咨询与建议

限定检索结果

文献类型

  • 1,832 篇 会议
  • 275 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,149 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,314 篇 工学
    • 1,054 篇 计算机科学与技术...
    • 894 篇 软件工程
    • 300 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 136 篇 生物工程
    • 123 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 99 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 59 篇 光学工程
    • 52 篇 安全科学与工程
    • 49 篇 动力工程及工程热...
    • 38 篇 建筑学
    • 37 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 35 篇 仪器科学与技术
  • 577 篇 理学
    • 339 篇 数学
    • 149 篇 生物学
    • 113 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 388 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 83 篇 医学
    • 81 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 62 篇 software
  • 59 篇 software enginee...
  • 59 篇 accuracy
  • 56 篇 machine learning
  • 48 篇 computational mo...
  • 48 篇 feature extracti...
  • 46 篇 training
  • 40 篇 real-time system...
  • 39 篇 deep learning
  • 36 篇 semantics
  • 35 篇 computer science
  • 33 篇 analytical model...
  • 33 篇 artificial intel...
  • 31 篇 computer archite...
  • 30 篇 data mining
  • 30 篇 predictive model...
  • 29 篇 internet of thin...
  • 29 篇 data models
  • 23 篇 scalability
  • 23 篇 support vector m...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 2,053 篇 英文
  • 82 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2149 条 记 录,以下是731-740 订阅
排序:
Genetic Algorithm-Based Feature Selection for Accurate Breast Cancer Classification
Genetic Algorithm-Based Feature Selection for Accurate Breas...
收藏 引用
IT and Industrial Technologies (ICIT), International Conference on
作者: Attia Shabbir Raja Hashim Ali Muhammad Zeeshan Shabbir Zain Ul Abideen Talha Ali Khan Ali Zeeshan Ijaz Nisar Ali Muhammad Imad Muhammad Abu Bakar Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany Department of Electrical Engineering University of Engineering & Technology (UET) Lahore Pakistan BCMaterials Basque Center for Materials Applications & Nanostructure Leioa Basque Country Spain Faculty of Electronic Systems Engineering University of Regina Regina Canada
Breast cancer is a significant global healthcare challenge, particularly in developing and underdeveloped countries, with profound physical, emotional, and psychological consequences, including mortality. Timely diagn...
来源: 评论
EdgeMatrix: A Resources Redefined Edge-Cloud System for Prioritized Services
arXiv
收藏 引用
arXiv 2022年
作者: Ren, Yuanming Shen, Shihao Ju, Yanli Wang, Xiaofei Wang, Wenyu Leung, Victor C.M. TANKLab College of Intelligence and Computing Tianjin University Tianjin China Shanghai Zhuichu Networking Technologies Co. Ltd. China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Dept. of Electrical and Computer Engineering The University of British Columbia Vancouver Canada
The edge-cloud system has the potential to combine the advantages of heterogeneous devices and truly realize ubiquitous computing. However, for service providers to guarantee the Service-Level-Agreement (SLA) prioriti... 详细信息
来源: 评论
Efficient Models for Detecting Monkeypox using Skin Lesion Images
Efficient Models for Detecting Monkeypox using Skin Lesion I...
收藏 引用
International Conference on Innovative Mechanisms for Industry Applications (ICIMIA)
作者: Neelam Sunda Divya Sharma Sujith Battu Rewanth Nayak Banoth Rahul Monika Department of Computer Science Kanoria PG Mahila Mahavidyalaya Jaipur India Department of Computer Science Kanoria PG Mahila Mahavidhyalaya jaipur India Dept. of Software Engineering Delhi Technological University New Delhi India Department of Applied Physics Delhi Technological University New Delhi India Department of Computer Science Shaheed Rajguru College of Applied Sciences for Women University of Delhi
Monkeypox is predicted to be the next pandemic and is spreading over African countries like water under a mat. The study basically investigates three deep learning imaging models for the identification of monkeypox fr...
来源: 评论
Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning
arXiv
收藏 引用
arXiv 2023年
作者: Zhai, Shengfang Dong, Yinpeng Shen, Qingni Pu, Shi Fang, Yuejian Su, Hang School of Software and Microelectronics Peking University China Department of Computer Science & Technology Tsinghua University China ShengShu Beijing China School of Software and Microelectronics National Engineering Research Center for Software Engineering PKU-OCTA Laboratory for Blockchain and Privacy Computing Peking University Beijing100871 China Dept. of Comp. Sci. and Tech. Institute for AI Tsinghua-Bosch Joint ML Center THBI Lab BNRist Center Tsinghua University Beijing100084 China
With the help of conditioning mechanisms, the state-of-the-art diffusion models have achieved tremendous success in guided image generation, particularly in text-to-image synthesis. To gain a better understanding of t... 详细信息
来源: 评论
Network Intrusion Detection System Using Deep Learning Method with KDD Cup'99 Dataset
Network Intrusion Detection System Using Deep Learning Metho...
收藏 引用
IEEE International Symposium on Embedded Multicore Socs (MCSoC)
作者: Jesse Jeremiah Tanimu Mohamed Hamada Patience Robert Anand Mahendran Dept. Of Computer Science Bayero University Kano Kano Nigeria Software Engineering Lab. University of Aizu Aizu Japan Department of Computer Science Federal Polytechnic Bali Bali Nigeria Theoretical Computer Science Lab. Higher School of Economics Moscow Moscow Russia
This work is a deep sparse autoencoder network intrusion detection system which addresses the issue of interpretability of L2 regularization technique used in other works. The proposed model was trained using a mini-b... 详细信息
来源: 评论
Information Leakage from Optical Emanations
arXiv
收藏 引用
arXiv 2023年
作者: Loughry, Joe Umphress, David A. Lockheed Martin Space Systems Dept. 3740 Mail Stop X3741 P.O. Box 179 DenverCO80201 United States Auburn University Department of Computer Science and Software Engineering 215 Dunstan Hall AL36849 United States
A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is signific... 详细信息
来源: 评论
TIMBERT: Toponym Identifier For The Medical Domain Based on BERT  28
TIMBERT: Toponym Identifier For The Medical Domain Based on ...
收藏 引用
28th International Conference on Computational Linguistics, COLING 2020
作者: Davari, MohammadReza Kosseim, Leila Bui, Tien D. Dept. Computer Science and Software Engineering Concordia University MontrealQCH3G 1M8 Canada
In this paper, we propose an approach to automate the process of place name detection in the medical domain to enable epidemiologists to better study and model the spread of viruses. We created a family of Toponym Ide... 详细信息
来源: 评论
Explaining Agent Behavior in Agent-Based Modeling Using Subgroup Discovery
SSRN
收藏 引用
SSRN 2023年
作者: Romero, Elena Carmona del Jesús, Cristóbal José Cordón, Oscar del Jesus, María José Damas, Sergio Chica, Manuel Andalusian Research Institute in Data Science and Computational Intelligence DaSCI University of Granada Granada18071 Spain Dept. of Computer Science and Artificial Intelligence DECSAI University of Granada Granada18071 Spain Andalusian Research Institute in Data Science and Computational Intelligence DaSCI University of Jaen Jaen23071 Spain Leicester School of Pharmacy De Montfort University LeicesterLEI 9BH United Kingdom Dept. of Computer Science University of Jaen Jaen23071 Spain Dept. of Software Engineering University of Granada Granada18071 Spain School of Electrical Engineering and Computing The University of Newcastle CallaghanNSW2308 Australia
Agent-based modeling (ABM) is a popular tool for simulating complex systems. In addition to the key performance indicators ABM provides as main outputs of the modeling process, it also generates valuable information a... 详细信息
来源: 评论
State of Security Awareness in the Additive Manufacturing Industry: 2020 Survey  6
State of Security Awareness in the Additive Manufacturing In...
收藏 引用
6th International Conference on Additive Manufacturing, ICAM 2021
作者: Yampolskiy, Mark Bates, Paul Seifi, Mohsen Shamsaei, Nima Dept. of Computer Science and Software Engineering Auburn Cyber Research Center 3127B Shelby Center 345 W. Magnolia Ave. AuburnAL36849 United States ASTM International 1850 M St. NW Suite 1030 WashingtonDC20036 United States Dept. of Mechanical Engineering Auburn University 1418 Wiggins Hall 354 War Eagle Way AuburnAL36849 United States National Center for Additive Manufacturing Excellence Auburn University 311 W. Magnolia Ave. AuburnAL36849 United States
The security of additive manufacturing (AM) gets increased attention due to the growing proliferation and adoption of AM in a variety of applications and business models. However, there is a significant disconnect bet... 详细信息
来源: 评论
A Survey on Explainable Artificial Intelligence for Cybersecurity
arXiv
收藏 引用
arXiv 2023年
作者: Rjoub, Gaith Bentahar, Jamal Wahab, Omar Abdel Mizouni, Rabeb Song, Alyssa Cohen, Robin Otrok, Hadi Mourad, Azzam King Hussein School of Computing Sciences Princess Sumaya University for Technology Jordan Concordia Institute for Information Systems Engineering Concordia University Montreal Canada Department of Computer and Software Engineering Polytechnique Montréal Montréal Canada Electrical Engineering and Computer Science Department Khalifa University Abu Dhabi United Arab Emirates Department of EECS Khalifa University Abu Dhabi United Arab Emirates David R. Cheriton School of Computer Science University of Waterloo Canada Cyber Security Systems and Applied AI Research Center Dept. of CSM Lebanese American University Lebanon Division of Science New York University Abu Dhabi United Arab Emirates
The "black-box" nature of artificial intelligence (AI) models has been the source of many concerns in their use for critical applications. Explainable Artificial Intelligence (XAI) is a rapidly growing resea... 详细信息
来源: 评论