咨询与建议

限定检索结果

文献类型

  • 34,611 篇 会议
  • 5,746 篇 期刊文献
  • 295 册 图书

馆藏范围

  • 40,652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25,453 篇 工学
    • 17,851 篇 计算机科学与技术...
    • 14,961 篇 软件工程
    • 6,575 篇 信息与通信工程
    • 4,225 篇 控制科学与工程
    • 3,253 篇 电子科学与技术(可...
    • 3,212 篇 电气工程
    • 2,620 篇 生物工程
    • 2,153 篇 生物医学工程(可授...
    • 1,776 篇 光学工程
    • 1,680 篇 机械工程
    • 1,442 篇 动力工程及工程热...
    • 1,416 篇 仪器科学与技术
    • 1,251 篇 化学工程与技术
    • 949 篇 安全科学与工程
    • 847 篇 交通运输工程
    • 777 篇 建筑学
  • 13,139 篇 理学
    • 7,154 篇 数学
    • 3,645 篇 物理学
    • 2,879 篇 生物学
    • 2,302 篇 统计学(可授理学、...
    • 1,596 篇 系统科学
    • 1,295 篇 化学
  • 6,447 篇 管理学
    • 3,816 篇 管理科学与工程(可...
    • 2,944 篇 图书情报与档案管...
    • 2,163 篇 工商管理
  • 1,799 篇 医学
    • 1,533 篇 临床医学
    • 1,431 篇 基础医学(可授医学...
    • 943 篇 药学(可授医学、理...
  • 1,163 篇 法学
    • 955 篇 社会学
  • 777 篇 经济学
    • 776 篇 应用经济学
  • 552 篇 农学
  • 547 篇 教育学
  • 170 篇 文学
  • 93 篇 军事学
  • 46 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 1,121 篇 accuracy
  • 888 篇 computational mo...
  • 877 篇 feature extracti...
  • 736 篇 training
  • 733 篇 computer science
  • 709 篇 deep learning
  • 582 篇 machine learning
  • 529 篇 real-time system...
  • 527 篇 support vector m...
  • 502 篇 predictive model...
  • 436 篇 internet of thin...
  • 400 篇 data models
  • 367 篇 optimization
  • 355 篇 convolutional ne...
  • 351 篇 computer archite...
  • 344 篇 reliability
  • 316 篇 artificial intel...
  • 314 篇 data mining
  • 299 篇 routing
  • 288 篇 visualization

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 67 篇 tno technical sc...
  • 66 篇 università di ca...
  • 59 篇 université de st...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 46 篇 dept. of compute...
  • 46 篇 dept. of compute...
  • 44 篇 dept. of electri...
  • 44 篇 dept. of informa...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...
  • 42 篇 nikhef national ...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 77 篇 kalekin o.
  • 77 篇 díaz a.f.
  • 74 篇 boumaaza j.
  • 70 篇 coleiro a.
  • 66 篇 huang f.
  • 64 篇 gozzini s.r.
  • 52 篇 kulikovskiy v.
  • 49 篇 dallier r.
  • 42 篇 anguita m.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 41 篇 del burgo r.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 39,185 篇 英文
  • 931 篇 其他
  • 369 篇 中文
  • 116 篇 日文
  • 47 篇 朝鲜文
  • 4 篇 德文
  • 2 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Dept. of Computer Engineering and Systems Science"
40652 条 记 录,以下是4981-4990 订阅
排序:
EventGo! Exploring Event Dynamics from Social-Media Posts
EventGo! Exploring Event Dynamics from Social-Media Posts
收藏 引用
2020 International computer Symposium, ICS 2020
作者: Chang, Chia-Hui Lin, Yuan-Hao Chuang, Hsiu-Min National Central University Dept. of Computer Science and Information Engineering Taoyuan Taiwan Chung Cheng Institute of Technology National Defense University Dept. of Computer Science and Information Engineering Taoyuan Taiwan
Looking for local events and promotions is a common need for most people during travel or moving to a new city. Similarly, delivering event messages to the right people is also a challenge for small businesses that se... 详细信息
来源: 评论
Fake Product Identification System  5
Fake Product Identification System
收藏 引用
5th IEEE International Conference for Emerging Technology, INCET 2024
作者: Rajalakshmi, B. Jayashree, Ms. Dharan, Anushka Jain, Jainam Chavan, Shivswami Dept. of CSE New Horizon College of Engineering Bengaluru India Dept. Computer Science and Engineering New Horizon College of Engineering Bengaluru India
The largest issue facing the retail industry today is product counterfeiting. Products that are counterfeit are just poor copies of authentic brands. Various techniques have been implemented to fight product counterfe... 详细信息
来源: 评论
Mining distance-based outliers from large databases in any metric space  06
Mining distance-based outliers from large databases in any m...
收藏 引用
KDD 2006: 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
作者: Tao, Yufei Xiao, Xiaokui Zhou, Shuigeng Dept. of Computer Science and Engineering Chinese University of Hong Kong Sha Tin New Territories Hong Kong Dept. of Computer Science and Engineering Fudan University Handan Road Shanghai China
Let R be a set of objects. An object o ∈ R is an outlier, if there exist less than k objects in R whose distances to o are at most r. The values of k, r, and the distance metric are provided by a user at the run time... 详细信息
来源: 评论
Reconsider Time Series Analysis for Insider Threat Detection
Reconsider Time Series Analysis for Insider Threat Detection
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Chen, Chia-Cheng Pao, Hsing-Kuo National Taiwan University of Science and Technology Dept. of Computer Science and Information Engineering Taipei Taiwan
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti... 详细信息
来源: 评论
Human Body Action Recognition based on 3D Feature Fusion over RGB Scenes  11
Human Body Action Recognition based on 3D Feature Fusion ove...
收藏 引用
11th International Conference on Information Technology, ICIT 2023
作者: Nsour, Heba Mustafa, Zaid Al-Sendah, Maria Al-Balqa Applied University Dept. of Computer Science Albalqa Jordan Al-Balqa Applied University Dept. of Computer Information Systems Albalqa Jordan Kuwait
Human body action recognition (HBAR) is an important area of research in machine learning and image processing due to its vast range of applications. Similarly, estimating various components of human anatomy from RGB ... 详细信息
来源: 评论
Distributed real-time data traffic statistics assisted routing protocol for vehicular networks
Distributed real-time data traffic statistics assisted routi...
收藏 引用
16th IEEE International Conference on Parallel and Distributed systems, ICPADS 2010
作者: Wang, Xiaomin Song, Chao Dept. of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China
A Vehicular Ad Hoc Network (VANET) not only experiences highly mobile and frequently disconnected, but may also have to deal with rapid changes of network topologies, especially when accidents and road traffic jams ha... 详细信息
来源: 评论
Dynamic distribution-aware data dissemination for vehicular ad hoc networks
Dynamic distribution-aware data dissemination for vehicular ...
收藏 引用
2010 2nd International Conference on Future computer and Communication, ICFCC 2010
作者: Wu, Lei Liu, Ming Wang, Xiaoming Gong, Haigang Dept. of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China
The paper proposes novel dynamic distribution-aware data dissemination (DDA) based Publish/Subscribe system for Vehicular Ad Hoc Networks(VANETs). Based on the characteristics of vehicles' moving in VANET, a notif... 详细信息
来源: 评论
Composition of Musical Piece Suited to Natural Sound by Interactive GA using User's EEG as Fitness  12
Composition of Musical Piece Suited to Natural Sound by Inte...
收藏 引用
12th International Congress on Advanced Applied Informatics, IIAI-AAI 2022
作者: Gan, Haroran Fukumoto, Makoto Fukuoka Institute of Technology Graduate School of Computer Science and Engineering Fukuoka Japan Fukuokainstitute of Technology Dept. of Computer Science and Engineering Fukuoka Japan
Everyone needs to be relaxed in some way. Previous studies show that listening to the combination of musical pieces and natural sounds effectively provide listeners with a relaxed feeling. In this study, we advocate a... 详细信息
来源: 评论
A different perspective on parallel sub-ant-colonies  14
A different perspective on parallel sub-ant-colonies
收藏 引用
12th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2014
作者: Hong, Tzung-Pei Huang, Ling-I Lin, Wen-Yang Dept. of Computer Science and Information Engineering National University of Kaohsiung Kaohsiung Taiwan
In the past, several parallel processing approaches were proposed to speed up the execution of the ant colony optimization. The approaches for parallel runs or multiple colonies usually set the ant number in each run ... 详细信息
来源: 评论
Optimized partial image encryption scheme using PSO
Optimized partial image encryption scheme using PSO
收藏 引用
2012 International Conference on Pattern Recognition, Informatics and Medical engineering, PRIME 2012
作者: Kuppusamy, K. Thamodaran, K. Dept. of Computer Science and Engineering Alagappa University Karaikudi Tamilnadu 630003 India
An encryption scheme provides security against illegal duplication and manipulation of multimedia contents especially to digital images. In this paper a novel optimized partial image encryption scheme based on Particl... 详细信息
来源: 评论