咨询与建议

限定检索结果

文献类型

  • 2,416 篇 会议
  • 794 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 3,250 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,006 篇 工学
    • 1,473 篇 计算机科学与技术...
    • 1,177 篇 软件工程
    • 403 篇 信息与通信工程
    • 274 篇 控制科学与工程
    • 193 篇 电气工程
    • 172 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 132 篇 机械工程
    • 131 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 112 篇 仪器科学与技术
    • 93 篇 化学工程与技术
    • 78 篇 建筑学
    • 75 篇 材料科学与工程(可...
    • 68 篇 动力工程及工程热...
    • 63 篇 土木工程
  • 1,369 篇 理学
    • 906 篇 数学
    • 333 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 203 篇 生物学
    • 124 篇 系统科学
    • 112 篇 化学
    • 82 篇 地球物理学
  • 488 篇 管理学
    • 274 篇 管理科学与工程(可...
    • 232 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 111 篇 医学
    • 96 篇 临床医学
    • 82 篇 基础医学(可授医学...
  • 80 篇 法学
    • 70 篇 社会学
  • 68 篇 教育学
    • 66 篇 教育学
  • 48 篇 经济学
  • 44 篇 农学
  • 11 篇 文学
  • 9 篇 军事学
  • 5 篇 哲学
  • 3 篇 历史学
  • 3 篇 艺术学

主题

  • 97 篇 computer science
  • 43 篇 mathematics
  • 42 篇 optimization
  • 41 篇 computational mo...
  • 40 篇 accuracy
  • 38 篇 artificial intel...
  • 35 篇 data mining
  • 35 篇 machine learning
  • 34 篇 feature extracti...
  • 33 篇 deep learning
  • 33 篇 semantics
  • 32 篇 predictive model...
  • 32 篇 training
  • 29 篇 support vector m...
  • 29 篇 data models
  • 28 篇 computer archite...
  • 27 篇 standards
  • 26 篇 software
  • 24 篇 internet of thin...
  • 24 篇 image segmentati...

机构

  • 54 篇 université de st...
  • 49 篇 university moham...
  • 46 篇 north-west unive...
  • 46 篇 infn sezione di ...
  • 45 篇 infn sezione di ...
  • 45 篇 institut univers...
  • 45 篇 tno technical sc...
  • 45 篇 nikhef national ...
  • 45 篇 ncsr demokritos ...
  • 44 篇 national centre ...
  • 44 篇 university würzb...
  • 44 篇 university of jo...
  • 44 篇 infn sezione di ...
  • 44 篇 infn sezione di ...
  • 43 篇 università di sa...
  • 42 篇 infn sezione di ...
  • 42 篇 lpc caen normand...
  • 41 篇 université de ha...
  • 41 篇 comenius univers...
  • 41 篇 university of am...

作者

  • 54 篇 ardid m.
  • 54 篇 kalekin o.
  • 54 篇 díaz a.f.
  • 54 篇 coleiro a.
  • 53 篇 ferrara g.
  • 53 篇 boumaaza j.
  • 52 篇 enzenhöfer a.
  • 52 篇 celli s.
  • 52 篇 dornic d.
  • 51 篇 brunner j.
  • 50 篇 di palma i.
  • 49 篇 coniglione r.
  • 49 篇 eberl t.
  • 48 篇 calvo d.
  • 47 篇 kulikovskiy v.
  • 46 篇 carretero v.
  • 46 篇 ardid s.
  • 46 篇 bendahman m.
  • 45 篇 chen a.
  • 44 篇 gal t.

语言

  • 2,952 篇 英文
  • 279 篇 其他
  • 13 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
检索条件"机构=Dept. of Applied Math and Computer Science"
3250 条 记 录,以下是1051-1060 订阅
排序:
Privacy-Preserving Linear Regression for Brain-computer Interface Applications
Privacy-Preserving Linear Regression for Brain-Computer Inte...
收藏 引用
2018 IEEE International Conference on Big Data, Big Data 2018
作者: Agarwal, Anisha Dowsley, Rafael McKinney, Nicholas D. Wu, Dongrui Lin, Chin-Teng Cock, Martine De Nascimento, Anderson School of Engineering and Technology University of Washington Tacoma United States Dept. of Computer Science Aarhus University Aarhus Denmark School of Automation Huazhong University of Science and Technology Wuhan China School of Software University of Technology Sydney Australia Dept. of Applied Math. Comp. Sc. and Statistics Ghent University Belgium
Many machine learning (ML) applications rely on large amounts of personal data for training and inference. Among the most intimate exploited data sources is electroencephalogram (EEG) data. The emergence of consumer-g... 详细信息
来源: 评论
Hidden and self-exited attractors in a heterogeneous Cournot oligopoly model
arXiv
收藏 引用
arXiv 2020年
作者: Danca, Marius-F Lampart, Marek Dept. of Mathematics and Computer Science Avram Iancu University of Cluj-Napoca Romania Romanian Institute of Science and Technology Cluj-Napoca400487 Romania IT4Innovations VSB - Technical University of Ostrava 17. listopadu 2172/15 Ostrava708 33 Czech Republic Department of Applied Mathematics VSB - Technical University of Ostrava 17. listopadu 2172/15 Ostrava708 33 Czech Republic
In this paper it is numerically proved that a heterogeneous Cournot oligopoly model presents hidden and self-excited attractors. The system has a single equilibrium and a line of equilibria. The bifurcation diagrams s... 详细信息
来源: 评论
Middleware IoT protocols performance evaluation for carrying out clustered data
Middleware IoT protocols performance evaluation for carrying...
收藏 引用
2018 South-East Europe Design Automation, computer Engineering, computer Networks and Social Media Conference, SEEDA_CECNSM 2018
作者: Kokkonis, George Chatzimparmpas, Angelos Kontogiannis, Sotirios Dept. of Business Administration Western Macedonia University of Applied Sciences Grevena Greece Dept. of Computer Science and Media Technology Linnaeus University Vejdes Plats 7 Växjö35195 Sweden Dept. of Mathematics University of Ioannina Ioannina Greece
Several IoT middleware protocols have been proposed for the wireless transfer of IoT data. The main representatives are the CoAP, the SOAP, the MQTT and the HTTP protocols. The main concerns on these technologies are ... 详细信息
来源: 评论
An encryption based security enhancer tool for IaaS applications in cloud computing  3
An encryption based security enhancer tool for IaaS applicat...
收藏 引用
3rd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2018
作者: Gopal, Viji Paul, Varghese Elayidom, M. Sudheep Gopalan, Sasi School of Engineering Cochin University of Science and Technology Dept. of Information Technology Kerala India School of Engineering Cochin University of Science and Technology Dept. of Computer Science and Engineering Kerala India School of Engineering Cochin University of Science and Technology Division of Applied Sciences and Humanities Kerala India
Now a days, Cloud computing has become an enormous and popular technology among many users and enterprises in various industries due to the high class service it is able to provide to its customers. But still there ex... 详细信息
来源: 评论
X-Spark: Generating Electricity from Human or Vehicle Pressure using PEC Material
X-Spark: Generating Electricity from Human or Vehicle Pressu...
收藏 引用
International Conference for Convergence of Technology (I2CT)
作者: Naseem Ahmad Astha Gupta Sukalyan Saha Shilpi Bose Dept. of Electronics and Communication Engineering Netaji Subhash Engineering College Kolkata India Dept. of Applied Electronics and Instrumentation Engineering Netaji Subhash Engineering College Kolkata India Dept.of Computer Science and Engineering Netaji Subhash Engineering College Kolkata India
World population is increasing day by day and so as the production and consumption of electricity. As a result of which, carbon emission in the atmosphere is also increasing. Hence, electricity crisis is a problem tha... 详细信息
来源: 评论
Thresholded non-uniform fourier frame-based reconstruction for stripmap SAR
arXiv
收藏 引用
arXiv 2019年
作者: McKay, John Gelb, Anne Jayasuriya, Suren Monga, Vishal Applied Research Laboratory Pennsylvania State University Dept. of Electrical Engineering Pennsylvania State University Dept of Math Dartmouth College Department of Arts Media and Engineering as well as Electrical Computer and Energy Engineering Arizona State University
Fourier domain methods are fast algorithms for SAR imaging. They typically involve an interpolation in the frequency domain to re-grid non-uniform data so inverse fast Fourier transforms can be performed. In this pape... 详细信息
来源: 评论
On Evaluation of Graph Pattern Matching in Large Databases
On Evaluation of Graph Pattern Matching in Large Databases
收藏 引用
International Conference on Computational science and Computational Intelligence (CSCI)
作者: Yangjun Chen Guo Bin Xinyue Huang Dept. Applied Computer Science University of Winnipeg Canada
Recently, graph databases have been received much attention in the research community due to their extensive applications in practice, such as social networks, biological networks and World Wide Web, which bring forth... 详细信息
来源: 评论
On the Designing of Popular Packages
On the Designing of Popular Packages
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Yangjun Chen Wei Shi Dept. Applied Computer Science University of Winnipeg Canada
By the package design problem we are given a set of queries (referred to as a query log) with each being a bit string indicating the favourite activities or items of customers and required to design a package of activ... 详细信息
来源: 评论
"Double-DIP": Unsupervised image decomposition via coupled deep-image-priors
arXiv
收藏 引用
arXiv 2018年
作者: Gandelsman, Yossi Shocher, Assaf Irani, Michal Dept. of Computer Science and Applied Mathematics Weizmann Institute of Science Israel
Many seemingly unrelated computer vision tasks can be viewed as a special case of image decomposition into separate layers. For example, image segmentation (separation into foreground and background layers);transparen... 详细信息
来源: 评论
Efficient Coarse-to-Fine Non-Local Module for the Detection of Small Objects y
arXiv
收藏 引用
arXiv 2018年
作者: Levi, Hila Ullman, Shimon Dept. of Computer Science and Applied Mathematics Weizmann Institute of Science Israel
An image is not just a collection of objects, but rather a graph where each object is related to other objects through spatial and semantic relations. Using relational reasoning modules, such as the non-local module [... 详细信息
来源: 评论