咨询与建议

限定检索结果

文献类型

  • 3,019 篇 会议
  • 980 篇 期刊文献
  • 55 册 图书

馆藏范围

  • 4,054 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,482 篇 工学
    • 1,532 篇 计算机科学与技术...
    • 1,256 篇 软件工程
    • 492 篇 信息与通信工程
    • 441 篇 控制科学与工程
    • 319 篇 电气工程
    • 312 篇 电子科学与技术(可...
    • 215 篇 生物工程
    • 188 篇 机械工程
    • 181 篇 光学工程
    • 180 篇 仪器科学与技术
    • 170 篇 生物医学工程(可授...
    • 139 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 104 篇 材料科学与工程(可...
    • 97 篇 建筑学
    • 95 篇 力学(可授工学、理...
    • 77 篇 土木工程
  • 1,688 篇 理学
    • 949 篇 数学
    • 509 篇 物理学
    • 291 篇 统计学(可授理学、...
    • 246 篇 生物学
    • 229 篇 系统科学
    • 160 篇 化学
    • 130 篇 地球物理学
  • 549 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 238 篇 图书情报与档案管...
    • 199 篇 工商管理
  • 140 篇 医学
    • 119 篇 临床医学
    • 114 篇 基础医学(可授医学...
  • 103 篇 法学
    • 91 篇 社会学
  • 63 篇 经济学
  • 52 篇 教育学
  • 43 篇 农学
  • 12 篇 文学
  • 11 篇 军事学
  • 4 篇 艺术学
  • 3 篇 哲学

主题

  • 77 篇 computational mo...
  • 70 篇 accuracy
  • 67 篇 optimization
  • 56 篇 feature extracti...
  • 56 篇 training
  • 50 篇 machine learning
  • 49 篇 computer science
  • 48 篇 predictive model...
  • 45 篇 support vector m...
  • 44 篇 deep learning
  • 43 篇 software
  • 43 篇 data models
  • 42 篇 real-time system...
  • 42 篇 artificial intel...
  • 38 篇 analytical model...
  • 38 篇 mathematics
  • 34 篇 reliability
  • 34 篇 image segmentati...
  • 33 篇 computer archite...
  • 32 篇 mathematical mod...

机构

  • 84 篇 institut univers...
  • 84 篇 tno technical sc...
  • 82 篇 north-west unive...
  • 82 篇 national centre ...
  • 81 篇 nikhef national ...
  • 79 篇 infn sezione di ...
  • 79 篇 university würzb...
  • 79 篇 university of jo...
  • 79 篇 infn sezione di ...
  • 78 篇 ncsr demokritos ...
  • 78 篇 infn sezione di ...
  • 77 篇 université de st...
  • 76 篇 infn sezione di ...
  • 74 篇 infn sezione di ...
  • 74 篇 western sydney u...
  • 71 篇 university moham...
  • 71 篇 università la sa...
  • 66 篇 università di ca...
  • 66 篇 university of am...
  • 64 篇 università di sa...

作者

  • 86 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 chen a.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 84 篇 boumaaza j.
  • 83 篇 díaz a.f.
  • 82 篇 kalekin o.
  • 82 篇 coleiro a.
  • 82 篇 gozzini s.r.
  • 82 篇 dallier r.
  • 80 篇 anguita m.
  • 80 篇 enzenhöfer a.
  • 80 篇 celli s.
  • 80 篇 brunner j.
  • 79 篇 bendahman m.
  • 79 篇 cherubini s.
  • 79 篇 di palma i.
  • 79 篇 giorgio e.

语言

  • 3,609 篇 英文
  • 405 篇 其他
  • 33 篇 中文
  • 4 篇 日文
  • 3 篇 德文
  • 2 篇 法文
检索条件"机构=Dept. of Computer Engineering and Applied Mathematics"
4054 条 记 录,以下是171-180 订阅
排序:
Dairy Cow Behavior Recognition Using computer Vision Techniques and CNN Networks
Dairy Cow Behavior Recognition Using Computer Vision Techniq...
收藏 引用
2022 IEEE International Conference on Internet of Things and Intelligence Systems, IoTaIS 2022
作者: Avanzato, Roberta Beritelli, Francesco Puglisi, Valerio Francesco University of Catania Dept. of Electrical Electronic and Computer Engineering Catania Italy University of Catania Dept. of Mathematics and Computer Science Catania Italy
The application of automated monitoring systems for precision breeding has seen a great increase in recent years. In particular, several studies have addressed the possibility of recognizing cow behavior using compute... 详细信息
来源: 评论
Enhancing the Security of Virtualized Infrastructure through Big Data Analytics in Cloud Computing  1
Enhancing the Security of Virtualized Infrastructure through...
收藏 引用
1st IEEE International Conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Bisen, Anand Singh Kumar, Ravi Hema, B. Jenasamanta, Abhinash Shakya, Lalit Mohan Shanthi, R. Vikrant University Dept. of CSE and IT Gwalior India ITM Skill University Dept of CSE Mumbai India Dhanalakshmi Srinivasan College of Engineering Dept. of Electronics and Communication Engineering Coimbatore India Usha Martin University Dept. of CSE Jharkhand India Science J.S. University Dept. of Computer Shikohabad India Meenakshi A.H.E.R Dept. of Mathematics Chennai India
This research paper presents a novel approach to enhancing the security of virtualized environments through big data analytics in cloud computing. While virtualization and cloud computing provide flexibility and cost-... 详细信息
来源: 评论
Securing Sensitive Data: How Blockchain Transforms Privacy in Healthcare, Law, and Education
Securing Sensitive Data: How Blockchain Transforms Privacy i...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Bale, Ajay Sudhir Arulananth, T.S. Saranya, S. Gadag, Tejashwini Sathiamoorthy, J. Ponnuru, Sudhakiran New Horizon College of Engineering Dept. of Ece Karnataka Bengaluru India Mlr Institute of Technology Department of Electronics and communication Engineering Telangana Hyderabad500043 India Bms Institute of Technology & Management Dept. of Mathematics Bengaluru India School of Computer Science Engineering Reva University Bengaluru India Rmk Engineering college Department of Computer science and Design Kavarapettai India
In the field of healthcare, law, and education, Blockchain technology (BT) is emerging as a transformative force. This paper helps to explore the usage of BT to enhance the privacy and security in the above said domai... 详细信息
来源: 评论
A data-driven approach for context definition in situation-aware wearable computing systems
A data-driven approach for context definition in situation-a...
收藏 引用
IEEE International Conference on Automation Science and engineering (CASE)
作者: Giuseppe D’Aniello Giancarlo Fortino Matteo Gaeta Zia Ur Rehman Dept. Information and Electrical Engineering and Applied Mathematics University of Salerno Fisciano Italy Dept. Computer Engineering Modeling Electronics and Systems University of Calabria Rende Italy
A situation-aware wearable computing system is defined as a wearable device with the capability to perceive, comprehend, and project the situations occurring in the environment in order to adapt its behavior according... 详细信息
来源: 评论
CDP: Selective Influential Nodes Based on Cliques in the Diffusion Process in Social Networks  9
CDP: Selective Influential Nodes Based on Cliques in the Dif...
收藏 引用
9th International Conference on Web Research, ICWR 2023
作者: Yazdanifar, Fatemeh Beni, Hamid Ahmadi Salimi, Nikoo Bouyer, Asgarali Amirkabir University of Technology Dept. of Mathematics and Computer Science Tehran Iran Madani University Dept. Software Engineering Azarbijan Shahid Tabriz Iran University of Genoa Dept. of the Elec. Electronics Electronics and Telecommunication Eng. and Naval Architecture Genoa Italy Azarbaijan Shahid Madani University Dept. of Computer Engineering Tabriz Iran
Influence maximization techniques emphasize selecting a set of influential nodes in order to maximize influence. Because the algorithms presented in this field ignore the topology of cliques for diffusion, there are t... 详细信息
来源: 评论
Web User Profiling using Fuzzy Signatures and Browser Fingerprinting
Web User Profiling using Fuzzy Signatures and Browser Finger...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Aliberti, Luca Apicella, Francesco D'Aniello, Giuseppe Flammini, Francesco Gaeta, Matteo Salzano, Simone University of Salerno Dept. Information and Electrical Engineering and Applied Mathematics SA Fisciano Italy Evolution Adv Rome Italy Idsia USI-SUPSI University of Applied Sciences and Arts of Southern Switzerland School of Innovation Design and Engineering Mälardalen University Sweden
Accurately identifying and profiling users is one of the primary challenges of many modern web applications. This paper presents an approach for user profiling that utilizes Fuzzy User Signatures combined with browser... 详细信息
来源: 评论
Gradient-free decoder inversion in latent diffusion models  24
Gradient-free decoder inversion in latent diffusion models
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Seongmin Hong Suh Yoon Jeon Kyeonghyun Lee Ernest K. Ryu Se Young Chun Dept. of Electrical and Computer Engineering INMC & IPAI Seoul National University Dept. of Electrical and Computer Engineering and Dept. of Mathematics University of California Los Angeles
In latent diffusion models (LDMs), denoising diffusion process efficiently takes place on latent space whose dimension is lower than that of pixel space. Decoder is typically used to transform the representation in la...
来源: 评论
Quantum Safe Construction of Authentication and Key Exchange Based on Module Lattices  4
Quantum Safe Construction of Authentication and Key Exchange...
收藏 引用
4th IEEE Global Conference for Advancement in Technology, GCAT 2023
作者: Banerjee, Sayan Nikhilesh, M. Sharma, Ankit Sreedevi, A.G. Rana, Saurabh Chaudhary, Dharminder Dept. of Computer Science & Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Dept. of Mathematics Chitkara University Solan India Bennett University Noida India
An authenticated mobile key exchange is necessary for post quantum secure communication over a public channel. It allows two entities to create a secure and unique session key for every communication session. We feel ... 详细信息
来源: 评论
Book Recommendation System using R Programming - A Comparative Study.  4
Book Recommendation System using R Programming - A Comparati...
收藏 引用
4th International Conference on Innovative Practices in Technology and Management, ICIPTM 2024
作者: Sandhiya, B. Meera, K.N. Broumi, Said Amrita School of Engineering Dept. of Computer Science and Engineering Amrita Vishwa Vidyapeetham Bengaluru India Amrita School of Engineering Dept. of Mathematics Amrita Vishwa Vidyapeetham Bengaluru India Faculty of Science Ben m'Sik University of Hassan Ii Laboratory of Information Processing Casablanca Morocco
A Recommendation System (also known as Recommender System) is built for the purpose of recommending similar items to the user based on their interest. The item can be anything like movies, music, books, songs, etc. Ma... 详细信息
来源: 评论
Exploring the Semantic Complexity of Adjective-Noun Collocations between Uzbek and English for Improved Machine Translation  9
Exploring the Semantic Complexity of Adjective-Noun Collocat...
收藏 引用
9th International Conference on computer Science and engineering, UBMK 2024
作者: Abdurakhmonova, Nilufar Shamieva, Nargiza Adali, Eşref National University of Uzbekistan Dept. of Computational and applied linguistics Tashkent Uzbekistan National Univ. of Uzbekistan Dept. of Foreign language and Literature Tashkent Uzbekistan Istanbul Technical University Computer Engineering and Informatics Faculty Istanbul Turkey
The bilingual thesaurus of Uzbek-English adjectives is a field that has not been studied well explored yet for machine translation. Several websites and electronic dictionaries created nearby show that not enough sema... 详细信息
来源: 评论