咨询与建议

限定检索结果

文献类型

  • 33,330 篇 会议
  • 5,137 篇 期刊文献
  • 271 册 图书

馆藏范围

  • 38,738 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 23,831 篇 工学
    • 17,230 篇 计算机科学与技术...
    • 14,496 篇 软件工程
    • 6,363 篇 信息与通信工程
    • 3,832 篇 控制科学与工程
    • 2,915 篇 电子科学与技术(可...
    • 2,821 篇 电气工程
    • 2,609 篇 生物工程
    • 2,096 篇 生物医学工程(可授...
    • 1,646 篇 光学工程
    • 1,509 篇 机械工程
    • 1,357 篇 仪器科学与技术
    • 1,348 篇 动力工程及工程热...
    • 1,105 篇 化学工程与技术
    • 964 篇 安全科学与工程
    • 798 篇 交通运输工程
  • 12,119 篇 理学
    • 6,500 篇 数学
    • 3,289 篇 物理学
    • 2,862 篇 生物学
    • 2,166 篇 统计学(可授理学、...
    • 1,491 篇 系统科学
    • 1,175 篇 化学
  • 6,226 篇 管理学
    • 3,667 篇 管理科学与工程(可...
    • 2,870 篇 图书情报与档案管...
    • 1,985 篇 工商管理
  • 1,822 篇 医学
    • 1,564 篇 临床医学
    • 1,459 篇 基础医学(可授医学...
    • 945 篇 药学(可授医学、理...
    • 785 篇 公共卫生与预防医...
  • 1,182 篇 法学
    • 965 篇 社会学
  • 715 篇 经济学
    • 715 篇 应用经济学
  • 559 篇 农学
  • 475 篇 教育学
  • 184 篇 文学
  • 92 篇 军事学
  • 45 篇 艺术学
  • 1 篇 哲学

主题

  • 1,229 篇 accuracy
  • 974 篇 feature extracti...
  • 931 篇 computational mo...
  • 839 篇 deep learning
  • 782 篇 training
  • 768 篇 computer science
  • 629 篇 real-time system...
  • 617 篇 machine learning
  • 603 篇 support vector m...
  • 528 篇 predictive model...
  • 487 篇 internet of thin...
  • 437 篇 convolutional ne...
  • 415 篇 data models
  • 366 篇 reliability
  • 346 篇 computer archite...
  • 340 篇 data mining
  • 328 篇 optimization
  • 306 篇 routing
  • 304 篇 artificial intel...
  • 303 篇 wireless sensor ...

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 71 篇 tno technical sc...
  • 66 篇 università di ca...
  • 63 篇 université de st...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 53 篇 nikhef national ...
  • 53 篇 dept. of informa...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 47 篇 dept. of compute...
  • 43 篇 dept. of electri...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 81 篇 kalekin o.
  • 79 篇 boumaaza j.
  • 78 篇 díaz a.f.
  • 78 篇 coleiro a.
  • 70 篇 gozzini s.r.
  • 68 篇 huang f.
  • 61 篇 dallier r.
  • 54 篇 anguita m.
  • 51 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 37,337 篇 英文
  • 962 篇 其他
  • 337 篇 中文
  • 54 篇 日文
  • 47 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept of Computer Engineering and Computer Science"
38738 条 记 录,以下是4941-4950 订阅
排序:
An algorithm frequently mines a set of items for big data to enhance efficiency
An algorithm frequently mines a set of items for big data to...
收藏 引用
Automation and Computation (AUTOCOM), International Conference on
作者: Sanjay Kumar Sonkar Balkar Singh Dept. of Computer Science and Engineering SunRise University Alwar Rajasthan India
In the landscape of rapidly expanding data streams, deriving meaningful insights, particularly frequent itemsets, within massive datasets at a swift pace poses a significant challenge. Addressing this challenge, vario...
来源: 评论
Beta-Sigma VAE: Separating beta and decoder variance in Gaussian variational autoencoder
arXiv
收藏 引用
arXiv 2024年
作者: Kim, Seunghwan Lee, Seungkyu Dept. of Computer Science and Engineering Kyung Hee University Korea Republic of
Variational autoencoder (VAE) is an established generative model but is notorious for its blurriness. In this work, we investigate the blurry output problem of VAE and resolve it, exploiting the variance of Gaussian d... 详细信息
来源: 评论
Optimizing Resume Parsing Processes by Leveraging Large Language Models
Optimizing Resume Parsing Processes by Leveraging Large Lang...
收藏 引用
IEEE Region 10 Symposium
作者: Vazzula Manish Yugandhar Manchala Y. Vijayalata Sudeep Banerjee Chopra Kothi Yashwanth Reddy Dept. of Information Technology Vardhaman College of Engineering Hyderabad India Dept. of Computer Science & Engineering Vardhaman College of Engineering Hyderabad India Dept. of Computer Science (AI & ML) Vardhaman College of Engineering Hyderabad India
In the present era of internet revolution, organizations have to go through numerous resumes in order to identify the most suitable candidates for their Job Description (JD), while ensuring that no acquisition of tale... 详细信息
来源: 评论
Accelerating supersingular isogeny Diffie-Hellman (SIDH) cryptosystem for the security of resource-constrained IoT devices with FPGA  3
Accelerating supersingular isogeny Diffie-Hellman (SIDH) cry...
收藏 引用
3rd IEEE International Conference on Electronic engineering, ICEEM 2023
作者: Khadra, Shaimaa Abo Ismail, Nabil A. Attiya, Gamal M. Abdulrahman, Salah Eldin S. E. High Institute of Engineering and Technology Dept. Mechatronics Engineerng Al-Mahalla-El-Kobra Egypt Menoufia University Faculty of Electronic En. Dept. Computer Science & Engineering Menouf Egypt
It is imperative to note that post-quantum cryptography, such as supersingular isogeny Diffie-Hellman (SIDH), is essential for ensuring that Internet of Things (IoT) devices have a restricted amount of resources. The ... 详细信息
来源: 评论
Implementation of human-following robot system applying virtual delay to posture of a leader
Implementation of human-following robot system applying virt...
收藏 引用
Image Processing and Robotics (ICIP), International Conference on
作者: Fumiaki Takemori Dept. of Electrical Engineering and Computer Science Faculty of Engineering Tottori University Tottori JAPAN
This paper develops an implementation of a measurement and control system in which a vehicle follows its predecessor while maintaining a certain distance. First, we construct a model that virtually delays the referenc... 详细信息
来源: 评论
In-memory Machine Learning using Adaptive Multivariate Decision Trees and Memristors
In-memory Machine Learning using Adaptive Multivariate Decis...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Akash Chavan Pranav Sinha Sunny Raj Dept. of Computer Science and Engineering Oakland University Rochester MI USA
We introduce a framework to design in-memory decision tree machine-learning (ML) circuits using memristor crossbars. Decision trees (DTs) offer many advantages over neural networks, such as enhanced energy efficiency,... 详细信息
来源: 评论
Fraud Detection in Credit Card through the Machine Learning Algorithms  1
Fraud Detection in Credit Card through the Machine Learning ...
收藏 引用
1st IEEE International Conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Kummarikuta, Sandhya Muppagowni, Ganesh Karthik Patam, Keerthi Pennera, Mounika Patimeedi, Upendra Harshith Reddy, Poreddy Chandra Mohan Babu University School of Computing Dept. AIandML Tirupati India GITAM University-Bengaluru Campus GITAM School of Technology Department of CSE Bengaluru India Sree Vidyanikethan Engineering College Dept. Computer Science and Engineering Tirupati India
The threat of credit card fraud is high and so there should be efficient ways to combat it. The research is being employed to focus on how to enhance credit card fraud detection, machine learning methodologies can be ... 详细信息
来源: 评论
Enhancing Pneumonia Detection: CNN Interpretability with LIME and SHAP
Enhancing Pneumonia Detection: CNN Interpretability with LIM...
收藏 引用
International Conference on Electrical engineering and Information & Communication Technology (ICEEICT)
作者: Md. Hamid Hosen Arnob Saha Altaf Uddin Kahakashan Ashraf Sadia Nawar Dept. of Computer Science & Engineering East Delta University Chittagong Bangladesh
A bacterial or viral infection of the lungs can cause pneumonia, one of the dangerous and potentially fatal illnesses that can have dire repercussions in a short amount of time. Therefore, a key component of a success... 详细信息
来源: 评论
Quantum Machine Learning for Anomaly Detection in Consumer Electronics
Quantum Machine Learning for Anomaly Detection in Consumer E...
收藏 引用
IEEE computer Society Annual Symposium on VLSI
作者: Sounak Bhowmik Himanshu Thaplival Dept. of Electrical Engineering and Computer Science University of Tennessee Knoxville Tennessee
Anomaly detection is a crucial task in cyber security. Technological advancement brings new cyber-physical threats like network intrusion, financial fraud, identity theft, and property invasion. In the rapidly changin... 详细信息
来源: 评论
PointOfView: A Multi-modal Network for Few-shot 3D Point Cloud Classification Fusing Point and Multi-view Image Features
PointOfView: A Multi-modal Network for Few-shot 3D Point Clo...
收藏 引用
IEEE computer Society Conference on computer Vision and Pattern Recognition Workshops (CVPRW)
作者: Huantao Ren Jiyang Wang Minmin Yang Senem Velipasalar Electrical Engineering and Computer Science Dept Syracuse University Syracuse NY USA
Most existing 3D point cloud analysis approaches employ traditional supervised methods, which require large amounts of labeled data, and data annotation is labor-intensive, and costly. On the other hand, although many... 详细信息
来源: 评论