咨询与建议

限定检索结果

文献类型

  • 22,002 篇 会议
  • 3,552 篇 期刊文献
  • 208 册 图书

馆藏范围

  • 25,762 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,810 篇 工学
    • 11,148 篇 计算机科学与技术...
    • 9,355 篇 软件工程
    • 4,296 篇 信息与通信工程
    • 2,504 篇 控制科学与工程
    • 2,154 篇 电子科学与技术(可...
    • 2,139 篇 电气工程
    • 1,539 篇 生物工程
    • 1,321 篇 生物医学工程(可授...
    • 1,135 篇 光学工程
    • 1,029 篇 机械工程
    • 884 篇 仪器科学与技术
    • 834 篇 动力工程及工程热...
    • 744 篇 化学工程与技术
    • 624 篇 安全科学与工程
    • 524 篇 交通运输工程
    • 467 篇 材料科学与工程(可...
    • 445 篇 建筑学
  • 8,214 篇 理学
    • 4,524 篇 数学
    • 2,415 篇 物理学
    • 1,705 篇 生物学
    • 1,374 篇 统计学(可授理学、...
    • 916 篇 系统科学
    • 760 篇 化学
  • 3,990 篇 管理学
    • 2,397 篇 管理科学与工程(可...
    • 1,826 篇 图书情报与档案管...
    • 1,258 篇 工商管理
  • 1,071 篇 医学
    • 948 篇 临床医学
    • 882 篇 基础医学(可授医学...
    • 574 篇 药学(可授医学、理...
  • 713 篇 法学
    • 561 篇 社会学
  • 445 篇 经济学
  • 346 篇 教育学
  • 316 篇 农学
  • 110 篇 文学
  • 73 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 681 篇 accuracy
  • 529 篇 feature extracti...
  • 474 篇 deep learning
  • 473 篇 computational mo...
  • 376 篇 support vector m...
  • 370 篇 training
  • 365 篇 computer science
  • 319 篇 internet of thin...
  • 283 篇 machine learning
  • 281 篇 real-time system...
  • 278 篇 computer archite...
  • 235 篇 predictive model...
  • 221 篇 routing
  • 220 篇 reliability
  • 218 篇 optimization
  • 212 篇 data mining
  • 210 篇 neural networks
  • 207 篇 convolutional ne...
  • 199 篇 throughput
  • 193 篇 image segmentati...

机构

  • 85 篇 dept. of compute...
  • 84 篇 institut univers...
  • 83 篇 north-west unive...
  • 83 篇 université de st...
  • 82 篇 infn sezione di ...
  • 82 篇 tno technical sc...
  • 81 篇 national centre ...
  • 79 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 69 篇 university würzb...
  • 66 篇 università di ca...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 50 篇 university of jo...
  • 48 篇 university moham...
  • 44 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 92 篇 kalekin o.
  • 92 篇 díaz a.f.
  • 91 篇 boumaaza j.
  • 90 篇 coleiro a.
  • 89 篇 calvo d.
  • 83 篇 gal t.
  • 82 篇 bozza c.
  • 80 篇 chen a.
  • 78 篇 gozzini s.r.
  • 76 篇 huang f.
  • 76 篇 dallier r.
  • 72 篇 anguita m.
  • 63 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 58 篇 boettcher m.
  • 57 篇 celli s.
  • 54 篇 aly z.
  • 52 篇 dornic d.

语言

  • 24,761 篇 英文
  • 608 篇 其他
  • 295 篇 中文
  • 75 篇 日文
  • 21 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Dept. Computer Technology and Computer Graphics"
25762 条 记 录,以下是4791-4800 订阅
排序:
Automated segmentation and classification of the atherosclerotic carotid plaque in ultrasound videos  24
Automated segmentation and classification of the atheroscler...
收藏 引用
24th International Conference on Digital Signal Processing, DSP 2023
作者: Liapi, Georgia D. Gemenaris, Michalis Loizou, Christos P. Kyriacou, Efthyvoulos Constatninou, Kyriacos P. Nicolaides, Andrew Dept. of Electrical Eng. Computer Eng. and Informatics Cyprus University of Technology Limassol Cyprus Dept. of Computer Science University of Cyprus Nicosia Cyprus Vascular Screening and Diagnostic Centre Nicosia Cyprus
The automated and reliable delineation of atherosclerotic carotid plaques in ultrasound (CUS) videos is of significant clinical relevance for management of the disease and the prediction of future stroke events. To fa... 详细信息
来源: 评论
Anomaly Detection from Web Log Data Using Machine Learning Model  7
Anomaly Detection from Web Log Data Using Machine Learning M...
收藏 引用
7th International Conference on computer Applications in Electrical Engineering-Recent Advances, CERA 2023
作者: Mishra, Amit Kumar Bagla, Piyush Sharma, Ravi Pandey, Neeraj Kumar Tripathi, Neha Graphic Era Hill University Dept. of Computer Science & Engineering Dehradun India National Institute of Technology Department of Computer Science & Engineering Jalandhar India Department of Computer Science & Engineering Dehradun India
The information in the logs produced by the servers, devices, and applications can be utilized to assess the system's health. It's crucial to manually review logs, for instance, during upgrades, to verify whet... 详细信息
来源: 评论
An evaluation method for toll policy in transportation
An evaluation method for toll policy in transportation
收藏 引用
1st International Conference on E-Business and E-Government, ICEE 2010
作者: Chen, Dafeng He, Xiaozheng Dept. of Computer Science and Technology Nanjing Audit University Nanjing China Dept. of Civil Engineering University of Minnesota MN United States
Tolling is generally considered to be a method for balancing the supply and demand of social resources. This paper explores the emergence and development of the transportation toll policy. It examines the influence of... 详细信息
来源: 评论
Multi-Agent H-Learning Based Cooperative Spectrum Sensing for Cognitive Radio Networks  32
Multi-Agent H-Learning Based Cooperative Spectrum Sensing fo...
收藏 引用
32nd International Conference on Electrical Engineering, ICEE 2024
作者: Fard, E. Karimpour Nouri, M. Behroozi, H. Sobhi-Givi, S. Sharif University of Technology Dept. of Electrical Engineering Tehran Iran University of Mohaghegh Ardabili Dept. of Electrical and Computer Engineering Ardabil Iran
Fast and accurate methods for spectrum sensing (SS) are the key elements in cognitive radio networks (CRNs) that achieve high SS. This paper proposes a reinforcement learning (RL) scheme for secondary users (SUs) in a... 详细信息
来源: 评论
Power in normative systems
Power in normative systems
收藏 引用
8th International Joint Conference on Autonomous Agents and Multiagent Systems 2009, AAMAS 2009
作者: Agotnest, Thomas Van Der Hoek, Wiebe Tennenholtz, Moshe Wooldridge, Michael Dept. of Computer Engineering Bergen University College Bergen Norway Dept. of Computer Engineering University of Liverpool Liverpool United Kingdom Microsoft Israel R and D Center Technion-Israel Institute of Technology Israel
Power indices such as the Banzhaf index were originally developed within voting theory in an attempt to rigorously characterise the influence that a voter is able to wield in a particular voting game. In this paper, w... 详细信息
来源: 评论
Ontology and specification-based intrusion detection and prevention system
Ontology and specification-based intrusion detection and pre...
收藏 引用
4th International Conference on the Next Generation Information technology Summit, Confluence 2013
作者: Garg, Shalini Garg, Ashish Kandpal, Ankita Joshi, Kajal Chauhan, Rashmi Goudar, R.H. Dept. of Information Technology Graphic Era University Dehradun India Dept. of Computer Science and Engineering Graphic Era University Dehradun India
Nowadays Intrusion Detection systems plays very important role in Network security. With the growing use of internet, the possibility of being attacked is also increasing. People are using signature based IDS's an... 详细信息
来源: 评论
Performance Analysis of Artificial Neural Network Based Classfiers for Cyberbulling Detection  3
Performance Analysis of Artificial Neural Network Based Clas...
收藏 引用
3rd International Conference on computer Science and Engineering, UBMK 2018
作者: Curuk, Eren Aci, Cigdem Sarac Essiz, Esra Dept. of Electrical-Electronics Engineering Mersin University Mersin Turkey Dept. of Computer Engineering Adana Science and Technology University Adana Turkey
In this study, analyzes were performed to detection of cyberbullying by Artificial Neural Network (ANN) based classifiers. In contrast to the general classifiers used in the detection of cyberbullying in the literatur... 详细信息
来源: 评论
Reversible binary image data hiding by run-length histogram modification
Reversible binary image data hiding by run-length histogram ...
收藏 引用
作者: Xuan, Guorong Shi, Yun Q. Chai, Peiqi Tong, Xuefeng Teng, Jianzhong Li, Jue Dept. of Computer Science Tongji University Shanghai China Dept. of ECE New Jersey Institute of Technology Newark NJ United States
A novel reversible binary image data hiding scheme using run-length (RL) histogram modification is presented in this paper. The binary image is scanned from left to right and from top to bottom to form a sequence of a... 详细信息
来源: 评论
FFT on a new parallel vector processor  2nd
收藏 引用
2nd Conference on Algorithms and Hardware for Parallel Processing, CONPAR 1986
作者: Lau, K.K. Qiao, X.Z. Dept. of Computer Science University of Manchester Oxford Road ManchesterM13 9PL United Kingdom Dept. of Computer Architecture Institute of Computing Technology Academia Sinica Beijing China
A new parallel processing system has been proposed, and a prototype model of the system has been constructed. It is designed to perform parallel vector operations at maximum efficiency. In addition, it can also handle... 详细信息
来源: 评论
Brainwave typing: Comparative study of P300 and motor imagery for typing using dry-electrode EEG devices
Brainwave typing: Comparative study of P300 and motor imager...
收藏 引用
15th International Conference on Human-computer Interaction, HCI International 2013
作者: Al-Negheimish, Hadeel Al-Andas, Lama Al-Mofeez, Latifah Al-Abdullatif, Aljawharah Al-Khalifa, Nuha Al-Wabil, Areej Information Technology Dept. College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia Software Engineering Dept. College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
This paper presents the findings of an exploratory study comparing two of Brain-computer Interface approaches, P300 and Motor Imagery, with EEG signals acquired using the Emotiv Neuroheadset. It was conducted to deter... 详细信息
来源: 评论