咨询与建议

限定检索结果

文献类型

  • 3,450 篇 会议
  • 3,360 篇 期刊文献
  • 65 册 图书

馆藏范围

  • 6,875 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,807 篇 工学
    • 3,325 篇 计算机科学与技术...
    • 2,799 篇 软件工程
    • 1,054 篇 信息与通信工程
    • 715 篇 生物工程
    • 673 篇 控制科学与工程
    • 524 篇 电气工程
    • 514 篇 生物医学工程(可授...
    • 500 篇 电子科学与技术(可...
    • 464 篇 光学工程
    • 341 篇 机械工程
    • 279 篇 化学工程与技术
    • 249 篇 仪器科学与技术
    • 204 篇 动力工程及工程热...
    • 145 篇 材料科学与工程(可...
    • 121 篇 交通运输工程
    • 110 篇 建筑学
  • 2,758 篇 理学
    • 1,308 篇 数学
    • 808 篇 物理学
    • 789 篇 生物学
    • 412 篇 统计学(可授理学、...
    • 308 篇 化学
    • 281 篇 系统科学
  • 1,265 篇 管理学
    • 726 篇 管理科学与工程(可...
    • 569 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 477 篇 医学
    • 406 篇 临床医学
    • 347 篇 基础医学(可授医学...
    • 241 篇 药学(可授医学、理...
    • 130 篇 公共卫生与预防医...
  • 207 篇 法学
    • 182 篇 社会学
  • 104 篇 经济学
  • 71 篇 教育学
  • 69 篇 农学
  • 38 篇 文学
  • 24 篇 艺术学
  • 19 篇 军事学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 137 篇 machine learning
  • 127 篇 semantics
  • 120 篇 deep learning
  • 95 篇 feature extracti...
  • 87 篇 training
  • 85 篇 computational mo...
  • 84 篇 artificial intel...
  • 77 篇 computer science
  • 73 篇 deep neural netw...
  • 65 篇 accuracy
  • 64 篇 data mining
  • 62 篇 visualization
  • 60 篇 object detection
  • 56 篇 reinforcement le...
  • 55 篇 neural networks
  • 53 篇 computer vision
  • 53 篇 forecasting
  • 52 篇 computer archite...
  • 51 篇 internet of thin...
  • 50 篇 optimization

机构

  • 210 篇 department of co...
  • 78 篇 department of co...
  • 56 篇 tencent ai lab
  • 49 篇 department of co...
  • 44 篇 department of co...
  • 43 篇 college of compu...
  • 38 篇 department of co...
  • 38 篇 department of el...
  • 37 篇 department of co...
  • 37 篇 pazhou lab
  • 37 篇 department of co...
  • 35 篇 peng cheng labor...
  • 32 篇 huawei noah's ar...
  • 31 篇 tsinghua univers...
  • 30 篇 university of sc...
  • 30 篇 state key lab on...
  • 29 篇 institute for ar...
  • 29 篇 department of co...
  • 28 篇 state key lab on...
  • 26 篇 department of co...

作者

  • 71 篇 sun maosong
  • 52 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 41 篇 bhowmik biswajit
  • 36 篇 zhu jun
  • 33 篇 huang minlie
  • 31 篇 huang wenbing
  • 30 篇 biswajit bhowmik
  • 27 篇 liu yang
  • 26 篇 timofte radu
  • 25 篇 yu kai
  • 24 篇 zhang min
  • 22 篇 liu qun
  • 21 篇 zhang lei
  • 21 篇 chen hao
  • 20 篇 fuchun sun
  • 18 篇 qinghua zheng
  • 18 篇 zheng qinghua
  • 17 篇 liu xin
  • 17 篇 zhao hai

语言

  • 6,551 篇 英文
  • 250 篇 其他
  • 77 篇 中文
  • 2 篇 日文
检索条件"机构=Programming Technology Lab Computer Science Department"
6875 条 记 录,以下是451-460 订阅
排序:
Next-Generation Human Activity Recognition Using Locality Constrained Linear Coding Combined With Machine Learning (NG-HAR-LCML)
收藏 引用
Healthcare technology Letters 2025年 第1期12卷
作者: Maryam Shabbir Fahad Ahmad Saad Awadh Alanazi Muhammad Hassan Khan Jianqiang Li Tariq Mahmood Shahid Naseem Muhammad Anwar Department of Computer Sciences Bahria University Lahore Punjab Pakistan Department of Computer Science Faculty of Computing & Information Technology University of the Punjab Lahore Pakistan School of Computing Faculty of Technology University of Portsmouth Portsmouth UK Portsmouth Artificial Intelligence and Data Science Centre (PAIDS) University of Portsmouth Portsmouth UK Department of Computer Science College of Computer and Information Sciences Jouf University Sakaka Aljouf Saudi Arabia The School of Software Engineering Beijing University of Technology Beijing China Artificial Intelligence and Data Analytics (AIDA) Lab CCIS Prince Sultan University Riyadh Saudi Arabia Department of Information Sciences University of Education Vehari Pakistan Faculty of Information Sciences Division Science &Technology University of Education Lahore Pakistan
Accurate Human Activity Recognition (HAR) is a critical challenge with wide-ranging applications in healthcare, assistive technologies, and human-computer interaction. Traditional feature extraction methods often stru... 详细信息
来源: 评论
A code-based 1-out-of-N oblivious transfer based on McEliece assumptions
收藏 引用
8th International Conference on Information Security Practice and Experience, ISPEC 2012
作者: Preetha, Mathew K. Vasant, Sachin Venkatesan, Sridhar Pandu Rangan, C. Theoretical Computer Science Lab. Department of Computer Science and Engineering Indian Institute of Technology Madras India Department of Mathematics and Computer Applications PSG College of Technology Coimbatore India
In this paper, we propose an efficient code-based 1-out-of-N oblivious transfer, OT1N, based on McEliece assumptions without invoking the OT12 several times as in the paradigm proposed in [20,6]. We also show that the... 详细信息
来源: 评论
An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model
An efficient IND-CCA2 secure variant of the Niederreiter enc...
收藏 引用
17th Australasian Conference on Information Security and Privacy, ACISP 2012
作者: Preetha Mathew, K. Vasant, Sachin Venkatesan, Sridhar Pandu Rangan, C. Theoretical Computer Science Lab. Department of Computer Science and Engineering Indian Institute of Technology Madras India Department of Mathematics and Computer Applications PSG College of Technology Coimbatore India
In this paper, we propose an IND-CCA2 secure code based encryption scheme in the standard model, built on the Niederreiter encryption scheme. The security of the scheme is based on the hardness of the Syndrome Decodin... 详细信息
来源: 评论
On the security of two ring signcryption schemes
On the security of two ring signcryption schemes
收藏 引用
SECRYPT 2009 - International Conference on Security and Cryptography
作者: Sree Vive, S. Sharmila Deva Selvi, S. Pandu Rangan, C. Theorectical Computer Science Lab. Department of Computer Science Indian Institute of Technology Madras Chennai-600036 India
Ring signcryption is a cryptographic primitive, that allows an user to send a message in confidential, authentic and anonymous way, i.e. the recipient of the message is convinced that the message is valid and it comes... 详细信息
来源: 评论
Strongly secure password based blind signature for real world applications
Strongly secure password based blind signature for real worl...
收藏 引用
作者: Jose, Sangeetha Mathew K., Preetha Rangan, C. Pandu Theoretical Computer Science Lab at Indian Institute of Technology Madras Poland Department of Computer Science and Engineering at Indian Institute of Technology Madras Poland
Digital signature is the cryptographic primitive that ensures authentication and nonrepudiation. A password based blind signature can be used in the scenarios, where the participation of both the signer and the user a... 详细信息
来源: 评论
On the security of two ring signcryption schemes
On the security of two ring signcryption schemes
收藏 引用
ICETE 2009 - International Joint Conference on e-Business and Telecommunications
作者: Vivek, S. Sree Deva Selvi, S. Sharmila Rangan, C. Pandu Theorectical Computer Science Lab. Department of Computer Science Indian Institute of Technology Madras Chennai-600036 India
Ring signcryption is a cryptographic primitive, that allows an user to send a message in confidential, authentic and anonymous way, i.e. the recipient of the message is convinced that the message is valid and it comes... 详细信息
来源: 评论
A Neuro-Fuzzy Approach to Road Traffic Congestion Prediction
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 295-310页
作者: Mohammed Gollapalli Atta-ur-Rahman Dhiaa Musleh Nehad Ibrahim Muhammad Adnan Khan Sagheer Abbas Ayesha Atta Muhammad Aftab Khan Mehwash Farooqui Tahir Iqbal Mohammed Salih Ahmed Mohammed Imran BAhmed Dakheel Almoqbil Majd Nabeel Abdullah Omer Department of Computer Information System(CIS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Science(CS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Pattern Recognition and Machine Learning Lab Department of Software EngineeringGachon UniversityInchonKorea Department of Computer Science National College of Business Administration and EconomicsLahorePunjab54000Pakistan Department of Computer Science Government College University(GCU)LahorePunjab54000Pakistan Department of Computer Engineering(CE) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia College of Business Administration Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Networks and Communications(NC) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia
The fast-paced growth of artificial intelligence applications provides unparalleled opportunities to improve the efficiency of various *** as the transportation sector faces many obstacles following the implementation... 详细信息
来源: 评论
Preface
Lecture Notes in Networks and Systems
收藏 引用
Lecture Notes in Networks and Systems 2025年 1241卷 xiii-xiv页
作者: Srujan Raju, K. Senkerik, Roman Kishore Kumar, T. Sellathurai, Mathini Kumar, Voruganti Naresh CMR Technical Campus Telangana Hyderabad India AI Lab Tomas Bata University Zlín Czech Republic Department of Computer Science and Engineering National Institute of Technology Telangana Warangal India Heriot-Watt University Edinburgh United Kingdom Department of Computer Science and Engineering CMR Technical Campus Telangana Hyderabad India
来源: 评论
Cognitive Skill Enhancement System Using Neuro-Feedback for ADHD Patients
收藏 引用
computers, Materials & Continua 2021年 第8期68卷 2363-2376页
作者: Muhammad Usman Ghani Khan Zubaira Naz Javeria Khan Tanzila Saba Ibrahim Abunadi Amjad Rehman Usman Tariq Al-khawarizmi Institute of Computer Science University of Engineering and TechnologyLahore54890Pakistan Department of Computer Science University of Engineering and TechnologyLahore54890Pakistan Artificial Intelligence and Data Analytics Lab CCIS Prince Sultan UniversityRiyadhSaudi Arabia College of Computer Engineering and Science Prince Sattam bin Abdulaziz UniversityAlkharjSaudi Arabia
The National Health Interview Survey(NHIS)shows that there are 13.2%of children at the age of 11 to 17 who are suffering from Attention Deficit Hyperactivity Disorder(ADHD),*** treatment methods for ADHD are either ps... 详细信息
来源: 评论
Adaptive scheduling for shared window joins over data streams
收藏 引用
中国高等学校学术文摘·计算机科学 2007年 第4期1卷 468-477页
作者: JIN Cheqing ZHOU Aoying Jeffrey Xu Yu Joshua Zhexue Huang CAO Feng Department of Computer Science and Engineering East China University of Science and TechnologyShanghai 200237China Department of Computer Science and Engineering Fudan UniversityShanghai 200433China Department of Systems Engineering and Engineering Management The Chinese University of Hong KongChina E-Business Technology Institute The University of ttong KongChina IBM China-Research Lab Beijing 100094China
Recently a few Continuous Query systems have been developed to cope with applications involving continuous data *** the same time,numerous algorithms are proposed for better performance.A recent work on this subject w... 详细信息
来源: 评论