咨询与建议

限定检索结果

文献类型

  • 9,293 篇 会议
  • 5,798 篇 期刊文献
  • 296 册 图书

馆藏范围

  • 15,387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,802 篇 工学
    • 6,066 篇 计算机科学与技术...
    • 4,945 篇 软件工程
    • 2,045 篇 信息与通信工程
    • 1,279 篇 控制科学与工程
    • 1,202 篇 生物工程
    • 1,194 篇 生物医学工程(可授...
    • 954 篇 电气工程
    • 856 篇 电子科学与技术(可...
    • 766 篇 光学工程
    • 565 篇 机械工程
    • 491 篇 仪器科学与技术
    • 387 篇 化学工程与技术
    • 360 篇 动力工程及工程热...
    • 310 篇 安全科学与工程
    • 265 篇 交通运输工程
    • 258 篇 建筑学
  • 5,597 篇 理学
    • 2,617 篇 数学
    • 1,908 篇 物理学
    • 1,387 篇 生物学
    • 864 篇 统计学(可授理学、...
    • 604 篇 系统科学
    • 439 篇 化学
  • 2,354 篇 管理学
    • 1,354 篇 管理科学与工程(可...
    • 1,102 篇 图书情报与档案管...
    • 743 篇 工商管理
  • 1,162 篇 医学
    • 994 篇 临床医学
    • 889 篇 基础医学(可授医学...
    • 580 篇 药学(可授医学、理...
    • 409 篇 公共卫生与预防医...
  • 406 篇 法学
    • 345 篇 社会学
  • 250 篇 经济学
  • 218 篇 教育学
  • 211 篇 农学
  • 51 篇 文学
  • 21 篇 军事学
  • 21 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 477 篇 informatics
  • 250 篇 computational mo...
  • 214 篇 computer archite...
  • 212 篇 deep learning
  • 198 篇 machine learning
  • 187 篇 computer science
  • 182 篇 data mining
  • 160 篇 artificial intel...
  • 157 篇 image segmentati...
  • 157 篇 optimization
  • 153 篇 internet of thin...
  • 141 篇 feature extracti...
  • 139 篇 quality of servi...
  • 131 篇 wireless sensor ...
  • 127 篇 support vector m...
  • 127 篇 resource managem...
  • 125 篇 neural networks
  • 125 篇 bandwidth
  • 123 篇 monitoring
  • 122 篇 accuracy

机构

  • 411 篇 department for p...
  • 404 篇 faculty of scien...
  • 401 篇 department of ph...
  • 393 篇 kirchhoff-instit...
  • 385 篇 department of ph...
  • 384 篇 department of ph...
  • 358 篇 fakultät für phy...
  • 339 篇 institute of phy...
  • 329 篇 institute of phy...
  • 305 篇 department of ph...
  • 280 篇 department of ph...
  • 273 篇 instituto de fís...
  • 268 篇 graduate school ...
  • 268 篇 universidade fed...
  • 267 篇 department of ph...
  • 264 篇 ictp trieste
  • 254 篇 yerevan physics ...
  • 252 篇 department of ph...
  • 248 篇 department of ph...
  • 246 篇 nikhef national ...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 331 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 324 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 305 篇 s. guindon
  • 299 篇 y. tayalati
  • 299 篇 a. kaczmarska
  • 283 篇 m. klein
  • 281 篇 j. schaarschmidt
  • 267 篇 a. d. pilkington
  • 259 篇 f. pastore

语言

  • 14,571 篇 英文
  • 710 篇 其他
  • 98 篇 中文
  • 13 篇 日文
  • 4 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 爱沙尼亚文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Department of Informatics Engineering and Computer"
15387 条 记 录,以下是4991-5000 订阅
排序:
Systematic Assessment of the Interoperability Requirements and Challenges of Secure Blockchain-Based Electronic Health Records
收藏 引用
Security and Communication Networks 2022年 第0期2022卷
作者: Reegu, Faheem Ahmad Abas, Hafiza Hakami, Zaid Tiwari, Sanatan Akmam, Rudzidatul Muda, Iskandar Almashqbeh, Hashem Ali Jain, Rituraj Razak Faculty of Technology and Informatics Universiti Teknologi Malaysia Kuala Lumpur50480 Malaysia Department of Computer Science Jazan University Jazan45142 Saudi Arabia Faculty of Management Studies University of Delhi Delhi India Faculty Economic and Business Universitas Sumatera Utara Medan Indonesia Department of Business Qatar University Doha Qatar Department of Electrical and Computer Engineering Wollega University Nekemte Ethiopia
A peer-to-peer (P2P) decentralized information-sharing network is used to share data and maintain security, privacy, and integrity standards called blockchain. In this case, information sharing and updating require re... 详细信息
来源: 评论
Mutual information based logistic regression for phishing URL detection
Cyber Security and Applications
收藏 引用
Cyber Security and Applications 2024年 2卷
作者: Vajrobol, Vajratiya Gupta, Brij B. Gaurav, Akshat Institute of Informatics and Communication University of Delhi India International Center for AI and Cyber Security Research and Innovations (CCRI) Asia University Taiwan Department of Computer Science and Information Engineering Asia University Taichung 413 Taiwan Ronin Institute Montclair NJ United States Symbiosis Centre for Information Technology (SCIT) Symbiosis International University Pune India Department of Electrical and Computer Engineering Lebanese American University Beirut 1102 Lebanon Center for Interdisciplinary Research University of Petroleum and Energy Studies (UPES) Dehradun India
Phishing is a cybersecurity problem that hackers employ to deceive individuals and organizations. Phishing is dynamic in nature;the hackers change several tricks to deceive the victims in multiple ways. It is importan... 详细信息
来源: 评论
Robustness modularity in complex networks
收藏 引用
Physical Review E 2022年 第5期105卷 054308-054308页
作者: Filipi N. Silva Aiiad Albeshri Vijey Thayananthan Wadee Alhalabi Santo Fortunato Indiana University Network Science Institute (IUNI) Bloomington Indiana 47408 USA Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University Jeddah 21589 Kingdom of Saudi Arabia Luddy School of Informatics Computing and Engineering Indiana University Bloomington Indiana 47408 USA
A basic question in network community detection is how modular a given network is. This is usually addressed by evaluating the quality of partitions detected in the network. The Girvan-Newman (GN) modularity function ... 详细信息
来源: 评论
Undetectable Attacks on Boolean Networks
Undetectable Attacks on Boolean Networks
收藏 引用
IEEE Conference on Decision and Control
作者: Shiyong Zhu Jianquan Lu Jinde Cao Lin Lin James Lam Michael Ng Shun-ichi Azuma Department of Systems Science School of Mathematics Southeast University Nanjing China School of Mathematics Southeast University Nanjing China Yonsei Frontier Lab Yonsei University Seoul South Korea Department of Computer Science and Engineering Yunnan University Kunming China Department of Mechanical Engineering The University of Hong Kong Hong Kong Department of Mathematics The University of Hong Kong Hong Kong Graduate School of Informatics Kyoto University Yoshida-honmachi Sakyo-ku Kyoto Japan
In this paper, driven by the ever-increasing cyber-security threats, we study the undetectable attack problems for Boolean networks (BNs), which model distributed systems with a limited capacity of storage and bandwid...
来源: 评论
StatAvg: Mitigating Data Heterogeneity in Federated Learning for Intrusion Detection Systems
arXiv
收藏 引用
arXiv 2024年
作者: Bouzinis, Pavlos S. Radoglou-Grammatikis, Panagiotis Makris, Ioannis Lagkas, Thomas Argyriou, Vasileios Papadopoulos, Georgios Th. Sarigiannidis, Panagiotis Karagiannidis, George K. MetaMind Innovation P.C. Kila Kozani Kozani50100 Greece The Department of Electrical and Computer Engineering University of Western Macedonia Campus ZEP Kozani Kozani50100 Greece K3Y Ltd. William Gladstone 31 Sofia1000 Bulgaria The Department of Computer Science Democritus University of Thrace Kavala Campus Kavala65404 Greece The Department of Networks and Digital Media Kingston University London Penrhyn Road Kingston upon Thames Surrey LondonKT1 2EE United Kingdom The Department of Informatics and Telematics Harokopio University of Athens Omirou 9 Tavros AthensGR17778 Greece The Department of Electrical and Computer Engineering Aristotle University of Thessaloniki Thessaloniki54124 Greece Beirut1102 2801 Lebanon
Federated learning (FL) is a decentralised learning technique that enables participating devices to collaboratively build a shared Machine Learning (ML) or Deep Learning (DL) model without revealing their raw data to ... 详细信息
来源: 评论
Fast light-field 3D microscopy with out-of-distribution detection and adaptation through Conditional Normalizing Flows
arXiv
收藏 引用
arXiv 2023年
作者: Vizcaíno, Josué Page Symvoulidis, Panagiotis Wang, Zeguan Jelten, Jonas Favaro, Paolo Boyden, Edward S. Lasser, Tobias Computational Imaging and Inverse Problems Department of Informatics School of Computation Information and Technology Technical University of Munich Germany Munich Institute of Biomedical Engineering Technical University of Munich Germany Synthetic Neurobiology Group Massachusetts Institute of Technology United States Computer Vision Group University of Bern Switzerland
Real-time 3D fluorescence microscopy is crucial for the spatiotemporal analysis of live organisms, such as neural activity monitoring. The eXtended field-of-view light field microscope (XLFM), also known as Fourier li... 详细信息
来源: 评论
Intelligent Spectrum Occupancy Prediction for Realistic Measurements: GRU based Approach
Intelligent Spectrum Occupancy Prediction for Realistic Meas...
收藏 引用
International Black Sea Conference on Communications and Networking (BlackSeaCom)
作者: Armed Tusha Batuhan Kaplan Hakan Ali Cı rpan Khalid Qaraqe seyin Arslan Department of Electrical and Electronics Engineering Istanbul Medipol University Istanbul Turkey Department of Electrical and Computer Engineering Texas A&#x0026 M University at Qatar Doha Qatar Informatics and Information Security Research Center (B&#x0130 LGEM) T&#x00DC B&#x0130 TAK Kocaeli Turkey Department of Electronics and Communication Engineering Istanbul Technical University Istanbul Turkey Department of Electrical Engineering University of South Florida Tampa Florida USA
Cognitive radio (CR) technology has always been a research hotspot in the wireless communications field as it has the potential to significantly improve system capacity at the cost of increased processing time and pow... 详细信息
来源: 评论
Robust Recovery of Low Rank Matrix by Nonconvex Rank Regularization  11th
Robust Recovery of Low Rank Matrix by Nonconvex Rank Regular...
收藏 引用
11th International Conference on Image and Graphics, ICIG 2021
作者: Zhang, Hengmin Luo, Wei Du, Wenli Qian, Jianjun Yang, Jian Zhang, Bob Department of Computer and Information Science University of Macau 999078 China School of Information Science and Engineering Key Laboratory of Advanced Smart Manufacturing in Energy Chemical Process Ministry of Education East China University of Science and Technology Shanghai200237 China College of Mathematics and Informatics South China Agricultural University Guangzhou510642 China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China
As we know, nuclear norm based regularization methods have the real-world applications in pattern recognition and computer vision. However, there exists a biased estimator when nuclear norm relaxes the rank function. ... 详细信息
来源: 评论
Lightning-Fast Dual-Layer Lossless Coding for Radiance Format High Dynamic Range Images
arXiv
收藏 引用
arXiv 2023年
作者: Suzuki, Taizo Yukikata, Sara Yang, Kai Yoshida, Taichi The Institute of Engineering Information and Systems University of Tsukuba Ibaraki305-8573 Japan Sky Co. Ltd. Tokyo108-0075 Japan Da-Jiang Innovations Science and Technology Japan Co. Ltd. Tokyo108-0075 Japan The Department of Computer and Network Engineering Graduate School of Informatics and Engineering The University of Electro-Communications Tokyo182-8585 Japan
This paper proposes a fast dual-layer lossless coding for high dynamic range images (HDRIs) in the Radiance format. The coding, which consists of a base layer and a lossless enhancement layer, provides a standard dyna... 详细信息
来源: 评论
MassSpecGym: A benchmark for the discovery and identification of molecules
arXiv
收藏 引用
arXiv 2024年
作者: Bushuiev, Roman Bushuiev, Anton de Jonge, Niek F. Young, Adamo Kretschmer, Fleming Samusevich, Raman Heirman, Janne Wang, Fei Zhang, Luke Dührkop, Kai Ludwig, Marcus Haupt, Nils A. Kalia, Apurva Brungs, Corinna Schmid, Robin Greiner, Russell Wang, Bo Wishart, David S. Liu, Li-Ping Rousu, Juho Bittremieux, Wout Rost, Hannes Mak, Tytus D. Hassoun, Soha Huber, Florian van der Hooft, Justin J.J. Stravs, Michael A. Böcker, Sebastian Sivic, Josef Pluskal, Tomáš Institute of Organic Chemistry and Biochemistry The Czech Academy of Sciences Czech Republic Czech Institute of Informatics Robotics and Cybernetics Czech Technical University Czech Republic Bioinformatics Group Wageningen University & Research Netherlands Department of Computer Science University of Toronto Canada Institute for Computer Science Friedrich Schiller University Jena Germany Department of Computer Science University of Antwerp Belgium Department of Computing Science University of Alberta Canada Alberta Machine Intelligence Institute Canada Department of Molecular Genetics University of Toronto Canada Bright Giant GmbH Germany Department of Computer Science Tufts University United States Department of Biological Sciences University of Alberta Canada Department of Computer Science Aalto University Finland Mass Spectrometry Data Center National Institute of Standards and Technology United States Department of Chemical and Biological Engineering Tufts University United States Centre for Digitalisation and Digitality University of Applied Sciences Düsseldorf Germany Department of Biochemistry University of Johannesburg South Africa Eawag: Swiss Federal Institute of Aquatic Science and Technology Switzerland
The discovery and identification of molecules in biological and environmental samples is crucial for advancing biomedical and chemical sciences. Tandem mass spectrometry (MS/MS) is the leading technique for high-throu... 详细信息
来源: 评论