咨询与建议

限定检索结果

文献类型

  • 22,002 篇 会议
  • 3,560 篇 期刊文献
  • 208 册 图书

馆藏范围

  • 25,770 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,818 篇 工学
    • 11,160 篇 计算机科学与技术...
    • 9,365 篇 软件工程
    • 4,315 篇 信息与通信工程
    • 2,522 篇 控制科学与工程
    • 2,156 篇 电子科学与技术(可...
    • 2,145 篇 电气工程
    • 1,539 篇 生物工程
    • 1,319 篇 生物医学工程(可授...
    • 1,129 篇 光学工程
    • 1,029 篇 机械工程
    • 883 篇 仪器科学与技术
    • 835 篇 动力工程及工程热...
    • 744 篇 化学工程与技术
    • 627 篇 安全科学与工程
    • 525 篇 交通运输工程
    • 470 篇 材料科学与工程(可...
  • 8,230 篇 理学
    • 4,538 篇 数学
    • 2,413 篇 物理学
    • 1,706 篇 生物学
    • 1,378 篇 统计学(可授理学、...
    • 915 篇 系统科学
    • 763 篇 化学
  • 4,000 篇 管理学
    • 2,395 篇 管理科学与工程(可...
    • 1,838 篇 图书情报与档案管...
    • 1,252 篇 工商管理
  • 1,082 篇 医学
    • 947 篇 临床医学
    • 881 篇 基础医学(可授医学...
    • 574 篇 药学(可授医学、理...
    • 451 篇 公共卫生与预防医...
  • 712 篇 法学
    • 560 篇 社会学
  • 444 篇 经济学
  • 346 篇 教育学
  • 315 篇 农学
  • 110 篇 文学
  • 73 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 681 篇 accuracy
  • 529 篇 feature extracti...
  • 477 篇 deep learning
  • 473 篇 computational mo...
  • 376 篇 support vector m...
  • 370 篇 training
  • 365 篇 computer science
  • 320 篇 internet of thin...
  • 284 篇 machine learning
  • 280 篇 real-time system...
  • 278 篇 computer archite...
  • 235 篇 predictive model...
  • 221 篇 routing
  • 220 篇 reliability
  • 219 篇 optimization
  • 212 篇 data mining
  • 210 篇 neural networks
  • 207 篇 convolutional ne...
  • 199 篇 throughput
  • 194 篇 image segmentati...

机构

  • 85 篇 dept. of compute...
  • 84 篇 institut univers...
  • 83 篇 north-west unive...
  • 83 篇 tno technical sc...
  • 83 篇 université de st...
  • 82 篇 infn sezione di ...
  • 81 篇 national centre ...
  • 79 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 69 篇 university würzb...
  • 66 篇 università di ca...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 50 篇 university of jo...
  • 48 篇 university moham...
  • 44 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 91 篇 kalekin o.
  • 91 篇 díaz a.f.
  • 90 篇 boumaaza j.
  • 89 篇 calvo d.
  • 89 篇 coleiro a.
  • 82 篇 gal t.
  • 81 篇 bozza c.
  • 80 篇 chen a.
  • 77 篇 gozzini s.r.
  • 76 篇 dallier r.
  • 75 篇 huang f.
  • 72 篇 anguita m.
  • 63 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 58 篇 celli s.
  • 57 篇 boettcher m.
  • 54 篇 aly z.
  • 53 篇 dornic d.

语言

  • 24,769 篇 英文
  • 607 篇 其他
  • 295 篇 中文
  • 75 篇 日文
  • 21 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Dept. Computer Technology and Computer Graphics"
25770 条 记 录,以下是4801-4810 订阅
排序:
Ontology and specification-based intrusion detection and prevention system
Ontology and specification-based intrusion detection and pre...
收藏 引用
4th International Conference on the Next Generation Information technology Summit, Confluence 2013
作者: Garg, Shalini Garg, Ashish Kandpal, Ankita Joshi, Kajal Chauhan, Rashmi Goudar, R.H. Dept. of Information Technology Graphic Era University Dehradun India Dept. of Computer Science and Engineering Graphic Era University Dehradun India
Nowadays Intrusion Detection systems plays very important role in Network security. With the growing use of internet, the possibility of being attacked is also increasing. People are using signature based IDS's an... 详细信息
来源: 评论
Performance Analysis of Artificial Neural Network Based Classfiers for Cyberbulling Detection  3
Performance Analysis of Artificial Neural Network Based Clas...
收藏 引用
3rd International Conference on computer Science and Engineering, UBMK 2018
作者: Curuk, Eren Aci, Cigdem Sarac Essiz, Esra Dept. of Electrical-Electronics Engineering Mersin University Mersin Turkey Dept. of Computer Engineering Adana Science and Technology University Adana Turkey
In this study, analyzes were performed to detection of cyberbullying by Artificial Neural Network (ANN) based classifiers. In contrast to the general classifiers used in the detection of cyberbullying in the literatur... 详细信息
来源: 评论
Reversible binary image data hiding by run-length histogram modification
Reversible binary image data hiding by run-length histogram ...
收藏 引用
作者: Xuan, Guorong Shi, Yun Q. Chai, Peiqi Tong, Xuefeng Teng, Jianzhong Li, Jue Dept. of Computer Science Tongji University Shanghai China Dept. of ECE New Jersey Institute of Technology Newark NJ United States
A novel reversible binary image data hiding scheme using run-length (RL) histogram modification is presented in this paper. The binary image is scanned from left to right and from top to bottom to form a sequence of a... 详细信息
来源: 评论
FFT on a new parallel vector processor  2nd
收藏 引用
2nd Conference on Algorithms and Hardware for Parallel Processing, CONPAR 1986
作者: Lau, K.K. Qiao, X.Z. Dept. of Computer Science University of Manchester Oxford Road ManchesterM13 9PL United Kingdom Dept. of Computer Architecture Institute of Computing Technology Academia Sinica Beijing China
A new parallel processing system has been proposed, and a prototype model of the system has been constructed. It is designed to perform parallel vector operations at maximum efficiency. In addition, it can also handle... 详细信息
来源: 评论
Brainwave typing: Comparative study of P300 and motor imagery for typing using dry-electrode EEG devices
Brainwave typing: Comparative study of P300 and motor imager...
收藏 引用
15th International Conference on Human-computer Interaction, HCI International 2013
作者: Al-Negheimish, Hadeel Al-Andas, Lama Al-Mofeez, Latifah Al-Abdullatif, Aljawharah Al-Khalifa, Nuha Al-Wabil, Areej Information Technology Dept. College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia Software Engineering Dept. College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
This paper presents the findings of an exploratory study comparing two of Brain-computer Interface approaches, P300 and Motor Imagery, with EEG signals acquired using the Emotiv Neuroheadset. It was conducted to deter... 详细信息
来源: 评论
Face recognition with only one training sample
收藏 引用
25th Chinese Control Conference, CCC 2006
作者: Chong, Lu Wanquan, Liu Senjian, An Dept. of Computer Science YiLi Normal College Yining 835000 China Dept. of Computing Curtin University of Technology WA 6102 Australia
In this paper, we compare the face recognition performance for five different methods with using only one training sample. Firstly, we investigate the Singular Value Decomposition (SVD) Of the face image and propose a... 详细信息
来源: 评论
Second-order adaptive bandwidth allocation to control delay of multicast multimedia streams in DiffServ router
Second-order adaptive bandwidth allocation to control delay ...
收藏 引用
Proceedings - IEEE Sixth International Symposium on Multimedia Software Engineering, MSE 2004
作者: Horng, Mong-Fong Kuo, Yau-Hwang Hsu, Jang-Pong Cheng, Ren-Hao Dept. Computer Science and Information Engineering Shu-Te University Taiwan Dept. of Computer Science and Information Engineering National Cheng-Kung University Taiwan Advanced Internet Multimedia Technology Inc. Taiwan
The proposed ABA scheme uses the queue occupancy as a feedback to adaptively allocate the bandwidth for each queue of EF PHB. Because the allocated bandwidth converges to the corresponding input traffic, ABA remains t... 详细信息
来源: 评论
A search theoretical approach to P2P networks: Analysis of learning
A search theoretical approach to P2P networks: Analysis of l...
收藏 引用
Advanced International Conference on Telecommunications andInternational Conference on Internet and Web Applications and Services, AICT/ICIW'06
作者: Taş, Nazif Cihan Taş, Bedri Kâmil Onur Dept. of Computer Science University of Maryland College Park MD 20742 Dept. of Economics TOBB Economics and Technology University Ankara Turkey
One of the main characteristics of the peer-to-peer systems is the highly dynamic nature of the users present in the system. In such a rapidly changing enviroment, end-user guarantees become hard to handle. In this pa... 详细信息
来源: 评论
The Early Detection of Dementia Disease Using Machine Learning Approach
The Early Detection of Dementia Disease Using Machine Learni...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Kabir, Md. Shariar Khanom, Jakia Bhuiyan, Md. Atik Tumpa, Zerin Nasrin Rabby, S.K. Fazlee Bilgaiyan, Saurabh Daffodil International University Dept. of Computer Science and Engineering Dhaka Bangladesh Daffodil International University Dept. of Software Engineering Dhaka Bangladesh Kalinga Institute of Industrial Technology School of Computer Engineering Bhubaneswar India
Early dementia detection is a crucial but challenging task in Bangladesh. Often, dementia is not recognized until it is too late to receive effective care. This results in part from a lack of knowledge about the illne... 详细信息
来源: 评论
MMR-based active machine learning for bio named entity recognition
MMR-based active machine learning for bio named entity recog...
收藏 引用
2006 Human Language technology Conference of the North American Chapter of the Association of Computational Linguistics, HLT-NAACL 2006
作者: Kim, Seokhwan Song, Yu Kim, Kyungduk Cha, Jeong-Won Lee, Gary Geunbae Dept. of Computer Science and Engineering POSTECH Pohang Korea Republic of AIA Information Technology Co. Ltd. Beijing China Dept. of Computer Science Changwon National University Changwon Korea Republic of
This paper presents a new active learning paradigm which considers not only the uncertainty of the classifier but also the diversity of the corpus. The two measures for uncertainty and diversity were combined using th... 详细信息
来源: 评论