咨询与建议

限定检索结果

文献类型

  • 194 篇 期刊文献
  • 189 篇 会议
  • 3 册 图书

馆藏范围

  • 386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 210 篇 工学
    • 129 篇 计算机科学与技术...
    • 105 篇 软件工程
    • 25 篇 生物医学工程(可授...
    • 24 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 15 篇 光学工程
    • 14 篇 生物工程
    • 13 篇 化学工程与技术
    • 12 篇 土木工程
    • 10 篇 力学(可授工学、理...
    • 9 篇 材料科学与工程(可...
    • 8 篇 船舶与海洋工程
    • 8 篇 安全科学与工程
    • 7 篇 机械工程
  • 162 篇 理学
    • 96 篇 数学
    • 38 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 19 篇 系统科学
    • 18 篇 化学
  • 62 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 26 篇 工商管理
    • 22 篇 图书情报与档案管...
  • 27 篇 医学
    • 19 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 11 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 法学
    • 7 篇 社会学
  • 5 篇 教育学
  • 3 篇 农学
  • 2 篇 军事学

主题

  • 12 篇 computer science
  • 8 篇 positrons
  • 6 篇 computational mo...
  • 6 篇 semantics
  • 5 篇 power engineerin...
  • 5 篇 petri nets
  • 5 篇 automata
  • 5 篇 polynomials
  • 5 篇 artificial intel...
  • 4 篇 polarization
  • 4 篇 hidden markov mo...
  • 4 篇 informatics
  • 4 篇 education
  • 4 篇 laboratories
  • 4 篇 optimization
  • 4 篇 data mining
  • 4 篇 contrastive lear...
  • 4 篇 real-time system...
  • 4 篇 production
  • 4 篇 computers

机构

  • 15 篇 beijing key labo...
  • 12 篇 gaoling school o...
  • 9 篇 department of so...
  • 8 篇 faculty of physi...
  • 8 篇 institute for fo...
  • 8 篇 pedagogical univ...
  • 8 篇 department of nu...
  • 7 篇 agh university o...
  • 7 篇 department of ap...
  • 7 篇 gamf faculty of ...
  • 7 篇 infn laboratori ...
  • 6 篇 department of ph...
  • 6 篇 university of ch...
  • 5 篇 budapest busines...
  • 5 篇 faculty of physi...
  • 5 篇 institute of ele...
  • 5 篇 high energy depa...
  • 5 篇 institute of com...
  • 5 篇 department of nu...
  • 5 篇 school of comput...

作者

  • 12 篇 dulski k.
  • 12 篇 kubicz e.
  • 12 篇 kozik t.
  • 12 篇 korcyl g.
  • 12 篇 moskal p.
  • 12 篇 silarski m.
  • 12 篇 gorgol m.
  • 12 篇 marek r. ogiela
  • 12 篇 gajos a.
  • 11 篇 skurzok m.
  • 11 篇 kowalski p.
  • 11 篇 hiesmayr b.c.
  • 11 篇 sharma s.
  • 11 篇 curceanu c.
  • 11 篇 rudy z.
  • 10 篇 tomasz hachaj
  • 10 篇 shopa r.y.
  • 10 篇 kisielewska d.
  • 10 篇 krawczyk n.
  • 10 篇 mohammed m.

语言

  • 337 篇 英文
  • 47 篇 其他
  • 1 篇 德文
  • 1 篇 俄文
  • 1 篇 中文
检索条件"机构=Institute of Computer Science and Computer Methods"
386 条 记 录,以下是31-40 订阅
排序:
Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?
Are Existing Out-Of-Distribution Techniques Suitable for Net...
收藏 引用
IEEE Conference on Communications and Network Security (CNS)
作者: Andrea Corsini Shanchieh Jay Yang Department of Science and Methods for Engineering University of Modena and Reggio Emilia Modena Italy Department of Computer Engineering Rochester Institute of Technology Rochester USA
Machine learning (ML) has become increasingly popular in network intrusion detection. However, ML-based solutions always respond regardless of whether the input data reflects known patterns, a common issue across safe...
来源: 评论
It's a Match - Enhancing the Fit between Users and Phishing Training through Personalisation  25
It's a Match - Enhancing the Fit between Users and Phishing ...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI 2025
作者: Schöni, Lorin Roch, Neele Sievers, Hannah Strohmeier, Martin Mayer, Peter Zimmermann, Verena Security Privacy & Society Eth Zurich Zurich Switzerland Armasuisse Thun Switzerland Department of Mathematics and Computer Science University of Southern Denmark Odense Denmark Institute of Applied Informatics and Formal Description Methods Karlsruhe Institute of Technology Karlsruhe Germany Department of Humanities Social and Political Sciences Eth Zürich Zürich Switzerland
Effective training is essential for enhancing users' ability to detect phishing attempts. Personalised training offers huge potential to more closely align training content with individuals' needs and skill le... 详细信息
来源: 评论
Verification of Genuineness of Educational Internet Resources Using Machine Learning methods
Verification of Genuineness of Educational Internet Resource...
收藏 引用
Technology Enhanced Learning in Higher Education (TELE), International Conference on
作者: Aleksandr N. Privalov Vadim A. Smirnov Institute of Advanced Information Technologies Tula State Lev Tolstoy Pedagogical University Tula Russia Department of mathematics computer science and teaching methods Ivanovo State University Shuya Russia
The analysis of various sources has been carried out, confirming the demand for protective solutions against information threats from fake websites of organizations. The relevance of the research topic is confirmed by... 详细信息
来源: 评论
Learning Superconductivity from Ordered and Disordered Material Structures  38
Learning Superconductivity from Ordered and Disordered Mater...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Chen, Pin Peng, Luoxuan Jiao, Rui Mo, Qing Wang, Zhen Huang, Wenbing Liu, Yang Lu, Yutong National Supercomputer Center in Guangzhou School of Computer Science and Engineering Sun Yat-sen University China Dept. of Comp. Sci. & Tech. Institute for AI BNRist Center Tsinghua University China Institute for AIR Tsinghua University China Gaoling School of Artificial Intelligence Renmin University of China China Beijing Key Laboratory of Big Data Management and Analysis Methods Beijing China
Superconductivity is a fascinating phenomenon observed in certain materials under certain conditions. However, some critical aspects of it, such as the relationship between superconductivity and materials' chemica...
来源: 评论
WatE: A Wasserstein t-distributed Embedding Method for Information-enriched Graph Visualization  39
WatE: A Wasserstein t-distributed Embedding Method for Infor...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Cheng, Minjie Luo, Dixin Xu, Hongteng Gaoling School of Artifcial Intelligence Renmin University of China China School of Computer Science and Technology Beijing Institute of Technology China Beijing Key Laboratory of Big Data Management and Analysis Methods China
As a fundamental problem of graph analysis, graph visualization aims to embed a set of graphs in a low-dimensional (e.g., 2D) space and provide insights into their distribution and clustering structure. Focusing on th... 详细信息
来源: 评论
Heuristic Algorithm for Solving Travelling Salesman Problem: Adding the Endpoints of the Longest Edges
Heuristic Algorithm for Solving Travelling Salesman Problem:...
收藏 引用
International Conference on Problems of Cybernetics and Informatics (PCI)
作者: Fidan Nuriyeva Department of Computer Science Dokuz Eylul University Izmir Turkey Laboratory of Recognition Identification and Methods of Optimal Solutions Institute of Control Systems Baku Azerbaijan
This study proposes, a new heuristic algorithm based on insertion heuristic to solve the symmetric Travelling Salesman Problem. In the proposed algorithm, firstly the two longest edges are selected and the starting to...
来源: 评论
Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?
arXiv
收藏 引用
arXiv 2023年
作者: Corsini, Andrea Yang, Shanchieh Jay Department of Science and Methods for Engineering University of Modena and Reggio Emilia Modena Italy Department of Computer Engineering Rochester Institute of Technology Rochester United States
Machine learning (ML) has become increasingly popular in network intrusion detection. However, ML-based solutions always respond regardless of whether the input data reflects known patterns, a common issue across safe... 详细信息
来源: 评论
Exploring the Impact of Random Distribution Choices on Particle Swarm Optimization: An Initial Analysis  27
Exploring the Impact of Random Distribution Choices on Parti...
收藏 引用
27th International Conference on Knowledge Based and Intelligent Information and Engineering Sytems, KES 2023
作者: Kolodziejczyk, Joanna Tarasenko, Yuliia Sulikowski, Piotr Research Team on Intelligent Decision Support Systems Department of Artificial Intelligence Methods and Applied Mathematics Faculty of Computer Science and Information Technology West Pomeranian University of Technology in Szczecin ul. Zolnierska 49 Szczecin71-210 Poland National Institute of Telecommunications ul. Szachowa 1 Warsaw04-894 Poland Department of Information Systems Engineering Faculty of Computer Science and Information Technology West Pomeranian University of Technology in Szczecin ul. Zolnierska 49 Szczecin71-210 Poland
Particle Swarm Optimization (PSO) is a robust stochastic optimization algorithm for solving complex and constrained optimization problems. This paper aims to systematically investigate the influence of diverse random ... 详细信息
来源: 评论
System Methodology of Data Analysis and Preprocessing for Solving Classification Problems
System Methodology of Data Analysis and Preprocessing for So...
收藏 引用
International computer sciences and Information Technologies (CSIT)
作者: Irina Kalinina Aleksandr Gozhyj Victoria Vysotska Eugene Malakhov Victor Gozhyj Iryna Tregubova Intelligent Information Systems Department Petro Mohyla Black Sea National University Mykolayiv Ukraine Department of Information Systems and Networks Institute of Computer Science and Information Technologies National University “Lviv Polytechnic” Lviv Ukraine Department of Mathematical Methods of Computer Systems of Odessa National Mechnikov University Odesa Ukraine Department of Computer Science State University of Intelligent Technologies and Telecommunications Odesa Ukraine
The article describes and investigates the systematic methodology of data analysis and preprocessing for solving classification problems. The methodology combines the following groups of methods on the basis of a syst... 详细信息
来源: 评论
Contrastive Hierarchical Clustering
arXiv
收藏 引用
arXiv 2023年
作者: Znalezniak, Michal Rola, Przemyslaw Kaszuba, Patryk Tabor, Jacek Śmieja, Marek Advanced Micro Devices Inc. United States Institute of Quantitative Methods in Social Sciences Cracow University of Economics Poland Faculty of Mathematics and Computer Science Adam Mickiewicz University Poland Faculty of Mathematics and Computer Science Jagiellonian University Kraków Poland
Deep clustering has been dominated by flat models, which split a dataset into a predefined number of groups. Although recent methods achieve an extremely high similarity with the ground truth on popular benchmarks, th... 详细信息
来源: 评论