咨询与建议

限定检索结果

文献类型

  • 2,236 篇 会议
  • 1,261 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,185 篇 工学
    • 1,742 篇 计算机科学与技术...
    • 1,416 篇 软件工程
    • 466 篇 信息与通信工程
    • 313 篇 控制科学与工程
    • 234 篇 生物工程
    • 183 篇 电气工程
    • 153 篇 机械工程
    • 150 篇 生物医学工程(可授...
    • 134 篇 电子科学与技术(可...
    • 95 篇 安全科学与工程
    • 85 篇 光学工程
    • 85 篇 仪器科学与技术
    • 78 篇 化学工程与技术
    • 76 篇 网络空间安全
    • 73 篇 建筑学
    • 65 篇 土木工程
  • 937 篇 理学
    • 460 篇 数学
    • 264 篇 生物学
    • 190 篇 物理学
    • 143 篇 统计学(可授理学、...
    • 121 篇 系统科学
    • 88 篇 化学
  • 705 篇 管理学
    • 463 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 261 篇 工商管理
  • 160 篇 医学
    • 144 篇 临床医学
    • 128 篇 基础医学(可授医学...
    • 67 篇 公共卫生与预防医...
  • 137 篇 法学
    • 108 篇 社会学
  • 95 篇 经济学
    • 94 篇 应用经济学
  • 64 篇 教育学
  • 44 篇 农学
  • 9 篇 军事学
  • 8 篇 文学
  • 7 篇 艺术学

主题

  • 156 篇 software enginee...
  • 114 篇 information syst...
  • 88 篇 machine learning
  • 86 篇 software
  • 74 篇 deep learning
  • 66 篇 software systems
  • 66 篇 accuracy
  • 61 篇 systems engineer...
  • 61 篇 training
  • 59 篇 semantics
  • 59 篇 artificial intel...
  • 58 篇 security
  • 57 篇 data mining
  • 57 篇 computational mo...
  • 55 篇 computer science
  • 54 篇 computer archite...
  • 53 篇 feature extracti...
  • 46 篇 internet of thin...
  • 44 篇 application soft...
  • 44 篇 cloud computing

机构

  • 57 篇 department of so...
  • 27 篇 department of so...
  • 25 篇 china industrial...
  • 24 篇 state key labora...
  • 24 篇 department of in...
  • 21 篇 school of softwa...
  • 18 篇 school of inform...
  • 18 篇 state key labora...
  • 17 篇 college of compu...
  • 16 篇 school of comput...
  • 15 篇 department of so...
  • 15 篇 institute of inf...
  • 14 篇 school of comput...
  • 14 篇 college of compu...
  • 13 篇 school of electr...
  • 12 篇 school of inform...
  • 11 篇 information syst...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 11 篇 department of so...

作者

  • 66 篇 shabtai asaf
  • 60 篇 elovici yuval
  • 28 篇 puzis rami
  • 26 篇 ismail leila
  • 19 篇 rokach lior
  • 17 篇 ruisheng zhang
  • 17 篇 jakimi abdeslam
  • 17 篇 abdeslam jakimi
  • 16 篇 fire michael
  • 15 篇 buyya rajkumar
  • 15 篇 jajodia sushil
  • 14 篇 mirsky yisroel
  • 13 篇 shapira bracha
  • 13 篇 r.s. sandhu
  • 13 篇 materwala huned
  • 13 篇 shahar yuval
  • 12 篇 h. gomaa
  • 12 篇 choo kim-kwang r...
  • 12 篇 guri mordechai
  • 12 篇 lin lin

语言

  • 3,418 篇 英文
  • 109 篇 其他
  • 19 篇 中文
  • 5 篇 日文
  • 3 篇 德文
  • 2 篇 土耳其文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering and Information Systems Engineering Team"
3553 条 记 录,以下是371-380 订阅
排序:
Local Periodicity-Based Beat Tracking for Expressive Classical Piano Music
收藏 引用
IEEE/ACM Transactions on Audio Speech and Language Processing 2023年 31卷 2824-2835页
作者: Chiu, Ching-Yu Muller, Meinard Davies, Matthew E. P. Su, Alvin Wen-Yu Yang, Yi-Hsuan National Cheng Kung University Academia Sinica Graduate Program of Multimedia Systems and Intelligent Computing Tainan701401 Taiwan International Audio Laboratories Erlangen Erlangen91058 Germany University of Coimbra Department of Informatics Engineering Centre for Informatics and Systems Coimbra3004-531 Portugal National Cheng Kung University Department of Computer Science and Information Engineering Tainan701401 Taiwan Taiwan AI Labs Yating Music Team Taipei103622 Taiwan Academia Sinica Research Center for IT Innovation Taipei11529 Taiwan
To model the periodicity of beats, state-of-the-art beat tracking systems use 'post-processing trackers' (PPTs) that rely on several empirically determined global assumptions for tempo transition, which work w... 详细信息
来源: 评论
A novel One-vs-Next approach for multiclass classification
A novel One-vs-Next approach for multiclass classification
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: V. Hurbungs V. Bassoo T. P. Fowdur Software and Information Systems Department Faculty of Information Communication & Digital Technologies University of Mauritius Electrical and Electronic Department Faculty of Engineering University of Mauritius
In machine learning, multiclass classification is the process of classifying data that contains three or more classes. One-vs-Rest and One-vs-One are two popular binary transformation approaches that reduce the multic... 详细信息
来源: 评论
Simulative Investigations of Crowd Evacuation by Incorporating Reinforcement Learning Scheme  6
Simulative Investigations of Crowd Evacuation by Incorporati...
收藏 引用
6th International Conference on Algorithms, Computing and systems, ICACS 2022
作者: Sinpan, Nitinun Sasithong, Pruk Chaudhary, Sushank Poomrittigul, Suvit Leelawat, Natt Wuttisittikulkij, Lunchakorn Department of Electrical Engineering Chulalongkorn University Thailand Wireless Communication Ecosystem Research Unit Thailand Department of Software Engineering and Information System Pathumwan Institute of Technology Thailand Disaster and Risk Management Information Systems Research Unit Department of Industrial Engineering Chulalongkorn University Thailand
Safe and effective evacuation is very essential to decrease casualties in an emergency event. The social force model is used to simulate the movement of evacuee and leader crowd evacuation with leader in an experiment... 详细信息
来源: 评论
Discussion Manipulation, Language and Domain Dependent Models: An Overview
Discussion Manipulation, Language and Domain Dependent Model...
收藏 引用
Zooming Innovation in Consumer Electronics International Conference (ZINC)
作者: Filip Chalás Igor Stupavský Valentino Vranić Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology in Bratislava
The amount of antisocial online behavior (AOB) in the political field has been on the rise in recent years. In the research, we are dealing with the reason for confusing AOB with other forms of antisocial behavior. We...
来源: 评论
RDANet: Reject Domain Attention Network For Confused Facial Expression Recognition
RDANet: Reject Domain Attention Network For Confused Facial ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jintao Luo Juan Li Tonglin Cheng Faculty of Information Technology Beijing University of Technology Beijing Engineering Researeh Center for loT Software and Systems Beijing China
Due to the significant intra-class differences and inter-class similarities inherent in facial expressions, distinguishing certain highly similar facial expressions such as disgust, fear, and sadness has become one of...
来源: 评论
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
Query-Based External information Leakage Attacks on Face Recognition Models
Query-Based External Information Leakage Attacks on Face Rec...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Edita Grolman Amit Giloni Ryuta Kremer Hiroo Saito Tomoyuki Shibata Tsukasa Omino Misaki Komatsu Yoshikazu Hanatani Asaf Shabtai Yuval Elovici Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Corporate Research & Development Center Toshiba Corporation
Recent studies have demonstrated external information leakage (EIL) attacks which allow an attacker to infer various sensitive implicit properties related to a machine learning (ML) model’s training data. Most of tho... 详细信息
来源: 评论
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring
arXiv
收藏 引用
arXiv 2024年
作者: Ben-Shimol, Lavi Grolman, Edita Elyashar, Aviad Maimon, Inbar Mimran, Dudu Brodt, Oleg Strassmann, Martin Lehmann, Heiko Elovici, Yuval Shabtai, Asaf Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Israel Deutsche Telekom AG. Germany
In a fully managed serverless environment, the cloud service provider is responsible for securing the cloud infrastructure, thereby reducing the operational and maintenance efforts of application developers. However, ... 详细信息
来源: 评论
Recurring Structures of Subcontract Management in System Outsourcing  22
Recurring Structures of Subcontract Management in System Out...
收藏 引用
Proceedings of the 29th Conference on Pattern Languages of Programs
作者: Haji Gul Wahaj Valentino Vranić Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology in Bratislava
Despite numerous efforts to address system outsourcing problems in the subcontract management system, the existing available solutions do not appear to be sufficient. They are fragmented into individual patterns, neit... 详细信息
来源: 评论
A Combined Method for Face Recognition
A Combined Method for Face Recognition
收藏 引用
International Conference on information and Computer Technologies (ICICT)
作者: Laura Mukhamadiyeva Aiman Moldagulova Information Systems International University of Information Technologies Almaty Kazakhstan Software Engineering Satbayev University Almaty Kazakhstan
Nowadays face recognition methods are in great interest of computer vision area. The development of a face recognition method that provides a high level of reliability of the solution in the absence of restrictions on...
来源: 评论