咨询与建议

限定检索结果

文献类型

  • 2,405 篇 会议
  • 775 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 3,181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,988 篇 工学
    • 1,462 篇 计算机科学与技术...
    • 1,170 篇 软件工程
    • 397 篇 信息与通信工程
    • 268 篇 控制科学与工程
    • 188 篇 电气工程
    • 172 篇 生物工程
    • 163 篇 电子科学与技术(可...
    • 132 篇 机械工程
    • 132 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 112 篇 仪器科学与技术
    • 93 篇 化学工程与技术
    • 78 篇 建筑学
    • 73 篇 材料科学与工程(可...
    • 68 篇 动力工程及工程热...
    • 63 篇 土木工程
  • 1,355 篇 理学
    • 897 篇 数学
    • 330 篇 物理学
    • 250 篇 统计学(可授理学、...
    • 203 篇 生物学
    • 124 篇 系统科学
    • 112 篇 化学
    • 80 篇 地球物理学
  • 481 篇 管理学
    • 269 篇 管理科学与工程(可...
    • 230 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 111 篇 医学
    • 96 篇 临床医学
    • 82 篇 基础医学(可授医学...
  • 79 篇 法学
    • 70 篇 社会学
  • 68 篇 教育学
    • 66 篇 教育学
  • 47 篇 经济学
  • 45 篇 农学
  • 11 篇 文学
  • 9 篇 军事学
  • 5 篇 哲学
  • 3 篇 历史学
  • 3 篇 艺术学

主题

  • 97 篇 computer science
  • 43 篇 mathematics
  • 41 篇 optimization
  • 40 篇 computational mo...
  • 39 篇 accuracy
  • 34 篇 data mining
  • 34 篇 machine learning
  • 33 篇 feature extracti...
  • 32 篇 predictive model...
  • 32 篇 semantics
  • 32 篇 training
  • 31 篇 deep learning
  • 29 篇 support vector m...
  • 29 篇 data models
  • 28 篇 computer archite...
  • 26 篇 software
  • 26 篇 standards
  • 24 篇 image segmentati...
  • 24 篇 neural networks
  • 24 篇 genetic algorith...

机构

  • 54 篇 université de st...
  • 49 篇 university moham...
  • 46 篇 north-west unive...
  • 46 篇 infn sezione di ...
  • 45 篇 infn sezione di ...
  • 45 篇 institut univers...
  • 45 篇 tno technical sc...
  • 45 篇 nikhef national ...
  • 45 篇 ncsr demokritos ...
  • 44 篇 national centre ...
  • 44 篇 university würzb...
  • 44 篇 university of jo...
  • 44 篇 infn sezione di ...
  • 44 篇 infn sezione di ...
  • 43 篇 università di sa...
  • 42 篇 infn sezione di ...
  • 42 篇 lpc caen normand...
  • 41 篇 université de ha...
  • 41 篇 comenius univers...
  • 41 篇 university of am...

作者

  • 54 篇 ardid m.
  • 54 篇 kalekin o.
  • 54 篇 díaz a.f.
  • 54 篇 coleiro a.
  • 53 篇 ferrara g.
  • 53 篇 boumaaza j.
  • 52 篇 enzenhöfer a.
  • 52 篇 celli s.
  • 52 篇 dornic d.
  • 52 篇 brunner j.
  • 51 篇 di palma i.
  • 50 篇 coniglione r.
  • 50 篇 eberl t.
  • 48 篇 calvo d.
  • 47 篇 kulikovskiy v.
  • 46 篇 carretero v.
  • 46 篇 ardid s.
  • 46 篇 bendahman m.
  • 45 篇 chen a.
  • 44 篇 gal t.

语言

  • 3,082 篇 英文
  • 81 篇 其他
  • 13 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
检索条件"机构=Dept. of Applied Math and Computer Science"
3181 条 记 录,以下是1-10 订阅
排序:
AAF-SCM: An Authenticated Framework for Supply Chain Management
AAF-SCM: An Authenticated Framework for Supply Chain Managem...
收藏 引用
2024 IEEE International Conference on Intelligent Systems and Advanced Applications, ICISAA 2024
作者: Roy, Prince Kumar, Rajneesh Morshed, Md Neaz Fairleigh Dickinson University Dept. of Applied Computer Science United States Dept. of Computer Science & Engineering India
The process of a supply chain involves a series of activities that distribute, assemble, and manage products, transferring them from the supplier to the end consumer. It operates as a complex, interconnected network r... 详细信息
来源: 评论
Analysis of Scanline and Minimum Entropy Selection Heuristics in Model Synthesis and Wave Function Collapse  5
Analysis of Scanline and Minimum Entropy Selection Heuristic...
收藏 引用
5th International Conference on Intelligent Computing, Communication, Networking and Services, ICCNS 2024
作者: Harvey, Lucas Srivastava, Gautam Brandon University Dept. of Math and Computer Science Canada
In this paper, we analyze two versions of a texture synthesis algorithm, study the cases in which they fail to produce a successful result and present modifications that could be made to lessen their rates of failure.... 详细信息
来源: 评论
A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks  15
A Framework for the Systematic Assessment of Anomaly Detecto...
收藏 引用
15th IEEE Vehicular Networking Conference, VNC 2024
作者: Meyer, Philipp Hackel, Timo Lubeck, Teresa Korf, Franz Schmidt, Thomas C. Hamburg University of Applied Sciences Dept. Computer Science Germany
Connected cars are susceptible to cyberattacks. Security and safety of future vehicles highly depend on a holistic protection of automotive components, of which the time-sensitive backbone network takes a significant ... 详细信息
来源: 评论
Compromising insecure crypto implementations: A deep-learning based cryptosystem-agnostic testing framework
Compromising insecure crypto implementations: A deep-learnin...
收藏 引用
2024 International Conference on Artificial Intelligence, computer, Data sciences, and Applications, ACDSA 2024
作者: Hill, Leonard Schimanke, Florian Schiffner, Stefan Mertens, Robert Hsw University of Applied Sciences Dept. of Computer Science Hameln Germany Berufliche Hochschule Hamburg Dept. of Computer Science Hamburg Germany
The use of insecure implementations of cryptographic systems makes encrypted communications vulnerable to practical attacks. Today, attacking, i.e. testing implementations requires human labour and an understanding of... 详细信息
来源: 评论
Advantages of brain parcellation in Multiple Sclerosis Lesion Segmentation
Advantages of brain parcellation in Multiple Sclerosis Lesio...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Pishvai, Dario Samuele Rondinella, Alessia Guarnera, Francesco Battiato, Sebastiano University of Catania Dept. of Math and Computer Science Catania Italy
Segmentation of multiple sclerosis lesions plays an important role in understanding disease status. In this work, we focus on the effectiveness of brain parcellation in enhancing the performance of segmentation for mu... 详细信息
来源: 评论
A Comparative Analysis of Digital Twins for Advanced Networks  7
A Comparative Analysis of Digital Twins for Advanced Network...
收藏 引用
7th IEEE International Conference and Workshop Obuda on Electrical and Power Engineering, CANDO-EPE 2024
作者: Muslim, Urwah Recker, Stephan University of Applied Sciences and Arts Dept. of computer science Dortmund Germany
A Digital Twin offers a revolutionary approach to analyzing scalable networks. By creating high-fidelity, fine-grained digital replicas of the network environment at a low cost, it facilitates comprehensive and safe a... 详细信息
来源: 评论
Media Competence is the key requirement when using Generative AI in Academic Education in a meaningful way
Media Competence is the key requirement when using Generativ...
收藏 引用
2024 IEEE International Conference of Artificial Intelligence x Humanities, Education, and Art, AIxHEART 2024
作者: Schimanke, Florian Dept. of Computer Science HSW University of Applied Sciences Hameln Germany
With the release of ChatGPT, Pandora's box of generative AI has been opened and the new technology is here to stay. This also impacts academic education, where it provides new opportunities while also bearing cert... 详细信息
来源: 评论
Enhancing MQTT Fault Tolerance and Resilience Against Broker Failures and DoS Attacks with Decentralized Blockchain Architecture  4
Enhancing MQTT Fault Tolerance and Resilience Against Broker...
收藏 引用
4th Intelligent Cybersecurity Conference, ICSC 2024
作者: Toe, Elisee Jaafar, Fehmi University of Quebec at Chicoutimi Dept. of Math and Computer Science Quebec Canada
The MQTT (Message Queuing Telemetry Transport) protocol has become the standard for IoT (Internet of Things) communication due to its lightweight nature and efficiency. However, its centralized architecture, with a si... 详细信息
来源: 评论
Enhancing Security: A Haar Cascade-based Face Recognition System for PGs and Hostels  9
Enhancing Security: A Haar Cascade-based Face Recognition Sy...
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Kumar, Pallavi R. Janani, K. Sri Vaishnavi, N. Sai Pradeep Rao, K. Reddy, D. J. Yashwanth Ms Ramaiah University of Applied Sciences Dept. of Computer Science Bangalore India
This work introduces an innovative security system prototype tailored explicitly for paying guest accommodations or hostels, blending Internet of Things (IoT), artificial intelligence (AI), machine learning algorithms... 详细信息
来源: 评论
Computational Web Drug Discovery Application forSARS- Cov-2 Disease Using Predictive and Analytical Approach  10
Computational Web Drug Discovery Application forSARS- Cov-2 ...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Hemkiran, S. Kartik, R. Aswath, S. Rathan Kabilan, K. Sudha Sadasivam, G. Psg Institute of Technology and Applied Research Dept. of Computer Science and Engineering Coimbatore India Psg College of Technology Dept. of Computer Science and Engineering Coimbatore India
In response to the urgent need for coronavirus treatments, this research focuses on leveraging bioactivity data collection and processing for efficient drug discovery, employing computational methods to predict potent... 详细信息
来源: 评论