咨询与建议

限定检索结果

文献类型

  • 5,640 篇 会议
  • 90 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 5,740 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,778 篇 工学
    • 2,336 篇 计算机科学与技术...
    • 1,325 篇 软件工程
    • 564 篇 信息与通信工程
    • 466 篇 电气工程
    • 200 篇 生物工程
    • 176 篇 控制科学与工程
    • 174 篇 生物医学工程(可授...
    • 108 篇 机械工程
    • 83 篇 化学工程与技术
    • 81 篇 交通运输工程
    • 79 篇 电子科学与技术(可...
    • 78 篇 光学工程
    • 70 篇 仪器科学与技术
    • 65 篇 动力工程及工程热...
    • 55 篇 土木工程
    • 53 篇 环境科学与工程(可...
    • 52 篇 安全科学与工程
  • 893 篇 理学
    • 475 篇 数学
    • 235 篇 生物学
    • 229 篇 物理学
    • 189 篇 统计学(可授理学、...
    • 119 篇 系统科学
    • 66 篇 化学
  • 588 篇 管理学
    • 329 篇 图书情报与档案管...
    • 302 篇 管理科学与工程(可...
    • 162 篇 工商管理
  • 290 篇 医学
    • 244 篇 临床医学
    • 145 篇 基础医学(可授医学...
    • 80 篇 药学(可授医学、理...
  • 75 篇 法学
    • 70 篇 社会学
  • 54 篇 经济学
  • 45 篇 教育学
  • 40 篇 农学
  • 27 篇 文学
  • 2 篇 军事学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 1,601 篇 data models
  • 538 篇 predictive model...
  • 531 篇 training
  • 500 篇 machine learning
  • 463 篇 data mining
  • 416 篇 big data
  • 405 篇 computational mo...
  • 343 篇 feature extracti...
  • 333 篇 task analysis
  • 328 篇 prediction algor...
  • 269 篇 deep learning
  • 255 篇 machine learning...
  • 245 篇 classification a...
  • 238 篇 analytical model...
  • 192 篇 clustering algor...
  • 190 篇 support vector m...
  • 183 篇 neural networks
  • 158 篇 natural language...
  • 142 篇 training data
  • 140 篇 mathematical mod...

机构

  • 19 篇 sun yat sen univ...
  • 19 篇 daffodil interna...
  • 12 篇 univ chinese aca...
  • 11 篇 tsinghua univers...
  • 11 篇 university of ch...
  • 11 篇 school of data a...
  • 10 篇 carnegie mellon ...
  • 9 篇 renmin univ chin...
  • 9 篇 lviv polytechnic...
  • 8 篇 shenzhen researc...
  • 7 篇 shanghai jiao to...
  • 7 篇 college of compu...
  • 7 篇 university of el...
  • 7 篇 school of comput...
  • 7 篇 national univers...
  • 7 篇 harbin institute...
  • 7 篇 beijing key lab ...
  • 7 篇 natl univ def te...
  • 7 篇 renmin univ chin...
  • 6 篇 university of sc...

作者

  • 7 篇 li li
  • 7 篇 wang wei
  • 7 篇 xiao yanghua
  • 6 篇 wen ji-rong
  • 6 篇 cui bin
  • 6 篇 zhao wayne xin
  • 6 篇 ying liu
  • 6 篇 syed akhter hoss...
  • 5 篇 yang tong
  • 5 篇 liu yang
  • 5 篇 li zhang
  • 5 篇 jia weijia
  • 5 篇 chen liu
  • 5 篇 yang yang
  • 5 篇 xiao hongbo
  • 5 篇 nguyen trong-the
  • 5 篇 yu jie
  • 5 篇 albert bifet
  • 5 篇 wang bin
  • 5 篇 carlos ordonez

语言

  • 5,567 篇 英文
  • 165 篇 其他
  • 15 篇 中文
  • 2 篇 俄文
  • 1 篇 乌克兰文
检索条件"任意字段=2020 International Conference on Data Processing Algorithms and Models, ICDPAM 2020"
5740 条 记 录,以下是261-270 订阅
排序:
Algorithm Implementation of Japanese Machine Translation System Based on Similarity of Semantic Distribution
Algorithm Implementation of Japanese Machine Translation Sys...
收藏 引用
2023 Asia-Europe conference on Electronics, data processing and Informatics, ACEDPI 2023
作者: Shan, Li Misa, Itai Dalian Polytechnic University Liaoning Dalian116034 China Josai International University Tokyo283-8555 Japan
In intelligent information processing, word similarity calculation based on semantics is a very basic and key problem, which is widely used in information retrieval, machine translation, automatic question answering s... 详细信息
来源: 评论
Hallucination Detection: Robustly Discerning Reliable Answers in Large Language models  23
Hallucination Detection: Robustly Discerning Reliable Answer...
收藏 引用
32nd ACM international conference on Information and Knowledge Management (CIKM)
作者: Chen, Yuyan Fu, Qiang Yuan, Yichen Wen, Zhihao Fan, Ge Liu, Dayiheng Zhang, Dongmei Li, Zhixu Xiao, Yanghua Fudan Univ Sch Comp Sci Shanghai Key Lab Data Sci Shanghai Peoples R China Microsoft Beijing Peoples R China Shanghai Key Lab Data Sci Shanghai Peoples R China Singapore Management Univ Singapore Singapore Tencent Shenzhen Peoples R China DAMO Acad Hangzhou Peoples R China Fudan Univ Sch Comp Sci Shanghai Key Lab Data Sci Fudan Aishu Cognit Intelligence Joint Res Shanghai Peoples R China
Large Language models (LLMs) have gained widespread adoption in various natural language processing tasks, including question answering and dialogue systems. However, a major drawback of LLMs is the issue of hallucina... 详细信息
来源: 评论
Chain-Based Outlier Detection for Complex data Scenarios
Chain-Based Outlier Detection for Complex Data Scenarios
收藏 引用
2023 IEEE international conference on Big data, Bigdata 2023
作者: Dong, Huiwen Wang, Qing-Guo Ding, Wei Institute of Artificial Intelligence and Future Networks Beijing Normal University Beijing China Institute for Advanced Study Guangdong Key Lab of Ai and Mm Data ProcessingGuangdong Provincial Key Laboratory Irads Ias Dst BNU-HKBU United International College Zhuhai China Changshu Institute of Technology Faculty of Electrical Engineering and Automation Changshu China
Outlier detection is a challenging problem due to the complexity of real-life data. Specifically, an effective outlier detection method should be able to handle (1) different types of outliers: local outliers, global ... 详细信息
来源: 评论
A non-contact SpO2 estimation using video magnification and infrared data  48
A non-contact SpO2 estimation using video magnification and ...
收藏 引用
48th IEEE international conference on Acoustics, Speech and Signal processing, ICASSP 2023
作者: Stogiannopoulos, Thomas Cheimariotis, Grigorios-Aris Mitianoudis, Nikolaos Democritus University of Thrace Electrical & Computer Engineering Dep. Xanthi Greece
Peripheral oxygen saturation (SpO2) is one important vital sign to be monitored in individuals, whose health is fragile, such as the elderly. Contactless SpO2 monitoring using RGB cameras has been already developed wi... 详细信息
来源: 评论
Time Series Forecasting of Ethereum Price by FB-Prophet
Time Series Forecasting of Ethereum Price by FB-Prophet
收藏 引用
international conference on Signal processing and Communication (ICSPC)
作者: P Yuvarani P Bharani B Dharun P Dinesh Dept. of Electronics and Communication Engineering M.Kumarasamy College of Engineering Karur India
Ethereum is one of a technology that allows us to create D-Applications and organizations, keep assets, transact, and communicate without being controlled by a central authority. Investing in cryptocurrencies is now a... 详细信息
来源: 评论
Time-series data Imputation for Improved Prediction of PM10 Pollutant in Northern Thailand  18
Time-series Data Imputation for Improved Prediction of PM10 ...
收藏 引用
18th international Joint Symposium on Artificial Intelligence and Natural Language processing (ISAI-NLP) / 4th international conference on Artificial Intelligence and Internet of Things (AIoT)
作者: Kumgyi, Seng Nu Pan Deepaisarn, Somrudee Supnithi, Thepchai Isshiki, Tsuhoshi Supasri, Titaporn Thammasat Univ Inst Technol Sirindhorn Int Bangkok Pathum Thani Thailand Natl Sci & Technol Dev Agcy Natl Elect & Comp Technol Ctr Khlong Luang Pathum Thani Thailand Tokyo Inst Technol Dept Informat & Commun Engn Tokyo Japan Natl Astron Res Inst Thailand Atmospher Res Unit Chiang Mai Thailand
Air pollution has become a big issue in the Northern part of Thailand due to forest fires, human activities, and seasonal climate. The air pollutant particulate matter (PM10) measurements from the Pollution Control De... 详细信息
来源: 评论
coDice: Connectivity-Preserving Dice Loss for 2D/3D Tubular Structure Segmentation
coDice: Connectivity-Preserving Dice Loss for 2D/3D Tubular ...
收藏 引用
2025 conference on Medical Imaging
作者: Dong, Jiahui Lv, Yan Bai, Xuan Tian, Ming Zhang, Chao Zhuang, Xiahai Jernberg, Tomas Wang, Chunliang Escope Tech Co Ltd Beijing Peoples R China Fudan Univ Sch Data Sci Shanghai Peoples R China Karolinska Inst Danderyd Hosp Dept Clin Sci Stockholm Sweden KTH Royal Inst Technol Dept Biomed Engn & Hlth Syst Stockholm Sweden
Vessel segmentation in 2D/3D images is crucial for accurate computer-assisted diagnosis and preoperative planning. However, due to noise, complex topology, and low contrast with the background, previous segmentation a... 详细信息
来源: 评论
DDoS Attack Detection via Privacy-aware Federated Learning and Collaborative Mitigation in Multi-domain Cyber Infrastructures  11
DDoS Attack Detection via Privacy-aware Federated Learning a...
收藏 引用
11th IEEE international conference on Cloud Networking (CloudNet)
作者: Dimolianis, Marinos Kalogeras, Dimitrios K. Kostopoulos, Nikos Maglaris, Vasilis Natl Tech Univ Athens NTUA Zografos Greece Inst Comp & Commun Syst ICCS Zografos Greece
Interconnected cyber infrastructures, accessible via the Internet, are a common target of DDoS attacks intending to downgrade their operations and services. Collaborative protection mechanisms are prime candidates to ... 详细信息
来源: 评论
Pedestrian Tracking Algorithm Based on Attention Mechanism and data Association  23
Pedestrian Tracking Algorithm Based on Attention Mechanism a...
收藏 引用
7th international conference on Digital Signal processing, ICDSP 2023
作者: Fan, Miao Huang, Lilian Zheng, Zhaodomg College of Information and Communication Engineering Harbin Engineering University No. 145 Nantong Street Nangang District Harbin150001 China
In this paper, a pedestrian tracking algorithm based on anchor free CBAM (Convolutional Block Attention Module) convolutional attention mechanism network is proposed to solve the problems such as target identity switc... 详细信息
来源: 评论
OSMO: Enhanced Offloading for data Stream Perception with Smoothness and Orderliness  29
OSMO: Enhanced Offloading for Data Stream Perception with Sm...
收藏 引用
29th IEEE international conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zhang, Chaokun Fan, Quan Jinlong, E. He, Shen Tianjin University College of Intelligence and Computing Tianjin China Digital City Technology Co. Ltd. China Xiongan Group Xiong'an China University of California Riverside United States Renmin University of China School of Information Beijing China Engineering Research Center of Database and Business Intelligence Moe China
On-device AI is taking over our daily lives by moving closer to mobile devices as perception applications. A data stream perception application generally has three essential requirements: timeliness, smoothness, and o... 详细信息
来源: 评论