咨询与建议

限定检索结果

文献类型

  • 1,911 篇 会议
  • 352 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 2,321 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,447 篇 工学
    • 1,093 篇 计算机科学与技术...
    • 875 篇 软件工程
    • 352 篇 信息与通信工程
    • 214 篇 控制科学与工程
    • 167 篇 电气工程
    • 129 篇 生物工程
    • 123 篇 生物医学工程(可授...
    • 121 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 71 篇 机械工程
    • 67 篇 仪器科学与技术
    • 60 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 54 篇 动力工程及工程热...
    • 53 篇 化学工程与技术
  • 695 篇 理学
    • 412 篇 数学
    • 150 篇 物理学
    • 146 篇 生物学
    • 123 篇 统计学(可授理学、...
    • 105 篇 系统科学
    • 54 篇 化学
  • 426 篇 管理学
    • 268 篇 管理科学与工程(可...
    • 198 篇 图书情报与档案管...
    • 180 篇 工商管理
  • 112 篇 医学
    • 103 篇 临床医学
    • 95 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 78 篇 法学
    • 70 篇 社会学
  • 77 篇 教育学
    • 76 篇 教育学
  • 49 篇 经济学
    • 49 篇 应用经济学
  • 31 篇 农学
  • 10 篇 文学
  • 5 篇 艺术学
  • 4 篇 军事学

主题

  • 58 篇 accuracy
  • 43 篇 artificial intel...
  • 39 篇 computational mo...
  • 36 篇 feature extracti...
  • 32 篇 predictive model...
  • 32 篇 machine learning
  • 31 篇 data mining
  • 31 篇 training
  • 30 篇 computer science
  • 30 篇 software
  • 29 篇 neural networks
  • 28 篇 internet of thin...
  • 28 篇 real-time system...
  • 28 篇 data models
  • 25 篇 wireless sensor ...
  • 25 篇 security
  • 23 篇 students
  • 22 篇 information syst...
  • 22 篇 optimization
  • 22 篇 visualization

机构

  • 17 篇 school of inform...
  • 12 篇 networking and i...
  • 11 篇 international is...
  • 10 篇 international is...
  • 10 篇 dept. of compute...
  • 9 篇 dept. of compute...
  • 9 篇 sri lanka instit...
  • 8 篇 state key labora...
  • 8 篇 dept. computer s...
  • 8 篇 dept. of compute...
  • 7 篇 state key lab. o...
  • 7 篇 electrical and c...
  • 7 篇 state key labora...
  • 7 篇 dept. of compute...
  • 7 篇 dept. of informa...
  • 6 篇 volgograd state ...
  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 information syst...
  • 6 篇 dept. of compute...

作者

  • 16 篇 fotiadis dimitri...
  • 15 篇 mesaritakis char...
  • 14 篇 nikumani choudhu...
  • 14 篇 zhu xiaoyan
  • 13 篇 huang minlie
  • 13 篇 xi zhang
  • 13 篇 bogris adonis
  • 10 篇 kartiwi mira
  • 10 篇 gunawan teddy su...
  • 9 篇 bossek jakob
  • 9 篇 gupta deepti
  • 9 篇 ioannis ch. pasc...
  • 9 篇 deligiannidis st...
  • 9 篇 dimitrios i. fot...
  • 8 篇 fotiadis d.i.
  • 8 篇 qiangfu zhao
  • 8 篇 petryshyn mykhai...
  • 8 篇 larsson aron
  • 8 篇 zhang xi
  • 8 篇 koushik reddy ch...

语言

  • 2,257 篇 英文
  • 42 篇 其他
  • 16 篇 中文
  • 4 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Information Systems and Computer Programming Dept."
2321 条 记 录,以下是281-290 订阅
排序:
Photonic Neuromorphic Accelerator Combined with an Event-Based Neuromorphic Camera for High-Speed Object Classification
Photonic Neuromorphic Accelerator Combined with an Event-Bas...
收藏 引用
2023 Conference on Lasers and Electro-Optics Europe and European Quantum Electronics Conference, CLEO/Europe-EQEC 2023
作者: Tsirigotis, Aris Tsilikas, Ioannis Sozos, Kostas Bogris, Adonis Mesaritakis, Charis University of the Aegean Dept. Information and Communication Systems Engineering Palama 2 str. Karlovasi Samos83200 Greece National Technical University of Athens Dept. Applied Physics and Mathematics Iroon Polytechniou 9 Zografou Athens15772 Greece University of West Attica Dept. Informatics and Computer Engineering Ag. Spiridonos Egaleo12243 Greece
In this work, we demonstrate the impact of an unconventional convolutional photonic accelerator, based on an optical spectrum slicing (OSS) [1], on the classification accuracy of objects, generated through a high-fram... 详细信息
来源: 评论
Human Body Action Recognition based on 3D Feature Fusion over RGB Scenes
Human Body Action Recognition based on 3D Feature Fusion ove...
收藏 引用
International Conference on information Technology (ICIT)
作者: Heba Nsour Zaid Mustafa Maria Al-Sendah Dept. of Computer Science Al-Balqa Applied University Albalqa Jordan Dept. of Computer Information Systems Al-Balqa Applied University Albalqa Jordan
Human body action recognition (HBAR) is an important area of research in machine learning and image processing due to its vast range of applications. Similarly, estimating various components of human anatomy from RGB ...
来源: 评论
Secure and Efficient Key Management for Deduplicated Cloud Storage systems
Secure and Efficient Key Management for Deduplicated Cloud S...
收藏 引用
Security of information and Networks (SIN), International Conference on
作者: Jay Dave Anshul Kanodia Raj Srivastava Kushagra Singh Prithvi Hegde Hitaishi Desai Dept. of Computer Science & Information Systems Birla Institute of Technology & Science Pilani Hyderabad India
Deduplication is a ubiquitous compression technique for cloud storage servers. It reduces storage and bandwidth requirements by avoiding duplicate copies of data. However, developing an encryption scheme for deduplica...
来源: 评论
EMDA-Net: Earth Mover’s Distance (EMD) influenced Attention-aided Neural Network for Medical Image Classification
EMDA-Net: Earth Mover’s Distance (EMD) influenced Attention...
收藏 引用
IEEE International Conference on Cognitive Machine Intelligence (CogMI)
作者: Surya Majumder Kushaj Mallick Wrick Pal Somenath Chakraborty Ram Sarkar Dept. of Computer Science & Engineering Heritage Institute of Technology Kolkata India Dept. of Electrical Engineering Jadavpur University Kolkata India Dept. of Computer Science & Information Systems West Virginia University Institute of Technology West Virginia USA Dept. of Computer Science & Engineering Jadavpur University Kolkata India
Medical image analysis methods need to be more generalized in order to meet the substantial problems associated with cancer detection and treatment, including skin, cervical, and breast cancer. In this work, we propos... 详细信息
来源: 评论
Ensuring Electronic Health Record (EHR) Privacy using Zero Knowledge Proofs (ZKP) and Secure Encryption Schemes on Blockchain
Ensuring Electronic Health Record (EHR) Privacy using Zero K...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Ranaweera T.A.V.Y Hewage H.N.H Hapuhinna H.K.D.W.M.C.B. Preethilal K.L.K.T Amila Senarathne Laneesha Ruggahakotuwa Dept. Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
In the haste of EHR digitization, the protection of patient data becomes paramount, casting a spotlight on small healthcare clinics grappling with the threats of an ever more interconnected healthcare sector. That is ...
来源: 评论
Optimal Auto Calling Algorithm for Real-Time Condition Reporting by Corruption Handling Officer  3
Optimal Auto Calling Algorithm for Real-Time Condition Repor...
收藏 引用
3rd International Conference on Electrical, Communication and computer Engineering, ICECCE 2021
作者: Ida Gani, Hamdan Faisal, Muhammad Rosnani Stmik Professional Dept. of Information System Makassar Indonesia Stmik Handayani Dept. of Computer Systems Makassar Indonesia
Corruption is a primary development challenge in Indonesia's economic and social field. In order to overcome these threats, Indonesia's government has been established the Corruption Eradication Commission (Ko... 详细信息
来源: 评论
CyberExpert: Towards an Automated Framework for Cybersecurity Expertise Acquisition and Mastery  53
CyberExpert: Towards an Automated Framework for Cybersecurit...
收藏 引用
53rd IEEE ASEE Frontiers in Education International Conference, FIE 2023
作者: Hatcher, William Harrison, Tyler Brown, Truman Hammad, Eman Texas A&m University - Commerce Rellis ISTAR Lab Computer Science & Information Systems Dept. BryanTX United States Texas A&m University ISTAR Lab College StationTX United States
The continuously increasing gap in cybersecurity workforce in numbers and in skill level, demands a fundamental shift in how we approach cybersecurity education and training. The complex and ever-evolving cybersecurit... 详细信息
来源: 评论
Smart Greenhouse Control System using Multi-Objective Adaptive Policy Gradient and Neural Meta Controller  4
Smart Greenhouse Control System using Multi-Objective Adapti...
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent information systems, ICUIS 2024
作者: Himabindu, C.H. Sreeramu, M. Chaganti, Koushik Reddy Gutta, Pruthvi Krishna Nagesh, C. Ruksana, S. Vignan Institute of Technology and Science Dept of Mba Hyderabad India University of the Cumberlands Dept. of Computer and Information Systems KY United States Tesla Dept of It AustinTX United States Srinivasa Ramanujan Institute of Technology Department of Cse Anantapur India Gates Institute of Technology and Science Department of Cse Anantapur India
This confluence of escalating energy costs and upsurges in the demand for high-quality crop yields under uncertain environmental conditions makes a strong case for the urgent optimization of greenhouse operations. The... 详细信息
来源: 评论
Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things
Secure Deduplication with Dynamic Key Management in Fog Enab...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Jay Dave Nikumani Choudhury Utkarsh Tiwari Samyu Kamtam Kudapa Sai Rohith Dept. of Computer Science & Information Systems Birla Institute of Technology & Science Pilani Hyderabad India
Fog computing is an extension of cloud computing and presents additional devices called fog devices near IoT devices providing services on behalf of cloud servers. Although fog computing brings several advantages, rap...
来源: 评论
What Kinds of Contracts Do ML APIs Need?
arXiv
收藏 引用
arXiv 2023年
作者: Khairunnesa, Samantha Syeda Ahmed, Shibbir Imtiaz, Sayem Mohammad Rajan, Hridesh Leavens, Gary T. Dept. of Computer Science and Information Systems Bradley University United States Dept. of Computer Science Iowa State University United States Dept. of Computer Science University of Central Florida United States
Recent work has shown that Machine Learning (ML) programs are error-prone and called for contracts for ML code. Contracts, as in the design by contract methodology, help document APIs and aid API users in writing corr... 详细信息
来源: 评论