咨询与建议

限定检索结果

文献类型

  • 1,576 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 1,577 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 899 篇 工学
    • 774 篇 计算机科学与技术...
    • 533 篇 软件工程
    • 253 篇 信息与通信工程
    • 194 篇 控制科学与工程
    • 130 篇 电气工程
    • 84 篇 网络空间安全
    • 78 篇 生物医学工程(可授...
    • 75 篇 安全科学与工程
    • 64 篇 交通运输工程
    • 62 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 45 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 42 篇 光学工程
    • 42 篇 石油与天然气工程
  • 306 篇 理学
    • 164 篇 数学
    • 83 篇 生物学
    • 73 篇 统计学(可授理学、...
    • 61 篇 物理学
    • 37 篇 系统科学
    • 33 篇 化学
  • 267 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 106 篇 图书情报与档案管...
    • 84 篇 工商管理
    • 34 篇 公共管理
  • 114 篇 医学
    • 80 篇 临床医学
    • 77 篇 公共卫生与预防医...
    • 64 篇 基础医学(可授医学...
  • 51 篇 法学
    • 48 篇 社会学
  • 39 篇 经济学
    • 39 篇 应用经济学
  • 18 篇 文学
  • 15 篇 教育学
  • 11 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 193 篇 data models
  • 157 篇 accuracy
  • 153 篇 computational mo...
  • 92 篇 training
  • 86 篇 feature extracti...
  • 86 篇 machine learning
  • 77 篇 predictive model...
  • 69 篇 data mining
  • 68 篇 deep learning
  • 63 篇 real-time system...
  • 57 篇 big data
  • 49 篇 adaptation model...
  • 45 篇 security
  • 44 篇 robustness
  • 41 篇 decision making
  • 40 篇 convolutional ne...
  • 39 篇 cloud computing
  • 36 篇 analytical model...
  • 35 篇 neural networks
  • 34 篇 optimization

机构

  • 14 篇 lovely professio...
  • 7 篇 shandong provinc...
  • 7 篇 key laboratory o...
  • 6 篇 college of mecha...
  • 6 篇 institute of aer...
  • 5 篇 lloyd institute ...
  • 5 篇 college of intel...
  • 5 篇 university of ch...
  • 5 篇 national univers...
  • 5 篇 department of co...
  • 5 篇 shandong fundame...
  • 5 篇 national univers...
  • 5 篇 institute of aer...
  • 4 篇 karnataka bangal...
  • 4 篇 shanghai jiao to...
  • 4 篇 school of comput...
  • 4 篇 chitkara univers...
  • 4 篇 new horizon coll...
  • 4 篇 srm institute of...
  • 4 篇 school of softwa...

作者

  • 7 篇 nijhawan ginni
  • 5 篇 jeanette miriam ...
  • 5 篇 lu xiaobo
  • 5 篇 singh navdeep
  • 4 篇 nicola franco
  • 4 篇 choudhry mani de...
  • 4 篇 akhil karnam
  • 4 篇 zhang rui
  • 4 篇 yu zhang
  • 4 篇 akshya j.
  • 4 篇 lihui wang
  • 4 篇 qu yuben
  • 4 篇 wang lihui
  • 4 篇 li lei
  • 4 篇 dong chao
  • 4 篇 dutt varun
  • 4 篇 puri chetan
  • 3 篇 yuangan wang
  • 3 篇 junqi luo
  • 3 篇 zhang lei

语言

  • 1,273 篇 英文
  • 303 篇 其他
  • 4 篇 中文
检索条件"任意字段=2024 IEEE International Conference on Cognitive Computing and Complex Data"
1577 条 记 录,以下是961-970 订阅
排序:
Balanced And Discriminative Contrastive Learning For Class-Imbalanced Medical Images
Balanced And Discriminative Contrastive Learning For Class-I...
收藏 引用
international conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xuewei Li Yilong Fan Hao Zheng Jie Gao Xi Wei Mei Yu College of Intelligence and Computing Tianjin University Tianjin China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China Tianjin Key Laboratory of Advanced Networking Tianjin China School of Feature Technology Tianjin University Tianjin China Tianjin Medical University Cancer Institute and Hospital Tianjin China
The class imbalance problem, which is prevalent in medical image datasets, seriously affects the diagnostic effectiveness of deep learning-based network models. Recently, the method based on two-stage learning has pro...
来源: 评论
Apptainer-Based Containers for Legacy and Platform Dependent Machine Learning Applications on HPC Systems
Apptainer-Based Containers for Legacy and Platform Dependent...
收藏 引用
ieee international conference on Big data
作者: Rajesh Pasupuleti Ravi Vadapalli Christopher Mader Victor J. Milenkovic Frost Institute for Data Science and Computing(IDSC) University of Miami Coral Gables Miami FL USA Department of Computer Science University of Miami Coral Gables Miami FL USA
Apptainer (Formerly known as Singularity) is a secure, portable, and easy-to-use container system that provides absolute trust and security. It is widely used across industry and academia and suitable for filling the ... 详细信息
来源: 评论
data-Driven Vulnerable Community Identification During Compound Disasters
Data-Driven Vulnerable Community Identification During Compo...
收藏 引用
ieee international conference on cognitive Machine Intelligence (CogMI)
作者: Jainil Anilkumar Patel Mohammadreza Akbari Lor Shu-Ching Chen Mei-Ling Shyu Steven Luis School of Science and Engineering University of Missouri-Kansas City Kansas City MO USA Data Science and Analytics Innovation Center (dSAIC) University of Missouri-Kansas City Kansas City MO USA Knight Foundation School of Computing and Information Sciences Florida International University Miami FL USA
This paper aims to introduce research directions to identify vulnerable communities during compound disasters, such as the intersection of hurricanes and pandemics like COVID-19. We suggest integrating mobility, socio... 详细信息
来源: 评论
Quantum PC Algorithm: data-Efficient and Nonlinear Causal Discovery
Quantum PC Algorithm: Data-Efficient and Nonlinear Causal Di...
收藏 引用
Quantum computing and Engineering (QCE), ieee international conference on
作者: Yota Maeda Ken Arai Yu Tanaka Yu Terada Hiroshi Ueno Hiroyuki Tezuka Advanced Research Laboratory Research Platform Sony Group Corporation Tokyo Japan
Causal discovery is the task of finding causal relationships between random variables from observed data. Typically, one assumes that the causal relationships can be represented by a directed acyclic graph (DAG), and ... 详细信息
来源: 评论
A Multi-granularity Graph-based Representation for Image Recognition
A Multi-granularity Graph-based Representation for Image Rec...
收藏 引用
Power Electronics, Computer Applications (ICPECA), ieee international conference on
作者: Danfeng Lan Dawei Dai Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing China
Graph neural networks (GNNs) are specially designed to process graph data because of their ability to effectively capture complex structures and relationships within graphs. However, due to the pixel-based nature of i...
来源: 评论
PhD Forum: MalFormer001- Multimodal Transformer Fused Attention based Malware Detector
PhD Forum: MalFormer001- Multimodal Transformer Fused Attent...
收藏 引用
international conference on Smart computing (SMARTCOMP)
作者: Pradip Kunwar Department of Computer Science Tennessee Tech University Cookeville USA
Current systems, relying heavily on single-modality analysis, often fail to identify sophisticated malware such as zero-day attacks. Our proposed Malformer model offers a novel approach by integrating multiple data mo... 详细信息
来源: 评论
Demystifying Cyberattacks: Potential for Securing Energy Systems With Explainable AI
Demystifying Cyberattacks: Potential for Securing Energy Sys...
收藏 引用
international conference on computing, Networking and Communications (ICNC)
作者: Shuva Paul Sanjana Vijayshankar Richard Macwan Energy Security and Resilience National Renewable Energy Laboratory Golden Colorado USA
Modernization of energy systems has led to in-creased interactions among multiple critical infrastructures and diverse stakeholders making the challenge of operational decision making more complex and at times beyond ... 详细信息
来源: 评论
Leveraging In-Network computing and Programmable Switches for Streaming Analysis of Scientific data  7
Leveraging In-Network Computing and Programmable Switches fo...
收藏 引用
ieee 7th international conference on Network Softwarization (NetSoft) - Accelerating Network Softwarization in the cognitive Age
作者: Sankaran, Ganesh C. Chung, Joaquin Kettimuthu, Raj Univ Calif Davis Davis CA 95616 USA Argonne Natl Lab Lemont IL USA
With the emergence of programmable network devices that match the performance of fixed function devices, several recent projects have explored in-network computing, where the processing that is traditionally done outs... 详细信息
来源: 评论
StreamDP: Continual Observation of Real-world data Streams with Differential Privacy
StreamDP: Continual Observation of Real-world Data Streams w...
收藏 引用
ieee international conference on Performance, computing and Communications (IPCCC)
作者: Shuailou Li Yu Wen Zhaoyang Wang Wenbo Wang Lisong Zhang Dan Meng Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
The real-time collection and query analysis of dynamic data streams have become increasingly common and important, yet the protection of sensitive private information remains a pressing challenge. Differential privacy... 详细信息
来源: 评论
PowerHeat: A non-intrusive approach for estimating the power consumption of bare metal water-cooled servers
PowerHeat: A non-intrusive approach for estimating the power...
收藏 引用
ieee/ACM Int'l conference on & Int'l conference on Cyber, Physical and Social computing (CPSCom) Green computing and Communications (GreenCom)
作者: Maxime Agusti Eddy Caron Benjamin Fichel Laurent Lefèvre Olivier Nicol Anne-Cécile Orgerie OVHcloud France Inria Université de Lyon (UCBL Lyon1) CNRS ENS de Lyon LIP France Inria CNRS IRISA Univ. Rennes France
Numerous cloud providers offer physical servers for rental in bare metal paradigm. This mode gives customers total control over hardware resources, but limits cloud providers’ visibility of their usage. Accurately me... 详细信息
来源: 评论