咨询与建议

限定检索结果

文献类型

  • 1,539 篇 会议
  • 370 篇 期刊文献
  • 33 册 图书

馆藏范围

  • 1,942 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,227 篇 工学
    • 896 篇 计算机科学与技术...
    • 739 篇 软件工程
    • 329 篇 信息与通信工程
    • 175 篇 控制科学与工程
    • 162 篇 生物医学工程(可授...
    • 146 篇 生物工程
    • 143 篇 电气工程
    • 129 篇 电子科学与技术(可...
    • 108 篇 光学工程
    • 62 篇 机械工程
    • 60 篇 仪器科学与技术
    • 54 篇 动力工程及工程热...
    • 45 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 安全科学与工程
  • 639 篇 理学
    • 343 篇 数学
    • 183 篇 物理学
    • 152 篇 生物学
    • 112 篇 统计学(可授理学、...
    • 85 篇 系统科学
    • 47 篇 化学
  • 320 篇 管理学
    • 179 篇 管理科学与工程(可...
    • 159 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 123 篇 医学
    • 113 篇 临床医学
    • 104 篇 基础医学(可授医学...
    • 70 篇 药学(可授医学、理...
    • 40 篇 公共卫生与预防医...
  • 47 篇 法学
    • 39 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 35 篇 教育学
  • 23 篇 农学
  • 4 篇 文学
  • 3 篇 艺术学
  • 1 篇 军事学

主题

  • 42 篇 training
  • 36 篇 feature extracti...
  • 32 篇 computational mo...
  • 31 篇 informatics
  • 31 篇 accuracy
  • 26 篇 artificial intel...
  • 24 篇 optimization
  • 22 篇 semantics
  • 22 篇 machine learning
  • 21 篇 computer archite...
  • 21 篇 predictive model...
  • 21 篇 testing
  • 20 篇 internet of thin...
  • 20 篇 vectors
  • 20 篇 quality of servi...
  • 20 篇 monitoring
  • 19 篇 support vector m...
  • 19 篇 resource managem...
  • 19 篇 data mining
  • 19 篇 visualization

机构

  • 22 篇 computer enginee...
  • 21 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 13 篇 computer enginee...
  • 12 篇 politeknik elekt...
  • 10 篇 national institu...
  • 10 篇 dept. of informa...
  • 10 篇 computer technol...
  • 9 篇 department of ph...
  • 9 篇 faculty of scien...
  • 9 篇 school of comput...
  • 9 篇 bahcesehir unive...
  • 9 篇 kirchhoff-instit...
  • 9 篇 department physi...
  • 9 篇 institute of phy...
  • 9 篇 department of ph...
  • 9 篇 department of ph...
  • 9 篇 computer technol...
  • 9 篇 rf and microwave...
  • 8 篇 dept. of applied...

作者

  • 31 篇 bouras christos
  • 27 篇 christos bouras
  • 23 篇 kostas berberidi...
  • 16 篇 dewantara bima s...
  • 15 篇 mesaritakis char...
  • 15 篇 berberidis kosta...
  • 14 篇 hatzilygeroudis ...
  • 14 篇 vasileios kokkin...
  • 14 篇 bogris adonis
  • 12 篇 kokkinos vasilei...
  • 11 篇 andreas papazois
  • 11 篇 catalyurek umit
  • 10 篇 sarigiannidis pa...
  • 10 篇 kaklamanis chris...
  • 10 篇 choo hyunseung
  • 10 篇 megalooikonomou ...
  • 9 篇 bellos p.
  • 9 篇 bona m.
  • 9 篇 bachacou h.
  • 9 篇 bressler s.

语言

  • 1,861 篇 英文
  • 58 篇 其他
  • 19 篇 中文
  • 3 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Dept Computer Engineering Informatics"
1942 条 记 录,以下是501-510 订阅
排序:
The Problem of Pos Tagging and Stemming for Agglutinative Languages (Turkish, Uyghur, Uzbek Languages)
The Problem of Pos Tagging and Stemming for Agglutinative La...
收藏 引用
International Conference on computer Science and engineering (UBMK)
作者: Elov Botir Boltayevich Eşref Adalι Khamroeva Shahlo Mirdjonovna Abdullayeva Oqila Xolmo'Minovna Xusainova Zilola Yuldashevna Xudayberganov Nizomaddin Uktamboy O'g'li Dept. of Computational Linguistics and Digital Technologies Tashkent State University of Uzbek Language and Literature named Alisher Navo'i Tashkent Uzbekistan Computer Engineering and Informatics Faculty Istanbul Technical University Istanbul Türkiye
The number of possible word forms in agglutinative languages is theoretically unlimited. This, in turn, creates the problem of POS tagging (part-of-speech) of out-of-vocabulary (OOV) words in agglutinative languages. ...
来源: 评论
RAN Explainable Anomaly Prediction for 6G Networks
RAN Explainable Anomaly Prediction for 6G Networks
收藏 引用
IEEE International Workshop on computer-Aided Modeling, Analysis, and Design of Communication Links and Networks, CAMAD
作者: Panagiotis Marantis Kostas Ramantas Christos Verikoukis Dept. of Signal Theory and Communications Universitat Politècnica de Catalunya Barcelona Spain Industrial Systems Institute Patras Greece Iquadrat Informatica S.L. Barcelona Spain Dept. of Computer Engineering and Informatics University of Patras Patras Greece Athena Research Center Athens Greece
Machine Learning (ML) models integrated into future 6G network architectures are anticipated to address the demanding task of Anomaly Detection (AD) at the Radio Access Network (RAN). A challenging but essential aspec... 详细信息
来源: 评论
Õ(n+poly(k))-time Algorithm for Bounded Tree Edit Distance
Õ(n+poly(k))-time Algorithm for Bounded Tree Edit Distance
收藏 引用
Annual IEEE Symposium on Foundations of computer Science
作者: Debarati Das Jacob Gilbert MohammadTaghi Hajiaghayi Tomasz Kociumaka Barna Saha Hamed Saleh Dept. of Computer Science & Engineering Pennsylvania State University State College PA United States Dept. of Computer Science University of Maryland College Park MD United States Max Planck Institute for Informatics Saarland Informatics Campus Saarbrücken Germany Dept. of Computer Science & Engineering Halıcıoğlu Data Science Institute University of California San Diego San Diego CA United States
Computing the edit distance of two strings is one of the most basic problems in computer science and combinatorial optimization. Tree edit distance is a natural generalization of edit distance in which the task is to ... 详细信息
来源: 评论
An Investigation of Running Load Comparisons of ARCore on Native Android and Unity for Outdoor Navigation System Using Smartphone
An Investigation of Running Load Comparisons of ARCore on Na...
收藏 引用
Vocational Education and Electrical engineering, International Conference on
作者: Komang Candra Brata Nobuo Funabiki Sritrusta Sukaridhoto Evianita Dewi Fajrianti Mustika Mentari Dept. of Information and Communication Systems Okayama University Okayama Japan Dept. of Informatics Engineering Universitas Brawijaya Malang Indonesia Dept. of Informatic and Computer Politeknik Elektronika Negeri Surabaya Surabaya Indonesia Dept. of Information Technology State Polytechnic of Malang Malang Indonesia
In recent years, the utilization of location-based augmented reality (LAR) has gained popularity across various domains, including tourism, education, gaming, and advertising. The advancements in AR technology have ma...
来源: 评论
An Energy-Autonomous SWIPT RFID Tag for Communication in the 2.4 GHz ISM Band  3
An Energy-Autonomous SWIPT RFID Tag for Communication in the...
收藏 引用
3rd URSI Atlantic and Asia Pacific Radio Science Meeting, AT-AP-RASC 2022
作者: Paolini, Giacomo Quddious, Abdul Chatzichristodoulou, David Masotti, Diego Nikolaou, Symeon Costanzo, Alessandra University of Bologna Dei 'Guglielmo Marconi' Bologna Italy Kios Research and Innovation Center of Excellence Nicosia Cyprus Frederick Research Center Nicosia Cyprus Rf and Microwave Solutions Ltd Cyprus Frederick University Dept. Electrical Computer Engineering and Informatics Nicosia Cyprus University of Bologna Dei 'Guglielmo Marconi' Cesena Italy
This paper presents the design of an energy autonomous radiofrequency identification (RFID) tag for communication and/or indoor localization. It makes use of the energy harvesting (EH) technique in the 915 MHz ultra-h... 详细信息
来源: 评论
MRIGAT: Many-to-many Recommendation using Interaction based Knowledge Graph Attention  22
MRIGAT: Many-to-many Recommendation using Interaction based ...
收藏 引用
3rd International Symposium on Artificial Intelligence for Medical Sciences, ISAIMS 2022
作者: Gao, Feng Yuan, Kai Gu, Jinguang Liu, Yun Department of Computer Science and Technology Wuhan University of Science and Technology China The Key Laboratory of Rich-Media Knowledge Organization Service of Digital Publishing Content Institute of Scientific and Technical Information of China China Guangxi Eco-engineering Vocational & Technical College China 1st Affiliated Hospital Dept. of Medical Informatics School of Biomedical Engineering & Informatic Nanjing Medical University China
Recommendation systems combining Graph Neural Networks and Knowledge Graphs have been successfully applied in various domains. However, most existing approaches only consider one-to-one or one-to-many user-item intera... 详细信息
来源: 评论
Enhanced Outsourced and Secure Inference for Tall Sparse Decision Trees
Enhanced Outsourced and Secure Inference for Tall Sparse Dec...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Andrew Quijano Spyros T. Halkidis Kevin Gallagher Kemal Akkaya Nikolaos Samaras Dept. of Computer Science and Engineering New York University New York NY USA Dept. of Applied Informatics University of Macedonia Thessaloniki Greece Nova Lincs Nova School of Science and Technology Lisbon Portugal Advanced Wireless and Security Lab Florida International University Miami FL USA
A decision tree is an easy-to-understand tool that has been widely used for classification tasks. On the one hand, due to privacy concerns, there has been an urgent need to create privacy-preserving classifiers that c... 详细信息
来源: 评论
Machine Vision Approach Using Multi Features for Detection of Oil Palm Stem Disease
Machine Vision Approach Using Multi Features for Detection o...
收藏 引用
Advanced engineering and Technologies (ICONNIC), International Conference on
作者: Anindita Septiarini Hamdani Hamdani Encik Akhmad Syaifudin Emy Setyaningsih Damar Nurcahyono Noor Alam Hadiwijaya Dept. of Informatics Mulawarman University Samarinda Indonesia Faculty of Agriculture Mulawarman University Samarinda Indonesia Department of Computer System Engineering Institut Sains Teknologi AKPRIND Yogyakarta Indonesia Dept. of Information Technology Politeknik Negeri Samarinda Samarinda Indonesia
Indonesia is a significant palm oil producer, widely cultivated due to its status as a prominent vegetable oil-producing plant. Palm oil is a highly sought-after crop in agriculture due to its profitability and the de...
来源: 评论
Using Natural Language Processing to Predict Costume Core Vocabulary of Historical Artifacts
Using Natural Language Processing to Predict Costume Core Vo...
收藏 引用
International Conference on Machine Learning and Applications (ICMLA)
作者: Madhuvanti Muralikrishnan Amr Hilal Chreston Miller Dina Smith-Glaviana Computer Science Dept Virginia Tech Blacksburg VA Informatics Lab Virginia Tech Blacksburg VA Department of Computer and Systems Engineering Alexandria University Egypt Apparel Housing and Resource Management Dept Virginia Tech Blacksburg VA
Historic dress artifacts are a valuable source for human studies. In particular, they can provide important insights into the social aspects of their corresponding era. These insights are commonly drawn from garment p... 详细信息
来源: 评论
Lossy Source Coding of Binary Memoryless Source by Trained LDGM Encoder
Lossy Source Coding of Binary Memoryless Source by Trained L...
收藏 引用
International Symposium on Information Theory and Its Applications, ISITA
作者: Kazuki Ogawa Hiromu Takata Motohiko Isaka Dept. of Informatics Graduate School of Science and Technology Kwansei Gakuin University Sanda Japan Dept. of Computer Science School of Engineering Kwansei Gakuin University Sanda Japan
Use of low-density generator matrix codes as codebook and encoding with message-passing algorithm is an efficient approach for lossy coding of the i.i.d. binary source. We propose lossy source encoder which is trained... 详细信息
来源: 评论