咨询与建议

限定检索结果

文献类型

  • 1,718 篇 期刊文献
  • 778 篇 会议
  • 24 册 图书

馆藏范围

  • 2,520 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,320 篇 工学
    • 756 篇 计算机科学与技术...
    • 618 篇 软件工程
    • 226 篇 信息与通信工程
    • 176 篇 生物工程
    • 160 篇 核科学与技术
    • 156 篇 生物医学工程(可授...
    • 152 篇 电气工程
    • 144 篇 控制科学与工程
    • 116 篇 光学工程
    • 107 篇 化学工程与技术
    • 99 篇 电子科学与技术(可...
    • 48 篇 机械工程
    • 46 篇 仪器科学与技术
    • 39 篇 安全科学与工程
    • 37 篇 网络空间安全
  • 1,226 篇 理学
    • 659 篇 物理学
    • 366 篇 数学
    • 248 篇 生物学
    • 144 篇 统计学(可授理学、...
    • 137 篇 化学
    • 63 篇 系统科学
  • 304 篇 管理学
    • 167 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 94 篇 工商管理
  • 237 篇 医学
    • 195 篇 临床医学
    • 137 篇 基础医学(可授医学...
    • 76 篇 公共卫生与预防医...
    • 72 篇 药学(可授医学、理...
  • 70 篇 法学
    • 55 篇 社会学
  • 48 篇 农学
  • 38 篇 经济学
    • 38 篇 应用经济学
  • 30 篇 教育学
  • 5 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 155 篇 hadron colliders
  • 76 篇 hadrons
  • 62 篇 machine learning
  • 60 篇 accuracy
  • 59 篇 deep learning
  • 52 篇 semantics
  • 46 篇 hadronic decays
  • 44 篇 feature extracti...
  • 43 篇 artificial intel...
  • 41 篇 bottom mesons
  • 37 篇 branching fracti...
  • 36 篇 training
  • 34 篇 computational mo...
  • 33 篇 particle decays
  • 33 篇 data models
  • 31 篇 w & z bosons
  • 30 篇 federated learni...
  • 26 篇 leptonic, semile...
  • 26 篇 data mining
  • 26 篇 predictive model...

机构

  • 418 篇 department of ph...
  • 389 篇 iccub universita...
  • 373 篇 horia hulubei na...
  • 365 篇 h.h. wills physi...
  • 356 篇 university of ch...
  • 355 篇 van swinderen in...
  • 355 篇 cavendish labora...
  • 355 篇 school of physic...
  • 347 篇 department of ph...
  • 347 篇 imperial college...
  • 342 篇 center for high ...
  • 340 篇 stfc rutherford ...
  • 338 篇 institute of par...
  • 335 篇 yandex school of...
  • 326 篇 infn sezione di ...
  • 322 篇 henryk niewodnic...
  • 313 篇 infn sezione di ...
  • 313 篇 nikhef national ...
  • 301 篇 school of physic...
  • 301 篇 physik-institut ...

作者

  • 236 篇 beiter a.
  • 218 篇 barter w.
  • 214 篇 bellee v.
  • 200 篇 casse g.
  • 196 篇 bowcock t.j.v.
  • 194 篇 blake t.
  • 191 篇 borsato m.
  • 191 篇 betancourt c.
  • 191 篇 amato s.
  • 191 篇 boettcher t.
  • 190 篇 bediaga i.
  • 187 篇 braun s.
  • 186 篇 baryshnikov f.
  • 186 篇 borisyak m.
  • 184 篇 bizzeti a.
  • 181 篇 bencivenni g.
  • 179 篇 brundu d.
  • 177 篇 back j.j.
  • 177 篇 bay a.
  • 176 篇 bursche a.

语言

  • 2,180 篇 英文
  • 328 篇 其他
  • 22 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Computer Science Research Network Data Science"
2520 条 记 录,以下是2451-2460 订阅
排序:
Animating 2D moving deformable objects based on complex barycentric coordinates
收藏 引用
Journal of Information and Computational science 2011年 第9期8卷 1533-1540页
作者: Deng, Zhengjie Li, Zheng Liang, Yun Su, Zhuo School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China Shenzhen Key Laboratory of Digital Living Network and Content Service Shenzhen Guangdong 518057 China Research Institute of Sun Yat-sen University in Shenzhen Shenzhen Guangdong 518057 China Faculty of Computer Guangdong University of Technology Guangzhou 510006 China College of Informatics South China Agricultural University Guangzhou 510642 China
In 2D animation processes, many simulated the movement and the deformation of a moving deformable object simultaneously. The binding of the movement and the deformation increased the complexity and restricted user'... 详细信息
来源: 评论
Comparative review study of reactive and proactive routing protocols in MANETs
Comparative review study of reactive and proactive routing p...
收藏 引用
2010 4th IEEE International Conference on Digital Ecosystems and Technologies, DEST 2010
作者: Mohseni, Shima Hassan, Rosilah Patel, Ahmed Razali, Rozilawati Department of Computer Science Faculty of Information Science University Kebangsaan Malaysia UKM Bangi 43600 Selangor Malaysia Network Management Research Group Malaysia
Mobile Ad Hoc networks (MANETs) are generating a lot of interests due to 3G and 4G activities. The dynamic nature of these networks demands new set of network routing strategy protocols to be implemented in order to p... 详细信息
来源: 评论
A non-linear illuminations balancing for reconstructed degraded scanned text-photo image
A non-linear illuminations balancing for reconstructed degra...
收藏 引用
IEEE International Symposium on Communications and Information Technology
作者: Athimethphat, Maythapolnun Patanavijit, Vorapoj Department of Business Data Analysis Faculty of Science and Technology Assumption University Bangkok Thailand Department of Computer and Network Engineering Faculty of Engineering Assumption University Bangkok Thailand
Due to the advancement of digital media, a large number of electronic books are digitized from old paper books through digital cameras or scanners. The scanned image often contains the distractions such as noises outs... 详细信息
来源: 评论
An investigation and survey of response options for Intrusion Response Systems (IRSs)
An investigation and survey of response options for Intrusio...
收藏 引用
Information Security for South Africa Conference
作者: Anuar, Nor Badrul Papadaki, Maria Furnell, Steve Clarke, Nathan Centre for Security Communications and Network Research University of Plymouth Plymouth United Kingdom Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia
The rise of attacks and incidents need additional and distinct methods of response. This paper starts a discussion by differentiating the type of operation mode such as Intrusion Detection Systems (IDSs), Intrusion Pr... 详细信息
来源: 评论
Fluctuated peer selection policy and its performance in large-scale multi-agent systems
收藏 引用
Web Intelligence and Agent Systems 2010年 第3期8卷 255-268页
作者: Sugawara, Toshiharu Fukuda, Kensuke Hirotsu, Toshio Sato, Shin-Ya Akashi, Osamu Kurihara, Satoshi Dept. of Computer Science and Engineering Waseda University Shinjuku Tokyo 169-8555 Japan National Institute of Informatics Chiyoda Tokyo 101-8430 Japan NTT Network Innovation Laboratories Musashino Tokyo 180-8585 Japan Faculty of Information Science Hosei University Koganei Tokyo 184-8584 Japan Institute of Scientific and Industrial Research Osaka University Osaka 567-0047 Japan
This paper describes how, in large-scale multi-agent systems, each agent's adaptive selection of peer agents for collaborative tasks affects the overall performance and how this performance varies with the workloa... 详细信息
来源: 评论
Comparative review study of reactive and proactive routing protocols in MANETs
Comparative review study of reactive and proactive routing p...
收藏 引用
Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST
作者: Shima Mohseni Rosilah Hassan Ahmed Patel Rozilawati Razali Department of Computer Science Faculty of Information Science Network Management Research Group Universiti Kebangsaan Malaysia Bangi Selangor Darul Ehsan Malaysia
Mobile Ad Hoc networks (MANETs) are generating a lot of interests due to 3G and 4G activities. The dynamic nature of these networks demands new set of network routing strategy protocols to be implemented in order to p... 详细信息
来源: 评论
Throughput analysis of airport resources
Throughput analysis of airport resources
收藏 引用
2010 Huntsville Simulation Conference, HSC 2010
作者: Moeller, Dietmar P.F. Leder, Soeren Wittmann, Jochen Schroer, Bernard Harris, Gregory University of Hamburg MIN Faculty Department Computer Science Vogt-Koelln-Str. 30 D. 22527 Hamburg Germany HTW Berlin Germany Center for Management and Economic Research Alabama Technology Network University of Alabama Huntsville AL United States
This paper presents an approach to determine the impact on throughput on airport resources in relation with operating procedures at airports. Due to time and cost constraints, identification of shortages on airport re... 详细信息
来源: 评论
A hierarchical cluster based preprocessing methodology for Web Usage Mining
A hierarchical cluster based preprocessing methodology for W...
收藏 引用
International Conference on Advanced Information Management and Service
作者: Tasawar Hussain Sohail Asghar Simon Fong Center of Research in Data Engineering (CORDE) Faculty of Engineering and Applied Sciences Mohammad Ali Jinnah University Islamabad Pakistan Department of Computer and Information Science Faculty of Science and Technology University of Macau Macao China
In Web Usage Mining (WUM), web session clustering plays a key role to classify web visitors on the basis of user click history and similarity measure. Swarm based web session clustering helps in many ways to manage th... 详细信息
来源: 评论
Hiding sensitive association rules using central tendency
Hiding sensitive association rules using central tendency
收藏 引用
International Conference on Advanced Information Management and Service
作者: Muhammad Naeem Sohail Asghar Simon Fong Center of Research in Data Engineering (CORDE) Mohammad Ali Jinnah University Islamabad Pakistan Department of Computer and Info. Science Faculty of Science and Technology University of Macau Macao China
Privacy Preserving in data Mining (PPDM) is a process by which certain sensitive information is hidden during data mining without precise access to original dataset. Majority of the techniques proposed in the literatu... 详细信息
来源: 评论
Hiding sensitive XML Association Rules via Bayesian network
Hiding sensitive XML Association Rules via Bayesian network
收藏 引用
International Conference on Advanced Information Management and Service
作者: Khalid Iqbal Sohail Asghar Simon Fong Department of Computer Science Shaheed Zulfikar Ali Bhutto Institute of Science and Technology Islamabad Pakistan Center of Research in Data Engineering (CORDE) Mohammad Ali Jinnah University Islamabad Pakistan Department of Computer and Information Science Faculty of Science and Technology University of Macau Macao China
Privacy Preserving data Mining (PPDM) is receiving a lot of attention recently by researchers from multiple domains, especially in Association Rule Mining. The outputs of Association Rule Mining often involve values o... 详细信息
来源: 评论