咨询与建议

限定检索结果

文献类型

  • 1,596 篇 会议
  • 1,350 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,955 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,646 篇 工学
    • 943 篇 计算机科学与技术...
    • 764 篇 软件工程
    • 279 篇 信息与通信工程
    • 226 篇 电子科学与技术(可...
    • 216 篇 电气工程
    • 204 篇 生物工程
    • 196 篇 控制科学与工程
    • 177 篇 生物医学工程(可授...
    • 154 篇 光学工程
    • 150 篇 化学工程与技术
    • 129 篇 材料科学与工程(可...
    • 103 篇 机械工程
    • 85 篇 仪器科学与技术
    • 84 篇 动力工程及工程热...
    • 70 篇 土木工程
  • 1,184 篇 理学
    • 492 篇 物理学
    • 419 篇 数学
    • 292 篇 生物学
    • 179 篇 化学
    • 176 篇 统计学(可授理学、...
    • 71 篇 系统科学
  • 400 篇 管理学
    • 229 篇 管理科学与工程(可...
    • 191 篇 图书情报与档案管...
    • 136 篇 工商管理
  • 210 篇 医学
    • 165 篇 临床医学
    • 143 篇 基础医学(可授医学...
    • 66 篇 公共卫生与预防医...
    • 66 篇 药学(可授医学、理...
  • 99 篇 教育学
    • 93 篇 教育学
  • 81 篇 法学
    • 72 篇 社会学
  • 72 篇 农学
  • 53 篇 经济学
  • 8 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 军事学

主题

  • 52 篇 computer science
  • 46 篇 accuracy
  • 43 篇 machine learning
  • 42 篇 feature extracti...
  • 39 篇 internet of thin...
  • 38 篇 deep learning
  • 36 篇 training
  • 34 篇 data mining
  • 34 篇 visualization
  • 34 篇 students
  • 33 篇 education
  • 33 篇 computational mo...
  • 31 篇 covid-19
  • 26 篇 artificial intel...
  • 25 篇 predictive model...
  • 22 篇 support vector m...
  • 22 篇 computer archite...
  • 22 篇 data models
  • 21 篇 real-time system...
  • 20 篇 optimization

机构

  • 27 篇 computer science...
  • 24 篇 school of physic...
  • 22 篇 department of ph...
  • 22 篇 department of ph...
  • 21 篇 kavli institute ...
  • 21 篇 university of ch...
  • 20 篇 computer science...
  • 19 篇 physics division...
  • 19 篇 enrico fermi ins...
  • 18 篇 applied mathemat...
  • 17 篇 department of as...
  • 16 篇 advanced institu...
  • 16 篇 harvey mudd coll...
  • 16 篇 computer science...
  • 16 篇 nist quantum dev...
  • 15 篇 fermi national a...
  • 14 篇 school of physic...
  • 14 篇 applied computer...
  • 14 篇 department of ph...
  • 13 篇 department of ph...

作者

  • 35 篇 gaol ford lumban
  • 29 篇 muhammad zarlis
  • 22 篇 jasra ajay
  • 21 篇 heryadi yaya
  • 20 篇 halverson n.w.
  • 20 篇 benson b.a.
  • 20 篇 padin s.
  • 19 篇 everett w.
  • 19 篇 ruhl j.e.
  • 19 篇 bender a.n.
  • 18 篇 whitehorn n.
  • 18 篇 smecher g.
  • 18 篇 schaffer k.k.
  • 18 篇 bens pardamean
  • 18 篇 holzapfel w.l.
  • 18 篇 novosad v.
  • 18 篇 matsuo tokuro
  • 18 篇 holder g.p.
  • 17 篇 meyer s.s.
  • 17 篇 nibarger j.p.

语言

  • 2,856 篇 英文
  • 75 篇 其他
  • 17 篇 中文
  • 7 篇 日文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Program in Computer Science & Technology"
2955 条 记 录,以下是221-230 订阅
排序:
Analysis A parallel combination between the Number Theorists aRe Us, Riverst Shamir Adleman and Triple Data Encryption Standard methods for measuring the speed of document security  2
Analysis A parallel combination between the Number Theorists...
收藏 引用
2nd International Conference on Mechanical, Electronics, computer, and Industrial technology, MECnIT 2018
作者: Hardiaman Hulu, Luken Candawan William Sipayung, David Hafis, Muhammad Christnatalis Informatics Engineering Study Program Deparment of Technology and Computer Science Universitas Prima Indonesia Medan Indonesia
computer security is a very important thing in an information system. The strength of the NTRU algorithm is the difficulty of finding a short vector of a lattice (a discrete subgroup of a collection of vectors that in... 详细信息
来源: 评论
Features Reduction with PCA Technique for Malware Detection Using Machine Learning  9
Features Reduction with PCA Technique for Malware Detection ...
收藏 引用
9th IEEE International Conference on Computing, Engineering and Design, ICCED 2023
作者: Mantoro, Teddy Ginanjar, Agung Ayu, Media Anugerah Aditiawarman, Umar Sampoerna University Faculty of Engineering and Technology Department of Computer Science Jakarta Indonesia Nusa Putra University Postgraduate Program - School of Computer Science Sukabumi Indonesia
Malware had been a problem for quite some times since it spreads easily and can cause various problems. Currently, malware is also one of the big threats for internet users. With a huge number of internet users today,... 详细信息
来源: 评论
A software authentication system for information integrity
收藏 引用
computers and Security 1992年 第8期11卷 747-752页
作者: Harn, Lein Lin, Hung-Yu Yang, Shoubao Computer Science Telecommunications Program University of Missouri-Kansas City Kansas City MO 64110 United States University of Science and Technology of China China
This paper describes a software authentication technique based on the public key cryptography for information integrity. The software provider can use a secret key to sign any released program and the user can verify ... 详细信息
来源: 评论
Hybrid Cryptosystem with Cramer-Shoup and Spritz Algorithms for Securing Digital Documents  8
Hybrid Cryptosystem with Cramer-Shoup and Spritz Algorithms ...
收藏 引用
8th International Conference on Electrical, Telecommunication and computer Engineering, ELTICOM 2024
作者: Hulu, Delisman Lydia, Maya Silvi Budiman, Mohammad Andri Universitas Sumatera Utara Master of Informatics Program Faculty of Computer Science and Information Technology Medan Indonesia
Symmetric algorithms offer speed but have weaknesses in key distribution, while asymmetric algorithms are secure but less efficient for encrypting and decrypting large text messages. This research aims to secure data ... 详细信息
来源: 评论
Traffic sign detection using histogram of oriented gradients and max margin object detection  2
Traffic sign detection using histogram of oriented gradients...
收藏 引用
2nd International Conference on Mechanical, Electronics, computer, and Industrial technology, MECnIT 2018
作者: Reinaldo Manurung, Natanael Simbolon, Juara Immanuel Christnatalis Informatics Engineering Study Program Deparment of Technology and Computer Science Universitas Prima Indonesia Medan Indonesia
Traffic signs are important markers in two-wheeled and four-wheeled vehicles. However, there is a change in direction or arrangement on the road that cannot be opened on a map which can cause incorrect information, wh... 详细信息
来源: 评论
Revealing social identity phenomena in videogames with archetypal analysis
Revealing social identity phenomena in videogames with arche...
收藏 引用
AISB Convention 2015
作者: Lim, Chong-U Fox Harrell, D. Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology United States Computer Science and Artificial Intelligence Laboratory Comparative Media Studies Program Massachusetts Institute of Technology United States
In this paper, we present a novel approach toward revealing social identity phenomena in videogames using archetypal analysis (AA). Conventionally used as a dimensionality reduction technique for multivariate data, we...
来源: 评论
HYPERTENSION SELF-MANAGEMENT SUCCESS IN 2 WEEKS;3 PILOT STUDIES  36
HYPERTENSION SELF-MANAGEMENT SUCCESS IN 2 WEEKS;3 PILOT STUD...
收藏 引用
36th Bled eConference, BLED 2023
作者: Simons, Luuk P.A. Wielaard, Bas Neerincx, Mark Delft University of Technology Faculty of Computer Science Delft Netherlands Health Coach Program Hague Netherlands
Platform business models like Uber Ride or Airbnb Lodging enable innovative business models by operating digital platforms to connect providers and consumers of products and services in two-sided markets. A particular... 详细信息
来源: 评论
Basic electrical parameters measurement laboratory: A K-12 outreach project  125
Basic electrical parameters measurement laboratory: A K-12 o...
收藏 引用
125th ASEE Annual Conference and Exposition
作者: Dua, Rohit Department of Electrical and Computer Engineering Missouri University of Science and Technology Cooperative Engineering Program United States
A basic laboratory exercise was designed and implemented, for K-12 students, which delves into the measurement of basics of electrical circuit parameters, such as resistance, current and voltage. This 2-3 hour lab exe...
来源: 评论
Interactive water streams with sphere scan conversion  09
Interactive water streams with sphere scan conversion
收藏 引用
2009 ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games, I3D 2009
作者: Hoetzlein, Rama Höllerer, Tobias Department of Computer Science Media Arts and Technology Program University of California Santa Barbara United States
Fluid simulations require efficient dynamics, surface extraction and rendering in order to achieve real time interaction. We present a novel technique for the surface extraction of stream-shaped fluid simulations repr... 详细信息
来源: 评论
A collaborative intelligent tutoring system for medical problem-based learning
A collaborative intelligent tutoring system for medical prob...
收藏 引用
IUI 04: 2004 International Conference on Intelligent User Interfaces
作者: Suebnukarn, Siriwan Haddawy, Peter Computer Science and Information Management Program Asian Institute of Technology PO Box 4 Pathumthani Thailand
This paper describes COMET, a collaborative intelligent tutoring system for medical problem-based learning. The system uses Bayesian networks to model individual student knowledge and activity, as well as that of the ... 详细信息
来源: 评论