咨询与建议

限定检索结果

文献类型

  • 22,002 篇 会议
  • 3,560 篇 期刊文献
  • 208 册 图书

馆藏范围

  • 25,770 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,818 篇 工学
    • 11,160 篇 计算机科学与技术...
    • 9,365 篇 软件工程
    • 4,315 篇 信息与通信工程
    • 2,522 篇 控制科学与工程
    • 2,156 篇 电子科学与技术(可...
    • 2,145 篇 电气工程
    • 1,539 篇 生物工程
    • 1,319 篇 生物医学工程(可授...
    • 1,129 篇 光学工程
    • 1,029 篇 机械工程
    • 883 篇 仪器科学与技术
    • 835 篇 动力工程及工程热...
    • 744 篇 化学工程与技术
    • 627 篇 安全科学与工程
    • 525 篇 交通运输工程
    • 470 篇 材料科学与工程(可...
  • 8,230 篇 理学
    • 4,538 篇 数学
    • 2,413 篇 物理学
    • 1,706 篇 生物学
    • 1,378 篇 统计学(可授理学、...
    • 915 篇 系统科学
    • 763 篇 化学
  • 4,000 篇 管理学
    • 2,395 篇 管理科学与工程(可...
    • 1,838 篇 图书情报与档案管...
    • 1,252 篇 工商管理
  • 1,082 篇 医学
    • 947 篇 临床医学
    • 881 篇 基础医学(可授医学...
    • 574 篇 药学(可授医学、理...
    • 451 篇 公共卫生与预防医...
  • 712 篇 法学
    • 560 篇 社会学
  • 444 篇 经济学
  • 346 篇 教育学
  • 315 篇 农学
  • 110 篇 文学
  • 73 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 681 篇 accuracy
  • 529 篇 feature extracti...
  • 477 篇 deep learning
  • 473 篇 computational mo...
  • 376 篇 support vector m...
  • 370 篇 training
  • 365 篇 computer science
  • 320 篇 internet of thin...
  • 284 篇 machine learning
  • 280 篇 real-time system...
  • 278 篇 computer archite...
  • 235 篇 predictive model...
  • 221 篇 routing
  • 220 篇 reliability
  • 219 篇 optimization
  • 212 篇 data mining
  • 210 篇 neural networks
  • 207 篇 convolutional ne...
  • 199 篇 throughput
  • 194 篇 image segmentati...

机构

  • 85 篇 dept. of compute...
  • 84 篇 institut univers...
  • 83 篇 north-west unive...
  • 83 篇 tno technical sc...
  • 83 篇 université de st...
  • 82 篇 infn sezione di ...
  • 81 篇 national centre ...
  • 79 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 69 篇 university würzb...
  • 66 篇 università di ca...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 50 篇 university of jo...
  • 48 篇 university moham...
  • 44 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 91 篇 kalekin o.
  • 91 篇 díaz a.f.
  • 90 篇 boumaaza j.
  • 89 篇 calvo d.
  • 89 篇 coleiro a.
  • 82 篇 gal t.
  • 81 篇 bozza c.
  • 80 篇 chen a.
  • 77 篇 gozzini s.r.
  • 76 篇 dallier r.
  • 75 篇 huang f.
  • 72 篇 anguita m.
  • 63 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 58 篇 celli s.
  • 57 篇 boettcher m.
  • 54 篇 aly z.
  • 53 篇 dornic d.

语言

  • 24,769 篇 英文
  • 607 篇 其他
  • 295 篇 中文
  • 75 篇 日文
  • 21 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Dept. Computer Technology and Computer Graphics"
25770 条 记 录,以下是4971-4980 订阅
排序:
Deep Learning and Proxy Smart Contract-Based Supply Chain Management for Electric Vehicles  3
Deep Learning and Proxy Smart Contract-Based Supply Chain Ma...
收藏 引用
3rd IEEE International Conference on Power Electronics, Intelligent Control and Energy Systems, ICPEICES 2024
作者: Gohil, Keyaba Gohil, Aditya Gupta, Rajesh Tanwar, Sudeep Inst. of Technology Nirma University Dept. of Computer Sci. and Engg. Ahmedabad India
In today's world of constant change and instant services, industrialisation has perhaps played the biggest role in the realisation of such a reality. The rapid and large-scale production of various goods is made p... 详细信息
来源: 评论
Test Suite Minimization Through PSO  11
Test Suite Minimization Through PSO
收藏 引用
11th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2024
作者: Ahuja, Neeru Bhatia, Pradeep Kumar Guru Jambheshwar University of Science and Technology Dept. of Computer Science and Engineering Haryana Hisar125001 India
Regression testing is a critical stage that ensures the software changes are not affecting existing functionality. Ideally, conducting regression tests after each software change is essential. However, the exhaustive ... 详细信息
来源: 评论
In silico Prediction of MicroRNA's from Chromosome no, 1 & 2 of Plasmodium vivax
In silico Prediction of MicroRNA's from Chromosome no, 1 & 2...
收藏 引用
National Conference on Computing and Communication Systems (NCCCS)
作者: Sarker, Ranojit Maulik, Ujjwal Dept. of Biotechnology Neotia Institute of Technology Management and Sciences PGS(s) DH Road 24 India Dept. of Computer Science and Engineering Jadavpur University kolkata India
MicroRNAs (MiRNA's) are similar to 22nt long;one of the types of non-coding RNA having an important role in the control of the gene regulation, either by termination of the translation procedure or sometimes activ... 详细信息
来源: 评论
Exploiting proximity in cooperative download of large files in peer-to-peer networks
Exploiting proximity in cooperative download of large files ...
收藏 引用
2nd International Conference on Internet and Web Applications and Services, ICIW'07
作者: Zhang, Lei Muppala, Jogesh K. Tu, Wanqing Dept. of Computer Science and Engineering Hong Kong University of Science and Technology Kowloon Hong Kong Department of Computer Science University College Cork Cork Ireland
Peer-to-peer networks have long being used for file-sharing among the connected peers. Recently, the popular BitTorrent tool has permitted the exchange of large sized files by dividing it into fragments, and enabling ... 详细信息
来源: 评论
Proving properties of co-logic programs by unfold/fold transformations
Proving properties of co-logic programs by unfold/fold trans...
收藏 引用
21st International Symposium on Logic-Based Program Synthesis and Transformation, LOPSTR 2011
作者: Seki, Hirohisa Dept. of Computer Science Nagoya Inst. of Technology Showa-ku Nagoya 466-8555 Japan
We present a framework for unfold/fold transformation of co-logic programs, where each predicate is annotated as either inductive or coinductive, and the declarative semantics of co-logic programs is defined by an alt... 详细信息
来源: 评论
Live demonstration: Hardware-software co-verification for very large scale SoC using synopsys HAPS platform
Live demonstration: Hardware-software co-verification for ve...
收藏 引用
2014 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2014
作者: Sutisna, Nana Lanante, Leonardo Nagao, Yuhei Kurosaki, Masayuki Ochi, Hiroshi Dept. of Computer Science and Electronics Kyushu Institute of Technology Kawazu Iizuka Fukuoka680-4 Japan
This demo presents the verification framework for very large scale SoC System using Synopsys HAPS platform. The IEEE 802.1 lac WLAN system is selected as a case study for verification purpose. The HW/SW co-verificatio... 详细信息
来源: 评论
Design of a 5-kVA distortion-Free PFC CV/CC AC power supply having variable capacitance devices  35
Design of a 5-kVA distortion-Free PFC CV/CC AC power supply ...
收藏 引用
35th International Telecommunications Energy Conference, Smart Power and Efficiency, INTELEC 2013
作者: Katsuki, Akihiko Sugimoto, Yuichi Dept. of Computer Science and Electronics Kyushu Institute of Technology Iizuka-shi Fukuoka820-8502 Japan
This paper presents a design example of distortion-free constant-voltage/constant-current ac power supply having the unity input power factor. A new concept 5-kVA regulator is introduced. It can accept a resistive loa... 详细信息
来源: 评论
Private Cloud Security: Secured user Authenticatio by using Enhanced Algorithm Hybrid
Private Cloud Security: Secured user Authenticatio by using ...
收藏 引用
IEEE International Conference on Advances in Communication and Computing Technologies, ICACACT 2014
作者: Gajra, Nikhil Khan, Shamsuddin S. Rane, Pradnya Dept. of Computer Engineering St. Francis Institute of Technology Mumbai University Mumbai400103 India
Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of dat... 详细信息
来源: 评论
Realtime Person Identification using Ear Biometrics
Realtime Person Identification using Ear Biometrics
收藏 引用
2021 International Conference on Information technology, ICIT 2021
作者: Hossain, Shahadat Akhter, Shamim International University of Business Agriculture and Technology AISIP Lab Dept. of Computer Science and Engineering Dhaka Bangladesh
Biometrics authentication is a very popular method to authorize a person to a system, device, or data. Fingerprints, Retina, Iris, Face, Voice, etc. are the most used Biometrics pattern to recognize and identify a per... 详细信息
来源: 评论
Analytical approaches to assess embedded wind generation effects on distribution networks
Analytical approaches to assess embedded wind generation eff...
收藏 引用
2010 IEEE 11th International Conference on Probabilistic Methods Applied to Power Systems, PMAPS 2010
作者: Jayaweera, Dilan Islam, Syed Tinney, Patrick Dept. of Electrical and Computer Engineering Curtin University of Technology Perth Australia Western Power Perth Australia
Among the intermittent distributed generation technologies the wind generation play a key role in supplying energy to modern grid customers. The characteristics of wind are intermittent and intermittent wind effects o... 详细信息
来源: 评论