咨询与建议

限定检索结果

文献类型

  • 15,887 篇 期刊文献
  • 11,497 篇 会议
  • 496 册 图书
  • 1 篇 专利

馆藏范围

  • 27,880 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 15,303 篇 理学
    • 9,849 篇 数学
    • 4,588 篇 物理学
    • 2,632 篇 统计学(可授理学、...
    • 1,835 篇 生物学
    • 1,517 篇 系统科学
    • 1,235 篇 化学
    • 943 篇 地球物理学
  • 15,180 篇 工学
    • 8,806 篇 计算机科学与技术...
    • 6,462 篇 软件工程
    • 2,342 篇 信息与通信工程
    • 2,170 篇 控制科学与工程
    • 1,602 篇 电气工程
    • 1,397 篇 电子科学与技术(可...
    • 1,377 篇 生物工程
    • 1,127 篇 生物医学工程(可授...
    • 981 篇 化学工程与技术
    • 965 篇 光学工程
    • 874 篇 材料科学与工程(可...
    • 843 篇 机械工程
    • 776 篇 力学(可授工学、理...
    • 669 篇 仪器科学与技术
    • 666 篇 动力工程及工程热...
    • 575 篇 土木工程
    • 554 篇 建筑学
    • 449 篇 核科学与技术
  • 2,828 篇 管理学
    • 1,672 篇 管理科学与工程(可...
    • 1,249 篇 图书情报与档案管...
    • 862 篇 工商管理
  • 1,022 篇 医学
    • 870 篇 临床医学
    • 742 篇 基础医学(可授医学...
  • 489 篇 法学
  • 390 篇 经济学
  • 323 篇 农学
  • 226 篇 教育学
  • 57 篇 文学
  • 44 篇 军事学
  • 42 篇 哲学
  • 23 篇 艺术学
  • 16 篇 历史学

主题

  • 848 篇 computer science
  • 653 篇 mathematics
  • 260 篇 computational mo...
  • 242 篇 machine learning
  • 238 篇 deep learning
  • 209 篇 approximation al...
  • 208 篇 galaxies
  • 205 篇 optimization
  • 202 篇 artificial intel...
  • 188 篇 support vector m...
  • 162 篇 neural networks
  • 158 篇 application soft...
  • 154 篇 accuracy
  • 151 篇 graph theory
  • 148 篇 feature extracti...
  • 146 篇 image segmentati...
  • 144 篇 computer archite...
  • 141 篇 training
  • 138 篇 data mining
  • 109 篇 eigenvalues and ...

机构

  • 398 篇 faculty of scien...
  • 381 篇 department of ph...
  • 378 篇 department for p...
  • 373 篇 department of ph...
  • 351 篇 department of ph...
  • 316 篇 kirchhoff-instit...
  • 306 篇 department of ph...
  • 282 篇 fakultät für phy...
  • 281 篇 institute of phy...
  • 278 篇 department of ph...
  • 271 篇 department of ph...
  • 270 篇 instituto de fís...
  • 266 篇 universidade fed...
  • 264 篇 institute of phy...
  • 263 篇 ictp trieste
  • 252 篇 nikhef national ...
  • 249 篇 department of ph...
  • 246 篇 department of ph...
  • 244 篇 department of ph...
  • 241 篇 particle physics...

作者

  • 329 篇 c. alexa
  • 326 篇 j. m. izen
  • 323 篇 g. bella
  • 321 篇 j. strandberg
  • 321 篇 d. calvet
  • 321 篇 c. amelung
  • 314 篇 g. spigo
  • 314 篇 f. siegert
  • 305 篇 r. ströhmer
  • 304 篇 m. rijssenbeek
  • 302 篇 s. jin
  • 300 篇 g. gaudio
  • 293 篇 s. mohapatra
  • 291 篇 y. tayalati
  • 275 篇 m. klein
  • 252 篇 s. guindon
  • 249 篇 f. pastore
  • 241 篇 n. orlando
  • 239 篇 a. kaczmarska
  • 231 篇 j. schaarschmidt

语言

  • 24,454 篇 英文
  • 3,259 篇 其他
  • 163 篇 中文
  • 35 篇 俄文
  • 14 篇 德文
  • 6 篇 法文
  • 4 篇 西班牙文
  • 3 篇 日文
  • 3 篇 葡萄牙文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Science and Computer Mathematics"
27881 条 记 录,以下是91-100 订阅
排序:
R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android  40
R+R: Matrioska: A User-Centric Defense Against Virtualizatio...
收藏 引用
40th Annual computer Security Applications Conference, ACSAC 2024
作者: Zerbini, Simone Doria, Samuele Wijesekera, Primal Egelman, Serge Losiouk, Eleonora Department of Mathematics University of Padua Padua Italy International Computer Science Institute Berkeley United States International Computer Science Institute University of California Berkeley Berkeley United States
The Android virtualization technique allows an app to create independent virtual environments running on top of the Android native one, where multiple apps can be executed simultaneously. While the technique has legit... 详细信息
来源: 评论
Covid-19 Data Preprocessing Approach in Machine Learning for Prediction  1st
Covid-19 Data Preprocessing Approach in Machine Learning for...
收藏 引用
1st EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2023
作者: Kotva Goudoungou, Samuel Dayang, Paul Tchomte, Naomi Dassi Ngossaha, Justin Moskolaï Moffo, Fabien Mouomene Mitton, Nathalie Department of Mathematics and Computer Science Faculty of Science The University of Ngaoundere Ngaoundere Cameroon Department of Mathematics and Computer Science University Institute of Technology The University of Ngaoundere Ngaoundere Cameroon Department of Computer Science Faculty of Science The University of Douala Douala Cameroon National Institute for Research in Digital Science and Technology University of Lille Villeneuve D’ascq59650 France
Artificial Intelligence (AI) is a vast field that allows the development of programs capable of simulating human intelligence. One of the most used AI techniques that is very important the preparation of raw data whic... 详细信息
来源: 评论
Complexity of Local Search for Euclidean Clustering Problems  35
Complexity of Local Search for Euclidean Clustering Problems
收藏 引用
35th International Symposium on Algorithms and Computation, ISAAC 2024
作者: Manthey, Bodo Morawietz, Nils van Rhijn, Jesse Sommer, Frank Faculty of Electrical Engineering Mathematics and Computer Science University of Twente Netherlands Institute of Computer Science Friedrich Schiller University Jena Germany Institute of Logic and Computation TU Wien Austria
We show that the simplest local search heuristics for two natural Euclidean clustering problems are PLS-hard. First, we show that the Hartigan-Wong method, which is essentially the Flip heuristic, for k-Means clusteri... 详细信息
来源: 评论
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ... 详细信息
来源: 评论
Survey of feature selection and extraction techniques for stock market prediction
收藏 引用
Financial Innovation 2023年 第1期9卷 667-691页
作者: Htet Htet Htun Michael Biehl Nicolai Petkov Bernoulli Institute for Mathematics Computer ScienceArtificial IntelligenceUniversity of GroningenGroningenThe Netherlands
In stock market forecasting,the identification of critical features that affect the performance of machine learning(ML)models is crucial to achieve accurate stock price *** review papers in the literature have focused... 详细信息
来源: 评论
Speed-Robust Scheduling Revisited  27
Speed-Robust Scheduling Revisited
收藏 引用
27th International Conference on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2024 and the 28th International Conference on Randomization and Computation, RANDOM 2024
作者: Minařík, Josef Sgall, Jiří Computer Science Institute Charles Univ. Faculty of Mathematics and Physics Prague Czech Republic
Speed-robust scheduling is the following two-stage problem of scheduling n jobs on m uniformly related machines. In the first stage, the algorithm receives the value of m and the processing times of n jobs;it has to p... 详细信息
来源: 评论
A Genetic Algorithm for Solving Sudoku Based on Multi-Armed Bandit Selection
收藏 引用
IEEE Transactions on Games 2024年 第2期17卷 429-441页
作者: Kim, Jon-Lark Eor, Eunjee Sogang University Department of Mathematics Korea and Institute for Mathematical and Data Sciences Seoul Korea Republic of Sogang University Department of Computer Science and Engineering Korea Republic of
In this paper, we introduce a Genetic Algorithm based Upper Confidence Bound (GA-UCB), an innovative hybrid genetic algorithm integrating Multi-Armed Bandit (MAB). It effectively addresses the challenges of solving la... 详细信息
来源: 评论
From Donkeys to Kings in Tournaments  32
From Donkeys to Kings in Tournaments
收藏 引用
32nd Annual European Symposium on Algorithms, ESA 2024
作者: Abboud, Amir Grossman, Tomer Naor, Moni Solomon, Tomer Department of Computer Science and Applied Mathematics Weizmann Institute of Science Rehovot Israel Tel Aviv University Israel
A tournament is an orientation of a complete graph. A vertex that can reach every other vertex within two steps is called a king. We study the complexity of finding k kings in a tournament graph. We show that the rand... 详细信息
来源: 评论
A Practical Multi-Protocol Collaborative Quantum Key Distribution Networking Scheme for Consumer Electronics Devices
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 1190-1200页
作者: Yao, Jia-Meng Li, Qiong Mao, Hao-Kun El-Latif, Ahmed A. Abd Harbin Institute of Technology Department of the School of Computer Science and Technology Harbin150001 China Prince Sultan University Center of Excellence in Quantum and Intelligent Computing Riyadh11586 Saudi Arabia Menoufia University Faculty of Science Department of Mathematics and Computer Science Shibin El Kom6132501 Egypt
The development of emerging consumer technologies such as the Internet of Things (IoT), artificial intelligence (AI), and cloud computing brings convenience but also raises critical concerns about securing communicati... 详细信息
来源: 评论
Hybrid Flow Shop with Setup Times Scheduling Problem
收藏 引用
computer Systems science & Engineering 2023年 第1期44卷 563-577页
作者: Mahdi Jemmali Lotfi Hidri Department of Computer Science and Information College of Science at ZulfiMajmaah UniversityMajmaah11952Saudi Arabia Mars Laboratory University of SousseSousseTunisia Department of Computer Science Higher Institute of Computer Science and Mathematics of MonastirMonastir UniversityMonastir5000Tunisia Industrial Engineering Department College of EngineeringKing Saud UniversityRiyadh11421Saudi Arabia
The two-stage hybridflow shop problem under setup times is addressed in this *** problem is *** the other hand,the studied problem is modeling different real-life applications especially in manufacturing and high *** ... 详细信息
来源: 评论