咨询与建议

限定检索结果

文献类型

  • 22,321 篇 会议
  • 12,286 篇 期刊文献
  • 454 册 图书

馆藏范围

  • 35,061 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 21,896 篇 工学
    • 17,277 篇 计算机科学与技术...
    • 14,323 篇 软件工程
    • 5,096 篇 信息与通信工程
    • 3,156 篇 控制科学与工程
    • 2,875 篇 生物工程
    • 2,249 篇 电气工程
    • 1,971 篇 生物医学工程(可授...
    • 1,667 篇 光学工程
    • 1,595 篇 电子科学与技术(可...
    • 1,241 篇 机械工程
    • 1,076 篇 网络空间安全
    • 900 篇 安全科学与工程
    • 870 篇 动力工程及工程热...
    • 856 篇 化学工程与技术
    • 818 篇 仪器科学与技术
    • 793 篇 交通运输工程
  • 11,307 篇 理学
    • 6,188 篇 数学
    • 3,167 篇 生物学
    • 2,709 篇 物理学
    • 1,946 篇 统计学(可授理学、...
    • 1,202 篇 系统科学
    • 997 篇 化学
  • 6,539 篇 管理学
    • 3,778 篇 管理科学与工程(可...
    • 3,046 篇 图书情报与档案管...
    • 1,713 篇 工商管理
  • 2,060 篇 医学
    • 1,643 篇 临床医学
    • 1,477 篇 基础医学(可授医学...
    • 1,009 篇 公共卫生与预防医...
    • 882 篇 药学(可授医学、理...
  • 1,318 篇 法学
    • 1,101 篇 社会学
  • 601 篇 经济学
  • 490 篇 农学
  • 447 篇 教育学
  • 230 篇 文学
  • 65 篇 艺术学
  • 58 篇 军事学
  • 13 篇 哲学
  • 5 篇 历史学

主题

  • 1,094 篇 deep learning
  • 1,060 篇 accuracy
  • 885 篇 computer science
  • 792 篇 computational mo...
  • 747 篇 feature extracti...
  • 721 篇 machine learning
  • 718 篇 training
  • 539 篇 semantics
  • 515 篇 predictive model...
  • 461 篇 internet of thin...
  • 450 篇 data models
  • 423 篇 support vector m...
  • 394 篇 real-time system...
  • 394 篇 convolutional ne...
  • 352 篇 artificial intel...
  • 297 篇 optimization
  • 296 篇 scalability
  • 296 篇 computer archite...
  • 275 篇 data mining
  • 268 篇 reliability

机构

  • 579 篇 school of comput...
  • 216 篇 institute of com...
  • 190 篇 department of co...
  • 171 篇 school of comput...
  • 161 篇 department of co...
  • 152 篇 department of co...
  • 142 篇 department of co...
  • 132 篇 school of comput...
  • 132 篇 school of comput...
  • 129 篇 school of comput...
  • 123 篇 school of comput...
  • 119 篇 school of comput...
  • 110 篇 school of comput...
  • 109 篇 school of comput...
  • 108 篇 school of comput...
  • 106 篇 department of co...
  • 103 篇 national enginee...
  • 102 篇 college of intel...
  • 99 篇 college of compu...
  • 99 篇 department of co...

作者

  • 136 篇 hai jin
  • 129 篇 jin hai
  • 122 篇 niyato dusit
  • 107 篇 zheng wei-shi
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 calvo d.
  • 93 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 83 篇 díaz a.f.
  • 81 篇 anjali t.
  • 74 篇 boumaaza j.
  • 73 篇 kalekin o.
  • 65 篇 coleiro a.
  • 61 篇 huang f.
  • 57 篇 gozzini s.r.
  • 56 篇 kulikovskiy v.
  • 55 篇 zhang lei
  • 54 篇 eddymaoui a.

语言

  • 33,106 篇 英文
  • 1,736 篇 其他
  • 262 篇 中文
  • 11 篇 法文
  • 10 篇 德文
  • 5 篇 日文
  • 3 篇 荷兰文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Computing Science"
35061 条 记 录,以下是4921-4930 订阅
排序:
GENIUS: A computational modeling framework for counter-terrorism planning and response
GENIUS: A computational modeling framework for counter-terro...
收藏 引用
2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security, ISI 2010
作者: Tsang, Herbert H. Park, Andrew J. Sun, Mengting Glässer, Uwe School of Computing Science Australia Centre Canada Simon Fraser University Canada Department of Computer Science University of Calgary Canada
Public safety has been a great concern in recent years as terrorism occurs everywhere. When a public event is held in an urban environment like Olympic games or soccer games, it is important to keep public safe and at... 详细信息
来源: 评论
A discriminative latent model of image region and object tag correspondence
A discriminative latent model of image region and object tag...
收藏 引用
24th Annual Conference on Neural Information Processing Systems 2010, NIPS 2010
作者: Wang, Yang Mori, Greg Department of Computer Science University of Illinois at Urbana-Champaign United States School of Computing Science Simon Fraser University Canada
We propose a discriminative latent model for annotating images with unaligned object-level textual annotations. Instead of using the bag-of-words image representation currently popular in the computer vision community... 详细信息
来源: 评论
Accelerate mapreduce on GPUs with multi-level reduction  13
Accelerate mapreduce on GPUs with multi-level reduction
收藏 引用
5th Asia-Pacific Symposium on Internetware, Internetware 2013
作者: Zheng, Ran Liu, Kai Jin, Hai Zhang, Qin Feng, Xiaowen Services Computing Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
With Graphics Processing Units (GPUs) becoming more and more popular in general purpose computing, more attentions have been paid on building a framework to provide convenient interfaces for GPU programming. MapReduce... 详细信息
来源: 评论
Survey on Detection and Prevention of Phishing Websites using Machine Learning
Survey on Detection and Prevention of Phishing Websites usin...
收藏 引用
2021 International Conference on Advance computing and Innovative Technologies in Engineering, ICACITE 2021
作者: Rastogi, Malaika Chhetri, Anmol Singh, Divyanshu Kumar Rajan V, Gokul Galgotias University Computer Science Department Greater Noida India Galgotias University School of Computing Science and Engineering UP India
This research paper discusses on the phishing websites Prevention and Detection. A phishing website is a common social engineering method that mimics trustful uniform resource locators (URLs) and webpages. Phishing is... 详细信息
来源: 评论
Exploring BitTorrent peer distribution via hybrid PlanetLab-internet measurement
Exploring BitTorrent peer distribution via hybrid PlanetLab-...
收藏 引用
2010 IEEE 18th International Workshop on Quality of Service, IWQoS 2010
作者: Wang, Haiyang Liu, Jiangchuan Xu, Ke School of Computing Science Simon Fraser University BC Canada Department of Computer Science and Technology Tsinghua University Beijing China
Understanding the peer distribution over the global Internet is the key issue toward building new generation of ISP-friendly peer-to-peer systems. However, there are unfortunately significant scalability and represent... 详细信息
来源: 评论
Mimir: Term-distributed indexing and search for secret documents
Mimir: Term-distributed indexing and search for secret docum...
收藏 引用
作者: Gao, Guoqiang Li, Ruixuan Gu, Xiwu Wen, Kunmei Lu, Zhengding Yan, Kun Intelligent and Distributed Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
In order to access sensitive documents shared over government, army and enterprise intranets, users rely on an indexing facility where they can quickly locate relevant documents they are allowed to access, (1) without... 详细信息
来源: 评论
PCTCP: Per-circuit TCP-over-IPsec transport for anonymous communication overlay networks  13
PCTCP: Per-circuit TCP-over-IPsec transport for anonymous co...
收藏 引用
2013 ACM SIGSAC Conference on computer and Communications Security, CCS 2013
作者: AlSabah, Mashael Goldberg, Ian Qatar Computing Research Institute Department of Computer Science and Engineering Qatar University Doha Qatar Cheriton School of Computer Science University of Waterloo Waterloo ON Canada
Recently, there have been several research efforts to design a transport layer that meets the security requirements of anonymous communications while maximizing the network performance experienced by users. In this wo... 详细信息
来源: 评论
A tabu search based approach for graph layout  20
A tabu search based approach for graph layout
收藏 引用
20th International Conference on Distributed Multimedia Systems, DMS 2014
作者: Dib, Fadi K. Rodgers, Peter Computer Science Department Gulf University for Science and Technology Kuwait Kuwait School of Computing University of Kent Canterbury United Kingdom
This paper describes an automated tabu search based method for drawing general simple graph layouts with straight lines. To our knowledge, this is the first time tabu methods have been applied to graph drawing. We for... 详细信息
来源: 评论
HMM based Hand Gesture Recognition: A Review on Techniques and Approaches
HMM based Hand Gesture Recognition: A Review on Techniques a...
收藏 引用
2nd IEEE International Conference on computer science and Information Technology
作者: Moni, M. A. Ali, A. B. M. Shawkat Department of Computer Science and Engineering Jatiya Kabi Kazi Nazrul Islam University Bangladesh India School of Computing Science Central Queensland University Australia
Gesture is one of the most natural and expressive ways of communications between human and computer in a virtual reality system. We naturally use various gestures to express our own intentions in everyday life. Hand g... 详细信息
来源: 评论
Neural Style Transfer: A Comparative Study  15
Neural Style Transfer: A Comparative Study
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Suryamritha, M. Balaji, Varshini Kannan, Srinidhi Singh, Tripty Sharma, Mansi Amrita School of Computing Amrita Vishwa Vidyapeetham Dept. of Computer Science and Engineering Bangalore India University Dept. of Computer Science and Engineering India
Neural Style Transfer (NST) has emerged as a powerful technique for artistic image synthesis by fusing the base image with style source. In this study, we present a comparative analysis of NST using popular convolutio... 详细信息
来源: 评论