咨询与建议

限定检索结果

文献类型

  • 22,002 篇 会议
  • 3,560 篇 期刊文献
  • 208 册 图书

馆藏范围

  • 25,770 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,818 篇 工学
    • 11,160 篇 计算机科学与技术...
    • 9,365 篇 软件工程
    • 4,315 篇 信息与通信工程
    • 2,522 篇 控制科学与工程
    • 2,156 篇 电子科学与技术(可...
    • 2,145 篇 电气工程
    • 1,539 篇 生物工程
    • 1,319 篇 生物医学工程(可授...
    • 1,129 篇 光学工程
    • 1,029 篇 机械工程
    • 883 篇 仪器科学与技术
    • 835 篇 动力工程及工程热...
    • 744 篇 化学工程与技术
    • 627 篇 安全科学与工程
    • 525 篇 交通运输工程
    • 470 篇 材料科学与工程(可...
  • 8,230 篇 理学
    • 4,538 篇 数学
    • 2,413 篇 物理学
    • 1,706 篇 生物学
    • 1,378 篇 统计学(可授理学、...
    • 915 篇 系统科学
    • 763 篇 化学
  • 4,000 篇 管理学
    • 2,395 篇 管理科学与工程(可...
    • 1,838 篇 图书情报与档案管...
    • 1,252 篇 工商管理
  • 1,082 篇 医学
    • 947 篇 临床医学
    • 881 篇 基础医学(可授医学...
    • 574 篇 药学(可授医学、理...
    • 451 篇 公共卫生与预防医...
  • 712 篇 法学
    • 560 篇 社会学
  • 444 篇 经济学
  • 346 篇 教育学
  • 315 篇 农学
  • 110 篇 文学
  • 73 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 681 篇 accuracy
  • 529 篇 feature extracti...
  • 477 篇 deep learning
  • 473 篇 computational mo...
  • 376 篇 support vector m...
  • 370 篇 training
  • 365 篇 computer science
  • 320 篇 internet of thin...
  • 284 篇 machine learning
  • 280 篇 real-time system...
  • 278 篇 computer archite...
  • 235 篇 predictive model...
  • 221 篇 routing
  • 220 篇 reliability
  • 219 篇 optimization
  • 212 篇 data mining
  • 210 篇 neural networks
  • 207 篇 convolutional ne...
  • 199 篇 throughput
  • 194 篇 image segmentati...

机构

  • 85 篇 dept. of compute...
  • 84 篇 institut univers...
  • 83 篇 north-west unive...
  • 83 篇 tno technical sc...
  • 83 篇 université de st...
  • 82 篇 infn sezione di ...
  • 81 篇 national centre ...
  • 79 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 69 篇 university würzb...
  • 66 篇 università di ca...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 50 篇 university of jo...
  • 48 篇 university moham...
  • 44 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 91 篇 kalekin o.
  • 91 篇 díaz a.f.
  • 90 篇 boumaaza j.
  • 89 篇 calvo d.
  • 89 篇 coleiro a.
  • 82 篇 gal t.
  • 81 篇 bozza c.
  • 80 篇 chen a.
  • 77 篇 gozzini s.r.
  • 76 篇 dallier r.
  • 75 篇 huang f.
  • 72 篇 anguita m.
  • 63 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 58 篇 celli s.
  • 57 篇 boettcher m.
  • 54 篇 aly z.
  • 53 篇 dornic d.

语言

  • 24,769 篇 英文
  • 607 篇 其他
  • 295 篇 中文
  • 75 篇 日文
  • 21 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Dept. Computer Technology and Computer Graphics"
25770 条 记 录,以下是4851-4860 订阅
排序:
The potential for implementing a big data analytic-based smart village in Indonesia
The potential for implementing a big data analytic-based sma...
收藏 引用
2020 International Conference on computer Science and Its Application in Agriculture, ICOSICA 2020
作者: Tosida, Eneng Tita Herdiyeni, Yeni Suprehatin, Suprehatin Marimin IPB University Computer Science Dept. Bogor Indonesia IPB University Agrobusiness Dept. Bogor Indonesia IPB University Industrial Technology Dept. Bogor Indonesia
Smart village is one of the solutions to reduce poverty in rural areas. The main objective of this research is to map the potential implementation of the concept of smart villages based on big data analytics in Indone... 详细信息
来源: 评论
Analysis on Quantum Cryptographic Approaches for Image Encryption  3
Analysis on Quantum Cryptographic Approaches for Image Encry...
收藏 引用
3rd IEEE International Conference on Intelligent Technologies, CONIT 2023
作者: Satre, Shilpa M. Joshi, Bharti Deemed to Be University Bharati Vidyapeeth College of Engineering Ramrao Adik Institute of Technology University of Mumbai Dept. of Computer Engineering Navi-Mumbai India Ramrao Adik Institute of Technology Deemed to Be University Dept. of Computer Engineering Navi-Mumbai India
To secure and protect the photos from unfair tactics, the encryption process is used. the advent of the digital era has made it exceedingly easy to hack any data kept on the cloud. Encryption is critical to ensuring c... 详细信息
来源: 评论
Detecting Routing Protocol Low Power and Lossy Network Attacks Using Machine Learning Techniques  21
Detecting Routing Protocol Low Power and Lossy Network Attac...
收藏 引用
21st International Multi-Conference on Systems, Signals and Devices, SSD 2024
作者: Kareem, Aythem Khairi Shaban, Ali Muwafaq Adil Nafea, Ahmed Aljanabi, Mohammad Aliesawi, Salah A. S. Mal-Ani, Mohammed General Directorate of Education in Anbar Ministry of Education Dept. of Heet Education Anbar Heet31007 Iraq College of Computer Science and IT University of Anbar Dept. Information System Ramadi Iraq College of Computer Science and IT University of Anbar Dept. Artificail Inteligence Ramadi Iraq Dept. Imam ja'Afar AI-Sadiq University Baghdad Iraq College of Computer Science and Information Technology University of Anbar Dept. Computer Science Ramadi Iraq Selangor Bangi Malaysia
The Internet of Things (loT) has been regarded as the most critical technology due to its resource-constrained sensors transmitted via low-power wireless technologies beneath low-power lossy networks (LLNs), where the... 详细信息
来源: 评论
Formalization for the agent method by using π-calculus  6th
Formalization for the agent method by using π-calculus
收藏 引用
6th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2000
作者: Iwata, Kazunori Ito, Nobuhiro Ishii, Naohiro Dept. of Intelligence and Computer Science Nagoya Institute of Technology Gokiso-cho Showa-ku Nagoya466-8555 Japan Dept. of Electrical and Computer Engineering Nagoya Institute of Technology Gokiso-cho Showa-ku Nagoya466-8555 Japan
In a real-time, dynamically-changing environment, software agents have the following big two problems in executing their methods. If the environment is the real-time world, then the delay to calculate the parameters, ... 详细信息
来源: 评论
Modeling hierarchical caches in content-centric networks
Modeling hierarchical caches in content-centric networks
收藏 引用
2013 IEEE 2013 22nd International Conference on computer Communication and Networks, ICCCN 2013
作者: Jia, Zixiao Zhang, Peng Huang, Jiwei Lin, Chuang Lui, John C. S. Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Dept. of Computer Science and Technology Tsinghua University Beijing China Dept. of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong
Content-Centric Network (CCN) provides a cleanslate design for the Internet, where content becomes the primitive of communications. In CCN, routers are equipped with content stores, which act as caches for frequently ... 详细信息
来源: 评论
SIGNIFICANCE OF INITIAL INTERPOLATION IN BAND-LIMITED SIGNAL INTERPOLATION
收藏 引用
IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING 1989年 第1期37卷 151-152页
作者: YEGNANARAYANA, B FATHIMA, ST NEHRU, BTKR VENKATARAMANAN, B Department of Computer Science and Engineering Indian Institute of Technology Chennai India Dept. of Comput. Sci. & Eng. Indian Inst. of Technol. Madras India
An improved version of the Papoulis algorithm for bandlimited signal interpolation is presented. This algorithm uses the concept of initial interpolation. The justification for initial interpolation is developed only ... 详细信息
来源: 评论
User interaction using Experttop analysis
User interaction using Experttop analysis
收藏 引用
IEEE International Conference on Advances in Communication and Computing Technologies, ICACACT 2014
作者: Patil, Sushant Computer Engineering Dept. St. Francis Institute of Technology Mumbai University Mumbai400103 India
To look for expertise, continuous interaction with expert systems is necessary. In many of these systems, it is complicated for a user to decide whether the answer obtained is from a reliable and authenticated source.... 详细信息
来源: 评论
Adaptive region based Huffman compression technique with selective code interchanging
Adaptive region based Huffman compression technique with sel...
收藏 引用
2nd International Conference on Advances in Computing and Information technology, ACITY-2012
作者: Nandi, Utpal Mandal, Jyotsna Kumar Dept. of Computer Sc. and Engg. Academy of Technology Hooghly-712121 West Bengal India Dept. of Computer Sc. and Engg. University of Kalyani Nadia-741235 West Bengal India
Adaptive version of loss-less Region Based Huffman compression techniques are proposed where a proposed region formation algorithm is used to divide the input file into a number of regions that adapts region size depe... 详细信息
来源: 评论
Fault Tolerance Based Comparative Analysis of Scheduling Algorithms in Cloud Computing
Fault Tolerance Based Comparative Analysis of Scheduling Alg...
收藏 引用
2018 International Conference on Circuits and Systems in Digital Enterprise technology, ICCSDET 2018
作者: Pandita, Archana Upadhyay, Prabhat Kumar Joshi, Nisheeth Dept. of Computer Science and Engg. Birla Institute of Technology Ras Al Khaimah United Arab Emirates Dept. of Electrical and Electronics Engg Birla Institute of Technology Mesra India Department of Computer Science Banasthali University Rajasthan India
Cloud computing is being paid a lot of consideration both in scholastics and ventures, from exploring researchers to clients. Cloud computing is a membership-based administration which gives arranged storage and PC as... 详细信息
来源: 评论
F2 - New technique for recognition of user emotional states in spoken dialogue systems
F2 - New technique for recognition of user emotional states ...
收藏 引用
11th Annual Meeting of the Special Interest Group on Discourse and Dialogue, SIGDIAL 2010
作者: López-Cózar, Ramón Jan, Silovsky Griol, David Dept. of Languages and Computer Systems CTIC-UGR University of Granada Spain Institute of Information Technology and Electronics Technical University of Liberec Czech Republic Dept. of Computer Science Carlos III University of Madrid Spain
In this paper we propose a new technique to enhance emotion recognition by combining in different ways what we call emotion predictions. The technique is called F2 as the combination is based on a double fusion proces... 详细信息
来源: 评论