咨询与建议

限定检索结果

文献类型

  • 4,461 篇 会议
  • 3,216 篇 期刊文献
  • 177 册 图书

馆藏范围

  • 7,854 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,520 篇 工学
    • 2,825 篇 计算机科学与技术...
    • 2,326 篇 软件工程
    • 1,000 篇 信息与通信工程
    • 602 篇 生物医学工程(可授...
    • 579 篇 生物工程
    • 530 篇 控制科学与工程
    • 444 篇 电气工程
    • 444 篇 电子科学与技术(可...
    • 425 篇 光学工程
    • 327 篇 核科学与技术
    • 279 篇 机械工程
    • 265 篇 仪器科学与技术
    • 209 篇 化学工程与技术
    • 152 篇 动力工程及工程热...
    • 150 篇 材料科学与工程(可...
    • 119 篇 交通运输工程
  • 2,909 篇 理学
    • 1,249 篇 数学
    • 1,185 篇 物理学
    • 680 篇 生物学
    • 415 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 232 篇 化学
  • 1,089 篇 管理学
    • 616 篇 管理科学与工程(可...
    • 498 篇 图书情报与档案管...
    • 349 篇 工商管理
  • 605 篇 医学
    • 505 篇 临床医学
    • 455 篇 基础医学(可授医学...
    • 304 篇 药学(可授医学、理...
    • 188 篇 公共卫生与预防医...
  • 167 篇 法学
    • 139 篇 社会学
  • 118 篇 经济学
  • 98 篇 农学
  • 83 篇 教育学
  • 21 篇 文学
  • 10 篇 军事学
  • 10 篇 艺术学
  • 2 篇 哲学

主题

  • 257 篇 informatics
  • 148 篇 artificial intel...
  • 132 篇 machine learning
  • 113 篇 computer archite...
  • 108 篇 computational mo...
  • 106 篇 data mining
  • 95 篇 quality of servi...
  • 94 篇 feature extracti...
  • 92 篇 deep learning
  • 90 篇 wireless sensor ...
  • 88 篇 computer science
  • 82 篇 hadron colliders
  • 78 篇 protocols
  • 77 篇 resource managem...
  • 76 篇 optimization
  • 76 篇 monitoring
  • 75 篇 image segmentati...
  • 75 篇 training
  • 74 篇 predictive model...
  • 71 篇 accuracy

机构

  • 413 篇 department for p...
  • 405 篇 faculty of scien...
  • 401 篇 kirchhoff-instit...
  • 400 篇 department of ph...
  • 386 篇 department of ph...
  • 385 篇 department of ph...
  • 371 篇 institute of phy...
  • 365 篇 fakultät für phy...
  • 365 篇 institute of phy...
  • 314 篇 instituto de fís...
  • 307 篇 department of ph...
  • 280 篇 department of ph...
  • 280 篇 graduate school ...
  • 268 篇 department of ph...
  • 268 篇 universidade fed...
  • 262 篇 ictp trieste
  • 260 篇 dipartimento di ...
  • 258 篇 yerevan physics ...
  • 258 篇 nikhef national ...
  • 254 篇 department of ph...

作者

  • 338 篇 c. alexa
  • 335 篇 j. m. izen
  • 334 篇 g. bella
  • 333 篇 d. calvet
  • 333 篇 c. amelung
  • 331 篇 j. strandberg
  • 327 篇 g. spigo
  • 326 篇 f. siegert
  • 321 篇 r. ströhmer
  • 321 篇 m. rijssenbeek
  • 321 篇 s. jin
  • 321 篇 g. gaudio
  • 321 篇 s. mohapatra
  • 310 篇 s. guindon
  • 309 篇 a. kaczmarska
  • 301 篇 y. tayalati
  • 301 篇 j. schaarschmidt
  • 291 篇 a. d. pilkington
  • 286 篇 l. chevalier
  • 285 篇 m. klein

语言

  • 7,062 篇 英文
  • 715 篇 其他
  • 73 篇 中文
  • 9 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Institute of Informatics and Computer Engineering"
7854 条 记 录,以下是671-680 订阅
排序:
Application of machine learning models for risk estimation and risk prediction of classical swine fever in Assam, India
收藏 引用
VirusDisease 2023年 第4期34卷 514-525页
作者: Suresh, Kuralayanapalya Puttahonnappa Barman, Nagendra Nath Bari, Tarushree Jagadish, Dikshitha Sushma, Bylaiah Darshan, H.V. Patil, Sharanagouda S. Bora, Mousumi Deka, Abhijit Spatial Epidemiology Laboratory Indian Council of Agricultural Research-National Institute of Veterinary Epidemiology and Disease Informatics Karnataka Yelahanka Bengaluru India Department of Veterinary Microbiology College of Veterinary Science Assam Agricultural University Guwahati India Department of Computer Science and Engineering M S Ramaiah Institute of Technology Matthikere Karnataka Bengaluru India Virology Laboratory Indian Council of Agricultural Research-National Institute of Veterinary Epidemiology and Disease Informatics Karnataka Yelahanka Bengaluru India Department of Veterinary Pathology College of Veterinary Science Assam Agricultural University Guwahati India
The present study is aimed to develop an early warning system of Classical swine fever (CSF) disease by applying machine learning models and to study the climate-disease relationship with respect to the spatial occurr... 详细信息
来源: 评论
Attackers Can Do Better: Over- and Understated Factors of Model Stealing Attacks
Attackers Can Do Better: Over- and Understated Factors of Mo...
收藏 引用
Secure and Trustworthy Machine Learning (SaTML), IEEE Conference on
作者: Daryna Oliynyk Rudolf Mayer Andreas Rauber CDL AsTra Faculty of Computer Science University of Vienna Vienna Austria SBA Research Vienna Austria Faculty of Informatics TU Wien Institute of Information Systems Engineering Vienna Austria
Machine learning (ML) models were shown to be vulnerable to model stealing attacks, which lead to intellectual property infringement. Among other attack methods, substitute model training is an all-encompassing attack... 详细信息
来源: 评论
Attackers Can Do Better: Over- and Understated Factors of Model Stealing Attacks
arXiv
收藏 引用
arXiv 2025年
作者: Oliynyk, Daryna Mayer, Rudolf Rauber, Andreas CDL AsTra Faculty of Computer Science University of Vienna Vienna Austria SBA Research Vienna Austria Institute of Information Systems Engineering Faculty of Informatics TU Wien Vienna Austria
Machine learning (ML) models were shown to be vulnerable to model stealing attacks, which lead to intellectual property infringement. Among other attack methods, substitute model training is an all-encompassing attack... 详细信息
来源: 评论
An Artificial Intelligence (AI) Based X-AODV Routing Protocol in Wireless Networks  4
An Artificial Intelligence (AI) Based X-AODV Routing Protoco...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Hussain, Khalid Ullah Sheikh, Md Amin Jazri, Husin Bin Muzzaffar, Saira Chowdhury, Sohini Kavita School of Computing and Informatics Albukhary International University Kedah Alor Setar Malaysia School of Computer Science Taylor's University Faculty of Innovation and Technology Subang Jaya Malaysia Lovely Professional University Division of Research and Development Phagwara144411 India KKR and KSR Institute of Technology and Sciences Andhra Pradesh Guntur India Chandigarh Group of Colleges Jhanjeri Department of Computer Science and Engineering Punjab Mohali140307 India
The multi-hopping mechanism features in the wireless network environment, in which all nodes contain the information of link and connectivity in any infrastructure less manner. When mobile devices either jump from the... 详细信息
来源: 评论
An Exploratory Investigation into Sustaining Cybersecurity Protection Through the Implementation of SETA  4
An Exploratory Investigation into Sustaining Cybersecurity P...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Abdullah Huda, Mahfuzul Brayyich, Mohammed Haroon, Noor Hanoon Khan, Abdul Azeem Verma, Rajan University Institute of Computing Chandigarh University Punjab India College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia College of Technical Engineering National University of Science & Technology Dhi Qar Iraq Technical Engineering College Al-Ayen University Department of Computer Technical Engineering Thi-Qar Iraq Negara Brunei Darussalam Faculty of Islamic Technology Brunei Lovely Professional University Division of Research and Development Phagwara144411 India KKR & KSR Institute of Technology & Sciences Andhra Pradesh Guntur India
Most modern businesses run their competitive operations online. Cybersecurity is crucial to commercial operations. No cybersecurity defensive solution is universal. Standard security strategy involves using hardware a... 详细信息
来源: 评论
Improving Prediction Quality of Face Image Preference Using Combinatorial Fusion Algorithm  16th
Improving Prediction Quality of Face Image Preference Using...
收藏 引用
16th International Conference on Brain informatics, BI 2023
作者: Zhang, Zihan Schweikert, Christina Shimojo, Shinsuke Hsu, D. Frank Laboratory of Informatics and Data Mining Department of Computer and Information Science Fordham University YorkNY10023 United States Division of Computer Science Mathematics and Science St. John’s University QueensNY11439 United States Division of Biology and Biological Engineering/Computation and Neural Systems California Institute of Technology PasadenaCA91125 United States
When two face images are shown to a subject, the subject’s preference choice is influenced by many factors. Although it is a challenging task, one way to detect a subject’s preference is to analyze the eye movement ... 详细信息
来源: 评论
Learning Features Using an optimized Artificial Neural Network for Breast Cancer Diagnosis
收藏 引用
SN computer Science 2022年 第3期3卷 1-8页
作者: AlShourbaji, Ibrahim Kachare, Pramod Zogaan, Waleed Muhammad, L.J. Abualigah, Laith Department of Computer and Network Engineering Jazan University Jazan 45142 Saudi Arabia Department of Electronics and Telecommunication Engineering Ramrao Adik Institute of Technology Nerul Maharashtra Navi Mumbai 400706 India Department of Computer Science Jazan University Jazan 45142 Saudi Arabia Department of Computer Science Faculty of Science Federal University of Kashere P.M.B. 0182 Gombe Nigeria Faculty of Computer Sciences and Informatics Amman Arab University Amman 11953 Jordan
Breast cancer (BC) has been one of the significant causes of death worldwide, and its early detection can play a vital role in increasing the survival rate of this disease. This paper suggests a novel feature learning... 详细信息
来源: 评论
Measurement of Synthetic-Dimension Band Structures in Silicon Coupled Ring Resonators  16
Measurement of Synthetic-Dimension Band Structures in Silico...
收藏 引用
16th Pacific Rim Conference on Lasers and Electro-Optics, CLEO-PR 2024
作者: Zhang, Ruming Li, Liucun Kamata, Mikiya Baba, Toshihiko Ozawa, Tomoki Ota, Yasutomo Iwamoto, Satoshi Research Center for Advanced Science and Technology The University of Tokyo Tokyo153-8904 Japan Yokohama National University Department of Electrical and Computer Engineering Yokohama240-8501 Japan Advanced Institute for Materials Research Tohoku University Sendai980-8577 Japan Keio University Department of Applied Physics and Physico-Informatics Yokohama223-8533 Japan
We fabricated integrated silicon coupled-ring resonators and measured photonic band structures for synthetic frequency lattices with different configurations. A phase difference between two modulation signals introduc... 详细信息
来源: 评论
Sensitivity and Distance Based Performance Analysis for Batteryless Tags with Transmit Beamforming and Ambient Backscattering
收藏 引用
China Communications 2022年 第2期19卷 109-117页
作者: Minzheng Jia Chaochao Yao Wei Liu Ruyi Ye Tutun Juhana Bo Ai Department of Information Engineering Beijing Polytechnic CollegeBeijing 100042China School of Computer and Information Technology Beijing Jiaotong UniversityBeijing 100044China School of Communication and Information Engineering Xi’an University of Posts and TelecommunicationsXi’an 710121China Chinese National Institute of Standalization Beijing 100088China School of Electrical Engineering and Informatics Institut Teknologi BandungIndonesia State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong UniversityBeijing 100044China
Ambient backscatter is a new green technology for Internet of Things(IoT)that utilizes surrounding wireless signals to enable batteryless devices to communicate with other *** battery-free devices first harvest energy... 详细信息
来源: 评论
AutoRoto: Automated Rotoscoping with Refined Deep Masks
AutoRoto: Automated Rotoscoping with Refined Deep Masks
收藏 引用
2021 International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2021
作者: Dissanayake, Sajitha Ayoob, Mohamed Vekneswaran, Prathieshna University of Westminster Computer Science and Engineering London United Kingdom Informatics Institute of Technology Department of Computing Colombo Sri Lanka
The legendary movie Jurassic Park (1993) would have been nearly impossible without computer Generated Imaginary(CGI). The movie's ground-breaking visual effects was able to smoothly integrate virtual characters wi... 详细信息
来源: 评论