咨询与建议

限定检索结果

文献类型

  • 1,017 篇 会议
  • 681 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 1,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 966 篇 工学
    • 731 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 191 篇 信息与通信工程
    • 155 篇 控制科学与工程
    • 78 篇 电气工程
    • 60 篇 电子科学与技术(可...
    • 56 篇 光学工程
    • 51 篇 生物工程
    • 48 篇 生物医学工程(可授...
    • 47 篇 材料科学与工程(可...
    • 43 篇 化学工程与技术
    • 40 篇 机械工程
    • 38 篇 力学(可授工学、理...
    • 29 篇 建筑学
    • 26 篇 动力工程及工程热...
    • 21 篇 土木工程
  • 924 篇 理学
    • 754 篇 数学
    • 162 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 73 篇 生物学
    • 55 篇 化学
    • 48 篇 系统科学
  • 207 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 97 篇 图书情报与档案管...
    • 61 篇 工商管理
  • 41 篇 医学
    • 37 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 39 篇 教育学
    • 36 篇 教育学
  • 37 篇 法学
    • 31 篇 社会学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 17 篇 农学
  • 4 篇 哲学
  • 3 篇 历史学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 65 篇 computer science
  • 44 篇 mathematics
  • 20 篇 neural networks
  • 18 篇 data mining
  • 15 篇 deep learning
  • 15 篇 algorithms
  • 15 篇 semantics
  • 15 篇 machine learning
  • 15 篇 artificial intel...
  • 14 篇 image segmentati...
  • 14 篇 educational inst...
  • 14 篇 testing
  • 13 篇 computational mo...
  • 12 篇 computer archite...
  • 12 篇 optimization
  • 12 篇 predictive model...
  • 12 篇 control systems
  • 12 篇 algorithm design...
  • 11 篇 computers
  • 11 篇 genetic algorith...

机构

  • 16 篇 hci lab. dept. o...
  • 12 篇 dept. of compute...
  • 9 篇 dept. of syst. s...
  • 9 篇 dept. of math an...
  • 8 篇 math. dept. coll...
  • 7 篇 department of sy...
  • 7 篇 dept. of compute...
  • 7 篇 department of ma...
  • 7 篇 dept. of math an...
  • 7 篇 dept. of math. a...
  • 7 篇 dept. of math an...
  • 7 篇 dept. of math. a...
  • 7 篇 department of el...
  • 7 篇 dept. of math. a...
  • 7 篇 dept. of math. a...
  • 6 篇 dept. of math an...
  • 6 篇 department of co...
  • 6 篇 dept. of math. a...
  • 6 篇 dept. of compute...
  • 6 篇 dept. of math an...

作者

  • 24 篇 chittaro luca
  • 19 篇 gautam srivastav...
  • 17 篇 sunderam vaidy
  • 15 篇 freisleben bernd
  • 14 篇 metwally n.
  • 14 篇 irani michal
  • 13 篇 srivastava gauta...
  • 11 篇 naor moni
  • 11 篇 amit konar
  • 10 篇 salama a.a.
  • 10 篇 obada a.-s.f.
  • 10 篇 atulya k. nagar
  • 9 篇 ewerth ralph
  • 8 篇 kurzyniec dawid
  • 8 篇 simon beth
  • 7 篇 hemaspaandra edi...
  • 7 篇 abd-rabbou m.y.
  • 7 篇 van den bussche ...
  • 7 篇 serkh kirill
  • 7 篇 fitzsimmons zack

语言

  • 1,611 篇 英文
  • 66 篇 其他
  • 36 篇 中文
检索条件"机构=dept. of Math. and Computer Science"
1713 条 记 录,以下是101-110 订阅
排序:
On Securing Sensitive Data Using Deep Convolutional Autoencoders
On Securing Sensitive Data Using Deep Convolutional Autoenco...
收藏 引用
International Conference on Control, Decision and Information Technologies (CoDIT)
作者: Abib Sy Fehmi Jaafar Kevin Bouchard Dept. of Math and Computer Science Université du Québec à Chicoutimi Quebec Canada
There are various traditional methods used for securing sensitive data, such as cryptography algorithms like AES-HMAC-SHA256, Twofish, and Chacha20. However, several studies showed that these cryptography algorithms s... 详细信息
来源: 评论
Spacelike Curves of Constant-Ratio in Pseudo-Galilean Space
arXiv
收藏 引用
arXiv 2022年
作者: Abdel-Aziz, H.S. Saad, M. Khalifa Ali, Haytham A. Dept. of Math. Faculty of Science Sohag Univ. Sohag82524 Egypt Dept. of Math. Faculty of Science Islamic University in Madinah Saudi Arabia
In the theory of differential geometry curves, a curve is said to be of constant-ratio if the ratio of the length of the tangential and normal components of its position vector function is constant. In this paper, we ... 详细信息
来源: 评论
An adaptive Particle Swarm Optimization to Solve Modern Security System
An adaptive Particle Swarm Optimization to Solve Modern Secu...
收藏 引用
Innovative Approaches in Smart Technologies (ISAS), International Symposium on
作者: Mohammed H. Ahmed Asaad Noori Hashim Khalid A. Hussein dept. Computer Science College of Education Mustansiriyah University Baghdad Iraq dept. Computer Science College of Computer Science and Math University of Kufa Najaf Iraq
Nonlinear stream ciphers hold a vital position in ensuring confidentiality within contemporary cryptographic systems. In this context, we interduce a new approach known as the Adaptive Three Sub-Swarm PSO based on Reg...
来源: 评论
An Innovative Tool for Uploading/Scraping Large Image Datasets on Social Networks
arXiv
收藏 引用
arXiv 2023年
作者: Arceri, Nicolò Fabio Giudice, Oliver Battiato, Sebastiano Dept. of Math and Computer Science University of Catania Catania Italy
Nowadays, people can retrieve and share digital information in an increasingly easy and fast fashion through the well-known digital platforms, including sensitive data, inappropriate or illegal content, and, in genera... 详细信息
来源: 评论
A Continuation Method for Fitting a Bandlimited Curve to Points in the Plane
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Mohan Serkh, Kirill Dept. of Computer Science University of Toronto TorontoONM5S 2E4 Canada Dept. of Math. and Computer Science University of Toronto TorontoONM5S 2E4 Canada
In this paper, we describe an algorithm for fitting an analytic and bandlimited closed or open curve to interpolate an arbitrary collection of points in R2. The main idea is to smooth the parametrization of the curve ... 详细信息
来源: 评论
On the Approximation of Singular Functions by Series of Non-integer Powers
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Mohan Serkh, Kirill Dept. of Computer Science University of Toronto TorontoONM5S 2E4 Canada Dept. of Math. and Computer Science University of Toronto TorontoONM5S 2E4 Canada
In this paper, we describe an algorithm for approximating functions of the form f(x) = Rab xµσ(µ) dµ over [0, 1], where σ(µ) is some signed Radon measure, or, more generally, of the form f(x) = 〈... 详细信息
来源: 评论
Key Exchange in the Quantum Era: Evaluating a Hybrid System of Public-Key Cryptography and Physical-Layer Security  59
Key Exchange in the Quantum Era: Evaluating a Hybrid System ...
收藏 引用
59th Annual Conference on Information sciences and Systems, CISS 2025
作者: Staat, Paul Dorpinghaus, Meik Sheikholeslami, Azadeh Paar, Christof Fcllwcis, Gerhard Goeckel, Dennis Max Planck Institute for Security and Privacy Bochum Germany Technische Universität Dresden Vodafone Chair Mobile Communications Systems Dresden Germany Suffolk University Math and Computer Science Department Boston United States University of Massachusetts Dept. Electrical and Computer Engineering Amherst United States
Today's information society relies on cryptography to achieve security goals such as confidentiality, integrity, authentication, and non-repudiation for digital communications. Here, public-key cryptosystems play ... 详细信息
来源: 评论
Evaluating Low-Resource Lane Following Algorithms for Compute-Constrained Automated Vehicles
arXiv
收藏 引用
arXiv 2024年
作者: Froemming-Aldanondo, Beñat Rastoskueva, Tatiana Evans, Michael Machado, Marcial Vadella, Anna Johnson, Rickey Escamilla, Luis Jostes, Milan Butani, Devson Kaddis, Ryan Chung, Chan-Jin Siegel, Josh Dept. of Computer Science & Engineering University of Minnesota Minneapolis United States Dept. of Computer Science The University of Arizona Tucson United States Dept. of Computer Science Old Dominion University Norfolk United States Dept. of Computer Science & Engineering The Ohio State University Columbus United States Dept. of Computer Science SWE Butler University Indianapolis United States Dept. of Computer Science North Carolina A&T State University Greensboro United States Dept. of Computer Science New Mexico State University Las Cruces United States Dept. of Math & Computer Science Lawrence Technological University Southfield United States DeepTech Lab Michigan State University East Lansing United States
Reliable lane-following is essential for automated and assisted driving, yet existing solutions often rely on models that require extensive computational resources, limiting their deployment in compute-constrained veh... 详细信息
来源: 评论
Explaining text classifiers through progressive neighborhood approximation with realistic samples
arXiv
收藏 引用
arXiv 2023年
作者: Cai, Yi Zimek, Arthur Ntoutsi, Eirini Wunder, Gerhard Dept. of Math. and Comp. Science Freie Universität Berlin Berlin Germany Dept. of Math. and Comp. Science University of Southern Denmark Odense Denmark Research Institute CODE Universität der Bundeswehr München Munich Germany
The importance of neighborhood construction in local explanation methods has been already highlighted in the literature. And several attempts have been made to improve neighborhood quality for high-dimensional data, f... 详细信息
来源: 评论
Revealing Modern Stream Ciphers Security: A Comprehensive Review
Revealing Modern Stream Ciphers Security: A Comprehensive Re...
收藏 引用
Engineering Applied and Nano sciences (ICEANS), International Conference on
作者: Mohammed Albawi Asaad N. Hashim Khalid A. Hussein Dept. Computer Science College of Education Technical Mustansiriyah University Baghdad Iraq Dept. Computer Science College of Computer Science and Math University of Kufa Najaf Iraq Dept. Computer Science College of Education Mustansiriyah University Baghdad Iraq
Stream ciphers are essential cryptographic primitives widely employed in various applications for efficient data protection. This paper presents a comprehensive review of attacks on the Grain, Trivium, and SNOW stream... 详细信息
来源: 评论