咨询与建议

限定检索结果

文献类型

  • 2,069 篇 期刊文献
  • 1,484 篇 会议
  • 36 册 图书

馆藏范围

  • 3,589 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,051 篇 工学
    • 1,453 篇 计算机科学与技术...
    • 1,199 篇 软件工程
    • 426 篇 信息与通信工程
    • 350 篇 生物工程
    • 304 篇 生物医学工程(可授...
    • 255 篇 控制科学与工程
    • 240 篇 光学工程
    • 216 篇 电气工程
    • 136 篇 电子科学与技术(可...
    • 135 篇 化学工程与技术
    • 96 篇 机械工程
    • 85 篇 安全科学与工程
    • 77 篇 网络空间安全
    • 75 篇 仪器科学与技术
    • 73 篇 动力工程及工程热...
  • 1,572 篇 理学
    • 647 篇 数学
    • 642 篇 物理学
    • 416 篇 生物学
    • 246 篇 统计学(可授理学、...
    • 180 篇 化学
    • 109 篇 系统科学
  • 595 篇 管理学
    • 318 篇 管理科学与工程(可...
    • 300 篇 图书情报与档案管...
    • 183 篇 工商管理
  • 315 篇 医学
    • 265 篇 临床医学
    • 229 篇 基础医学(可授医学...
    • 142 篇 药学(可授医学、理...
    • 123 篇 公共卫生与预防医...
  • 112 篇 法学
    • 90 篇 社会学
  • 75 篇 经济学
    • 75 篇 应用经济学
  • 57 篇 农学
  • 49 篇 教育学
  • 7 篇 文学
  • 5 篇 军事学
  • 2 篇 历史学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 130 篇 accuracy
  • 126 篇 deep learning
  • 116 篇 machine learning
  • 78 篇 feature extracti...
  • 75 篇 hadrons
  • 74 篇 training
  • 70 篇 data models
  • 66 篇 convolutional ne...
  • 65 篇 artificial intel...
  • 61 篇 real-time system...
  • 57 篇 semantics
  • 55 篇 computational mo...
  • 53 篇 predictive model...
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 43 篇 internet of thin...
  • 43 篇 support vector m...
  • 42 篇 optimization
  • 42 篇 visualization
  • 40 篇 data mining

机构

  • 427 篇 department of ph...
  • 410 篇 horia hulubei na...
  • 404 篇 van swinderen in...
  • 401 篇 school of physic...
  • 400 篇 iccub universita...
  • 399 篇 cavendish labora...
  • 398 篇 h.h. wills physi...
  • 381 篇 yandex school of...
  • 380 篇 department of ph...
  • 375 篇 imperial college...
  • 362 篇 university of ch...
  • 357 篇 stfc rutherford ...
  • 353 篇 center for high ...
  • 348 篇 institute of par...
  • 321 篇 henryk niewodnic...
  • 316 篇 nikhef national ...
  • 298 篇 physik-institut ...
  • 297 篇 school of physic...
  • 295 篇 oliver lodge lab...
  • 290 篇 school of physic...

作者

  • 252 篇 barter w.
  • 249 篇 bellee v.
  • 241 篇 beiter a.
  • 224 篇 casse g.
  • 222 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 amato s.
  • 215 篇 bediaga i.
  • 215 篇 boettcher t.
  • 210 篇 brundu d.
  • 210 篇 baryshnikov f.
  • 208 篇 braun s.
  • 205 篇 borisyak m.
  • 202 篇 bizzeti a.
  • 195 篇 bencivenni g.
  • 190 篇 back j.j.
  • 189 篇 bay a.
  • 174 篇 bursche a.

语言

  • 3,246 篇 英文
  • 332 篇 其他
  • 13 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 日文
  • 1 篇 俄文
检索条件"机构=Faculty for Computer Science and Data Science"
3589 条 记 录,以下是901-910 订阅
排序:
A Comprehensive Exploration of Fine-Tuning WavLM for Enhancing Speech Emotion Recognition
A Comprehensive Exploration of Fine-Tuning WavLM for Enhanci...
收藏 引用
International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)
作者: Fadel Ali Aniati Murni Arymurthy Radityo Eko Prasojo Faculty of Computer Science Universitas Indonesia Depok Indonesia Department of AI & Data Pitik Digital Indonesia South Tangerang Indonesia
Speech Emotion Recognition (SER) is a pivotal area in Human-computer Interaction (HCI) with numerous applications. Traditional SER models rely on supervised learning but face challenges due to limited labeled data and...
来源: 评论
Private Image Generation with Dual-Purpose Auxiliary Classifier
Private Image Generation with Dual-Purpose Auxiliary Classif...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Chen Chen Daochang Liu Siqi Ma Surya Nepal Chang Xu School of Computer Science The University of Sydney Faculty of Engineering The University of New South Wales Canberra CSIRO Data61
Privacy-preserving image generation has been important for segments such as medical domains that have sensitive and limited data. The benefits of guaranteed privacy come at the costs of generated images' quality a...
来源: 评论
Identifying human values from goal models: An industrial case study
arXiv
收藏 引用
arXiv 2023年
作者: Iqbal, Tahira Taveter, Kuldar Strenze, Tarmo Hussain, Waqar Haggag, Omar Matthews, John Alphonsus Piirisild, Anu Institute of Computer Science University of Tartu Estonia Data 61 CSIRO Australia Faculty of Information Technology Monash University Australia
Human values are principles that guide human actions and behaviour in personal and social life. Ignoring human values during requirements engineering introduces a negative impact on software uptake and continued use. ... 详细信息
来源: 评论
Deep Learning Approaches for Malware Detection in the Industrial Internet of Things: A Comprehensive Analysis
Deep Learning Approaches for Malware Detection in the Indust...
收藏 引用
Information Technology (ACIT)
作者: Ghassan Samara Mohammad Abu Fadda Abeer Al-Mohtaseb Raed Alazaidah Alrefai Mohamed N. Mahmoud Odeh Mohammad Aljaidi Mohammed Mahmod Shuaib Mohammad Kanan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan Faculty of Information Technology Zarqa University Zarqa Jordan Department of Data Science and AI Faculty of Information Technology Zarqa University Zarqa Jordan Department of Mathematics Faculty of Science Zarqa University Zarqa Jordan Department of Industrial Engineering University of Business and Technology Jeddah Saudi Arabia
This survey aims to identify hazards associated with the Internet of Things (IoT), focusing on malware that can infiltrate various devices, applications, and systems within the Industrial Internet of Things (IIoT). Su... 详细信息
来源: 评论
Systematic Biases in LLM Simulations of Debates
Systematic Biases in LLM Simulations of Debates
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Taubenfeld, Amir Dover, Yaniv Reichart, Roi Goldstein, Ariel The Hebrew University of Jerusalem School of Computer Science and Engineering Israel Google Research United States The Hebrew University Business School Jerusalem Israel Federmann Center for the Study of Rationality Hebrew University Jerusalem Israel Faculty of Data and Decision Sciences Technion Israel Department of Cognitive and Brain Sciences Hebrew University Jerusalem Israel
The emergence of Large Language Models (LLMs), has opened exciting possibilities for constructing computational simulations designed to replicate human behavior accurately. Current research suggests that LLM-based age... 详细信息
来源: 评论
Empowering Open data Sharing for Social Good: A Privacy-Aware Approach
arXiv
收藏 引用
arXiv 2024年
作者: Carvalho, Tânia Antunes, Luís Costa, Cristina Moniz, Nuno Faculty of Computer Science University of Porto Portugal TekPrivacy Porto Portugal Faculty of Medicine University of Porto Portugal Lucy Family Institute for Data and Society University of Notre Dame IN United States
The Covid-19 pandemic has affected the world at multiple levels. data sharing was pivotal for advancing research to understand the underlying causes and implement effective containment strategies. In response, many co... 详细信息
来源: 评论
Fortifying database Security: Integrating Advanced Honeypot Technology for Resilient SQL Injection Defense
Fortifying Database Security: Integrating Advanced Honeypot ...
收藏 引用
Communication, computer sciences and Engineering (IC3SE), International Conference on
作者: Kumaran U Thammisetty Swetha G. S. N. Santhosh Reddy Harini Ala Senthil Murugan Nagarajan B. Umah Department of Computer Science & Engineering Amrita School of Computing Bengaluru India Department of Computer Science & Engineering (Data Science) Madanapalle Institute of Technology & Science Madanapalle Andhra Pradesh India Department of Electronics and Communication Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Bengaluru Karnataka India Department of Mathematics Faculty of Science Technology and Medicine University of Luxembourg Luxembourg Department of Computer Science & Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Bengaluru Karnataka India
The dynamic nature of cyber threats necessitates the development of novel approaches to strengthen database system security. The novel method for fortifying defenses against SQL injection attacks—a pervasive and ongo... 详细信息
来源: 评论
Comparative Analysis of Classifier Performance on Reduced Feature Sets
Comparative Analysis of Classifier Performance on Reduced Fe...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Raed Alazaidah Wael Hadi Suhaila Abu Owaida Alaa Bani-bakr Mo'ath Alluwaici Muhyeeddin Alqaraleh Department of Data Science Faculty of Information Technology Zarqa University Zarqa Jordan Department of Information Security Faculty of Information Technology University of Petra Amman Jordan Department of Computer Science Faculty of Information Technology Al-al-Bayt University Mafraq Jordan Department of Cyber Security Faculty of Information Technology Zarqa University Zarqa Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan Software Engineering Department Faculty of Information Technology Zarqa University Zarqa Jordan
In this study, we examine the impact of feature reduction on the performance of various classifiers within the Weka environment. Utilizing the Pima Indians Diabetes database, we compare the Accuracy, Precision, Recall... 详细信息
来源: 评论
EdgeAuth: An intelligent token-based collaborative authentication scheme
EdgeAuth: An intelligent token-based collaborative authentic...
收藏 引用
作者: Jiang, Xutong Dou, Ruihan He, Qiang Zhang, Xuyun Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Faculty of Mathematics University of Waterloo Waterloo Canada Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Department of Computing Macquarie University Sydney Australia College of Big Data and Intelligent Engineering Southwest Forestry University China
Edge computing is regarded as an extension of cloud computing that brings computing and storage resources to the network edge. For some Industrial Internet of Things (IIoT) applications such as supply-chain supervisio... 详细信息
来源: 评论
Graph Spatiotemporal Process for Multivariate Time Series Anomaly Detection with Missing Values
arXiv
收藏 引用
arXiv 2024年
作者: Zheng, Yu Koh, Huan Yee Jin, Ming Chi, Lianhua Wang, Haishuai Phan, Khoa T. Chen, Yi-Ping Phoebe Pan, Shirui Xiang, Wei Department of Computer Science and Information Technology La Trobe University Australia Department of Data Science and AI Faculty of IT Monash University Australia School of Information and Communication Technology Griffith University Australia Zhejiang University China
The detection of anomalies in multivariate time series data is crucial for various practical applications, including smart power grids, traffic flow forecasting, and industrial process control. However, real-world tim... 详细信息
来源: 评论