咨询与建议

限定检索结果

文献类型

  • 5,107 篇 会议
  • 4,164 篇 期刊文献
  • 162 册 图书

馆藏范围

  • 9,433 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,524 篇 工学
    • 3,985 篇 计算机科学与技术...
    • 3,211 篇 软件工程
    • 1,110 篇 信息与通信工程
    • 848 篇 控制科学与工程
    • 627 篇 生物工程
    • 590 篇 电气工程
    • 522 篇 生物医学工程(可授...
    • 494 篇 电子科学与技术(可...
    • 409 篇 机械工程
    • 351 篇 光学工程
    • 269 篇 仪器科学与技术
    • 259 篇 化学工程与技术
    • 224 篇 动力工程及工程热...
    • 179 篇 网络空间安全
    • 167 篇 安全科学与工程
  • 3,359 篇 理学
    • 1,505 篇 数学
    • 1,178 篇 物理学
    • 760 篇 生物学
    • 501 篇 统计学(可授理学、...
    • 373 篇 系统科学
    • 289 篇 化学
  • 1,762 篇 管理学
    • 1,087 篇 管理科学与工程(可...
    • 749 篇 图书情报与档案管...
    • 584 篇 工商管理
  • 608 篇 医学
    • 516 篇 临床医学
    • 389 篇 基础医学(可授医学...
    • 237 篇 公共卫生与预防医...
    • 210 篇 药学(可授医学、理...
  • 276 篇 法学
    • 227 篇 社会学
  • 205 篇 经济学
    • 201 篇 应用经济学
  • 155 篇 教育学
  • 124 篇 农学
  • 52 篇 文学
  • 35 篇 艺术学
  • 12 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 315 篇 deep learning
  • 251 篇 machine learning
  • 230 篇 computer science
  • 176 篇 artificial intel...
  • 175 篇 feature extracti...
  • 167 篇 computational mo...
  • 153 篇 information syst...
  • 146 篇 accuracy
  • 118 篇 data mining
  • 110 篇 internet of thin...
  • 110 篇 neural networks
  • 106 篇 semantics
  • 98 篇 information tech...
  • 96 篇 covid-19
  • 95 篇 optimization
  • 94 篇 security
  • 91 篇 predictive model...
  • 86 篇 support vector m...
  • 84 篇 training
  • 73 篇 decision making

机构

  • 291 篇 department for p...
  • 290 篇 faculty of scien...
  • 285 篇 department of ph...
  • 282 篇 departamento de ...
  • 276 篇 department of ph...
  • 265 篇 kirchhoff-instit...
  • 264 篇 department of ph...
  • 263 篇 department of ph...
  • 259 篇 faculté des scie...
  • 254 篇 institute of phy...
  • 237 篇 fakultät für phy...
  • 234 篇 institute of phy...
  • 230 篇 yerevan physics ...
  • 227 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 209 篇 department of ph...
  • 202 篇 department of ph...
  • 197 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 261 篇 m. klein
  • 260 篇 h. a. gordon
  • 257 篇 r. ströhmer
  • 255 篇 m. rijssenbeek
  • 254 篇 h. sakamoto
  • 254 篇 s. jin
  • 254 篇 g. gaudio
  • 254 篇 s. mohapatra
  • 253 篇 y. nagasaka
  • 248 篇 s. guindon
  • 243 篇 y. tayalati

语言

  • 9,105 篇 英文
  • 278 篇 其他
  • 35 篇 中文
  • 17 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=Faculty Information Systems and Applied Computer Science"
9433 条 记 录,以下是4991-5000 订阅
排序:
A k-anonymization algorithm on social network data that reduces distances between nodes  33
A k-anonymization algorithm on social network data that redu...
收藏 引用
2014 IEEE 33rd International Symposium on Reliable Distributed systems Workshops, SRDSW 2014
作者: Okada, Rina Watanabe, Chiemi Kitagawa, Hiroyuki Department of Computer Science Graduate School of S.I.E. University of Tsukuba 1-1-1 Tennodai Tsukuba Ibaraki305-8573 Japan Faculty of Engineering Information and Systems University of Tsukuba 1-1-1 Tennodai Tsukuba Ibaraki305-8573 Japan
To provide social network data (SN) data to researchers for data analysis, protecting user privacy via anonymization is necessary. One anonymization metric for SN data called k-neighbor focuses on the neighborhood sub... 详细信息
来源: 评论
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Enhancing security performance with parallel crypto operatio...
收藏 引用
IEEE International Conference on Telecommunications and Malaysia Communications (ICT-MICC)
作者: Hashem Mohammed Alaidaros Mohd Fadlee A. Rasid Mohamed Othman Raja Syamsul Azmir Raja Abdullah Department of Computer and Communication Systems Engineering Faculty of Engineering Universiti Putra Malaysia Malaysia Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia Malaysia
information security, including integrity and privacy, is an important concern among today's computer users due to increased connectivity. Despite a number of secure algorithms that have been proposed, the trade-o... 详细信息
来源: 评论
Integration of updated DeLone & McLean success model, KANO model and QFD to analyze quality of an information system
Integration of updated DeLone & McLean success model, KANO m...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Erma Nindiaswari Fatimah Azzahro Achmad Nizar Hidayanto Solikin Gitik Pornthep Anussornnitisarn Faculty of Computer Science Universitas Indonesia Department of Information Systems STMIK Bina Insani Bekasi Department of Industrial Engineering Kasetsart University
Studies on information system success and evaluation have been done for several decades. However, an evaluation should be followed by system improvement to give practical contribution to organization. This study propo... 详细信息
来源: 评论
Foreword
Foreword
收藏 引用
作者: Abawajy, Jemal Xu, Zheng Atiquzzaman, Mohammed Zhang, Xiaolu Faculty of Science Engineering and Built Environment Deakin University GeelongVIC Australia School of Computer Engineering and Sciences Shanghai Polytechnic University Shanghai China School of Computer Science University of Oklahoma NormanOK United States Department of Information Systems and Cyber Security The University of Texas at San Antonio San AntonioTX United States
来源: 评论
A comparison of part of speech taggers in the task of changing to a new domain
A comparison of part of speech taggers in the task of changi...
收藏 引用
International Conference on information Intelligence and systems
作者: L. Boggess J.S. Hamaker R. Duncan L. Klimek Yufeng Wu Yu Zeng KUDZU Laboratory for Applied Intelligent Systems Research Department of Computer Science Mississippi State University USA ISIP (Institute for Signal and Information Processing) College of Engineering Mississippi State University USA Laboratory for Applied Intelligent Systems Research Department of Computer Science Mississippi State University USA
Part-of-speech tagging in real-world applications is performed on text in domains which are different from the publicly available large training data sets. The two most successful part-of-speech taggers are trained on... 详细信息
来源: 评论
Arabic Abstractive Summarization Using the Multilingual T5 Model
Arabic Abstractive Summarization Using the Multilingual T5 M...
收藏 引用
Computing and Informatics (ICCI), International Conference on
作者: Abdelrhman A. Karim Mohammed Usama Manar A. Ibrahim Youssef Hatem Waleed Wael Ahmad T. Mazrua Ghada K. El-Monayer Magy Elbanhawy Khaled Foad Ibrahim F. Moawad Artificial Intelligence Engineering Department Faculty of Computer Science and Engineering New Mansoura University Dakhlia Egypt Computer Engineering Department Faculty of Computer Science and Engineering New Mansoura University Dakhlia Egypt Faculty of Computer Science and Engineering New Mansoura University Dakhlia Egypt Computer and System Department Faculty of Engineering Portsaid University Egypt Information Systems Faculty of Computers and Artificial Intelligence Benha University Egypt Faculty of Computer and Information Sciences Ain Shams University Cairo Egypt
Natural language processing (NLP) is a branch of artificial intelligence (AI) that enables computers to comprehend, generate, and manipulate human language. Natural language processing can interrogate the data with na...
来源: 评论
‘Do Not Disturb’: An Implication Design To Be Alerted But Less Stress
‘Do Not Disturb’: An Implication Design To Be Alerted But ...
收藏 引用
International Seminar on Application for Technology of information and Communication (ISemantic)
作者: Weerachaya Jarupreechachan Kotcharat Kitchat Thattapon Surasak Dept. of Computer Engineering Faculty of Engineering at Kamphaeng Saen Kasetsart University Nakhon Pathom Thailand Dept. of Computer Science and Information Engineering National Central University Taoyuan Taiwan Dept. of Computer and Information Science Faculty of Applied Science King Mongkut’s University of Technology North Bangkok Bangkok Thailand
The pervasive utilization of smartphones, while augmenting personal and professional communications, also elicits mental stress and disrupts the work-life balance. Users necessitate staying connected to critical updat...
来源: 评论
Optimizing pervasive sensor data acquisition utilizing missing values substitution  10
Optimizing pervasive sensor data acquisition utilizing missi...
收藏 引用
3rd International Conference on PErvasive Technologies Related to Assistive Environments, PETRA 2010
作者: Michalopoulos, M. Maglogiannis, Ilias Anagnostopoulos, C. Doukas, Charalampos Hadjiefthymiades, S. Faculty of Informatics Hellenic Open University Greece University of Central Greece Dep. of Computer Science and Bioinformatics Lamia Greece Dept. of Informatics and Telecommunications University of Athens Ilissia Athens Greece University of the Aegean Dep. of Information and Communication Systems Engineering Samos Greece
Acquisition of pervasive sensor data can be often unsuccessful due to power outage at nodes, time synchronization issues, interference, network transmission failures or sensor hardware issues. Such failures can lead t... 详细信息
来源: 评论
Molecular-dynamics study on fracutre property of amorphous metal with crystallization
Molecular-dynamics study on fracutre property of amorphous m...
收藏 引用
11th International Conference on Fracture 2005, ICF11
作者: Matsumoto, R. Nakagaki, M. Nakatani, A. Kitagawa, H. Department of Mechanical Information Science and Technology Faculty of Computer Science and Systems Engineering Kyushu Institute of Technology 680-4 Kawazu Iizuka-City Fukuoka 820-8502 Japan Department of Adaptive Machine Systems Graduate School of Engineering Osaka University 2-1 Yamada-Oka Suita-City Osaka 565-0871 Japan Department of Energy and Mechanical Engineering Faculty of Engineering Doshisha University 1-3 Tatara Tsudani Kyotanabe-City Kyoto 610-0394 Japan
The fracture property of amorphous metal was studied by a large scale molecular dynamics (MD) simulation. The Finnis-Sinclair potential for α-iron was used as an inter-atomic potential. At first, we made a model amor... 详细信息
来源: 评论
Potential issues in novel computational research: artificial immune systems
Potential issues in novel computational research: artificial...
收藏 引用
IEEE International Conference on Multi Topic
作者: N. Iqbal M.A. Maarof Group on Artificial Immune Networks and Security (GAINS) Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia Skudai Johor Malaysia
Recent trends in computational research show the significance of computation-based biological research, for example, bioinformatics and system biology, and biologically inspired computational research, which includes ... 详细信息
来源: 评论