咨询与建议

限定检索结果

文献类型

  • 688 篇 期刊文献
  • 110 篇 会议
  • 6 册 图书

馆藏范围

  • 804 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 553 篇 理学
    • 390 篇 物理学
    • 120 篇 数学
    • 79 篇 化学
    • 69 篇 生物学
    • 60 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 地球物理学
  • 346 篇 工学
    • 122 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 78 篇 化学工程与技术
    • 48 篇 核科学与技术
    • 38 篇 生物工程
    • 36 篇 信息与通信工程
    • 36 篇 生物医学工程(可授...
    • 34 篇 光学工程
    • 32 篇 电子科学与技术(可...
    • 30 篇 电气工程
    • 20 篇 力学(可授工学、理...
    • 20 篇 控制科学与工程
    • 15 篇 土木工程
    • 14 篇 冶金工程
    • 11 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 8 篇 建筑学
  • 53 篇 管理学
    • 28 篇 图书情报与档案管...
    • 26 篇 管理科学与工程(可...
  • 42 篇 医学
    • 36 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
    • 11 篇 药学(可授医学、理...
  • 13 篇 农学
  • 7 篇 法学
  • 3 篇 经济学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 75 篇 hadrons
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 38 篇 bottom mesons
  • 34 篇 branching fracti...
  • 30 篇 particle decays
  • 26 篇 leptonic, semile...
  • 25 篇 flavor changing ...
  • 21 篇 bosons
  • 21 篇 charmed mesons
  • 18 篇 quark model
  • 17 篇 visualization
  • 17 篇 cp violation
  • 15 篇 supersymmetry
  • 15 篇 rare decays
  • 14 篇 tellurium compou...
  • 14 篇 electroweak inte...
  • 13 篇 quantum chromody...
  • 13 篇 particle product...
  • 12 篇 bottom baryons

机构

  • 427 篇 department of ph...
  • 420 篇 school of physic...
  • 415 篇 department of ph...
  • 414 篇 horia hulubei na...
  • 414 篇 cavendish labora...
  • 412 篇 center for high ...
  • 411 篇 van swinderen in...
  • 411 篇 imperial college...
  • 408 篇 stfc rutherford ...
  • 403 篇 h.h. wills physi...
  • 403 篇 nikhef national ...
  • 401 篇 iccub universita...
  • 399 篇 institute of par...
  • 397 篇 henryk niewodnic...
  • 396 篇 yandex school of...
  • 390 篇 school of physic...
  • 388 篇 university of ch...
  • 388 篇 physik-institut ...
  • 386 篇 oliver lodge lab...
  • 370 篇 departamento de ...

作者

  • 253 篇 barter w.
  • 249 篇 bellee v.
  • 241 篇 beiter a.
  • 227 篇 bowcock t.j.v.
  • 227 篇 casse g.
  • 219 篇 boettcher t.
  • 217 篇 blake t.
  • 217 篇 amato s.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 215 篇 bediaga i.
  • 214 篇 braun s.
  • 213 篇 borisyak m.
  • 212 篇 bizzeti a.
  • 211 篇 baryshnikov f.
  • 211 篇 bencivenni g.
  • 210 篇 brundu d.
  • 209 篇 back j.j.
  • 208 篇 bay a.
  • 207 篇 cattaneo m.

语言

  • 780 篇 英文
  • 21 篇 其他
  • 3 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Institute for Data Analysis and Visualization Department of Computer Science"
804 条 记 录,以下是1-10 订阅
排序:
PraK Tool V3: Enhancing Video Item Search Using Localized Text and Texture Queries  31st
PraK Tool V3: Enhancing Video Item Search Using Localized Te...
收藏 引用
31st International Conference on Multimedia Modeling, MMM 2025
作者: Stroh, Michael Kloda, Vojtěch Verner, Benjamin Vopálková, Zuzana Buchmüller, Raphael Jäckl, Bastian Hajko, Jakub Lokoč, Jakub Visual Computing Department of Computer Science Faculty of Natural Sciences Konstanz University Konstanz Germany SIRET Research Group Department of Software Engineering Faculty of Mathematics and Physics Charles University Prague Czech Republic Data Analysis and Visualization Department of Computer Science Faculty of Natural Sciences Konstanz University Konstanz Germany
We present a third version of the PraK system designed around an effective text-image and image-image search model. The system integrates sub-image search options for localized context search for CLIP and image color/... 详细信息
来源: 评论
ControlVideo: conditional control for one-shot text-driven video editing and beyond
收藏 引用
science China(Information sciences) 2025年 第3期68卷 150-162页
作者: Min ZHAO Rongzhen WANG Fan BAO Chongxuan LI Jun ZHU Department of Computer Science and Technology Institute for AI Tsinghua-Bosch Joint ML CenterTsinghua Laboratory of Brain and Intelligence Lab Tsinghua University ShengShu Technology Gaoling School of Artificial Intelligence Renmin University of China Beijing Key Laboratory of Big Data Management and Analysis Methods Pazhou Laboratory (Huangpu)
This paper presents ControlVideo for text-driven video editing — generating a video that aligns with a given text while preserving the structure of the source video. Building on a pre-trained text-to-image diffusion ... 详细信息
来源: 评论
PraK Tool: An Interactive Search Tool Based on Video data Services  30th
PraK Tool: An Interactive Search Tool Based on Video Data S...
收藏 引用
30th International Conference on MultiMedia Modeling, MMM 2024
作者: Lokoč, Jakub Vopálková, Zuzana Stroh, Michael Buchmueller, Raphael Schlegel, Udo SIRET Research Group Department of Software Engineering Faculty of Mathematics and Physics Charles University Prague Czech Republic Visual Computing Department of Computer Science Faculty of Natural Sciences Konstanz University Konstanz Germany Data Analysis and Visualization Department of Computer Science Faculty of Natural Sciences Konstanz University Konstanz Germany
This paper presents a tool relying on data service architecture, where technical details of all VBS datasets are completely hidden behind an abstract stateless data layer. The data services allow independent developme... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Blockchain-Based Cognitive Computing Model for data Security on a Cloud Platform
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3305-3323页
作者: Xiangmin Guo Guangjun Liang Jiayin Liu Xianyi Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Jiangsu Police InstituteNanjing210031China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China
Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and ***,information shoplifting poses significant threats,potentially leading to poor perf... 详细信息
来源: 评论
Evolving Safety Protocols: Deep Learning-Enabled Detection of Personal Protective Equipment  1
收藏 引用
4th International Conference on computer Vision, High-Performance Computing, Smart Devices, and Networks, CHSN 2023
作者: Alahmid, Mustafa Bhimani, Kishankumar Saradva, Khushbu Ghildiyal, Sushil Saeedi, Sayed Aryan Ali, Saraa Yan, Han Filippov, Evgeny Faculty of Computer Science and Technology Saint Petersburg Electrotechnical University "LETI" Saint Petersburg Russia Laboratory on AI for Computational Biology Faculty of Computer Science HSE University Moscow Russia Department of Computer Science and Engineering Indian Institute of Technology Ropar Punjab India Laboratory of Methods for Big Data Analysis Faculty of Computer Science HSE University Moscow Russia Deggendorf Institute of Technology Bavaria Germany
To give shift in safety protocols, we have employed advanced deep learning algorithms and frameworks (Shrestha and Mahmood in IEEE Access 7:53,040–53,065, 2019 [25]) to construct an innovative AI model. The designed ... 详细信息
来源: 评论
Enhancing medical vision-language contrastive learning via inter-matching relation modelling
收藏 引用
IEEE Transactions on Medical Imaging 2025年 第6期PP卷 PP页
作者: Li, Mingjian Meng, Mingyuan Fulham, Michael Feng, David Dagan Bi, Lei Kim, Jinman University of Sydney Biomedical data analysis and visualization lab School of Computer Science NSW Australia Royal Prince Alfred Hospital Department of Molecular Imaging NSW Australia Shanghai Jiao Tong University Institute of Translational Medicine Shanghai China
Medical image representations can be learned through medical vision-language contrastive learning (mVLCL) where medical imaging reports are used as weak supervision through image-text alignment. These learned image re... 详细信息
来源: 评论
HOFD: An Outdated Fact Detector for Knowledge Bases
收藏 引用
IEEE Transactions on Knowledge and data Engineering 2023年 第10期35卷 10775-10789页
作者: Hao, Shuang Chai, Chengliang Li, Guoliang Tang, Nan Wang, Ning Yu, Xiang Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing100044 China Beijing Institute of Technology School of Computer Science and Technology Beijing100811 China Beijing100190 China Qatar Computing Research Institute Hbku Doha34110 Qatar Huawei Company Gauss Department Beijing100031 China
Knowledge bases (KBs), which store high-quality information, are crucial for many applications, such as enhancing search results and serving as external sources for data cleaning. Not surprisingly, there exist outdate... 详细信息
来源: 评论
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
收藏 引用
IEEE Access 2023年 11卷 74000-74020页
作者: Javed, Safdar Hussain Ahmad, Maaz Bin Asif, Muhammad Akram, Waseem Mahmood, Khalid Das, Ashok Kumar Shetty, Sachin College of Computing and Information Sciences Karachi75190 Pakistan Lahore Garrison University Department of Computer Science Lahore54810 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan International Institute of Information Technology at Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center Department of Modeling SuffolkVA23435 United States Old Dominion University Center for Cybersecurity Education and Research SuffolkVA23435 United States
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) t... 详细信息
来源: 评论
Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture
收藏 引用
Journal of Advanced Research 2024年 62卷 155-163页
作者: Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Kharel, Rupak Das, Ashok Kumar Shetty, Sachin Rodrigues, Joel J.P.C. School of Psychology and Computer Science University of Central Lancashire Preston United Kingdom Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Yunlin 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan Department of Computer Science University of Sahiwal Punjab Sahiwal 57000 Pakistan Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India Department of Modeling Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center and Center for Cybersecurity Education and Research Old Dominion University Suffolk 23435 VA United States COPELABS Lusófona University Campo Grande 376 Lisbon 1749-024 Portugal
Introduction: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical... 详细信息
来源: 评论