咨询与建议

限定检索结果

文献类型

  • 1,577 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 1,578 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 897 篇 工学
    • 774 篇 计算机科学与技术...
    • 531 篇 软件工程
    • 251 篇 信息与通信工程
    • 193 篇 控制科学与工程
    • 131 篇 电气工程
    • 84 篇 网络空间安全
    • 77 篇 生物医学工程(可授...
    • 76 篇 安全科学与工程
    • 64 篇 交通运输工程
    • 62 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 45 篇 动力工程及工程热...
    • 42 篇 仪器科学与技术
    • 42 篇 石油与天然气工程
    • 41 篇 光学工程
  • 304 篇 理学
    • 164 篇 数学
    • 81 篇 生物学
    • 73 篇 统计学(可授理学、...
    • 60 篇 物理学
    • 37 篇 系统科学
    • 33 篇 化学
  • 268 篇 管理学
    • 204 篇 管理科学与工程(可...
    • 106 篇 图书情报与档案管...
    • 84 篇 工商管理
    • 35 篇 公共管理
  • 114 篇 医学
    • 79 篇 临床医学
    • 77 篇 公共卫生与预防医...
    • 63 篇 基础医学(可授医学...
  • 52 篇 法学
    • 49 篇 社会学
  • 39 篇 经济学
    • 39 篇 应用经济学
  • 18 篇 文学
  • 15 篇 教育学
  • 11 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 193 篇 data models
  • 158 篇 accuracy
  • 153 篇 computational mo...
  • 92 篇 training
  • 87 篇 feature extracti...
  • 87 篇 machine learning
  • 77 篇 predictive model...
  • 69 篇 data mining
  • 68 篇 deep learning
  • 64 篇 real-time system...
  • 58 篇 big data
  • 49 篇 adaptation model...
  • 45 篇 security
  • 44 篇 robustness
  • 41 篇 decision making
  • 40 篇 cloud computing
  • 40 篇 convolutional ne...
  • 36 篇 analytical model...
  • 35 篇 neural networks
  • 35 篇 artificial intel...

机构

  • 14 篇 lovely professio...
  • 7 篇 shandong provinc...
  • 7 篇 key laboratory o...
  • 6 篇 college of mecha...
  • 6 篇 institute of aer...
  • 5 篇 lloyd institute ...
  • 5 篇 college of intel...
  • 5 篇 university of ch...
  • 5 篇 national univers...
  • 5 篇 department of co...
  • 5 篇 shandong fundame...
  • 5 篇 national univers...
  • 5 篇 institute of aer...
  • 4 篇 karnataka bangal...
  • 4 篇 school of comput...
  • 4 篇 chitkara univers...
  • 4 篇 new horizon coll...
  • 4 篇 srm institute of...
  • 4 篇 school of softwa...
  • 4 篇 koneru lakshmaia...

作者

  • 7 篇 nijhawan ginni
  • 5 篇 jeanette miriam ...
  • 5 篇 lu xiaobo
  • 5 篇 singh navdeep
  • 4 篇 nicola franco
  • 4 篇 choudhry mani de...
  • 4 篇 akhil karnam
  • 4 篇 zhang rui
  • 4 篇 yu zhang
  • 4 篇 akshya j.
  • 4 篇 lihui wang
  • 4 篇 qu yuben
  • 4 篇 wang lihui
  • 4 篇 li lei
  • 4 篇 dong chao
  • 4 篇 dutt varun
  • 4 篇 puri chetan
  • 3 篇 yuangan wang
  • 3 篇 junqi luo
  • 3 篇 zhang lei

语言

  • 1,249 篇 英文
  • 328 篇 其他
  • 4 篇 中文
检索条件"任意字段=2024 IEEE International Conference on Cognitive Computing and Complex Data"
1578 条 记 录,以下是1041-1050 订阅
排序:
The Quantum Interface Controller: A Full-Stack, Modular, and Scalable System for Qubit Readout and Manipulation
The Quantum Interface Controller: A Full-Stack, Modular, and...
收藏 引用
Quantum computing and Engineering (QCE), ieee international conference on
作者: Luis E. Ardila-Perez Marvin Fuchs Robert Gartmann Lukas Scheller Mario Schlösser Roger Heil Christian Roth Ilja Bekman Markus Jerger Rami Barends Stefan van Waasen Oliver Sander Institute for Data Processing and Electronics (IPE) Karlsruhe Institute of Technology (KIT) Karlsruhe Germany Integrated Computing Architectures Electronic Systems (ZEA-2) Forschungszentrum Jülich. GmbH Jülich Germany Functional Quantum Systems Peter Grünberg Institute (PGI-13) Forschungszentrum Jülich GmbH Jülich Germany
Quantum computing has the potential to revolutionize computation by solving complex problems in a way that classical computers cannot. However, robust and scalable qubit manipulation and control electronics are needed... 详细信息
来源: 评论
Front-running Attack Detection in Blockchain using Conditional Packing Generative AI
Front-running Attack Detection in Blockchain using Condition...
收藏 引用
ieee international conference on Big data
作者: Shagufta Henna Mohamed Amjath Department of Computing Atlantic Technological University Donegal Ireland
Detecting front-running attacks in Ethereum blockchain transactions is crucial for maintaining security and integrity within decentralized ecosystems. However, existing models struggle to accurately model the complex ... 详细信息
来源: 评论
BWG: An IOC Identification Method for Imbalanced Threat Intelligence datasets
BWG: An IOC Identification Method for Imbalanced Threat Inte...
收藏 引用
ieee international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Juncheng Lu Yiyang Zhao Yan Wang Jiyuan Cui Sanfeng Zhang School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
APT attacks are becoming increasingly complex and stealthy. To effectively counter APT attacks, modelling threat intelligence data based on graphs, identifying Indicators of Compromise (IOC) nodes, and providing early... 详细信息
来源: 评论
Daily Routine Recognition from Longitudinal, Real-Life Wearable Sensor data for the Elderly
Daily Routine Recognition from Longitudinal, Real-Life Weara...
收藏 引用
Activity and Behavior computing (ABC), international conference on
作者: Sayeda Shamma Alia Paula Lago Electrical and Computer Engineering Concordia University Montreal Canada
As our population continues to age, there is a growing need for tailored healthcare solutions for the elderly. Despite the promise of current wearable devices, the effectiveness of these devices in addressing complex ... 详细信息
来源: 评论
MEC- Assisted Task offloading using Meta-Reinforcement Learning for B5G/6G Network
MEC- Assisted Task offloading using Meta-Reinforcement Learn...
收藏 引用
ieee international conference on Big data
作者: Priyadarshni Priyadarshni Praveen Kumar Shivani Tripathi Akshun Pratap Dubey Rajiv Misra Computer Science and Engineering Indian Institute of Technology Patna India Computer Science and Engineering B.P. Mandal College of Engineering Madhepura Bihar India
The rapid growth of mobile data and computing demands has strained resource-constrained edge devices, particularly in supporting IoT applications. Mobile Edge computing (MEC) offloading alleviates these challenges by ... 详细信息
来源: 评论
cognitive Deep-Learning approach to enhance Problem-Solving Skills based on Knowledge Organization
Cognitive Deep-Learning approach to enhance Problem-Solving ...
收藏 引用
international conference on ICT in Business Industry & Government (ICTBIG)
作者: Karnam Akhil Bollineni Harshadha Nikhil Kota Harika Kalakata Jaswanth Kondabrolu Medipally Abhinay Department of CSE&CSBS VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING AND TECHNOLOGY Hyderabad India Department of CSBS VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING AND TECHNOLOGY Hyderabad India VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING AND TECHNOLOGY Hyderabad India
Knowledge is a fundamental component of human cognition that exists in procedural, declarative, and non-declarative forms and plays a crucial role in influencing problem-solving capabilities. In the current environmen... 详细信息
来源: 评论
Machine Fault Diagnosis Using EMD-Gammatone Texture Representation and A Lightweight Self-Attention SqueezeNet
Machine Fault Diagnosis Using EMD-Gammatone Texture Represen...
收藏 引用
international conference on Big data and Smart computing (BIGCOMP)
作者: Mahe Zabin Anika Nahian Binte Kabir Muhammad Khubayeeb Kabir Ho-Jin Choi Jia Uddin School of Computing Korea Advanced Institute of Science & Technology KAIST Daejeon South Korea Department of Computer Science and Engineering Brac University Dhaka Bangladesh Artificial Intelligence and Big Data Department Woosong University Daejeon South Korea
Machine fault diagnosis involves the intricate process of detecting and isolating faults, which is particularly challenging due to various sources of noise and the complex nature of the faults. In automatic fault diag...
来源: 评论
Efficient Network Embedding by Approximate Equitable Partitions
Efficient Network Embedding by Approximate Equitable Partiti...
收藏 引用
ieee international conference on data Mining (ICDM)
作者: Giuseppe Squillace Mirco Tribastone Max Tschaikowski Andrea Vandin IMT Lucca Italy Aalborg University Denmark Sant'Anna Pisa Italy DTU Denmark
Structural network embedding is a crucial step in enabling effective downstream tasks for complex systems that aim to project a network into a lower-dimensional space while preserving similarities among nodes. We intr... 详细信息
来源: 评论
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive Learning Framework for Drug-Target Binding Affinity Prediction
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive L...
收藏 引用
ieee international conference on Bioinformatics and Biomedicine (BIBM)
作者: Huiting Li Weiyu Zhang Yong Shang Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Drug-target binding affinity prediction is critical to drug design. Some existing computational methods rely on single-scale data and cannot fully integrate the rich information of multi-scale data, such as molecular ... 详细信息
来源: 评论
An Empirical Analysis of Realistic Noise in Quantum Neural Networks for Medical Classifications of Tabular, Signal and Imaging data
An Empirical Analysis of Realistic Noise in Quantum Neural N...
收藏 引用
Quantum computing and Engineering (QCE), ieee international conference on
作者: Philipp Moser Alexander Maletzky Michael Giretzlehner Research Unit Medical Informatics RISC Software GmbH Hagenberg Austria
Quantum machine learning has gained significant momentum in recent years, particularly with the use of parameterized quantum circuits that exhibit a certain level of resilience to noise in current NISQ devices. Howeve... 详细信息
来源: 评论