咨询与建议

限定检索结果

文献类型

  • 58,185 篇 会议
  • 57,670 篇 期刊文献
  • 1,670 册 图书
  • 1 篇 科技报告

馆藏范围

  • 117,524 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 63,223 篇 工学
    • 41,424 篇 计算机科学与技术...
    • 31,600 篇 软件工程
    • 11,250 篇 信息与通信工程
    • 9,294 篇 控制科学与工程
    • 6,802 篇 电气工程
    • 6,385 篇 生物工程
    • 5,746 篇 电子科学与技术(可...
    • 5,484 篇 生物医学工程(可授...
    • 3,938 篇 光学工程
    • 3,926 篇 化学工程与技术
    • 3,841 篇 机械工程
    • 2,996 篇 动力工程及工程热...
    • 2,802 篇 材料科学与工程(可...
    • 2,663 篇 仪器科学与技术
    • 2,344 篇 力学(可授工学、理...
    • 1,982 篇 建筑学
  • 55,059 篇 理学
    • 35,024 篇 数学
    • 15,186 篇 物理学
    • 8,732 篇 统计学(可授理学、...
    • 7,925 篇 生物学
    • 5,458 篇 系统科学
    • 4,447 篇 化学
  • 15,267 篇 管理学
    • 8,825 篇 管理科学与工程(可...
    • 6,856 篇 图书情报与档案管...
    • 4,645 篇 工商管理
  • 5,503 篇 医学
    • 4,592 篇 临床医学
    • 3,906 篇 基础医学(可授医学...
    • 2,370 篇 药学(可授医学、理...
  • 2,626 篇 法学
    • 2,248 篇 社会学
  • 2,042 篇 经济学
    • 2,006 篇 应用经济学
  • 1,791 篇 教育学
  • 1,508 篇 农学
  • 416 篇 文学
  • 230 篇 哲学
  • 194 篇 军事学
  • 141 篇 艺术学
  • 100 篇 历史学

主题

  • 4,236 篇 computer science
  • 2,897 篇 mathematics
  • 1,777 篇 machine learning
  • 1,672 篇 computational mo...
  • 1,474 篇 deep learning
  • 1,464 篇 accuracy
  • 1,439 篇 artificial intel...
  • 1,242 篇 feature extracti...
  • 1,028 篇 training
  • 995 篇 optimization
  • 988 篇 data mining
  • 926 篇 support vector m...
  • 903 篇 neural networks
  • 884 篇 mathematical mod...
  • 778 篇 predictive model...
  • 749 篇 internet of thin...
  • 676 篇 application soft...
  • 676 篇 educational inst...
  • 673 篇 semantics
  • 665 篇 image segmentati...

机构

  • 1,098 篇 cavendish labora...
  • 1,024 篇 department of ph...
  • 969 篇 oliver lodge lab...
  • 964 篇 physikalisches i...
  • 648 篇 infn laboratori ...
  • 617 篇 infn sezione di ...
  • 600 篇 infn sezione di ...
  • 584 篇 university of ch...
  • 569 篇 fakultät physik ...
  • 567 篇 infn sezione di ...
  • 558 篇 department of ph...
  • 554 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 532 篇 school of physic...
  • 520 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 512 篇 nikhef national ...
  • 512 篇 school of physic...
  • 505 篇 stfc rutherford ...
  • 483 篇 center for high ...

作者

  • 254 篇 barter w.
  • 244 篇 a. gomes
  • 234 篇 c. alexa
  • 234 篇 beiter a.
  • 230 篇 j. m. izen
  • 225 篇 blake t.
  • 224 篇 bellee v.
  • 223 篇 c. amelung
  • 223 篇 s. chen
  • 222 篇 g. bella
  • 222 篇 j. strandberg
  • 221 篇 d. calvet
  • 220 篇 bowcock t.j.v.
  • 219 篇 amato s.
  • 217 篇 boettcher t.
  • 215 篇 brundu d.
  • 215 篇 betancourt c.
  • 213 篇 g. spigo
  • 213 篇 borsato m.
  • 212 篇 bencivenni g.

语言

  • 112,370 篇 英文
  • 4,440 篇 其他
  • 619 篇 中文
  • 69 篇 日文
  • 30 篇 德文
  • 22 篇 法文
  • 9 篇 俄文
  • 9 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 3 篇 意大利文
  • 3 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
  • 1 篇 泰文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Mathematics and Computer Science/Department of Computer Science"
117526 条 记 录,以下是4831-4840 订阅
排序:
Faster Repeated Evasion Attacks in Tree Ensembles  38
Faster Repeated Evasion Attacks in Tree Ensembles
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Cascioli, Lorenzo Devos, Laurens Kuzelka, Ondrej Davis, Jesse Department of Computer Science KU Leuven Leuven Belgium Faculty of Electrical Engineering Czech Technical University in Prague Prague Czech Republic
Tree ensembles are one of the most widely used model classes. However, these models are susceptible to adversarial examples, i.e., slightly perturbed examples that elicit a misprediction. There has been significant re...
来源: 评论
Joint Channel and Multi-User Detection Empowered with Machine Learning
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 109-121页
作者: Mohammad Sh.Daoud Areej Fatima Waseem Ahmad Khan Muhammad Adnan Khan Sagheer Abbas Baha Ihnaini Munir Ahmad Muhammad Sheraz Javeid Shabib Aftab College of Engineering Al Ain UniversityAbu Dhabi112612UAE Department of Computer Science Lahore Garrison UniversityLahore54792Pakistan School of Computer Science National College of Business Administration and EconomicsLahore54000Pakistan Riphah School of Computing and Innovation Faculty of ComputingRiphah International UniversityLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of Software EngineeringGachon UniversitySeongnam13557South Korea Department of Computer Science College of Science and TechnologyWenzhou Kean University325060USA Department of Computer Science Hameeda Rasheed Institute of Science and TechnologyMultan66000Pakistan
The numbers of multimedia applications and their users increase with each passing *** multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the future ge... 详细信息
来源: 评论
Privacy-Aware Artificial Intelligence with Homomorphic Encryption using Machine Learning
Privacy-Aware Artificial Intelligence with Homomorphic Encry...
收藏 引用
2023 International Conference on Sustainable Computing and Smart Systems, ICSCSS 2023
作者: Srinivasa Rao, B. Chattopadhyay, Saumitra Singh, Prashant Hazela, Bramah Sabarinathan, G. Yamini, Kalva Department of Computer Science and Engineering Bachupally Telangana Hyderabad India Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Amity University Amity School of Engineering and Technology Lucknow Department of Computer Science and Engineering Uttar Pradesh India Psna College of Engineering and Technology Department of Mathematics Tamilnadu Dindigul India Sri Ramachandra Institute of Higher Education and Research Cyber Security in Computer Science and Engineering Tamilnadu Chennai India
Along with the expansion of machine learning (ML) applications, the amount of data required to create predictions increases. Big-data ML has always been limited by off-chip memory capacity and computational speed. Con... 详细信息
来源: 评论
Assessing the Effects of Blackhole Attacks on MANET Reliability and Security
Assessing the Effects of Blackhole Attacks on MANET Reliabil...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Fadhil, Saif Aamer Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad10011 Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Mobile Ad Hoc Networks (MANETs) are characterized by some important attributes, including infrastructure, mobile, and dynamic nature, which makes them have vast applications in different areas of computer networks. Th... 详细信息
来源: 评论
Realizing the Potential of Metaverse to Revolutionize the Future of Healthcare  2
Realizing the Potential of Metaverse to Revolutionize the Fu...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Ishtaiwi, Abdelraouf Hadi, Wael Al-Qerem, Ahmad University Of Petra Department Of Data Science And Artificial Intelligence Amman Jordan University Of Petra Department Of Information Security Amman Jordan Zarqa University Faculty Of Information Technology Computer Science Department Zarqa Jordan
The emergence of metaverse technology, underpinned by virtual reality, augmented reality, and artificial intelligence, holds profound implications for transforming healthcare. This paper reviews the current applicatio... 详细信息
来源: 评论
Legal Contract Analysis and Risk Assessment Using Pre-Trained Legal-T5 and Law-GPT  3
Legal Contract Analysis and Risk Assessment Using Pre-Traine...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Poornima, A. Nagaraja, K.V. Venugopalan, Manju Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru India Amrita School of Engineering Amrita Vishwa Vidyapeetham Department of Mathematics Bengaluru India
The need for effective solutions in reviewing, risk identification, and compliance management of complex legal contracts has remained a critical challenge. This research explores how modern machine learning models lik... 详细信息
来源: 评论
Understanding Interpersonal Conflict Types and their Impact on Perception Classification  5
Understanding Interpersonal Conflict Types and their Impact ...
收藏 引用
5th Workshop on Natural Language Processing and Computational Social science, NLPCSS 2022, Held at the 2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022
作者: Welch, Charles Plepi, Joan Neuendorf, Béla Flek, Lucie Lab Department of Mathematics and Computer Science University of Marburg Germany Germany
Studies on interpersonal conflict have a long history and contain many suggestions for conflict typology. We use this as the basis of a novel annotation scheme and release a new dataset of situations and conflict aspe... 详细信息
来源: 评论
Damage Assessment and Recovery in Fog-based Computing Systems
Damage Assessment and Recovery in Fog-based Computing System...
收藏 引用
2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022
作者: Thoumi, Sergio Haraty, Ramzi A. Lebanese American University Department of Computer Science and Mathematics Beirut Lebanon
Technological improvements have been exponential in the last two decades. The advancements in networking, fog computing, and artificial intelligence have allowed us to implement the "Internet of Things"start... 详细信息
来源: 评论
Development of Additive Manufacturing Design Based on Machine Learning: A Biomedical Engineering Approach  1
Development of Additive Manufacturing Design Based on Machin...
收藏 引用
1st International Conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Khan, Akbar Valivarthi, Dharma Teja Banik, Shampa Kakkad, Ashish Sujatha, B. Acharya, Deepak Nimra College of Engineering and Technology ECE Department Andhra Pradesh Vijayawada India Tek Leaders TX United States Dhaka Bangladesh Marwadi University Faculty of Physiotherapy Rajkot India Department of Computer Science and Engineering Tamilnadu Tiruchengode India The University of Alabama in Huntsville Department of computer science United States
Additive manufacturing (AM) is a versatile and complex manufacturing technique that is extensively employed in the production of personalized biopolymer-orientated items and sophisticated medical architecture. One of ... 详细信息
来源: 评论
CrisisHateMM: Multimodal Analysis of Directed and Undirected Hate Speech in Text-Embedded Images from Russia-Ukraine Conflict
CrisisHateMM: Multimodal Analysis of Directed and Undirected...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Bhandari, Aashish Shah, Siddhant B. Thapa, Surendrabikram Naseem, Usman Nasim, Mehwish Delhi Technological University Department of CSE India Virginia Tech Department of Computer Science United States School of Computer Science The University of Sydney Australia School of Physics Mathematics and Computing The University of Western Australia Australia College of Science and Engineering Flinders University Australia
Text-embedded images are frequently used on social media to convey opinions and emotions, but they can also be a medium for disseminating hate speech, propaganda, and extremist ideologies. During the Russia-Ukraine wa... 详细信息
来源: 评论