咨询与建议

限定检索结果

文献类型

  • 13,377 篇 会议
  • 17 篇 期刊文献

馆藏范围

  • 13,394 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,105 篇 工学
    • 6,398 篇 计算机科学与技术...
    • 5,095 篇 软件工程
    • 1,730 篇 信息与通信工程
    • 1,008 篇 控制科学与工程
    • 735 篇 生物工程
    • 721 篇 电气工程
    • 667 篇 生物医学工程(可授...
    • 582 篇 网络空间安全
    • 511 篇 光学工程
    • 451 篇 安全科学与工程
    • 398 篇 电子科学与技术(可...
    • 344 篇 交通运输工程
    • 328 篇 动力工程及工程热...
    • 288 篇 机械工程
    • 267 篇 仪器科学与技术
  • 2,667 篇 理学
    • 1,298 篇 数学
    • 879 篇 生物学
    • 637 篇 统计学(可授理学、...
    • 535 篇 物理学
    • 328 篇 系统科学
    • 242 篇 化学
  • 1,877 篇 管理学
    • 1,300 篇 管理科学与工程(可...
    • 789 篇 图书情报与档案管...
    • 573 篇 工商管理
  • 947 篇 医学
    • 687 篇 临床医学
    • 681 篇 基础医学(可授医学...
    • 659 篇 公共卫生与预防医...
    • 264 篇 药学(可授医学、理...
  • 508 篇 法学
    • 471 篇 社会学
  • 262 篇 经济学
    • 262 篇 应用经济学
  • 223 篇 农学
  • 210 篇 教育学
  • 198 篇 文学
  • 9 篇 军事学
  • 1 篇 艺术学

主题

  • 2,085 篇 accuracy
  • 1,690 篇 deep learning
  • 1,198 篇 machine learning
  • 1,188 篇 computational mo...
  • 1,044 篇 training
  • 1,026 篇 data models
  • 968 篇 predictive model...
  • 724 篇 real-time system...
  • 687 篇 convolutional ne...
  • 685 篇 feature extracti...
  • 676 篇 machine learning...
  • 585 篇 support vector m...
  • 532 篇 federated learni...
  • 485 篇 adversarial mach...
  • 330 篇 contrastive lear...
  • 311 篇 medical services
  • 295 篇 random forests
  • 289 篇 analytical model...
  • 278 篇 prediction algor...
  • 271 篇 neural networks

机构

  • 105 篇 lovely professio...
  • 101 篇 chitkara univers...
  • 57 篇 department of co...
  • 47 篇 school of comput...
  • 45 篇 school of comput...
  • 45 篇 department of co...
  • 44 篇 department of co...
  • 42 篇 the islamic univ...
  • 40 篇 shandong provinc...
  • 36 篇 college of compu...
  • 32 篇 university of ch...
  • 28 篇 department of co...
  • 27 篇 department of co...
  • 26 篇 computer science...
  • 26 篇 graphic era deem...
  • 25 篇 department of co...
  • 25 篇 amrita vishwa vi...
  • 25 篇 the islamic univ...
  • 23 篇 department of co...
  • 23 篇 college of intel...

作者

  • 23 篇 satvik vats
  • 18 篇 shiva mehta
  • 18 篇 kukreja vinay
  • 18 篇 vats satvik
  • 17 篇 anjali t.
  • 17 篇 rishabh sharma
  • 17 篇 deepak upadhyay
  • 16 篇 senthil kumar th...
  • 15 篇 singh jagendra
  • 15 篇 venugopalan manj...
  • 13 篇 manjunatha
  • 13 篇 rakesh kumar
  • 12 篇 ramya maranan
  • 11 篇 selvanayaki kola...
  • 11 篇 s. kaliappan
  • 10 篇 andersson karl
  • 10 篇 muthukumaravel a...
  • 10 篇 yang yang
  • 10 篇 ayodeji olalekan...
  • 10 篇 surendran r.

语言

  • 12,124 篇 英文
  • 1,269 篇 其他
  • 306 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=2024 International Conference on Computing, Machine Learning and Data Science, CMLDS 2024"
13394 条 记 录,以下是4921-4930 订阅
排序:
Edge Energy Orchestration  20th
Edge Energy Orchestration
收藏 引用
20th international conference on the Economics of Grids, Clouds, Systems, and Services, GECON 2024
作者: Kumar, Vijay Valizadeh, Nima Petri, Ioan Rana, Omer Nag, Ambarish Zisman, Sagi Tripp, Charles Paul, Shuva School of Computer Science and Informatics Cardiff University Cardiff United Kingdom School of Engineering Cardiff University Cardiff United Kingdom Colorado United States Colorado United States
Edge computing devices have increased in number and capability over recent years. The ability to process data and execute machine learning in proximity to data generation and collection sources provides several advant... 详细信息
来源: 评论
Knowledge-Enhanced Contextual Auction Design Based on Deep Neural Networks
Knowledge-Enhanced Contextual Auction Design Based on Deep N...
收藏 引用
2024 IEEE international conference on Cognitive computing and Complex data
作者: Liang, Mingxuan Guo, Zhibo Zhu, Junwu Zhang, Yuanyuan Li, Xueqing Yangzhou Univ Dept Informat Engn Yangzhou Jiangsu Peoples R China
The optimal auction represents a fundamental challenge in auction design, primarily focused on maximizing the seller's revenue. Recently, context-aware auction design has gained traction as it enhances the model&#... 详细信息
来源: 评论
Towards an Efficient DDoS Attack Detection in SDN: An Approach with CNN-GRU Fusion  4
Towards an Efficient DDoS Attack Detection in SDN: An Approa...
收藏 引用
4th international conference on Advances in Electrical, computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Goud, Konda Srikar Rao, Giduturi Srinivasa Gitam University Gitam School of Technology Department of Computer Science and Engineering AP Visakhapatnam India Bvrit Hyderabad College of Engineering for Women Telangana Hyderabad India
The emergence of Distributed Denial of Service (DDoS) attacks presents a significant risk to Software-Defined Networking (SDN) services. This study focuses on developing an effective method for detecting DDoS attacks ... 详细信息
来源: 评论
Advanced Deep learning Approaches for Real-Time Anomaly Detection in IoT Environments  7
Advanced Deep Learning Approaches for Real-Time Anomaly Dete...
收藏 引用
7th international conference on Contemporary computing and Informatics, IC3I 2024
作者: Goyal, Himanshu Rai Husain, Saif O. Dixit, Krishna Kant Boob, Nandini Shirish Reddy, B. Ravali Kumar, Jaysheel Sharma, Smita Graphic Era Deemed to be University Department of Computer Science & Engineering Dehradun India The Islamic university College of technical engineering Department of computers Techniques engineering Najaf Iraq Gla University Department of Electrical Engineering Mathura India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Tamilnadu Chennai India Mlr Institute of Technology Department of Computer Science and Engineering Telangana Hyderabad India New Horizon College of Engineering Bangalore India Amity University Amity School of Engineering & Technology Uttar Pradesh Greater Noida India
The proliferation of Internet of Things (IoT) systems has led to the generation of vast amounts of data, increasing the need for effective anomaly detection mechanisms to ensure system reliability and security. Tradit... 详细信息
来源: 评论
FedZipper: A Layer-wise Quantization Compression Framework for Federated learning with Statistical Heterogeneity  20th
FedZipper: A Layer-wise Quantization Compression Framework f...
收藏 引用
20th IFIP WG 10.3 international conference on Network and Parallel computing, NPC 2024
作者: Du, Haizhou Peng, Yan Shanghai University of Electric Power Shanghai China
Quantization is a common compression scheme for reducing traffic in federated learning that converts data from floating-point numbers to a low-precision representation. Existing quantization approaches typically apply... 详细信息
来源: 评论
Unsupervised Nonlinear Deformable Registration Network for 4D CT Lung Imaging  25
Unsupervised Nonlinear Deformable Registration Network for 4...
收藏 引用
25th international conference on Digital Image computing: Techniques and Applications, DICTA 2024
作者: Iqbal, M Zafar Ulhaq, Anwaar Razzak, Imran School of Engineering and Technology Central Queensland University Sydney Australia School of Computer Science and Engineering University of New South Wales Sydney Australia
Deformable image registration is crucial in various image-guided radiation therapy applications, particularly in registering computed tomography (CT) lung image modalities during extreme inspiration and expiration pha... 详细信息
来源: 评论
A Hybrid Deep learning Approach for Bone Defect Detection using DCGAN and CNN  1
A Hybrid Deep Learning Approach for Bone Defect Detection us...
收藏 引用
1st international conference on Technological Innovations and Advance computing, TIACOMP 2024
作者: Pundir, Brajesh Singh Kumar, Rakesh Gupta, Meenu Obaid, Ahmed J. Chandigarh University Department of Cse Punjab India University of Kufa Faculty of Computer Science and Mathematics Dept of Computer Science Najaf Iraq National University of Science and Technology Dhi Qar Iraq
Bone fractures, caused by accidental traumas and medical disorders, can harm the human skeletal system, which provides structural support and protects vital organs. Leveraging Synthetic Image Generation via Generative... 详细信息
来源: 评论
Span-Based Chinese Few-Shot NER with Contrastive and Prompt learning  13th
Span-Based Chinese Few-Shot NER with Contrastive and Prompt ...
收藏 引用
13th international conference on Natural Language Processing and Chinese computing
作者: Ye, Feiyang Lai, Peichao Yang, Sanhe Zhang, Zhengfeng Wang, Yilei Fuzhou Univ Coll Comp & Data Sci Fuzhou Peoples R China
For Chinese Named Entity Recognition (NER) tasks, achieving better performance with fewer training samples remains a challenge. Previous works primarily focus on enhancing model performance in NER by incorporating add... 详细信息
来源: 评论
A Secure Certificateless Multi-signature Scheme for Wireless Sensor Networks  24
A Secure Certificateless Multi-signature Scheme for Wireless...
收藏 引用
8th international conference on machine learning and Soft computing, ICMLSC 2024
作者: Lin, Han-Yu Tsai, Tung-Tso Hsu, Jing-Yu Department of Computer Science and Engineering National Taiwan Ocean University Taiwan
In the application of wireless sensor networks (WSNs), lots of deployed sensor nodes will forward authenticated message to a base station for verification. The technique of data aggregation is thus become important, s... 详细信息
来源: 评论
Visual malware classification and detection method based on convolutional neural network  9
Visual malware classification and detection method based on ...
收藏 引用
9th IEEE international conference on data science in Cyberspace, DSC 2024
作者: Huang, Hua Sheng, Hua Han, Xingwang Zhang, Wenbin Zhao, Zilin State Grid Shandong Electric Power Company Information and Telecommunications Company Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
With the rapid development of Internet technology, leading to the evolution of malware variants, and malicious threats are also increasing. Therefore, rapid and accurate classification of malware becomes crucial. In r... 详细信息
来源: 评论