咨询与建议

限定检索结果

文献类型

  • 9,292 篇 会议
  • 5,769 篇 期刊文献
  • 296 册 图书

馆藏范围

  • 15,357 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,780 篇 工学
    • 6,051 篇 计算机科学与技术...
    • 4,943 篇 软件工程
    • 2,033 篇 信息与通信工程
    • 1,266 篇 控制科学与工程
    • 1,198 篇 生物工程
    • 1,191 篇 生物医学工程(可授...
    • 946 篇 电气工程
    • 853 篇 电子科学与技术(可...
    • 766 篇 光学工程
    • 564 篇 机械工程
    • 489 篇 仪器科学与技术
    • 385 篇 化学工程与技术
    • 359 篇 动力工程及工程热...
    • 308 篇 安全科学与工程
    • 266 篇 交通运输工程
    • 260 篇 建筑学
  • 5,588 篇 理学
    • 2,620 篇 数学
    • 1,898 篇 物理学
    • 1,385 篇 生物学
    • 866 篇 统计学(可授理学、...
    • 604 篇 系统科学
    • 434 篇 化学
  • 2,359 篇 管理学
    • 1,360 篇 管理科学与工程(可...
    • 1,100 篇 图书情报与档案管...
    • 745 篇 工商管理
  • 1,157 篇 医学
    • 993 篇 临床医学
    • 890 篇 基础医学(可授医学...
    • 580 篇 药学(可授医学、理...
    • 411 篇 公共卫生与预防医...
  • 408 篇 法学
    • 346 篇 社会学
  • 249 篇 经济学
  • 219 篇 教育学
  • 211 篇 农学
  • 51 篇 文学
  • 21 篇 军事学
  • 21 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 477 篇 informatics
  • 251 篇 computational mo...
  • 212 篇 computer archite...
  • 208 篇 deep learning
  • 196 篇 machine learning
  • 187 篇 computer science
  • 182 篇 data mining
  • 162 篇 artificial intel...
  • 157 篇 image segmentati...
  • 156 篇 optimization
  • 151 篇 internet of thin...
  • 141 篇 feature extracti...
  • 139 篇 quality of servi...
  • 131 篇 wireless sensor ...
  • 127 篇 support vector m...
  • 127 篇 resource managem...
  • 126 篇 bandwidth
  • 125 篇 neural networks
  • 123 篇 monitoring
  • 121 篇 accuracy

机构

  • 412 篇 department for p...
  • 404 篇 faculty of scien...
  • 402 篇 department of ph...
  • 394 篇 kirchhoff-instit...
  • 385 篇 department of ph...
  • 385 篇 department of ph...
  • 357 篇 fakultät für phy...
  • 338 篇 institute of phy...
  • 328 篇 institute of phy...
  • 305 篇 department of ph...
  • 280 篇 department of ph...
  • 273 篇 instituto de fís...
  • 268 篇 universidade fed...
  • 267 篇 graduate school ...
  • 267 篇 department of ph...
  • 264 篇 ictp trieste
  • 254 篇 yerevan physics ...
  • 252 篇 department of ph...
  • 248 篇 department of ph...
  • 246 篇 nikhef national ...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 331 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 324 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 318 篇 s. mohapatra
  • 306 篇 s. guindon
  • 299 篇 y. tayalati
  • 299 篇 a. kaczmarska
  • 283 篇 m. klein
  • 282 篇 j. schaarschmidt
  • 266 篇 a. d. pilkington
  • 259 篇 f. pastore

语言

  • 14,538 篇 英文
  • 713 篇 其他
  • 98 篇 中文
  • 13 篇 日文
  • 4 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 爱沙尼亚文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Informatics and Computer Engineering Department"
15357 条 记 录,以下是891-900 订阅
排序:
Automated User Experience (UX) Testing for Mobile Application: Strengths and Limitations
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2022年 第4期16卷 30-45页
作者: Abuaddous, Hayfa. Y. Saleh, Ashraf Mousa Enaizan, Odai Ghabban, Fahad Al-Badareen, Anas Bassam Faculty of Computer Sciences and Informatics Amman Arab University Amman Jordan Department of Management Information System University of Tabuk Tabuk Saudi Arabia College of Computer Science and Engineering Taibah University Medina Saudi Arabia Department of Software Engineering Aqaba University of Technology Aqaba Jordan
User Experience (UX) evaluation has a significant importance for any interactive application. Mobile device applications have additional limitations to convey good user experiences (UX) due to the usage and features o... 详细信息
来源: 评论
Don't Forget the Exception! : Considering Robustness Changes to Identify Design Problems  20
Don't Forget the Exception! : Considering Robustness Changes...
收藏 引用
20th IEEE/ACM International Conference on Mining Software Repositories, MSR 2023
作者: Oliveira, Anderson Correia, Joao Sousa, Leonardo Assuncao, Wesley K. G. Coutinho, Daniel Garcia, Alessandro Oizumi, Willian Barbosa, Caio Uchoa, Anderson Pereira, Juliana Alves Informatics Department - Pontifical Catholic Rio de Janeiro Brazil Carnegie Mellon University Department of Electrical and Computer Engineering Pittsburgh United States Institute of Software Systems Engineering Linz Austria Itapajé Brazil
Modern programming languages, such as Java, use exception-handling mechanisms to guarantee the robustness of software systems. Although important, the quality of exception code is usually poor and neglected by develop... 详细信息
来源: 评论
An Architectural Extension for Digital Twin Platforms to Leverage Behavioral ModelsBehaviors  19
An Architectural Extension for Digital Twin Platforms to Lev...
收藏 引用
19th IEEE International Conference on Automation Science and engineering, CASE 2023
作者: Lehner, Daniel Gil, Santiago Mikkelsen, Peter H. Larsen, Peter G. Wimmer, Manuel CDL-MINT Institute of Business Informatics - Software Engineering Johannes Kepler University Linz Austria Aarhus University Department of Electrical and Computer Engineering Finlandsgade 22 Aarhus8200 Denmark
To reduce the work effort for developing and managing Digital Twin (DT)-based services, so-called DT platforms have emerged recently. These DT platforms make it easier to collect, store, and manage data from physical ... 详细信息
来源: 评论
Emotion Recognition from Speech Using Convolutional Neural Networks
Emotion Recognition from Speech Using Convolutional Neural ...
收藏 引用
International Conference on Data Analytics and Management, ICDAM 2022
作者: Mahfood, Bayan Elnagar, Ashraf Kamalov, Firuz Department of Computer Science College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates Department of Electrical Engineering Canadian University Dubai Dubai United Arab Emirates
The human voice carries a great deal of useful information. This information can be utilized in various areas such as call centers, security and medicine among many others. This work aims at implementing a speech emot... 详细信息
来源: 评论
Feature Fool Exploitation for Lightweight Anomaly Detection in Respiratory Sound  10th
Feature Fool Exploitation for Lightweight Anomaly Detection...
收藏 引用
10th International Conference on Future Data and Security engineering, FDSE 2023
作者: Le, Kim-Ngoc T. Bang, Sammy Yap Xiang Le, Duc-Tai Choo, Hyunseung Department of AI Systems Engineering Sungkyunkwan University Seoul Korea Republic of College of Computing and Informatics Sungkyunkwan University Seoul Korea Republic of Department of Electrical and Computer Engineering Sungkyunkwan University Seoul Korea Republic of
Respiratory sound auscultation with digital stethoscopes is a common technique for identifying lung disorders, however, it requires a qualified medical expert to interpret the sounds, and inter-listener variability re... 详细信息
来源: 评论
Flexible Real-Time Emulation of Fading Channels on SoC-FPGA Devices
Flexible Real-Time Emulation of Fading Channels on SoC-FPGA ...
收藏 引用
Panhellenic Conference on Electronics and Telecommunications (PACET)
作者: Ilias Papalamprou Giorgos Armeniakos Ioannis Stratakos George Lentaris Dimitrios Soudris School of Electrical and Computer Engineering National Technical University of Athens Department of Informatics and Computer Engineering University of West Attica
Modeling and replicating the channel effects between a transmitter and receiver, is crucial in any telecommunication system, in order to evaluate the impact on the transmitted data. Therefore the necessity of having a...
来源: 评论
Identification Important Nodes in Diffusion Process by User Experience on Social Network  28
Identification Important Nodes in Diffusion Process by User ...
收藏 引用
28th International computer Conference, computer Society of Iran, CSICC 2023
作者: Kazemzadeh, Farzaneh Safaei, Ali Asghar Mirzarezaee, Mitra Islamic Azad University Department of Computer Engineering Science and Research Branch Tehran Iran Tarbiat Modares University Faculty of Medical Sciences Department of Medical Informatics Tehran Iran
The influence maximization problem (IMP) has been proposed in social networks. Nowadays, it is considered an important and practical problem due to the earnings potential by identifying a set of influential nodes, and... 详细信息
来源: 评论
Developing an Anti -Phishing Large Language Model: A Focus Group Study on Human, Technological, and Legal Factors
Developing an Anti -Phishing Large Language Model: A Focus G...
收藏 引用
International Conference on Information, Intelligence, Systems and Applications (IISA)
作者: George A. Thomopoulos Panagiota Kiortsi Damianos Dumi Sigalas Dimitris Kosmopoulos Ioannis Igglezakis Christos Fidas Department of Electrical and Computer Engineering University of Patras Faculty of Law Aristotle University of Thessaloniki Department of Computer Engineering and Informatics University of Patras
The phishing problem poses a significant threat in modern information systems, putting both individuals and businesses at risk of financial and professional harm. Owing to social media's rapid development and wide... 详细信息
来源: 评论
Trust-Chain-Based Certificate Revocation Control in Autonomous Vehicle Networks  5
Trust-Chain-Based Certificate Revocation Control in Autonomo...
收藏 引用
5th International Conference on Information and Communications Technology, ICOIACT 2022
作者: Erceylan, Gizem Akcayol, M. Ali Informatics Institute Gazi University Ankara Turkey Gazi University Department of Computer Engineering Ankara Turkey
One of the biggest problems in V2X communication is the inclusion of faulty or illegal nodes in the network. In V2X systems using PKI, the primary approach is to revoke the certificates of malicious and compromised ve... 详细信息
来源: 评论
Introduction to Advances in Information, Intelligence, Systems and Applications  14th
Introduction to Advances in Information, Intelligence, Syste...
收藏 引用
14th International Conference on Information, Intelligence, Systems, and Applications, IISA 2023
作者: Tsihrintzis, George A. Virvou, Maria Bourbakis, Nikolaos G. Jain, Lakhmi C. Department of Informatics University of Piraeus Piraeus185 34 Greece Department of Electrical and Computer Engineering Wright State University DaytonOH45435-0001 United States KES International Shoreham-by-Sea United Kingdom
Information is widely available and accessible, but frequently leads to information overload and overexposure and the effort for coding, storing, hiding, securing, transmitting, and retrieving it may be excessive. Int... 详细信息
来源: 评论