咨询与建议

限定检索结果

文献类型

  • 9,293 篇 会议
  • 5,798 篇 期刊文献
  • 296 册 图书

馆藏范围

  • 15,387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,802 篇 工学
    • 6,066 篇 计算机科学与技术...
    • 4,945 篇 软件工程
    • 2,045 篇 信息与通信工程
    • 1,279 篇 控制科学与工程
    • 1,202 篇 生物工程
    • 1,194 篇 生物医学工程(可授...
    • 954 篇 电气工程
    • 856 篇 电子科学与技术(可...
    • 766 篇 光学工程
    • 565 篇 机械工程
    • 491 篇 仪器科学与技术
    • 387 篇 化学工程与技术
    • 360 篇 动力工程及工程热...
    • 310 篇 安全科学与工程
    • 265 篇 交通运输工程
    • 258 篇 建筑学
  • 5,597 篇 理学
    • 2,617 篇 数学
    • 1,908 篇 物理学
    • 1,387 篇 生物学
    • 864 篇 统计学(可授理学、...
    • 604 篇 系统科学
    • 439 篇 化学
  • 2,354 篇 管理学
    • 1,354 篇 管理科学与工程(可...
    • 1,102 篇 图书情报与档案管...
    • 743 篇 工商管理
  • 1,162 篇 医学
    • 994 篇 临床医学
    • 889 篇 基础医学(可授医学...
    • 580 篇 药学(可授医学、理...
    • 409 篇 公共卫生与预防医...
  • 406 篇 法学
    • 345 篇 社会学
  • 250 篇 经济学
  • 218 篇 教育学
  • 211 篇 农学
  • 51 篇 文学
  • 21 篇 军事学
  • 21 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 477 篇 informatics
  • 250 篇 computational mo...
  • 214 篇 computer archite...
  • 212 篇 deep learning
  • 198 篇 machine learning
  • 187 篇 computer science
  • 182 篇 data mining
  • 160 篇 artificial intel...
  • 157 篇 image segmentati...
  • 157 篇 optimization
  • 153 篇 internet of thin...
  • 141 篇 feature extracti...
  • 139 篇 quality of servi...
  • 131 篇 wireless sensor ...
  • 127 篇 support vector m...
  • 127 篇 resource managem...
  • 125 篇 neural networks
  • 125 篇 bandwidth
  • 123 篇 monitoring
  • 122 篇 accuracy

机构

  • 411 篇 department for p...
  • 404 篇 faculty of scien...
  • 401 篇 department of ph...
  • 393 篇 kirchhoff-instit...
  • 385 篇 department of ph...
  • 384 篇 department of ph...
  • 358 篇 fakultät für phy...
  • 339 篇 institute of phy...
  • 329 篇 institute of phy...
  • 305 篇 department of ph...
  • 280 篇 department of ph...
  • 273 篇 instituto de fís...
  • 268 篇 graduate school ...
  • 268 篇 universidade fed...
  • 267 篇 department of ph...
  • 264 篇 ictp trieste
  • 254 篇 yerevan physics ...
  • 252 篇 department of ph...
  • 248 篇 department of ph...
  • 246 篇 nikhef national ...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 331 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 324 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 305 篇 s. guindon
  • 299 篇 y. tayalati
  • 299 篇 a. kaczmarska
  • 283 篇 m. klein
  • 281 篇 j. schaarschmidt
  • 267 篇 a. d. pilkington
  • 259 篇 f. pastore

语言

  • 14,571 篇 英文
  • 710 篇 其他
  • 98 篇 中文
  • 13 篇 日文
  • 4 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 爱沙尼亚文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Department of informatics and Computer Engineering"
15387 条 记 录,以下是921-930 订阅
排序:
A Network Simulator as a Service for Demanding Performance Evaluation of Wireless and IoT Scenarios  2
A Network Simulator as a Service for Demanding Performance E...
收藏 引用
2nd IEEE International Mediterranean Conference on Communications and Networking, MeditCom 2022
作者: Antonopoulos, Konstantinos Ringas, Dimitrios Christopoulou, Eleni Keramidas, Georgios Antonopoulos, Christos Voros, Nikolaos University of Peloponesse Electrical and Computer Engineering Department Patras Greece Ionian University Department of Informatics Corfu Greece School of Informatics Aristotle University of Thessaloniki Thessaloniki Greece
This paper presents the design, development and evaluation of a novel Network Simulator as a Service infrastructure. It is based on a prominent open-source discrete-event network simulator which is extended to offer a... 详细信息
来源: 评论
On Quantitative Algebraic Higher-Order Theories  7
On Quantitative Algebraic Higher-Order Theories
收藏 引用
7th International Conference on Formal Structures for Computation and Deduction, FSCD 2022
作者: Lago, Ugo Dal Honsell, Furio Lenisa, Marina Pistone, Paolo Department of Computer Science and Engineering University of Bologna Italy Department of Mathematical Sciences Informatics and Physics University of Udine Italy
We explore the possibility of extending Mardare et al.’s quantitative algebras to the structures which naturally emerge from Combinatory Logic and the λ-calculus. First of all, we show that the framework is indeed a... 详细信息
来源: 评论
New Cloud Computing Authentication Based on Secure Hash Algorithm (SHA-3) and Lightweight Sosemanuk Algorithm  2nd
New Cloud Computing Authentication Based on Secure Hash Algo...
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Niaf, Jolan Rokan Kadhim, Aqeel Kamil Mohammed, Qutaiba Humadi Hoomod, Haider K. Salman, Muna Muhsen Iraqi Commission for Computers & Informatics Informatics Institute for Postgraduate Studies Baghdad Iraq Computer Techniques Engineering Department Imam Al-Kadhim College Baghdad Iraq College of Nursing University of Baghdad Baghdad Iraq College of Education Al-Mustansiriyah University Baghdad Iraq Ministry of Science and Technology Department of Information Technology Baghdad Iraq
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of... 详细信息
来源: 评论
(ω1,ω2)-temporal random hyperbolic graphs
arXiv
收藏 引用
arXiv 2024年
作者: Zambirinis, Sofoclis Papadopoulos, Fragkiskos Department of Electrical Engineering Computer Engineering and Informatics Cyprus University of Technology Limassol3036 Cyprus
We extend a recent model of temporal random hyperbolic graphs by allowing connections and disconnections to persist across network snapshots with different probabilities, ω1 and ω2. This extension, while conceptuall... 详细信息
来源: 评论
Practical Evaluation of Graph Neural Networks in Network Intrusion Detection
Practical Evaluation of Graph Neural Networks in Network Int...
收藏 引用
2023 Italian Conference on Cyber Security, ITASEC 2023
作者: Venturi, Andrea Pellegrini, Daniele Andreolini, Mauro Ferretti, Luca Marchetti, Mirco Colajanni, Michele Department of Engineering "Enzo Ferrari" University of Modena and Reggio Emilia Modena Italy Department of Physics Computer Science and Mathematics University of Modena and Reggio Emilia Modena Italy Department of Informatics Science and Engineering University of Bologna Bologna Italy
The most recent proposals of Machine and Deep Learning algorithms for Network Intrusion Detection Systems (NIDS) leverage Graph Neural Networks (GNN). These techniques create a graph representation of network traffic ... 详细信息
来源: 评论
Urban Pluvial Flood Prediction Using Machine Learning Models  4
Urban Pluvial Flood Prediction Using Machine Learning Models
收藏 引用
4th International Conference on Innovations in computer Science, ICONICS 2024
作者: Waseemullah Hassan, Tahir Majeed, Sajid Memon, Muhammad Qasim NED University of Engineering and Technology Department of Computer Science & Information Technology Karachi Pakistan Institute of Space Technology Department of Remote Sensing & Geo-Informatics Karachi Pakistan University of Sufism and Modern Sciences Department of Information and Computing Bhitshah Pakistan
Urban pluvial flooding causes threats to human lives, economy, infrastructure, and ecosystems around the world, particularly in developing countries. Pakistan is among those developing countries that have become vulne... 详细信息
来源: 评论
Social engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable Systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论
Handwritten Signature Recognition Using Siamese Neural Network
Handwritten Signature Recognition Using Siamese Neural Netwo...
收藏 引用
International Conference on computer engineering, Network and Intelligent Multimedia (CENIM)
作者: Yuliana Setiowati Arna Fariza Muhamad Rifqi Luthfi Ramadhan Informatics and Computer Engineering Department Politeknik Elektronika Negeri Surabaya Surabaya Indonesia
This research proposes a novel approach to addressing the issue of signature authenticity identification by implementing Deep Metric Learning (DML). The aim of this study is to develop a DML model with high accuracy i... 详细信息
来源: 评论
Secure & Traceable Companies File Management System Using Blockchain and IPFS
Secure & Traceable Companies File Management System Using Bl...
收藏 引用
IEEE International Symposium on Consumer Electronics (ISCE)
作者: Cahyo Arissabarno Sritrusta Sukaridhoto Idris Winarno Department of Informatics and Computer Engineering Politeknik Elektronika Negeri Surabaya Surabaya Indonesia
With the advancement of cloud-based file management platforms, sharing and storing files in the company's area can be easily achieved through a variety of file-sharing platforms. However, these platforms often lac... 详细信息
来源: 评论
CO2 sensor placement for the prompt identification of high virus transmission-risk conditions  17
CO2 sensor placement for the prompt identification of high v...
收藏 引用
17th International Conference on Indoor Air Quality and Climate, INDOOR AIR 2022
作者: Athanasiou, Modestos Kyriacou, Alexis Michaelides, Michalis P. Lelantus Innovations Ltd Nicosia Cyprus Department of Electrical Engineering Computer Engineering and Informatics Cyprus University of Technology Limassol Cyprus
Poor Indoor Air Quality (IAQ) can contribute to airborne viruses remaining viable for longer time periods with the increased risk of infecting more people. Various methodologies, usually by considering CO2 concentrati... 详细信息
来源: 评论