咨询与建议

限定检索结果

文献类型

  • 2,010 篇 会议
  • 1,982 篇 期刊文献
  • 110 册 图书

馆藏范围

  • 4,102 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,237 篇 工学
    • 1,346 篇 计算机科学与技术...
    • 1,083 篇 软件工程
    • 519 篇 信息与通信工程
    • 282 篇 生物医学工程(可授...
    • 275 篇 生物工程
    • 267 篇 控制科学与工程
    • 248 篇 电气工程
    • 244 篇 电子科学与技术(可...
    • 231 篇 光学工程
    • 191 篇 仪器科学与技术
    • 164 篇 核科学与技术
    • 151 篇 机械工程
    • 102 篇 化学工程与技术
    • 84 篇 动力工程及工程热...
    • 69 篇 材料科学与工程(可...
  • 1,770 篇 理学
    • 903 篇 物理学
    • 594 篇 数学
    • 336 篇 生物学
    • 201 篇 统计学(可授理学、...
    • 138 篇 化学
    • 132 篇 系统科学
    • 92 篇 地球物理学
  • 546 篇 管理学
    • 333 篇 管理科学与工程(可...
    • 231 篇 图书情报与档案管...
    • 177 篇 工商管理
  • 291 篇 医学
    • 241 篇 临床医学
    • 221 篇 基础医学(可授医学...
    • 148 篇 药学(可授医学、理...
    • 95 篇 公共卫生与预防医...
  • 90 篇 法学
    • 75 篇 社会学
  • 68 篇 经济学
  • 50 篇 教育学
  • 44 篇 农学
  • 11 篇 文学
  • 6 篇 艺术学
  • 3 篇 军事学

主题

  • 141 篇 informatics
  • 97 篇 artificial intel...
  • 90 篇 hadron colliders
  • 72 篇 machine learning
  • 72 篇 computer network...
  • 63 篇 higgs bosons
  • 58 篇 deep learning
  • 58 篇 wireless sensor ...
  • 55 篇 quality of servi...
  • 55 篇 computational mo...
  • 53 篇 computer archite...
  • 48 篇 protocols
  • 47 篇 proton-proton in...
  • 45 篇 bandwidth
  • 44 篇 mobile communica...
  • 43 篇 costs
  • 42 篇 electronic mail
  • 41 篇 routing
  • 41 篇 image segmentati...
  • 40 篇 resource managem...

机构

  • 417 篇 department for p...
  • 410 篇 faculty of scien...
  • 404 篇 kirchhoff-instit...
  • 400 篇 department of ph...
  • 387 篇 department of ph...
  • 387 篇 institute of phy...
  • 386 篇 department of ph...
  • 373 篇 institute of phy...
  • 368 篇 fakultät für phy...
  • 341 篇 instituto de fís...
  • 308 篇 department of ph...
  • 287 篇 department of ph...
  • 285 篇 graduate school ...
  • 284 篇 nikhef national ...
  • 282 篇 dipartimento di ...
  • 281 篇 department of ph...
  • 275 篇 universidade fed...
  • 267 篇 department of ph...
  • 267 篇 ictp trieste
  • 259 篇 yerevan physics ...

作者

  • 336 篇 c. alexa
  • 333 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 325 篇 g. spigo
  • 325 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 318 篇 s. mohapatra
  • 310 篇 s. guindon
  • 307 篇 a. kaczmarska
  • 301 篇 j. schaarschmidt
  • 299 篇 y. tayalati
  • 292 篇 a. d. pilkington
  • 288 篇 l. chevalier
  • 282 篇 m. klein

语言

  • 3,515 篇 英文
  • 554 篇 其他
  • 37 篇 中文
  • 4 篇 日文
  • 3 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=RA Computer Technology Institute and Department of Computer Engineering and Informatics"
4102 条 记 录,以下是191-200 订阅
Approximate EFX and Exact tEFX Allocations for Indivisible Chores: Improved Algorithms
arXiv
收藏 引用
arXiv 2024年
作者: Afshinmehr, Mahyar Ansaripour, Matin Danaei, Alireza Mehlhorn, Kurt Department of Computer Engineering Sharif University of Technology Iran Computer and Communications Sciences Department EPFL Switzerland Max Planck Institute for Informatics SIC Germany
We explore the fair distribution of a set of m indivisible chores among n agents, where each agent’s costs are evaluated using a monotone cost function. Our focus lies on two fairness criteria: envy-freeness up to an... 详细信息
来源: 评论
A House Divided: How U.S. Politics Could Shape Contact-Tracing Adoption in Future Pandemics  25
A House Divided: How U.S. Politics Could Shape Contact-Traci...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI 2025
作者: Smith, Garrett Chapman, Kirsten Weng, Tzu-Yu Hao, Haijing Mondal, Mainack Smith, Staci Chen, Yunan Page, Xinru Brigham Young University ProvoUT United States Computer Science Brigham Young University ProvoUT United States Bentley University WalthamMA United States Department of Computer Science and Engineering Indian Institute of Technology Kharagpur West Bengal Kharagpur India Informatics University of California Irvine IrvineCA United States Department of Computer Science Brigham Young University ProvoUT United States
Contact tracing has shown to be an effective tool in limiting the spread of transmittable diseases in countries where it is widely adopted. During the COVID-19 pandemic, contact tracing app adoption in the United Stat...
来源: 评论
A Contend Node-Restricted Receiver-Initiated MAC Protocol With Consecutive Packet Transmission
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2025年
作者: Liu, Yuxin Ota, Kaoru Dong, Mianxiong Wang, Ruoyu Changsha University College of Computer Science and Engineering Changsha410022 China Muroran Institute of Technology Department of Sciences and Informatics Japan Central South University School of Computer Science and Engineering Changsha410083 China
The medium access control (MAC) protocol plays a crucial role in wireless communications, influencing key performance metrics, such as energy consumption, delay, collision, and throughput. This paper introduces the Co... 详细信息
来源: 评论
Shuffle-F-ZFNet: ShuffleNet Fuzzy Zeiler and Fergus network for data aggregation in WSN data communication
收藏 引用
Wireless Networks 2025年 1-24页
作者: Dhanabal, S. Goswami, Chandrashekhar Praveen, rani Venkata Satya Vetriselvi, T. Department of Computer Science and Engineering Kongunadu College of Engineering and Technology Thottiam Trichy India Faculty of Computing and Informatics Sir Padampat Singhania University Udaipur India Digital Engineering & Assurance Hitech City Hyderabad India Department of IOT School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Wireless sensor networks (WSN) have acquired great importance from industries owing to their wide range of applications. In system security, intrusion detection systems (IDS) play a significant role. In WSN, data aggr... 详细信息
来源: 评论
Leveraging LLM in Genetic Programming Hyper-heuristics for Dynamic Microservice Deployment  37th
Leveraging LLM in Genetic Programming Hyper-heuristics for...
收藏 引用
37th Australasian Joint Conference on Artificial Intelligence, AJCAI 2024
作者: Fang, Zhengxin Ma, Hui Chen, Gang Hartmann, Sven Wang, Chen Centre for Data Science and Artificial Intelligence and School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand Department of Informatics Clausthal University of Technology Clausthal-Zellerfeld Germany National Institute of Water and Atmospheric Research Wellington New Zealand
Microservice deployment in cloud computing is a challenging combinatorial optimization problem due to the complex dependencies among microservices and the intricate trade-offs among different QoS requirements, e.g., m... 详细信息
来源: 评论
Missing Data Imputation: A Comprehensive Review
收藏 引用
Journal of computer and Communications 2024年 第11期12卷 53-75页
作者: Majed Alwateer El-Sayed Atlam Mahmoud Mohammed Abd El-raouf Osama A. Ghoneim Ibrahim Gad Department of Computer Science College of Computer Science and Engineering Taibah University Yanbu Saudi Arabia Computer Science Department Faculty of Science Tanta University Tanta Egypt Basic and Applied Science Institute College of Engineering and Technology Arab Academy for Science and Technology (AAST) Alexandria Egypt Department of Computer Science Faculty of Computers and informatics Tanta University Tanta Egypt
Missing data presents a significant challenge in statistical analysis and machine learning, often resulting in biased outcomes and diminished efficiency. This comprehensive review investigates various imputation techn... 详细信息
来源: 评论
Human Activity Recognition in Smart Cities from Smart Watch Data using LSTM Recurrent Neural Networks  1
Human Activity Recognition in Smart Cities from Smart Watch ...
收藏 引用
1st International Conference in Advanced Innovation on Smart City, ICAISC 2023
作者: Kandpal, Meenakshi Sharma, Bhisham Barik, rabindra K. Chowdhury, Subrata Patra, Sudhansu Shekhar Dhaou, Imed Ben KIIT Deemed to Be University School of Computer Engineering KIIT Deemed to Be University Bhubaneswar India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India KIIT Deemed to Be University School of Computer Applications Bhubaneswar India MCA Department AP Chittoor India Dar Al-Hekma University Hekma School of Engineering Computing and Informatics Department of Computer Science Jeddah Saudi Arabia
Due to the convergence of healthcare and smart cities, information and technology are employed in health and medical procedures worldwide. Residents of smart cities now enjoy better lives and healthier bodies because ... 详细信息
来源: 评论
Advancing general robotic manipulation with multimodal foundation models: An embodied AI paradigm
收藏 引用
Science China(Technological Sciences) 2025年 第5期68卷 290-292页
作者: Shifeng HUANG He WANG Xing ZHOU Wenkai CHEN Haibin YANG Jianwei ZHANG Department of Mechanical and Aerospace Engineering Hong Kong University of Science and TechnologyHong Kong 999077China Foshan Institute of Intelligent Equipment Technology Foshan 528234China Foshan Huashu Robot Co. Ltd.Foshan 528234China Center on Frontiers of Computing Studies(CFCS) School of Computer SciencePeking UniversityBeijing 100871China Beijing Academy of Artificial Intelligence Beijing 100084China Department of Informatics Universität HamburgHamburg 20146Germany
Can current robotic technologies truly replicate the full scope and intricacies of human labour?In practice,the adoption of robots remains limited,especially in open,unstructured environments commonly encountered in e... 详细信息
来源: 评论
State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques  13
State-based Sandbox Tool for Distributed Malware Detection w...
收藏 引用
13th International Conference on Dependable Systems, Services and Technologies, DESSERT 2023
作者: Rehida, Pavlo Markowsky, George Sachenko, Anatoliy Savenko, Oleg Khmelnytskyi National University Department of Computer Engineering and Information Systems Khmelnytskyi Ukraine Kennesaw State University Department of Software Engineering and Game Development Marietta United States Kazimierz Pulaski University of Technology and Humanities Department of Informatics Radom Poland Research Institute for Intelligent Computer Systems West Ukrainian National Unversity Ternopil Ukraine
This paper deals with the problem of detecting the malware by using emulation approach. Modern malware include various avoid techniques, to hide its anomaly actions. Advantages of using sandbox and emulation technolog... 详细信息
来源: 评论
Comparing the Effectiveness of Generative Adversarial Networks for Clustering Tasks  19
Comparing the Effectiveness of Generative Adversarial Networ...
收藏 引用
19th IEEE International Conference on computer Science and Information Technologies, CSIT 2024
作者: Lytvynenko, Volodymyr Olszewski, Serge Osypenko, Volodymyr Lurie, Iryna Demchenko, Violeta Dontsova, Dariia Kherson National Technical University Department of Informatics and Computer Science Kherson Ukraine Taras Shevchenko National University Department of Radio Engineering and Electronic Systems Kyiv Ukraine Kyiv National University of Technology and Design Department of Computer Science Kyiv Ukraine State Institution 'Kundiiev Institute of Occupational Health of the National Academy of Medical Sciences of Ukraine' Kyiv Ukraine
This study compares the effectiveness of various Generative Adversarial Network architectures, including WGAN and WGAN-GP, in data clustering using the Iris dataset. Performance was evaluated with metrics such as Silh... 详细信息
来源: 评论