咨询与建议

限定检索结果

文献类型

  • 17,652 篇 会议
  • 13,218 篇 期刊文献
  • 332 册 图书

馆藏范围

  • 31,202 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17,770 篇 工学
    • 9,573 篇 计算机科学与技术...
    • 7,605 篇 软件工程
    • 3,827 篇 信息与通信工程
    • 3,381 篇 电气工程
    • 3,269 篇 控制科学与工程
    • 3,017 篇 电子科学与技术(可...
    • 1,751 篇 生物工程
    • 1,502 篇 生物医学工程(可授...
    • 1,418 篇 光学工程
    • 1,416 篇 机械工程
    • 1,266 篇 动力工程及工程热...
    • 1,220 篇 化学工程与技术
    • 1,204 篇 仪器科学与技术
    • 973 篇 材料科学与工程(可...
    • 669 篇 力学(可授工学、理...
    • 506 篇 土木工程
  • 13,177 篇 理学
    • 6,489 篇 数学
    • 5,318 篇 物理学
    • 2,097 篇 生物学
    • 2,027 篇 统计学(可授理学、...
    • 1,646 篇 系统科学
    • 1,349 篇 化学
    • 500 篇 地球物理学
  • 3,606 篇 管理学
    • 2,310 篇 管理科学与工程(可...
    • 1,401 篇 图书情报与档案管...
    • 1,134 篇 工商管理
  • 1,412 篇 医学
    • 1,196 篇 临床医学
    • 1,024 篇 基础医学(可授医学...
    • 659 篇 药学(可授医学、理...
  • 575 篇 法学
    • 515 篇 社会学
  • 455 篇 经济学
  • 322 篇 教育学
  • 300 篇 农学
  • 68 篇 文学
  • 57 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 5 篇 历史学

主题

  • 864 篇 computer science
  • 414 篇 deep learning
  • 343 篇 mathematics
  • 337 篇 accuracy
  • 314 篇 optimization
  • 305 篇 computational mo...
  • 299 篇 machine learning
  • 265 篇 feature extracti...
  • 255 篇 internet of thin...
  • 231 篇 mathematical mod...
  • 225 篇 training
  • 204 篇 support vector m...
  • 204 篇 control systems
  • 195 篇 computer archite...
  • 181 篇 simulation
  • 179 篇 neural networks
  • 179 篇 artificial intel...
  • 165 篇 application soft...
  • 152 篇 image segmentati...
  • 135 篇 reliability

机构

  • 599 篇 department of ph...
  • 500 篇 infn laboratori ...
  • 478 篇 horia hulubei na...
  • 432 篇 infn sezione di ...
  • 416 篇 dipartimento di ...
  • 360 篇 faculty of elect...
  • 357 篇 faculty of scien...
  • 351 篇 infn sezione di ...
  • 345 篇 yerevan physics ...
  • 340 篇 department for p...
  • 338 篇 department of ph...
  • 335 篇 china institute ...
  • 333 篇 infn sezione di ...
  • 332 篇 department of ph...
  • 315 篇 department of ph...
  • 310 篇 infn sezione di ...
  • 309 篇 infn sezione di ...
  • 303 篇 indian institute...
  • 291 篇 kirchhoff-instit...
  • 288 篇 department of ph...

作者

  • 295 篇 c. alexa
  • 293 篇 j. m. izen
  • 281 篇 g. bella
  • 280 篇 d. calvet
  • 280 篇 c. amelung
  • 279 篇 j. strandberg
  • 270 篇 g. spigo
  • 267 篇 f. siegert
  • 257 篇 r. ströhmer
  • 253 篇 m. rijssenbeek
  • 248 篇 y. tayalati
  • 248 篇 s. jin
  • 246 篇 g. gaudio
  • 240 篇 s. mohapatra
  • 231 篇 biswas s.
  • 228 篇 ahammed z.
  • 224 篇 m. klein
  • 222 篇 f. pastore
  • 216 篇 alkin a.
  • 215 篇 altsybeev i.

语言

  • 29,856 篇 英文
  • 1,065 篇 其他
  • 232 篇 中文
  • 20 篇 日文
  • 9 篇 德文
  • 6 篇 法文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Electrical Engineering Mathematics and Computer Science"
31202 条 记 录,以下是1-10 订阅
排序:
Privacy-preserving explainable AI: a survey
收藏 引用
science China(Information sciences) 2025年 第1期68卷 23-56页
作者: Thanh Tam NGUYEN Thanh Trung HUYNH Zhao REN Thanh Toan NGUYEN Phi Le NGUYEN Hongzhi YIN Quoc Viet Hung NGUYEN School of Information and Communication Technology Griffith University School of Computer and Communication Sciences Ecole Polytechnique Federale de Lausanne Faculty of Mathematics and Computer Science University of Bremen Faculty of Information Technology HUTECH University Department of Computer Science Hanoi University of Science and Technology School of Electrical Engineering and Computer Science The University of Queensland
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention... 详细信息
来源: 评论
Mechanical Constraint Identification in Model-Mediated Teleoperation
收藏 引用
IEEE Robotics and Automation Letters 2025年 第6期10卷 5777-5782页
作者: Van Der Walt, Christophe Stramigioli, Stefano Dresscher, Douwe University of Twente Robotics and Mechatronics Group Faculty of Electrical Engineering Mathematics and Computer Science NB Enschede7522 Netherlands
Model-Mediated Teleoperation (MMT) is a form of teleoperation where a model is used to display operator commands to the environment and environmental feedback to the operator. This circumvents the performance-stabilit... 详细信息
来源: 评论
Generating Temporal Contact Graphs Using Random Walkers
收藏 引用
IEEE Transactions on Network science and engineering 2025年 第3期12卷 1649-1659页
作者: Almasan, Anton-David Shvydun, Sergey Scholtes, Ingo Van Mieghem, Piet Delft University of Technology Faculty of Electrical Engineering Mathematics and Computer Science Delft2628 CD Netherlands 50 Würzburg97074 Germany
We study human mobility networks through timeseries of contacts between individuals. Our proposed Random Walkers Induced temporal Graph (RWIG) model generates temporal graph sequences based on independent random walke... 详细信息
来源: 评论
Leveraging Large Language Models to Identify the Values Behind Arguments  2nd
Leveraging Large Language Models to Identify the Values Be...
收藏 引用
2nd International Workshop on Value engineering in Artificial Intelligence, VALE 2024
作者: Senthilkumar, Rithik Appachi Homayounirad, Amir Siebert, Luciano Cavalcante Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft Netherlands
Human values capture what people and societies perceive as desirable, transcend specific situations and serve as guiding principles for action. People’s value systems motivate their positions on issues concerning the... 详细信息
来源: 评论
Graph Topology Identification Based on Covariance Matching
Graph Topology Identification Based on Covariance Matching
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Han, Yongsheng Natali, Alberto Leus, Geert Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft Netherlands
This paper addresses graph topology identification for applications where the underlying structure of systems like brain and social networks is not directly observable. Traditional approaches based on signal matching ... 详细信息
来源: 评论
Adaptive Cooperative Quality Weight Spectrum Sensing for Mitigating Byzantine Attacks in Cognitive Radio
收藏 引用
IEEE Access 2025年 13卷 80930-80940页
作者: Srisomboon, Kanabadee Pipanmekaporn, Luepol Prayote, Akara Lee, Wilaiporn Division of Electrical Engineering Department of Electrical and Computer Engineering Faculty of Engineering Bangkok10800 Thailand King Mongkut’s University of Technology North Bangkok Faculty of Applied Science Department of Computer and Information Science Bangkok10800 Thailand
Spectrum sensing data falsification (SSDF) attack, i.e., Byzantine attack, is one of the critical threats of the cooperative spectrum sensing where the Byzantine attackers (BAs) forward incorrect local sensing results... 详细信息
来源: 评论
Improved Bounds on the Size of Permutation codes under Kendall τ-metric
收藏 引用
IEEE Transactions on Information Theory 2025年 第6期71卷 4156-4166页
作者: Parvaresh, Farzad Sobhani, Reza Abdollahi, Alireza Bagherian, Javad Jafari, Fatemeh Khatami, Maryam University of Isfahan Faculty of Engineering Department of Electrical Engineering Isfahan Iran School of Mathematics Tehran19395-5746 Iran University of Isfahan Faculty of Mathematics and Statistics Department of Applied Mathematics and Computer Science Isfahan81746-73441 Iran University of Isfahan Faculty of Mathematics and Statistics Department of Pure Mathematics Isfahan81746-73441 Iran
In order to overcome the challenges caused by flash memories and also to protect against errors related to reading information stored in DNA molecules in the shotgun sequencing method, the rank modulation method has b... 详细信息
来源: 评论
Neutrosophic Fuzzy Power Management (NFPM): Tackling Uncertainty in Energy Harvesting for Sensor Networks
收藏 引用
Neutrosophic Sets and Systems 2025年 76卷 99-114页
作者: Alzubi, Musallam M. Mohamed, Mohamed A. Amer, Hanan M. Salama, A.A. Electronics and Communications Engineering Department Faculty of Engineering Mansoura University Mansoura Egypt Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt
This paper presents a novel approach known as Neutrosophic Fuzzy Power Management (NFPM) aimed at addressing the critical challenge of uncertain energy availability in Energy Harvesting Sensor Networks (EHWSNs). The m... 详细信息
来源: 评论
Optimized COVID-19 detection using sparse deep learning models from multimodal imaging data
收藏 引用
Multimedia Tools and Applications 2025年 第13期84卷 11451-11474页
作者: Moradi, MohammadMahdi Hassanzadeh, Alireza Haghanifar, Arman Ko, Seok Bum Faculty of Computer Science and Software Engineering Concordia University MontrealQC Canada Faculty of Electrical Engineering Shahid Beheshti University Tehran Tehran Iran Department of Electrical & Computer Engineering University of Saskatchewan SaskatoonSK Canada
This paper explores the global spread of the COVID-19 virus since 2019, impacting 219 countries worldwide. Despite the absence of a definitive cure, the utilization of artificial intelligence (AI) methods for disease ... 详细信息
来源: 评论
Social-Physical Human-Robot Interaction for Health Applications: A Scoping Review  16th
Social-Physical Human-Robot Interaction for Health Applicat...
收藏 引用
16th International Conference on Social Robotics, ICSR + AI 2024
作者: Schneider, Sebastian Human-Media Interaction Faculty of Electrical Engineering Mathematics and Computer Science University of Twente Enschede Netherlands
Social robots capable of physically or tactilely interacting with users could unlock new health applications. Despite the potential benefits, integrating physical interaction capabilities in social robot applications ... 详细信息
来源: 评论