咨询与建议

限定检索结果

文献类型

  • 2,738 篇 会议
  • 1,344 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 4,123 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,588 篇 工学
    • 1,368 篇 计算机科学与技术...
    • 1,114 篇 软件工程
    • 494 篇 电子科学与技术(可...
    • 458 篇 信息与通信工程
    • 379 篇 电气工程
    • 317 篇 光学工程
    • 295 篇 控制科学与工程
    • 279 篇 仪器科学与技术
    • 268 篇 化学工程与技术
    • 226 篇 生物工程
    • 218 篇 材料科学与工程(可...
    • 191 篇 生物医学工程(可授...
    • 169 篇 机械工程
    • 144 篇 动力工程及工程热...
    • 128 篇 冶金工程
    • 115 篇 力学(可授工学、理...
    • 108 篇 航空宇航科学与技...
    • 95 篇 建筑学
  • 2,078 篇 理学
    • 972 篇 物理学
    • 848 篇 数学
    • 331 篇 地球物理学
    • 328 篇 化学
    • 308 篇 统计学(可授理学、...
    • 271 篇 生物学
    • 153 篇 系统科学
  • 464 篇 管理学
    • 288 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 163 篇 工商管理
  • 138 篇 医学
    • 118 篇 临床医学
    • 104 篇 基础医学(可授医学...
  • 78 篇 法学
  • 57 篇 经济学
  • 48 篇 教育学
  • 47 篇 农学
  • 14 篇 军事学
  • 13 篇 文学
  • 3 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 50 篇 computer science
  • 50 篇 accuracy
  • 46 篇 computational mo...
  • 43 篇 machine learning
  • 38 篇 optimization
  • 38 篇 feature extracti...
  • 33 篇 predictive model...
  • 33 篇 software
  • 32 篇 deep learning
  • 32 篇 galaxies
  • 32 篇 cosmology
  • 31 篇 support vector m...
  • 31 篇 training
  • 30 篇 neutrons
  • 29 篇 internet of thin...
  • 29 篇 gamma rays
  • 28 篇 artificial intel...
  • 27 篇 data mining
  • 26 篇 visualization
  • 26 篇 forecasting

机构

  • 86 篇 université de st...
  • 84 篇 institut univers...
  • 83 篇 north-west unive...
  • 83 篇 tno technical sc...
  • 82 篇 national centre ...
  • 82 篇 nikhef national ...
  • 81 篇 infn sezione di ...
  • 80 篇 ncsr demokritos ...
  • 79 篇 university würzb...
  • 79 篇 infn sezione di ...
  • 78 篇 university of jo...
  • 78 篇 university moham...
  • 76 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 72 篇 infn sezione di ...
  • 66 篇 università di ca...
  • 59 篇 western sydney u...
  • 57 篇 university moham...
  • 53 篇 leiden universit...
  • 53 篇 university of am...

作者

  • 102 篇 ferrara g.
  • 95 篇 ardid m.
  • 94 篇 coleiro a.
  • 93 篇 kalekin o.
  • 93 篇 díaz a.f.
  • 93 篇 boumaaza j.
  • 87 篇 chen a.
  • 87 篇 calvo d.
  • 87 篇 enzenhöfer a.
  • 87 篇 celli s.
  • 84 篇 dornic d.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 81 篇 gozzini s.r.
  • 79 篇 dallier r.
  • 78 篇 bendahman m.
  • 77 篇 huang f.
  • 77 篇 brunner j.
  • 76 篇 anguita m.
  • 76 篇 carretero v.

语言

  • 3,893 篇 英文
  • 197 篇 其他
  • 21 篇 中文
  • 10 篇 日文
  • 3 篇 德文
  • 3 篇 法文
检索条件"机构=Dept. of Physics and Applied Computer Science"
4123 条 记 录,以下是1-10 订阅
排序:
AAF-SCM: An Authenticated Framework for Supply Chain Management
AAF-SCM: An Authenticated Framework for Supply Chain Managem...
收藏 引用
2024 IEEE International Conference on Intelligent Systems and Advanced Applications, ICISAA 2024
作者: Roy, Prince Kumar, Rajneesh Morshed, Md Neaz Fairleigh Dickinson University Dept. of Applied Computer Science United States Dept. of Computer Science & Engineering India
The process of a supply chain involves a series of activities that distribute, assemble, and manage products, transferring them from the supplier to the end consumer. It operates as a complex, interconnected network r... 详细信息
来源: 评论
A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks  15
A Framework for the Systematic Assessment of Anomaly Detecto...
收藏 引用
15th IEEE Vehicular Networking Conference, VNC 2024
作者: Meyer, Philipp Hackel, Timo Lubeck, Teresa Korf, Franz Schmidt, Thomas C. Hamburg University of Applied Sciences Dept. Computer Science Germany
Connected cars are susceptible to cyberattacks. Security and safety of future vehicles highly depend on a holistic protection of automotive components, of which the time-sensitive backbone network takes a significant ... 详细信息
来源: 评论
Compromising insecure crypto implementations: A deep-learning based cryptosystem-agnostic testing framework
Compromising insecure crypto implementations: A deep-learnin...
收藏 引用
2024 International Conference on Artificial Intelligence, computer, Data sciences, and Applications, ACDSA 2024
作者: Hill, Leonard Schimanke, Florian Schiffner, Stefan Mertens, Robert Hsw University of Applied Sciences Dept. of Computer Science Hameln Germany Berufliche Hochschule Hamburg Dept. of Computer Science Hamburg Germany
The use of insecure implementations of cryptographic systems makes encrypted communications vulnerable to practical attacks. Today, attacking, i.e. testing implementations requires human labour and an understanding of... 详细信息
来源: 评论
A Comparative Analysis of Digital Twins for Advanced Networks  7
A Comparative Analysis of Digital Twins for Advanced Network...
收藏 引用
7th IEEE International Conference and Workshop Obuda on Electrical and Power Engineering, CANDO-EPE 2024
作者: Muslim, Urwah Recker, Stephan University of Applied Sciences and Arts Dept. of computer science Dortmund Germany
A Digital Twin offers a revolutionary approach to analyzing scalable networks. By creating high-fidelity, fine-grained digital replicas of the network environment at a low cost, it facilitates comprehensive and safe a... 详细信息
来源: 评论
Media Competence is the key requirement when using Generative AI in Academic Education in a meaningful way
Media Competence is the key requirement when using Generativ...
收藏 引用
2024 IEEE International Conference of Artificial Intelligence x Humanities, Education, and Art, AIxHEART 2024
作者: Schimanke, Florian Dept. of Computer Science HSW University of Applied Sciences Hameln Germany
With the release of ChatGPT, Pandora's box of generative AI has been opened and the new technology is here to stay. This also impacts academic education, where it provides new opportunities while also bearing cert... 详细信息
来源: 评论
From EHR to Machine Learning: A Preliminary Report on an Ingestion Pipeline Based on JSON-LD
From EHR to Machine Learning: A Preliminary Report on an Ing...
收藏 引用
34th Medical Informatics Europe Conference, MIE 2024
作者: Baroni, Giulia Lucrezia della Mea, Vincenzo Foresti, Gian Luca Dept. of Mathematics Computer Science and Physics University of Udine Italy
In this paper, we present the preliminary experiments for the development of an ingestion mechanism to move data from Electronic Health Records to machine learning processes, based on the concept of Linked Data and th... 详细信息
来源: 评论
Robust Line-Convex Polygon Intersection Computation in E2 using Projective Space Representation
收藏 引用
Machine Graphics and Vision 2023年 第3-4期32卷 3-16页
作者: Skala, Vaclav Dept. of Computer Science and Engineering Faculty of Applied Sciences University of West Bohemia Pilsen Czech Republic
This paper describes modified robust algorithms for a line clipping by a convex polygon in E2 and a convex polyhedron in E3. The proposed algorithm is based on the Cyrus-Beck algorithm and uses homogeneous coordinates... 详细信息
来源: 评论
Enhancing Security: A Haar Cascade-based Face Recognition System for PGs and Hostels  9
Enhancing Security: A Haar Cascade-based Face Recognition Sy...
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Kumar, Pallavi R. Janani, K. Sri Vaishnavi, N. Sai Pradeep Rao, K. Reddy, D. J. Yashwanth Ms Ramaiah University of Applied Sciences Dept. of Computer Science Bangalore India
This work introduces an innovative security system prototype tailored explicitly for paying guest accommodations or hostels, blending Internet of Things (IoT), artificial intelligence (AI), machine learning algorithms... 详细信息
来源: 评论
Efficient Workflow Scheduling in Fog-Cloud Environments using Ant Colony Optimization  2
Efficient Workflow Scheduling in Fog-Cloud Environments usin...
收藏 引用
2nd International Conference on Data science and Information System, ICDSIS 2024
作者: Varshney, Saiyam Srivastava, Gur Mauj Saran Dayalbagh Educational Institute Dept. Of Physics And Computer Science Agra India
Fog computing has emerged as a solution to address challenges encountered in cloud computing at the network edge, and provides benefits such as low latency, increased availability, and reduced costs. Consequently, the... 详细信息
来源: 评论
Computational Web Drug Discovery Application forSARS- Cov-2 Disease Using Predictive and Analytical Approach  10
Computational Web Drug Discovery Application forSARS- Cov-2 ...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Hemkiran, S. Kartik, R. Aswath, S. Rathan Kabilan, K. Sudha Sadasivam, G. Psg Institute of Technology and Applied Research Dept. of Computer Science and Engineering Coimbatore India Psg College of Technology Dept. of Computer Science and Engineering Coimbatore India
In response to the urgent need for coronavirus treatments, this research focuses on leveraging bioactivity data collection and processing for efficient drug discovery, employing computational methods to predict potent... 详细信息
来源: 评论