咨询与建议

限定检索结果

文献类型

  • 4,458 篇 会议
  • 3,244 篇 期刊文献
  • 177 册 图书

馆藏范围

  • 7,879 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,391 篇 工学
    • 2,847 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 1,010 篇 信息与通信工程
    • 606 篇 生物医学工程(可授...
    • 581 篇 生物工程
    • 535 篇 控制科学与工程
    • 453 篇 电气工程
    • 449 篇 电子科学与技术(可...
    • 430 篇 光学工程
    • 281 篇 机械工程
    • 269 篇 仪器科学与技术
    • 212 篇 化学工程与技术
    • 174 篇 核科学与技术
    • 154 篇 动力工程及工程热...
    • 148 篇 材料科学与工程(可...
    • 120 篇 交通运输工程
  • 2,926 篇 理学
    • 1,243 篇 数学
    • 1,198 篇 物理学
    • 685 篇 生物学
    • 410 篇 统计学(可授理学、...
    • 263 篇 系统科学
    • 234 篇 化学
  • 1,086 篇 管理学
    • 615 篇 管理科学与工程(可...
    • 497 篇 图书情报与档案管...
    • 348 篇 工商管理
  • 615 篇 医学
    • 512 篇 临床医学
    • 460 篇 基础医学(可授医学...
    • 303 篇 药学(可授医学、理...
    • 191 篇 公共卫生与预防医...
  • 167 篇 法学
    • 140 篇 社会学
  • 119 篇 经济学
  • 99 篇 农学
  • 85 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 10 篇 艺术学
  • 2 篇 哲学

主题

  • 257 篇 informatics
  • 140 篇 artificial intel...
  • 134 篇 machine learning
  • 113 篇 computer archite...
  • 109 篇 computational mo...
  • 105 篇 data mining
  • 95 篇 quality of servi...
  • 95 篇 feature extracti...
  • 92 篇 deep learning
  • 91 篇 wireless sensor ...
  • 90 篇 hadron colliders
  • 88 篇 computer science
  • 77 篇 resource managem...
  • 76 篇 image segmentati...
  • 76 篇 optimization
  • 76 篇 monitoring
  • 76 篇 predictive model...
  • 74 篇 protocols
  • 73 篇 training
  • 69 篇 application soft...

机构

  • 411 篇 department for p...
  • 404 篇 faculty of scien...
  • 400 篇 kirchhoff-instit...
  • 398 篇 department of ph...
  • 385 篇 department of ph...
  • 385 篇 department of ph...
  • 368 篇 fakultät für phy...
  • 364 篇 institute of phy...
  • 363 篇 institute of phy...
  • 306 篇 instituto de fís...
  • 305 篇 department of ph...
  • 281 篇 graduate school ...
  • 280 篇 department of ph...
  • 269 篇 department of ph...
  • 268 篇 universidade fed...
  • 264 篇 ictp trieste
  • 258 篇 yerevan physics ...
  • 258 篇 dipartimento di ...
  • 253 篇 department of ph...
  • 252 篇 department of ph...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 324 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 307 篇 s. guindon
  • 305 篇 a. kaczmarska
  • 299 篇 y. tayalati
  • 296 篇 j. schaarschmidt
  • 284 篇 a. d. pilkington
  • 283 篇 m. klein
  • 280 篇 l. chevalier

语言

  • 7,472 篇 英文
  • 330 篇 其他
  • 72 篇 中文
  • 9 篇 日文
  • 4 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Institute of Informatics and Computer Engineering"
7879 条 记 录,以下是101-110 订阅
排序:
Gamification of cyber ranges in cybersecurity education  20
Gamification of cyber ranges in cybersecurity education
收藏 引用
20th IEEE International Conference on Emerging eLearning Technologies and Applications, ICETA 2022
作者: Jelo, Martin Helebrandt, Pavol Slovak University of Technology Institute of Computer Engineering and Applied Informatics Bratislava Slovakia
There is a lack of cybersecurity experts, and this problem is getting worse with the increasing number and importance of IT systems together with rising number and sophistication of attacks. Rapid development in cyber... 详细信息
来源: 评论
Line Patterns Segmentation in Blurred Images Using Contrast Enhancement and Local Entropy Thresholding
收藏 引用
Journal of computer and Communications 2024年 第2期12卷 116-141页
作者: Marios Vlachos Evangelos Dermatas Institute of Communication and Computer Systems Athens Greece Department of Computer Engineering and Informatics University of Patras Patras Greece
Finger vein extraction and recognition hold significance in various applications due to the unique and reliable nature of finger vein patterns. While recently finger vein recognition has gained popularity, there are s... 详细信息
来源: 评论
Analysis of data from UAVs for surveillance and threat identification in maritime areas  8
Analysis of data from UAVs for surveillance and threat ident...
收藏 引用
8th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science, BCD 2023
作者: Lampropoulos, Fotis Daramouskas, Ioannis Perikos, Isidoros Paraskevas, Michael University of Peloponnese Electrical and Computer Engineering Dept. Patras Greece Hellenic Coast Guard Patras Greece University of Patras Computer Technology Institute and Press "diophantus" Computer Engineering and Informatics Department Patras Greece University of Peloponnese Computer Technology Institute and Press "diophantus" Electrical and Computer Engineering Dept. Patras Greece
In this paper, we present a methodology for drones for recognizing different types of objects in maritime areas. The concept and the aim is to assist the national maritime surveillance authorities in the identificatio... 详细信息
来源: 评论
Covert Channel Detection Methods  20
Covert Channel Detection Methods
收藏 引用
20th IEEE International Conference on Emerging eLearning Technologies and Applications, ICETA 2022
作者: Ondov, Adrian Helebrandt, Pavol Institute of Computer Engineering and Applied Informatics Slovak University of Technology Bratislava Slovakia
The modern networking world is being exposed to many risks more frequently every day. Most of systems strongly rely on remaining anonymous throughout the whole endpoint exploitation process. Covert channels represent ... 详细信息
来源: 评论
Eye State Classification Using Ensemble Machine Learning Models and SMOTE on EEG Data  9
Eye State Classification Using Ensemble Machine Learning Mod...
收藏 引用
9th South-East Europe Design Automation, computer engineering, computer Networks and Social Media Conference, SEEDA-CECNSM 2024
作者: Trigka, Maria Dritsas, Elias Mylonas, Phivos Athena Research and Innovation Center Industrial Systems Institute Patras26504 Greece University of West Attica Department of Informatics and Computer Engineering Egaleo12243 Greece
Electroencephalography (EEG) data presents complex and high-dimensional signals, offering great potential for applications in various fields such as neurofeedback, clinical diagnostics, cognitive neuroscience, human-c... 详细信息
来源: 评论
Hybridization Model of Frame Semantics and deep learning for text semantic similarity calculation  6
Hybridization Model of Frame Semantics and deep learning for...
收藏 引用
6th International Conference on computer Information Science and Application Technology, CISAT 2023
作者: Haijing, Liu Department of Computer Engineering Taiyuan Institute of Technology Taiyuan China College of computing informatics and media University Technology Mara Malaysia
Text semantic similarity computation is a fundamental problem in the field of natural language processing. In recent years, text semantic similarity algorithms based on deep learning have become the mainstream researc... 详细信息
来源: 评论
Performance and Security Analysis of the Diffie-Hellman Key Exchange Protocol  19
Performance and Security Analysis of the Diffie-Hellman Key ...
收藏 引用
19th International Workshop on Semantic and Social Media Adaptation and Personalization, SMAP 2024
作者: Dritsas, Elias Trigka, Maria Mylonas, Phivos Athena Research and Innovation Center Industrial Systems Institute Patras26504 Greece University of West Attica Department of Informatics and Computer Engineering Egaleo12243 Greece
The Diffie-Hellman Key Exchange Protocol (DHKE) is a fundamental element of modern cryptographic systems, enabling secure key exchange over unsecured channels. The present research work aims to provide a comprehensive... 详细信息
来源: 评论
A Mobility-Aware Reinforcement Learning Proactive Solution for State Data Migration in Edge Computing  29
A Mobility-Aware Reinforcement Learning Proactive Solution f...
收藏 引用
29th IEEE International Workshop on computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2024
作者: Dritsas, Elias Ramantas, Kostas Verikoukis, Christos Iquadrat Barcelona Spain University of Patras Department of Computer Engineering and Informatics Patras Greece Industrial Systems Institute Athena Research and Innovation Center Patras Greece
To handle the demands of modern applications for storage, computing, low latency, and bandwidth, various services are offloaded from the cloud to edge servers, bringing them closer to end-users. This shift in computin... 详细信息
来源: 评论
Mobile Application for Cholesterol Detection Using Iridology with Image Processing and Support Vector Machine
Mobile Application for Cholesterol Detection Using Iridology...
收藏 引用
24th International Electronics Symposium, IES 2022
作者: Kusumaningtyas, Entin Martiana Setyawan, Alfian Haidar Barakbah, Ali Ridho Eepis Electronic Engineering Polytechnic Institute of Surabaya Departement of Informatics and Computer Engineering Surabaya Indonesia
Cholesterol is one of the factors than can cause disability and other diseases that is fatal to one's life. Data from World Health Organization (WHO) said that around 4.4 million people die because of cholesterol ... 详细信息
来源: 评论
Solving (Max) 3-SAT via Quadratic Unconstrained Binary Optimization  1
收藏 引用
23rd International Conference on Computational Science, ICCS 2023
作者: Nüßlein, Jonas Zielinski, Sebastian Gabor, Thomas Linnhoff-Popien, Claudia Feld, Sebastian Institute for Informatics LMU Munich Munich Germany Faculty of Electrical Engineering Mathematics and Computer Science TU Delft Delft Netherlands
We introduce a novel approach to translate arbitrary 3-sat instances to Quadratic Unconstrained Binary Optimization (qubo) as they are used by quantum annealing (QA) or the quantum approximate optimization algorithm (... 详细信息
来源: 评论