咨询与建议

限定检索结果

文献类型

  • 80 篇 会议
  • 52 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 140 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 73 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 14 篇 控制科学与工程
    • 11 篇 信息与通信工程
    • 10 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 土木工程
    • 4 篇 石油与天然气工程
    • 4 篇 交通运输工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 船舶与海洋工程
    • 2 篇 生物工程
  • 54 篇 理学
    • 33 篇 数学
    • 10 篇 系统科学
    • 8 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 海洋科学
  • 23 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 10 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 教育学
    • 4 篇 教育学
  • 1 篇 法学
  • 1 篇 农学

主题

  • 9 篇 artificial intel...
  • 8 篇 computer science
  • 6 篇 software enginee...
  • 4 篇 logic programmin...
  • 4 篇 dipper throated ...
  • 3 篇 grey wolf optimi...
  • 3 篇 computational in...
  • 3 篇 data mining and ...
  • 3 篇 java
  • 3 篇 semantics
  • 3 篇 unified modeling...
  • 3 篇 information stor...
  • 2 篇 compilers
  • 2 篇 access control
  • 2 篇 information syst...
  • 2 篇 metaheuristics
  • 2 篇 object oriented ...
  • 2 篇 decision support...
  • 2 篇 operating system...
  • 2 篇 concurrent compu...

机构

  • 9 篇 department of sy...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 3 篇 department of ap...
  • 3 篇 zuse institute b...
  • 3 篇 university of tw...
  • 3 篇 rwth aachen univ...
  • 3 篇 friedrich-alexan...
  • 3 篇 department of in...
  • 3 篇 department of in...
  • 3 篇 institute of sof...
  • 3 篇 institute for so...
  • 3 篇 technische unive...
  • 2 篇 school of mathem...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 dr fusco is a ch...

作者

  • 6 篇 mostafa abotaleb
  • 6 篇 abdelhameed ibra...
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 doaa sami khafag...
  • 4 篇 choe km
  • 4 篇 kapur deepak
  • 4 篇 raschke alexande...
  • 3 篇 serrano felipe
  • 3 篇 scholz sven-bodo
  • 3 篇 mondal shyamal k...
  • 3 篇 narendran paliat...
  • 3 篇 maiti manoranjan
  • 3 篇 weninger dieter
  • 3 篇 reem alkanhel
  • 3 篇 hojny christophe...
  • 3 篇 chmiela antonia
  • 3 篇 mühmer erik
  • 3 篇 mozhaiev mykhail...
  • 3 篇 halbig katrin

语言

  • 137 篇 英文
  • 3 篇 其他
检索条件"机构=Institute for Programming and Logics Department of computer science"
140 条 记 录,以下是101-110 订阅
排序:
Redundant optical data transmission using semiconductor lasers
Redundant optical data transmission using semiconductor lase...
收藏 引用
ACS/IEEE International Conference on computer Systems and Applications
作者: H. D. Wacker J. Borcsok H. Hillmer Development HIMA Paul Hildebrandt GmbH + Co KG Bruehl GERMANY Department of Electrical Engineering and Computer Science Chair for Computer Architecture and System Programming Kassel GERMANY University of Kassel Institute of Nanostructure Technologies and Analytics (INA) and Center for Interdisciplinary Nanostructure Science and Technology (CINSaT) Kassel GERMANY
This paper is dealing with redundant optoelectronic data transmission with special respect to laser channels. The concept of the generalized erasure channel (GEC) is used to determine the probability of undetected err... 详细信息
来源: 评论
Extraction of human mandible bones from multi-slice computed tomographic data
Extraction of human mandible bones from multi-slice computed...
收藏 引用
Middle East Conference on Biomedical Engineering (MECBME)
作者: Tamer M. Nassef Nahed H. Solouma Mohamed Alkhodary Mona K. Marei Yasser M. Kadah Computer and Programming Engineering Department Misr University for Science and Technology Six of October City Egypt Tissue Engineering Laboratory Alexandria University Alexandria Egypt National Institute of Laser Science Cairo University Giza Egypt Biomedical Engineering Department Cairo University Giza Egypt
A new approach for segmenting different anatomical regions in dental Computed Tomography (CT) studies is presented in this paper. It is expected that the proposed approach will help automate different tissues regions ... 详细信息
来源: 评论
computer assisted determination of mandibular cystic lesion volume from computed tomographic data
Computer assisted determination of mandibular cystic lesion ...
收藏 引用
Middle East Conference on Biomedical Engineering (MECBME)
作者: Tamer M. Nassef Reham M. Fliefel Mona K. Marei Nahed H. Solouma Yasser M. Kadah Computer and Programming Engineering Department Misr University for Science and Technology Six of October City Egypt Tissue Engineering Lab Alexandria University Alexandria Egypt National Institute of Laser Science Cairo University Giza Egypt Biomedical Engineering Department Cairo University Giza Egypt
In this paper, a new approach for computing different anatomical regions in dental Computed Tomography (CT) is presented. The approach consists of two steps. First, a HU threshold window sets to separate between diffe... 详细信息
来源: 评论
Method for calculating of R-learning traffic peakedness
Method for calculating of R-learning traffic peakedness
收藏 引用
International Scientific-Practical Conference Problems of Infocommunications science and Technology
作者: Nina Kuchuk Oleksandr Mozhaiev Mykhailo Mozhaiev Heorgii Kuchuk Department of Computer Science National University Kharkiv Ukraine Laboratory on Speech and Audio Computer Engineering and Telecommunication Kharkov SRI examinations named Dist. prof. N.S. Bokariusa Kharkiv Ukraine Department of Information Technologies Kharkiv National University of Internal Affairs Kharkiv Ukraine Department of Computer science and programming National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine
In this article e-leaming traffic which is served by system on the hyper convergent platform is considered. It was done the analysis of the known methods of determine the degree of pulsation of traffic. The method for... 详细信息
来源: 评论
How file access patterns influence interference among cluster applications
How file access patterns influence interference among cluste...
收藏 引用
IEEE International Conference on Cluster Computing
作者: Chih-Song Kuo Aamer Shah Akihiro Nomura Satoshi Matsuoka Felix Wolf Department of Computer Science RWTH Aachen University Aachen Germany German Research School for Simulation Sciences Laboratory for Parallel Programming Aachen Germany Tokyo Institute of Technology Global Scientific Information and Computing Center Tokyo Japan
On large-scale clusters, tens to hundreds of applications can simultaneously access a parallel file system, leading to contention and in its wake to degraded application performance. However, the degree of interferenc... 详细信息
来源: 评论
probabilistic and deterministic local search for solving the binary multiknapsack problem*
收藏 引用
Optimization 1995年 第2期33卷 155-166页
作者: Bertocchi, M. Butti, A. Slominski, L. Sobczynska, J. Department of Mathematics Statistics and Computer Science University of Bergamo Bergamo Piazza Rosate 2 Italy Mathematical Programming Department Systems Research Institute Polish Academy of Sciences Warsaw Newelska str 6 Poland
Results of extensive computational experiments aimed at comparing performance quality (accuracy of an approximate solution and the running time) of the Threshold Accept (TA) approach versus the Simulated Annealing (SA... 详细信息
来源: 评论
A Horizontal Federated Learning Approach to IoT Malware Traffic Detection: An Empirical Evaluation with N-BaIoT Dataset  26
A Horizontal Federated Learning Approach to IoT Malware Traf...
收藏 引用
26th International Conference on Advanced Communications Technology, ICACT 2024
作者: Do, Phuc Hao Le, Tran Duc Vishnevsky, Vladimir Berezkin, Aleksandr Kirichek, Ruslan The Bonch-Bruevich Saint-Petersburg State University of Telecommunications Saint-Petersburg Russia Danang Architecture University Da Nang Viet Nam University of Telecommunications Department of Communication Networks and Data Transmission at Bonch-Bruevich Saint-Petersburg State Russia University of Science and Technology The University of Danang Da Nang Viet Nam The University of Danang University of Science and Technology Information Technology Faculty Danang Viet Nam V. A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences Moscow Russia Institute of Control Sciences of Russian Academy of Sciences Russia Bonch Bruevich Saint Petersburg State University of Telecommunications Department of Programming Engineering and Computer Science Russia
The increasing prevalence of botnet attacks in IoT networks has led to the development of deep learning techniques for their detection. However, conventional centralized deep learning models pose challenges in simulta... 详细信息
来源: 评论
Data poisoning: issues, challenges, and needs
Data poisoning: issues, challenges, and needs
收藏 引用
7th IET Smart Cities Symposium (SCS 2023)
作者: Mohammad Aljanabi Alaa Hamza Omran Maad M Mijwil Mostafa Abotaleb El-Sayed M. El-kenawy Sahar Yousif Mohammed Abdelhameed Ibrahim Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science & Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
来源: 评论
Multiservice network security metric
Multiservice network security metric
收藏 引用
International Conference on Advanced Information and Communication Technologies (AICT)
作者: Oleksandr Mozhaev Heorgii Kuchuk Nina Kuchuk Mykhailo Mozhaev Mykhailo Lohvynenko Department of Information Technologies Kharkiv National University of Internal Affairs Kharkiv Ukraine Department of Computer science and programming “Kharkiv Polytechnic Institute” Kharkiv Ukraine Faculty of computer science V.N. Karazin Kharkiv National University Kharkiv Ukraine Laboratory on Speech and Audio Computer Engineering and Telecommunication Kharkiv SRI examinations Kharkiv Ukraine Sector on Computer Engineering and Telecommunication Examinations Kharkiv SRI examinations Kharkiv Ukraine
This report proposes a new approach to determination of security complex metric. Such approach allows to obtain a quantitative assess based on network security recorded monitoring. Assessment of separate network host,... 详细信息
来源: 评论
Including gap junctions into distributed neuronal network simulations  1
收藏 引用
2nd International Workshop on Brain-Inspired Computing, BrainComp 2015
作者: Hahne, Jan Helias, Moritz Kunkel, Susanne Igarashi, Jun Kitayama, Itaru Wylie, Brian Bolten, Matthias Frommer, Andreas Diesmann, Markus School of Mathematics and Natural Sciences University of Wuppertal Wuppertal Germany and JARA BRAIN Institute I Jülich Research Centre Jülich Germany RIKEN Advanced Institute for Computational Science Programming Environment Research Team Kobe Japan Department of Computational Science and Technology School of Computer Science and Communication KTH Royal Institute of Technology Stockholm Sweden Simulation Laboratory Neuroscience Bernstein Facility for Simulation and Database Technology Institute for Advanced Simulation Jülich Aachen Research Alliance Jülich Research Centre Jülich Germany Okinawa Institute of Science and Technology Neural Computation Unit Okinawa Japan Laboratory for Neural Circuit Theory RIKEN Brain Science Institute Wako Japan HPC Usability Research Team RIKEN Advanced Institute for Computational Science Kobe Japan Jülich Supercomputing Centre Jülich Research Centre Jülich Germany Institut für Mathematik Universität Kassel Kassel Germany Department of Psychiatry Psychotherapy and Psychosomatics Medical Faculty RWTH Aachen University Aachen Germany Department of Physics Faculty 1 RWTH Aachen University Aachen Germany
Contemporary simulation technology for neuronal networks enables the simulation of brain-scale networks using neuron models with a single or a few compartments. However, distributed simulations at full cell density ar... 详细信息
来源: 评论