咨询与建议

限定检索结果

文献类型

  • 30,645 篇 会议
  • 4,729 篇 期刊文献
  • 247 册 图书

馆藏范围

  • 35,621 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,165 篇 工学
    • 16,130 篇 计算机科学与技术...
    • 13,569 篇 软件工程
    • 5,889 篇 信息与通信工程
    • 3,528 篇 控制科学与工程
    • 2,705 篇 电子科学与技术(可...
    • 2,667 篇 电气工程
    • 2,358 篇 生物工程
    • 1,888 篇 生物医学工程(可授...
    • 1,520 篇 光学工程
    • 1,366 篇 机械工程
    • 1,227 篇 动力工程及工程热...
    • 1,201 篇 仪器科学与技术
    • 1,025 篇 化学工程与技术
    • 862 篇 安全科学与工程
    • 724 篇 交通运输工程
  • 11,338 篇 理学
    • 6,211 篇 数学
    • 3,044 篇 物理学
    • 2,579 篇 生物学
    • 2,040 篇 统计学(可授理学、...
    • 1,357 篇 系统科学
    • 1,096 篇 化学
  • 5,775 篇 管理学
    • 3,358 篇 管理科学与工程(可...
    • 2,701 篇 图书情报与档案管...
    • 1,865 篇 工商管理
  • 1,602 篇 医学
    • 1,378 篇 临床医学
    • 1,287 篇 基础医学(可授医学...
    • 851 篇 药学(可授医学、理...
    • 679 篇 公共卫生与预防医...
  • 1,055 篇 法学
    • 851 篇 社会学
  • 670 篇 经济学
    • 670 篇 应用经济学
  • 485 篇 农学
  • 443 篇 教育学
  • 161 篇 文学
  • 78 篇 军事学
  • 40 篇 艺术学
  • 1 篇 哲学

主题

  • 1,057 篇 accuracy
  • 840 篇 feature extracti...
  • 824 篇 computational mo...
  • 704 篇 deep learning
  • 692 篇 training
  • 686 篇 computer science
  • 529 篇 machine learning
  • 518 篇 real-time system...
  • 507 篇 support vector m...
  • 441 篇 predictive model...
  • 417 篇 internet of thin...
  • 351 篇 computer archite...
  • 348 篇 data models
  • 339 篇 convolutional ne...
  • 325 篇 reliability
  • 311 篇 optimization
  • 300 篇 data mining
  • 279 篇 routing
  • 259 篇 wireless sensor ...
  • 257 篇 artificial intel...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 76 篇 tno technical sc...
  • 66 篇 università di ca...
  • 65 篇 université de st...
  • 63 篇 dept. of informa...
  • 61 篇 nikhef national ...
  • 59 篇 dept. of compute...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 49 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 44 篇 dept. of electri...
  • 43 篇 university würzb...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 81 篇 kalekin o.
  • 77 篇 díaz a.f.
  • 77 篇 boumaaza j.
  • 76 篇 coleiro a.
  • 75 篇 gozzini s.r.
  • 71 篇 dallier r.
  • 68 篇 huang f.
  • 63 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 43 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 34,355 篇 英文
  • 843 篇 其他
  • 312 篇 中文
  • 57 篇 日文
  • 51 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Science and Software Engineering"
35621 条 记 录,以下是4961-4970 订阅
排序:
Pain Assessment Model using Facial Recognition  6
Pain Assessment Model using Facial Recognition
收藏 引用
6th International Conference on Intelligent Computing and Control Systems, ICICCS 2022
作者: Swetha, L. Praiscia, A. Juliet, Sujitha Karunya Institute of Technology and Sciences Dept. of Computer Science and Engineering Coimbatore India
Since pain is a basic piece of life, this study took a gander at the utilization of facial expression to assist individuals with pain. The recognizable proof framework is regularly used to analyze issues and doesn'... 详细信息
来源: 评论
A virtual preemption paradigm for using priority rules to solve job shop scheduling problems
A virtual preemption paradigm for using priority rules to so...
收藏 引用
2005 IEEE International Conference on Robotics and Automation
作者: Chiang, Tsung-Che Fu, Li-Chen Dept. of Computer Science and Information Engineering National Taiwan University Taipei Taiwan
To solve job shop scheduling problems, the priority rule is one of the most popular approach. It has the appeal because of simplicity, efficiency and effectiveness. However, the paradigm conventionally used to apply p... 详细信息
来源: 评论
A graph coloring approach to slicing of object-oriented programs  10
A graph coloring approach to slicing of object-oriented prog...
收藏 引用
International Conference and Workshop on Emerging Trends in Technology 2010, ICWET 2010
作者: Barpanda, S.S. Biswal, B.N. Mohapatra, D. Dept. of Computer Science and Engineering N.I.T. Rourkela India
The wide spread interest in slicing of object-oriented software has led to the birth of number of algorithms. Nowadays, slicing of object-oriented programs has picked up the momentum as most of the real world programs... 详细信息
来源: 评论
Explainability to Business: Demystify Transformer Models with Attention-based Explanations  2
Explainability to Business: Demystify Transformer Models wit...
收藏 引用
2nd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2023
作者: Thiruthuvaraj, Rajasekhar Jo, Ashly Ann Raj, Ebin Deni Indian Institute of Information Technology Dept. of Computer Science & Engineering Kottayam India
Recently, many companies are relying on Natural Language Processing (NLP) techniques to understand the text data generated daily. It has become very critical to deal with this data because finding the sentiments of te... 详细信息
来源: 评论
Automatic Detection of Hypernasality in Cleft Palate Speech Using Phase Feature  14
Automatic Detection of Hypernasality in Cleft Palate Speech ...
收藏 引用
14th International Conference on Cloud Computing, Data science and engineering, Confluence 2024
作者: Hashreta, Kanuri Naga Venkata Sai Lalitha, Duggaraju Sri Lahari, Maddula Lalitha Sri, Pittala Deepthi Dubey, Akhilesh Kumar Koneru Lakshmaiah Education Foundation Dept. of Computer Science and Engineering Guntur India
The detection of hypernasality, a speech disorder common in children with cleft palate, typically involves analyzing vowels within speech stimuli. An essential acoustic cue for hypernasality detection is the presence ... 详细信息
来源: 评论
Dynamic Fencing for Interference Mitigation in Integrated Satellite-Terrestrial Networks
Dynamic Fencing for Interference Mitigation in Integrated Sa...
收藏 引用
2022 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2022
作者: Khan, Aman Kherani, Nomaan Alam Baswade, Anand M. Indian Institute of Technology Dept. of Electrical Engineering and Computer Science Bhilai India
Integrated Satellite-Terrestrial Network (ISTN) is one of the promising approaches for global wireless connection in 5th Generation (5G) and beyond networks. The integration of terrestrial and non-terrestrial networks... 详细信息
来源: 评论
View synthesis for robust distributed video compression in wireless camera networks
View synthesis for robust distributed video compression in w...
收藏 引用
14th IEEE International Conference on Image Processing, ICIP 2007
作者: Chuohao, Yeo Jiajun, Wang Ramchandran, Kannan Dept. of Electrical Engineering and Computer Science University of California Berkeley United States
We propose a method for delivering error-resilient video from wireless camera networks in a distributed fashion over lossy channels. Our scheme is based on distributed source coding that exploits inter-view correlatio... 详细信息
来源: 评论
The effectiveness of virtual reality technology applying in vocational training on occupational competency among the students with intellectual disability in senior high school
The effectiveness of virtual reality technology applying in ...
收藏 引用
2021 IEEE International Conference on Social sciences and Intelligent Management, SSIM 2021
作者: Yang, Hsuan-Yu Yeh, Shih-Ching Wu, Eric Hsiao-Kuang Hong, William National Central University Dept. of Computer Science and Information Engineering Taoyuan Taiwan
Under the atmosphere of social inclusion, it becomes the essential goal of trans-disciplines professionals to promote people with intellectual disability (ID) work in community independently. Nevertheless, limitation ... 详细信息
来源: 评论
BERN-NN: Tight Bound Propagation For Neural Networks Using Bernstein Polynomial Interval Arithmetic  26
BERN-NN: Tight Bound Propagation For Neural Networks Using B...
收藏 引用
26th ACM International Conference on Hybrid Systems: Computation and Control, HSCC 2023, Part of CPS-IoT Week 2023
作者: Fatnassi, Wael Khedr, Haitham Yamamoto, Valen Shoukry, Yasser University of California Irvine United States Dept. of Electrical Engineering and Computer Science
In this paper, we present BERN-NN as an efficient tool to perform bound propagation of Neural Networks (NNs). Bound propagation is a critical step in wide range of NN model checkers and reachability analysis tools. Gi... 详细信息
来源: 评论
Identity-based integrity verification (IBIV) protocol for cloud data storage  1
Identity-based integrity verification (IBIV) protocol for cl...
收藏 引用
1st IEEE International Conference on Advances in Electrical, Computing, Communications and Sustainable Technologies, ICAECT 2021
作者: Sahu, Indra Kumar Nene, Manisha J. Dept. of Computer Science &Engineering Defence Institute of Advanced Technology Pune India
With meteoric advancement in quantum computing, the traditional data integrity verifying schemes are no longer safe for cloud data storage. A large number of the current techniques are dependent on expensive Public Ke... 详细信息
来源: 评论