咨询与建议

限定检索结果

文献类型

  • 60,366 篇 会议
  • 10,819 篇 期刊文献
  • 550 册 图书
  • 34 篇 科技报告

馆藏范围

  • 71,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 46,552 篇 工学
    • 35,856 篇 计算机科学与技术...
    • 29,889 篇 软件工程
    • 10,951 篇 信息与通信工程
    • 6,658 篇 控制科学与工程
    • 4,503 篇 电气工程
    • 4,397 篇 生物工程
    • 4,236 篇 电子科学与技术(可...
    • 3,454 篇 生物医学工程(可授...
    • 2,692 篇 光学工程
    • 2,452 篇 机械工程
    • 1,944 篇 仪器科学与技术
    • 1,832 篇 动力工程及工程热...
    • 1,779 篇 化学工程与技术
    • 1,470 篇 安全科学与工程
    • 1,339 篇 建筑学
    • 1,237 篇 交通运输工程
  • 24,292 篇 理学
    • 14,985 篇 数学
    • 5,496 篇 物理学
    • 4,916 篇 生物学
    • 4,508 篇 统计学(可授理学、...
    • 2,684 篇 系统科学
    • 1,918 篇 化学
  • 12,363 篇 管理学
    • 6,717 篇 管理科学与工程(可...
    • 6,284 篇 图书情报与档案管...
    • 3,901 篇 工商管理
  • 2,812 篇 医学
    • 2,469 篇 临床医学
    • 2,268 篇 基础医学(可授医学...
    • 1,463 篇 药学(可授医学、理...
  • 2,188 篇 法学
    • 1,830 篇 社会学
  • 1,281 篇 经济学
    • 1,278 篇 应用经济学
  • 1,168 篇 教育学
  • 917 篇 农学
  • 288 篇 文学
  • 152 篇 军事学
  • 85 篇 艺术学
  • 39 篇 哲学
  • 17 篇 历史学

主题

  • 1,772 篇 computer science
  • 1,697 篇 accuracy
  • 1,572 篇 computational mo...
  • 1,490 篇 feature extracti...
  • 1,230 篇 training
  • 1,061 篇 deep learning
  • 999 篇 machine learning
  • 841 篇 predictive model...
  • 835 篇 data mining
  • 779 篇 semantics
  • 769 篇 real-time system...
  • 736 篇 support vector m...
  • 722 篇 data models
  • 711 篇 artificial intel...
  • 675 篇 computer archite...
  • 600 篇 visualization
  • 582 篇 convolutional ne...
  • 580 篇 optimization
  • 558 篇 internet of thin...
  • 544 篇 neural networks

机构

  • 91 篇 institute of inf...
  • 84 篇 dept. of compute...
  • 83 篇 north-west unive...
  • 82 篇 dept. of compute...
  • 81 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 68 篇 institut univers...
  • 66 篇 università di ca...
  • 65 篇 dept. of compute...
  • 60 篇 dept. of compute...
  • 60 篇 national centre ...
  • 56 篇 dept. of compute...
  • 54 篇 dept. of informa...
  • 52 篇 school of automa...
  • 44 篇 dept. of compute...
  • 44 篇 leiden universit...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...
  • 39 篇 dept. of compute...
  • 37 篇 hokkaido univers...

作者

  • 97 篇 ferrara g.
  • 94 篇 ardid m.
  • 87 篇 calvo d.
  • 82 篇 chen a.
  • 75 篇 gal t.
  • 72 篇 bozza c.
  • 62 篇 ahmad jalal
  • 60 篇 kulikovskiy v.
  • 53 篇 kalekin o.
  • 41 篇 gagliardini s.
  • 40 篇 benoit d.m.
  • 40 篇 eddymaoui a.
  • 40 篇 labalme m.
  • 37 篇 díaz a.f.
  • 36 篇 androulakis g.
  • 34 篇 crawford h.j.
  • 34 篇 cafagna f.
  • 34 篇 de palma m.
  • 34 篇 huang f.
  • 33 篇 haungs a.

语言

  • 68,584 篇 英文
  • 2,468 篇 其他
  • 528 篇 中文
  • 108 篇 日文
  • 64 篇 朝鲜文
  • 11 篇 德文
  • 7 篇 法文
  • 6 篇 西班牙文
  • 4 篇 斯洛文尼亚文
  • 3 篇 葡萄牙文
检索条件"机构=Dept. of Computer Science and Data Science"
71769 条 记 录,以下是471-480 订阅
排序:
An Ontological Approach to Address Socio-Technical Gaps in Co-Engineering of Safety and Security  8
An Ontological Approach to Address Socio-Technical Gaps in C...
收藏 引用
8th International Conference on System Reliability and Safety, ICSRS 2024
作者: Ramachandra, Sanketh Vankeirsbilck, Jens Sion, Laurens Yskout, Koen Boydens, Jeroen Ku Leuven DistriNet Dept. of Computer Science Bruges Belgium
The co-engineering of safety and security in modern systems is a complex endeavor that requires the combined consideration of these qualities and their interactions. This is problematic in existing approaches as they ... 详细信息
来源: 评论
Advantages of brain parcellation in Multiple Sclerosis Lesion Segmentation
Advantages of brain parcellation in Multiple Sclerosis Lesio...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Pishvai, Dario Samuele Rondinella, Alessia Guarnera, Francesco Battiato, Sebastiano University of Catania Dept. of Math and Computer Science Catania Italy
Segmentation of multiple sclerosis lesions plays an important role in understanding disease status. In this work, we focus on the effectiveness of brain parcellation in enhancing the performance of segmentation for mu... 详细信息
来源: 评论
A Bidirectional Statistical Machine Translation System for Exploring the Performance of the Low Resource Language Pair English-Nepali
A Bidirectional Statistical Machine Translation System for E...
收藏 引用
2024 International Conference on Computational Intelligence for Green and Sustainable Technologies, ICCIGST 2024
作者: Roy, Amit Kumar Purkayastha, Bipul Syam Paul, Saptarshi Assam University Dept. of Computer Science Assam Silchar India
The advances in Neural Machine Translation (NMT) systems have cast a shadow over Machine Translation (MT), which was previously dominated by Rule-based Machine Translation (RBMT) and Statistical Machine Translation (S... 详细信息
来源: 评论
BeTS: Abstractive Text Summarization with Transfer Learning  2
BeTS: Abstractive Text Summarization with Transfer Learning
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Bhardwaj, Meher Ethari, Hrishikesh Charan, Annepu Sai Singh Moirangthem, Dennis Iiit Manipur Dept. of Computer Science and Engineering Imphal India
We introduce BeTS, which stands for Bert Transformer Summarizer, an abstractive summarization model that is built using transfer learning. Our model consists of a pre-trained BERT encoder and a generative transformer ... 详细信息
来源: 评论
Multilabel Text Classification Using Transformers
Multilabel Text Classification Using Transformers
收藏 引用
2024 IEEE MIT Undergraduate Research Technology Conference, URTC 2024
作者: Milano, Heather University of Massachusetts Lowell Dept. of Computer Science United States
Social media platforms are widely popular for communicating ideas, comments, and feelings. In a new digital age of communication, it is becoming more important to characterize online comments into their respective emo... 详细信息
来源: 评论
Machine Learning - Driven Approaches for Detection and Analysis of Phishing attacks: A Robust Framework for Cybersecurity  7
Machine Learning - Driven Approaches for Detection and Analy...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Sarvan, N.D.S.S. Sai Ram Reddy, Venkata Jain, Darshan Rakesh, Guntupalli Anguraj, Dinesh Kumar Kl University Dept. of Computer Science Engineering Guntur India
Phishing is the attempt to trick someone into disclosing confidential and private information by using internet communication, such as bank account details, passwords, credit/debit card details, and usernames. The acc... 详细信息
来源: 评论
An Ensemble Machine Learning-Based Method to Determine the Presence of Heart Ailment Using Pooled dataset
An Ensemble Machine Learning-Based Method to Determine the P...
收藏 引用
2024 IEEE International Conference on Computing, Applications and Systems, COMPAS 2024
作者: Saad, Mirza Nadim Jahan, Esrat Ahmed, Shifat Mohi Uddin, Khandaker Mohammad Southeast University Dept. of Computer Science and Engineering Dhaka Bangladesh
Heart disease remains the leading cause of mortality globally, emphasizing the critical need for better diagnostics. This study used a variety of machine learning methods to forecast cardiac disease, using SVM, Random... 详细信息
来源: 评论
A Framework to Find Single Language Version Using Pattern Analysis in Mixed Script Queries  2
A Framework to Find Single Language Version Using Pattern An...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Chaudhary, Anu Shekhar, Shashi Gla University Dept. of Computer Science and Engineering Mathura India
Pattern analysis for converting a complete mixed code into a single language after determining confidence levels is a systematic approach crucial for applications requiring language uniformity. The process begins by t... 详细信息
来源: 评论
A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks  15
A Framework for the Systematic Assessment of Anomaly Detecto...
收藏 引用
15th IEEE Vehicular Networking Conference, VNC 2024
作者: Meyer, Philipp Hackel, Timo Lubeck, Teresa Korf, Franz Schmidt, Thomas C. Hamburg University of Applied Sciences Dept. Computer Science Germany
Connected cars are susceptible to cyberattacks. Security and safety of future vehicles highly depend on a holistic protection of automotive components, of which the time-sensitive backbone network takes a significant ... 详细信息
来源: 评论
A Study on Deep Fake Face Detection Techniques  3
A Study on Deep Fake Face Detection Techniques
收藏 引用
3rd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2024
作者: Arya, Mudit Priyanshu Upwan Akash Goyal, Umang Chawla, Simran Chandigarh University Dept. of Computer Science and Engineering Punjab India
Advanced technology and the widespread use of deep fake technology has rendered the digital landscape vulnerable to deceptive manipulations, particularly through the creation of synthetic face images. This comprehensi... 详细信息
来源: 评论