咨询与建议

限定检索结果

文献类型

  • 272 篇 会议
  • 77 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 352 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 268 篇 工学
    • 146 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 83 篇 仪器科学与技术
    • 45 篇 电子科学与技术(可...
    • 40 篇 信息与通信工程
    • 36 篇 电气工程
    • 35 篇 航空宇航科学与技...
    • 31 篇 光学工程
    • 30 篇 控制科学与工程
    • 24 篇 生物医学工程(可授...
    • 18 篇 机械工程
    • 17 篇 动力工程及工程热...
    • 14 篇 生物工程
    • 12 篇 化学工程与技术
    • 11 篇 冶金工程
    • 11 篇 土木工程
  • 179 篇 理学
    • 78 篇 物理学
    • 66 篇 数学
    • 62 篇 地球物理学
    • 39 篇 化学
    • 19 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 14 篇 系统科学
  • 53 篇 管理学
    • 32 篇 管理科学与工程(可...
    • 22 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 23 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 15 篇 药学(可授医学、理...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 7 篇 法学
  • 3 篇 教育学
  • 2 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 23 篇 neutrons
  • 11 篇 computer archite...
  • 9 篇 cosmology
  • 9 篇 photomultipliers
  • 6 篇 cosmic rays
  • 6 篇 hardware
  • 6 篇 computer aided d...
  • 5 篇 optimization
  • 5 篇 computational mo...
  • 5 篇 evolutionary alg...
  • 5 篇 topology
  • 5 篇 feature extracti...
  • 4 篇 simulation
  • 4 篇 databases
  • 4 篇 synchronization
  • 4 篇 field programmab...
  • 4 篇 shape
  • 3 篇 internet of thin...
  • 3 篇 urban areas
  • 3 篇 maintenance engi...

机构

  • 89 篇 infn sezione di ...
  • 87 篇 université de st...
  • 87 篇 nikhef national ...
  • 87 篇 infn sezione di ...
  • 86 篇 ncsr demokritos ...
  • 85 篇 institut univers...
  • 85 篇 tno technical sc...
  • 85 篇 infn sezione di ...
  • 84 篇 università la sa...
  • 84 篇 infn sezione di ...
  • 83 篇 north-west unive...
  • 83 篇 university würzb...
  • 83 篇 university of jo...
  • 82 篇 infn sezione di ...
  • 82 篇 national centre ...
  • 82 篇 western sydney u...
  • 81 篇 università di ge...
  • 80 篇 university moham...
  • 80 篇 cadi ayyad unive...
  • 80 篇 università di bo...

作者

  • 95 篇 ardid m.
  • 94 篇 díaz a.f.
  • 94 篇 coleiro a.
  • 94 篇 enzenhöfer a.
  • 94 篇 celli s.
  • 94 篇 brunner j.
  • 94 篇 coniglione r.
  • 94 篇 eberl t.
  • 93 篇 ferrara g.
  • 93 篇 boumaaza j.
  • 93 篇 di palma i.
  • 93 篇 van haren h.
  • 93 篇 donzaud c.
  • 92 篇 kalekin o.
  • 91 篇 dornic d.
  • 91 篇 chabab m.
  • 90 篇 bouta m.
  • 89 篇 calvo d.
  • 87 篇 bendahman m.
  • 87 篇 capone a.

语言

  • 281 篇 英文
  • 64 篇 其他
  • 4 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Architecture and Computer Technology"
352 条 记 录,以下是21-30 订阅
排序:
Identify Initial Nodes for Spreader in A New Diffusion Model Based on Topology (DBT) in Social Networks
Identify Initial Nodes for Spreader in A New Diffusion Model...
收藏 引用
International Conference on Web Research (ICWR)
作者: Ehsan Khosravi Fatemeh Yazdanifar Nikoo Salimi Hamid Ahmadi Beni Dept. of Computer Engineering Sharif University of Technology Tehran Iran Dept. of Mathematics and Computer Science Amirkabir University of Technology Tehran Iran Dept. of the Electrical Electronics Electronics and Telecommunication Engineering and Naval Architecture University of Genoa Genoa Italy Dept. of Software Engineering Azarbaijan Shahid Madani University Tabriz Iran
With the development of science and technology through social networks, the process of diffusion has become a controversial subject. In social networks, the process of diffusion is transmitted from one individual to a...
来源: 评论
Navigating Green Transportation in Urban Agglomerations: A Refined Approach for Carbon Emissions Assessment  24
Navigating Green Transportation in Urban Agglomerations: A R...
收藏 引用
24th COTA International Conference of Transportation Professionals: Resilient, Intelligent, Connected, and Lowcarbon Multimodal Transportation, CICTP 2024
作者: Chen, Boyou Wang, Yuanqing Abolarin, Emmanuel Zhang, Shuangyan Liu, Xihao Guo, Hanlin Ren, Baolong Dept. of Built Environment Bartlett School of Planning Univ. College London London United Kingdom Dept. of Transportation Engineering College of Transportation Engineering Chang’an Univ. Xi’an China Dept. of Industrial and Manufacturing Systems Engineering College of Engineering and Computer Science Univ. of Michigan–Dearborn Dearborn United States School of Civil and Transportation Engineering Beijing Univ. of Civil Engineering and Architecture Beijing China Sino-French Engineer School Beihang Univ. Beijing China Dept. of Instrument Science and Technology College of Mechanical Engineering Nanjing Univ. of Science and Technology Nanjing China Sino-Danish College Univ. of Chinese Academy of Sciences Beijing China
Rapid urbanization has expanded urban agglomerations, escalating carbon emissions from increased transportation needs. These agglomerations have distinct multi-modal transportation systems. Analyzing their carbon foot... 详细信息
来源: 评论
Exploring the feasibility of Mobility as a Service (MaaS) for integrated passenger and freight transport through a Delphi survey
收藏 引用
Transportation Research Procedia 2025年 90卷 559-566页
作者: Michela Le Pira Nadia Giuffrida Rodrigo Tapia Lóránt Tavasszy Gonçalo Correia Francesco Pilla Matteo Ignaccolo Giuseppe Inturri Dept. of Civil Engineering and Architecture University of Catania Via Santa Sofia 64 95123 Catania Italy Dept. of Civil Environmental Land Construction and Chemistry Polytechnic University of Bari Via Edoardo Orabona 4 70125 Bari Italy Dept. of Transport & Planning Faculty of Civil Engineering and Geosciences Delft University of Technology Stevinweg 1 2628 CN Delft the Netherlands Dept. of Political Sciences University of Roma TRE Via Gabriello Chiabrera 199 00145 Roma Italy Faculty of Technology Policy and Management Delft University of Technology Jaffalaan 5 2628 BX Delft the Netherlands School of Architecture Planning and Environmental Policy University College Dublin Richview School of Architecture Belfield Dublin 4 Ireland Dept. of Electrical Electronic and Computer Engineering University of Catania Via Santa Sofia 64 95123 Catania Italy
This paper presents the first results of a Delphi survey aimed at eliciting experts’ opinions on possible scenarios of integration between passenger and freight transport enabled by a Mobility as a Service (MaaS) pla... 详细信息
来源: 评论
Speaker's Emotions Recognition Module Based on the GoogleLeNet Neural Network
Speaker's Emotions Recognition Module Based on the GoogleLeN...
收藏 引用
2022 International Conference on Smart Information Systems and Technologies, SIST 2022
作者: Tereikovskyi, Ihor Tereikovska, Liudmyla Kryvoruchko, Olena Tereikovskyi, Oleh Tyshchenko, Dmytro Franchuk, Tamara National Technical University Of Ukraine Igor Sikorsky Kyiv Polytechnic Institute Dept. Of System Programming And Specialized Computer Systems Kyiv Ukraine Kyiv National University Of Construction And Architecture Dept. Of Information Technology For Design And Applied Mathematics Kyiv Ukraine Kyiv National University Of Trade And Economics Dept. Of Software Engineering And Cyber Security Kyiv Ukraine National Technical University Of Ukraine Igor Sikorsky Kyiv Polytechnic Institute Dept. Of Department Of Computer Engineering Kyiv Ukraine
The article is devoted to the development of means for recognition of the emotions of the speaker, based on the neural network analysis of fixed fragments of the voice signal. The possibility of improving recognition ... 详细信息
来源: 评论
Machine Learning based Cybersecurity Technique for Detection of Upcoming Cyber Attacks  8
Machine Learning based Cybersecurity Technique for Detection...
收藏 引用
8th International Conference on Communication and Electronics Systems, ICCES 2023
作者: Lakshmi, Kanchi Lohitha Shobana, S. Kumar, Bathula Prasanna Glory, K.B. Kumar, Bonda Kiran Rani, Sandya Vasireddy Venkatadri Institute of Technology Department of Computer Science and Engineering Guntur India R.M.K Engineering College Department of It India Kkr & Ksr Institute of Technology and Sciences Department of Computer Science and Engineering AP Guntur India Koneru Lakshmaiah Education Foundation Department of Engineering English Andhra Pradesh State Vaddeswaram522302 India Kl Deemed to Be University Kl School of Architecture Department of Architecture Guntur District Vaddeswaram522302 India St. Martin's Engineering College Dept. of It Telangana Secunderabad India
Cyberattacks are prevalent in the age of the Internet. Each year, both the quantity and severity of cybercrimes increase. Protection against cyber-attacks has become a primary responsibility, Significant in the intern... 详细信息
来源: 评论
CDP: Selective Influential Nodes Based on Cliques in the Diffusion Process in Social Networks
CDP: Selective Influential Nodes Based on Cliques in the Dif...
收藏 引用
International Conference on Web Research (ICWR)
作者: Fatemeh Yazdanifar Hamid Ahmadi Beni Nikoo Salimi Asgarali Bouyer Dept. of Mathematics and Computer Science Amirkabir University of Technology Tehran Iran Dept. Software Engineering Azarbijan Shahid Madani University Tabriz Iran Dept. of the Electrical Electronics Electronics and Telecommunication Engineering and Naval Architecture University of Genoa Genoa Italy Dept. of Computer Engineering Azarbaijan Shahid Madani University Tabriz Iran
Influence maximization techniques emphasize selecting a set of influential nodes in order to maximize influence. Because the algorithms presented in this field ignore the topology of cliques for diffusion, there are t...
来源: 评论
BC4ECO - Using Visual Tools for a Shared Understanding and Pedagogical Approach across an Interdisciplinary Consortium
BC4ECO - Using Visual Tools for a Shared Understanding and P...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Andy Peruccon Roisin Lyons Amalia de Gotzen Tiziana Margaria Luca Simeone dept. of Architecture Design and Media Technology Aalborg University Copenhagen Denmark Kemmy Business School University of Limerick Limerick Ireland Dept. of Computer Science and Information Systems University of Limerick Limerick Ireland
Effective communication is crucial when working on complex or wicked problems in interdisciplinary, international teams. Developing a shared understanding of critical concepts and aligning knowledge, focus, and resour...
来源: 评论
Concept of an Optical Distance and Speed Sensor Using Novel Offsetless Spatial Frequency Filters in the Area of Functional Safety
Concept of an Optical Distance and Speed Sensor Using Novel ...
收藏 引用
IEEE International Symposium on Industrial Electronics (ISIE)
作者: Frank Wasinski Werner Bonath Ubbo Ricklefs Josef Börcsök Michael Schwarz Eike Hahn Dept. of Electrical Engineering and Information Technology THM University of Applied Sciences Giessen Germany ICAS Institute for Computer Architecture and System Programming University of Kassel Kassel Germany
Optical speed sensors based on the spatial frequency filter method are a proven technology that offer high measurement accuracy over a wide speed range. Newly developed variants also enable measurements at very low sp...
来源: 评论
Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection
arXiv
收藏 引用
arXiv 2023年
作者: Molina-Coronado, Borja Ruggia, Antonio Mori, Usue Merlo, Alessio Mendiburu, Alexander Miguel-Alonso, Jose The Dept. of Computer Architecture and Technology University of the Basque Country UPV/EHU Donostia Spain The Dept. of Computer Science and Artificial Intelligence University of the Basque Country UPV/EHU Donostia Spain The Dept. of Informatics Bioengineering Robotics and Sytems Engineering University of Genoa Genoa Italy The CASD - Centre for Advanced Defense Studies Rome Italy
Malware authors have seen obfuscation as the mean to bypass malware detectors based on static analysis features. For Android, several studies have confirmed that many anti-malware products are easily evaded with simpl... 详细信息
来源: 评论
Towards a Fair Comparison and Realistic Evaluation Framework of Android Malware Detectors based on Static Analysis and Machine Learning
arXiv
收藏 引用
arXiv 2022年
作者: Molina-Coronado, Borja Mori, Usue Mendiburu, Alexander Miguel-Alonso, Jose The Dept. of Computer Architecture and Technology University of the Basque Country UPV EHU Donostia Spain The Dept. of Computer Science and Artificial Intelligence University of the Basque Country UPV EHU Donostia Spain
z As in other cybersecurity areas, machine learning (ML) techniques have emerged as a promising solution to detect Android malware. In this sense, many proposals employing a variety of algorithms and feature sets have... 详细信息
来源: 评论