咨询与建议

限定检索结果

文献类型

  • 6,430 篇 会议
  • 1,021 篇 期刊文献
  • 59 册 图书

馆藏范围

  • 7,510 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,670 篇 工学
    • 3,540 篇 计算机科学与技术...
    • 2,994 篇 软件工程
    • 1,223 篇 信息与通信工程
    • 690 篇 控制科学与工程
    • 509 篇 电气工程
    • 499 篇 生物工程
    • 491 篇 电子科学与技术(可...
    • 401 篇 生物医学工程(可授...
    • 326 篇 光学工程
    • 276 篇 机械工程
    • 273 篇 仪器科学与技术
    • 229 篇 动力工程及工程热...
    • 199 篇 化学工程与技术
    • 195 篇 安全科学与工程
    • 179 篇 交通运输工程
    • 162 篇 建筑学
  • 2,352 篇 理学
    • 1,250 篇 数学
    • 631 篇 物理学
    • 537 篇 生物学
    • 399 篇 统计学(可授理学、...
    • 293 篇 系统科学
    • 221 篇 化学
  • 1,271 篇 管理学
    • 774 篇 管理科学与工程(可...
    • 562 篇 图书情报与档案管...
    • 407 篇 工商管理
  • 345 篇 医学
    • 303 篇 临床医学
    • 286 篇 基础医学(可授医学...
    • 181 篇 药学(可授医学、理...
    • 164 篇 公共卫生与预防医...
  • 213 篇 法学
    • 155 篇 社会学
  • 137 篇 教育学
  • 136 篇 经济学
  • 120 篇 农学
  • 32 篇 文学
  • 15 篇 军事学
  • 8 篇 艺术学

主题

  • 246 篇 accuracy
  • 205 篇 feature extracti...
  • 158 篇 deep learning
  • 152 篇 computational mo...
  • 140 篇 machine learning
  • 128 篇 training
  • 119 篇 predictive model...
  • 117 篇 internet of thin...
  • 117 篇 support vector m...
  • 116 篇 real-time system...
  • 106 篇 cloud computing
  • 95 篇 visualization
  • 92 篇 security
  • 89 篇 data mining
  • 88 篇 software
  • 87 篇 optimization
  • 85 篇 computer archite...
  • 85 篇 artificial intel...
  • 84 篇 semantics
  • 83 篇 monitoring

机构

  • 87 篇 université de st...
  • 87 篇 nikhef national ...
  • 86 篇 ncsr demokritos ...
  • 85 篇 institut univers...
  • 85 篇 tno technical sc...
  • 83 篇 north-west unive...
  • 83 篇 university würzb...
  • 83 篇 university of jo...
  • 83 篇 infn sezione di ...
  • 82 篇 infn sezione di ...
  • 82 篇 national centre ...
  • 81 篇 infn sezione di ...
  • 80 篇 university moham...
  • 80 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 69 篇 western sydney u...
  • 66 篇 università di ca...
  • 62 篇 university of am...
  • 58 篇 university moham...
  • 58 篇 università la sa...

作者

  • 95 篇 ardid m.
  • 94 篇 díaz a.f.
  • 94 篇 coleiro a.
  • 94 篇 enzenhöfer a.
  • 94 篇 celli s.
  • 93 篇 ferrara g.
  • 93 篇 boumaaza j.
  • 92 篇 kalekin o.
  • 91 篇 dornic d.
  • 90 篇 brunner j.
  • 89 篇 calvo d.
  • 88 篇 di palma i.
  • 87 篇 bendahman m.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 83 篇 gozzini s.r.
  • 83 篇 carretero v.
  • 82 篇 dallier r.
  • 81 篇 chen a.
  • 80 篇 anguita m.

语言

  • 6,632 篇 英文
  • 761 篇 其他
  • 67 篇 中文
  • 42 篇 日文
  • 7 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Architecture and Information Technology"
7510 条 记 录,以下是91-100 订阅
排序:
DMDA: A Computational Resource Allocation Approach for IoT Devices in Fog Computing  4
DMDA: A Computational Resource Allocation Approach for IoT D...
收藏 引用
4th International Conference on Intelligent Cybernetics technology and Applications, ICICyTA 2024
作者: Pramono, Luthfan Hadi Shen, Shan-Hsiang National Taiwan University of Science and Technology Dept. of Computer Science and Information Engineering Taipei Taiwan
Fog Computing enables the efficient offloading of computational tasks from IoT Devices to Fog nodes, enhancing processing efficiency and reducing latency. This paper introduces the Dynamic Matching with Deferred Accep... 详细信息
来源: 评论
Development of Extraction Technique for Diagnosing Kidney Abnormalities by Using Ultrasound Images  8
Development of Extraction Technique for Diagnosing Kidney Ab...
收藏 引用
8th International Conference on information technology, information Systems and Electrical Engineering, ICITISEE 2024
作者: Zain, Ruri Hartika Sumijan Defit, Sarjon Universitas Putra Indonesia Yptk Faculty of Computer Science Dept. Information Technology Padang Indonesia
Kidney disease is a health problem consisting of kidney failure, where it is caused by a complication of decreased kidney function. To prevent serious complications, kidney disorders must be diagnosed quickly and auto... 详细信息
来源: 评论
Optimizing mmWave UAV Networks: Mobility-Aware Deployment and Resource Allocation  100
Optimizing mmWave UAV Networks: Mobility-Aware Deployment an...
收藏 引用
100th IEEE Vehicular technology Conference, VTC 2024-Fall
作者: Li, Sicong Yoshii, Kazutoshi Shimamoto, Shigeru Ho, Tu Dac Waseda University Dept. of Communications and Computer Engineering Tokyo Japan Norwegian University of Science and Technology Dept. of Information Security and Communication Technology Trondheim Norway
Application of Unmanned Aerial Vehicles (UAVs) as small airborne base stations is gradually becoming a research hotspot in the field of wireless communications. With the flexible deployment, wide coverage and low cost... 详细信息
来源: 评论
Sarcasm Detection in Libyan Arabic Dialects Using Natural Language Processing Techniques  4
Sarcasm Detection in Libyan Arabic Dialects Using Natural La...
收藏 引用
4th IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and computer Engineering, MI-STA 2024
作者: Alakrot, Azalden Dogman, Aboagela Ammer, Fathi Yefren College of Medical Technology Dept. of Information Technology Yefren Libya Libyan Academy for Postgraduate Studies Dept. of Electrical and Computer Engineering Al Zentan Libya University of Zawia Dept. of Computer Science Azawia Libya
Sarcasm is often used to convey the opposite of what is actually said (positive words, negative meaning). It is a type of humor that relies on the listener or reader to understand the intended meaning of the words. Sa... 详细信息
来源: 评论
Smart Waste Management System Using IoT
Smart Waste Management System Using IoT
收藏 引用
2024 IEEE Silchar Subsection Annual Conference, SILCON 2024
作者: Dhar, Mainak Roy, Alak Mandal, Purnendu Icfai University Dept. of Computer Science and Engineering Tripura Agartala India Tripura University Dept. of Information Technology Agartala India
It is thereby noticed that the rapid rate of urbanization has increased the quantum of waste generation manifold, which imposes significant challenges in waste management for traditional systems. In this paper, a Smar... 详细信息
来源: 评论
Enhanced Adaptive Video Streaming for Resource-Constrained UAVs through Dynamic Region-of-Interest Tile Swapping  10
Enhanced Adaptive Video Streaming for Resource-Constrained U...
收藏 引用
10th International Conference on Applied System Innovation, ICASI 2024
作者: Hsu, Tz-Heng Ju, Rui-Han Horng, Gwo-Jiun Southern Taiwan University of Science and Technology Dept. of Computer Science and Information Engineering Tainan Taiwan
Real-time video transmission via unmanned aerial vehicles (UAVs) is significantly impacted by latency issues. Using Region of Interest (ROI) tile segmentation methods, video streaming techniques can dynamically adjust... 详细信息
来源: 评论
Reconsider Time Series Analysis for Insider Threat Detection
Reconsider Time Series Analysis for Insider Threat Detection
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Chen, Chia-Cheng Pao, Hsing-Kuo National Taiwan University of Science and Technology Dept. of Computer Science and Information Engineering Taipei Taiwan
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti... 详细信息
来源: 评论
Navigating the Horizon Towards 6G Wireless Communication Networks
Navigating the Horizon Towards 6G Wireless Communication Net...
收藏 引用
2024 IEEE SmartBlock4Africa, SmartBlock4Africa 2024
作者: Akinwunmi, Damilare Uche, Obinna Sokunbi, Onevemi Akinwumi, Hannah Awodele, Oludele Ajaegbu, Chigozirim Babcock University Dept. of Computer Science Ilishan-Remo Nigeria Babcock University Dept. of Information Technology Ilishan-Remo Nigeria
Sixth generation (6G) wireless communication is the next frontier. Researchers and business professionals are already focusing on the sixth generation of wireless technology, even though 5G is still being deployed glo... 详细信息
来源: 评论
Unleashing Password Potential: VAEs vs GANs in a Password Guessing Duel
Unleashing Password Potential: VAEs vs GANs in a Password Gu...
收藏 引用
2024 IEEE International Conference on computer Vision and Machine Intelligence, CVMI 2024
作者: Salve, Siddhant Punn, Narinder Singh Dewangan, Deepak Kumar Agarwal, Sonali ABV-IIITM Dept. of Computer Science and Engg. Gwalior India Iiit Allahabad Dept. of Information Technology Prayagraj India
Insecure passwords remain a persistent vulnerability in cybersecurity. This study investigates the potential of employing Variational Autoencoders (VAEs) and Generative Adversarial Networks (GANs) as tools for generat... 详细信息
来源: 评论
Expressing Liminality in Data within the Context of Deep Learning  5
Expressing Liminality in Data within the Context of Deep Lea...
收藏 引用
5th International Conference on Computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2024
作者: Mehmeti, Fatjon Elmazi, Donald Kulla, Elis IT University Metropolitan Tirana Dept. of Computer Science Tirana Albania Fukuoka Institute of Technology Dept. of Information Management Fukuoka Japan
In this paper we describe the concept of Liminality and how it manifests in Feature Spaces of Data during processes of Deep Learning, with particular focus on data during transition, transformation and other states wh... 详细信息
来源: 评论