咨询与建议

限定检索结果

文献类型

  • 1,387 篇 会议
  • 1,230 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 2,657 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,610 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 979 篇 软件工程
    • 347 篇 信息与通信工程
    • 234 篇 生物工程
    • 233 篇 控制科学与工程
    • 175 篇 生物医学工程(可授...
    • 143 篇 电气工程
    • 139 篇 光学工程
    • 116 篇 电子科学与技术(可...
    • 87 篇 机械工程
    • 67 篇 化学工程与技术
    • 64 篇 材料科学与工程(可...
    • 60 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 53 篇 建筑学
  • 951 篇 理学
    • 440 篇 数学
    • 315 篇 物理学
    • 269 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 86 篇 系统科学
    • 76 篇 化学
  • 453 篇 管理学
    • 246 篇 管理科学与工程(可...
    • 215 篇 图书情报与档案管...
    • 130 篇 工商管理
  • 206 篇 医学
    • 180 篇 临床医学
    • 162 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 105 篇 法学
    • 89 篇 社会学
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 54 篇 教育学
  • 40 篇 农学
  • 8 篇 文学
  • 8 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 63 篇 machine learning
  • 55 篇 training
  • 52 篇 accuracy
  • 48 篇 deep learning
  • 45 篇 computational mo...
  • 44 篇 artificial intel...
  • 36 篇 feature extracti...
  • 35 篇 security
  • 35 篇 data models
  • 34 篇 analytical model...
  • 33 篇 internet of thin...
  • 33 篇 predictive model...
  • 31 篇 educational inst...
  • 31 篇 cloud computing
  • 29 篇 computer archite...
  • 29 篇 real-time system...
  • 28 篇 convolutional ne...
  • 26 篇 visualization
  • 25 篇 covid-19
  • 25 篇 informatics

机构

  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 school of comput...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 37 篇 faculté des scie...

作者

  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic
  • 32 篇 m. rijssenbeek

语言

  • 2,454 篇 英文
  • 185 篇 其他
  • 17 篇 中文
  • 3 篇 德文
  • 2 篇 日文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Informatics Technology"
2657 条 记 录,以下是2121-2130 订阅
排序:
The benchmark data set CeTReS.B-MI for in vitro mitosis detection  11
The benchmark data set CeTReS.B-MI for in vitro mitosis dete...
收藏 引用
2014 IEEE 11th International Symposium on Biomedical Imaging, ISBI 2014
作者: Becker, T. Kanje, W. Rapoport, D. Thierbach, K. Scherf, N. Roeder, I. Madany Mamlouk, A. Fraunhofer Institution for Marine Biotechnology Lübeck Germany Graduate School for Computing in Medicine and Life Sciences University of Lübeck Germany Institute for Neuro- and Bioinformatics University of Lübeck Germany Institute for Medical Informatics and Biometry Dresden University of Technology Germany
Mitosis detection poses a major challenge in cell tracking as mitoses are crucial events in the construction of genealogical trees. Making use of typical mitotic patterns that can be seen in phase contrast images of t... 详细信息
来源: 评论
An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures
An alignment-free fingerprint bio-cryptosystem based on modi...
收藏 引用
作者: Yang, Wencheng Hu, Jiankun Wang, Song Stojmenovic, Milos School of Engineering and Information Technology University of New South Wales at the Australia Defence Force Academy Canberra ACT 2600 Australia School of Engineering and Mathematical Sciences La Trobe University VIC 3086 Australia Department of Informatics and Computing Singidunum University Belgrade Serbia
Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high reco... 详细信息
来源: 评论
Estimating packet reception rate in noisy environments
Estimating packet reception rate in noisy environments
收藏 引用
IEEE Conference on ALocal Computer Networks Workshops (LCN Workshops)
作者: James Brown Utz Roedig Carlo Alberto Boano Kay Römer School of Computing and Communications Lancaster University Lancaster United Kingdom Institute for Technical Informatics Graz University of Technology Graz Austria
For the design of dependable and efficient wireless sensor networks it is essential to estimate the achievable packet reception rate (PRR) in the deployment environment. Making such estimation is not trivial as packet... 详细信息
来源: 评论
Scene radiance estimation from human corneal reflections
Scene radiance estimation from human corneal reflections
收藏 引用
Imaging Systems and Applications, ISA 2014
作者: Tominaga, Shoji Ohtera, Ryo Nishi, Shogo Graduate School of Advanced Integration Science Chiba University Inage-ku Chiba-shi Chiba 263-8522 Japan Graduate School of Information Technology Kobe Institute of Computing Chuo-ku Kobe 650-0001 Japan Department of Engineering Informatics Osaka Electro-Communication University Neyagawa Osaka 572-8530 Japan
A method is proposed for estimating spectral radiances of the surrounding scene from a reflected image on the corneal surface. A digital color camera and the human eyeball are used to develop a simple imaging system w... 详细信息
来源: 评论
A data collection approach for Mobile Botnet analysis and detection
A data collection approach for Mobile Botnet analysis and de...
收藏 引用
IEEE Symposium on Wireless technology and Applications (ISWTA)
作者: Meisam Eslahi Mohammad Reza Rostami H. Hashim N. M. Tahir Maryam Var Naseri Faculty of Computing Engineering & Technology Asia Pacific University of Technology & Innovation Malaysia Faculty of Electrical Engineering Universiti Teknologi MARA Advanced Informatics School University Technology Malaysia
Recently, MoBots or Mobile Botnets have become one of the most critical challenges in mobile communication and cyber security. The integration of Mobile devices with the Internet along with enhanced features and capab... 详细信息
来源: 评论
Message from SNAA 2014 program chairs
ASONAM 2014 - Proceedings of the 2014 IEEE/ACM International...
收藏 引用
ASONAM 2014 - Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2014年 xxxiv页
作者: Bródka, Piotr Magnani, Matteo Musial, Katarzyna Institute of Informatics Wroclaw University of Technology Poland Department of Information Technology Division of Computing Science Uppsala University Sweden School of Natural and Mathematical Sciences Department of Informatics King's College London United Kingdom
来源: 评论
Q-Learning: From Computer Network Security to Software Security
Q-Learning: From Computer Network Security to Software Secur...
收藏 引用
International Conference on Machine Learning and Applications (ICMLA)
作者: Arisoa S. Randrianasolo Larry D. Pyeatt School of Computing and Informatics Lipscomb University Nashville TN USA Department of Mathematics and Computer Science South Dakota School of Mines and Technology Rapid City SD USA
Reinforcement learning techniques become more popular in computer network security. The same reinforcement learning techniques developed for network security can be applied to software security as well. This research ... 详细信息
来源: 评论
Automatic Identification of Solid-Phase Medication Intake Using Wireless Wearable Accelerometers
Automatic Identification of Solid-Phase Medication Intake Us...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society
作者: Rui Wang Zdenka Sitova Xiaoqing Jia Xiang He Tobi Abramson Paolo Gasti Kiran S. Balagani Aydin Farajidavar Integrated Medical Systems (IMS) Laboratory at the School of Engineering and Computing Sciences New York Institute of Technology (NYIT) Faculty of Informatics Masaryk University School of health profession NYIT Cyber Security and Privacy Laboratory at the School of Engineering and Computing Sciences NYIT
We have proposed a novel solution to a fundamental problem encountered in implementing non-ingestion based medical adherence monitoring systems, namely, how to reliably identify pill medication intake. We show how wir... 详细信息
来源: 评论
Robust ladder-climbing with a humanoid robot with application to the DARPA Robotics Challenge
Robust ladder-climbing with a humanoid robot with applicatio...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Jingru Luo Yajia Zhang Kris Hauser H. Andy Park Manas Paldhe C. S. George Lee Michael Grey Mike Stilman Jun Ho Oh Jungho Lee Inhyeok Kim Paul Oh School of Informatics and Computing Indiana University Bloomington School of Electrical and Computer Engineering Purdue University USA School of Interactive Computing Georgia Institute of Technology USA Korea Advanced Institute of Science and Technology South Korea Rainbow Co. South Korea Mechanical Engineering and Mechanics Drexel University USA
This paper presents an autonomous planning and control framework for humanoid robots to climb general ladder- and stair-like structures. The approach consists of two major components: 1) a multi-limbed locomotion plan... 详细信息
来源: 评论
A nature-inspired hybrid Fuzzy C-means algorithm for better clustering of biological data sets
A nature-inspired hybrid Fuzzy C-means algorithm for better ...
收藏 引用
International Conference on Data Science & Engineering (ICDSE)
作者: T A Arunanand K A Abdul Nazeer Mathew J Palakal Meeta Pradhan Department of Computer Science and Engineering National Institute of Technology Calicut INDIA National Institute of Technology Calicut Calicut Kerala IN School of Informatics and Computing Indiana University Purdue University Indianapolis USA
Clustering is one of the widely used unsupervised methods to interpret and analyze huge amount of data in the field of Bioinformatics. One of the major issues involved in clustering is to address the growing data so t... 详细信息
来源: 评论