咨询与建议

限定检索结果

文献类型

  • 5,639 篇 会议
  • 266 册 图书
  • 113 篇 期刊文献

馆藏范围

  • 6,018 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 4,085 篇 工学
    • 3,146 篇 计算机科学与技术...
    • 2,588 篇 软件工程
    • 665 篇 信息与通信工程
    • 485 篇 控制科学与工程
    • 411 篇 生物工程
    • 382 篇 电气工程
    • 321 篇 机械工程
    • 287 篇 光学工程
    • 282 篇 生物医学工程(可授...
    • 226 篇 电子科学与技术(可...
    • 184 篇 材料科学与工程(可...
    • 180 篇 化学工程与技术
    • 157 篇 动力工程及工程热...
    • 152 篇 交通运输工程
    • 152 篇 安全科学与工程
    • 144 篇 土木工程
  • 1,799 篇 理学
    • 1,059 篇 数学
    • 447 篇 生物学
    • 416 篇 物理学
    • 222 篇 统计学(可授理学、...
    • 189 篇 系统科学
    • 156 篇 化学
  • 983 篇 管理学
    • 675 篇 管理科学与工程(可...
    • 341 篇 工商管理
    • 341 篇 图书情报与档案管...
  • 238 篇 教育学
    • 233 篇 教育学
  • 220 篇 医学
    • 193 篇 临床医学
    • 178 篇 基础医学(可授医学...
  • 186 篇 法学
    • 153 篇 社会学
  • 150 篇 经济学
    • 149 篇 应用经济学
  • 119 篇 艺术学
  • 76 篇 农学
  • 38 篇 文学
  • 9 篇 军事学
  • 8 篇 历史学
  • 4 篇 哲学

主题

  • 214 篇 software enginee...
  • 162 篇 programming
  • 136 篇 software enginee...
  • 127 篇 linear programmi...
  • 126 篇 artificial intel...
  • 126 篇 accuracy
  • 110 篇 deep learning
  • 103 篇 feature extracti...
  • 101 篇 dynamic programm...
  • 93 篇 computational mo...
  • 93 篇 semantics
  • 88 篇 training
  • 86 篇 optimization
  • 81 篇 machine learning
  • 80 篇 computer communi...
  • 77 篇 computer science
  • 77 篇 programming tech...
  • 72 篇 integer programm...
  • 72 篇 convolutional ne...
  • 70 篇 programming lang...

机构

  • 20 篇 chitkara univers...
  • 15 篇 school of inform...
  • 12 篇 school of comput...
  • 12 篇 school of comput...
  • 10 篇 college of compu...
  • 10 篇 school of inform...
  • 10 篇 university of ch...
  • 10 篇 school of cyber ...
  • 10 篇 univ potsdam has...
  • 10 篇 univ sumatera ut...
  • 9 篇 school of comput...
  • 9 篇 the hong kong un...
  • 9 篇 school of comput...
  • 9 篇 univ calgary dep...
  • 8 篇 college of infor...
  • 8 篇 school of transp...
  • 8 篇 school of data s...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 college of compu...

作者

  • 11 篇 hirschfeld rober...
  • 11 篇 maurer frank
  • 11 篇 yang li
  • 10 篇 li yang
  • 10 篇 mawengkang herma...
  • 8 篇 stuckey peter j.
  • 8 篇 holcombe mike
  • 7 篇 wang jing
  • 7 篇 kukreja vinay
  • 7 篇 hoos holger h.
  • 7 篇 beck j. christop...
  • 7 篇 zhang wei
  • 6 篇 liu bo
  • 6 篇 yan jun
  • 6 篇 huang min
  • 6 篇 liu bing
  • 6 篇 lo david
  • 6 篇 michael r. lyu
  • 6 篇 wang jun
  • 5 篇 wang lei

语言

  • 5,438 篇 英文
  • 565 篇 其他
  • 44 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=4th International Conference on the Art Science and Engineering of Programming"
6018 条 记 录,以下是491-500 订阅
排序:
Blur-ASKNet: An Effective Network for Remote Sensing Image Classification Capturing Joint Features  4
Blur-ASKNet: An Effective Network for Remote Sensing Image C...
收藏 引用
4th international conference on Computer Vision, Image and Deep Learning, CVIDL 2023
作者: Liu, Tengfei Wang, Qi Hao, Guocheng School of Computer Science University of Geosciences Wuhan China China University of Geosciences Department of Automation Wuhan China China University of Geosciences Department of Communication Engineering China Wuhan China
Remote sensing image classification faces two major challenges: the intra-class variability and inter-class similarity. Consequently, it is more challenging for classification neural networks to extract discriminant f... 详细信息
来源: 评论
Salient Object Detection via Hybrid Encoder and Feature Feedback Fusion Mechanism  4
Salient Object Detection via Hybrid Encoder and Feature Feed...
收藏 引用
4th international conference on Computer Vision, Image and Deep Learning, CVIDL 2023
作者: Li, Xueliang School of Information and Control Engineering Qingdao University of Technology Qingdao266000 China
Deep encoder-decoder networks have been adopted for saliency detection and achieved the state-of-the-art performance. However, most existing saliency methods usually fail to process images with complex background and ... 详细信息
来源: 评论
FREE FROM BELLMAN COMPLETENESS: TRAJECTORY STITCHING VIA MODEL-BASED RETURN-CONDITIONED SUPERVISED LEARNING  12
FREE FROM BELLMAN COMPLETENESS: TRAJECTORY STITCHING VIA MOD...
收藏 引用
12th international conference on Learning Representations, ICLR 2024
作者: Zhou, Zhaoyi Zhu, Chuning Zhou, Runlong Cui, Qiwen Gupta, Abhishek Du, Simon S. Institute for Interdisciplinary Information Sciences Tsinghua University China Paul G. Allen School of Computer Science and Engineering University of Washington United States
Off-policy dynamic programming (DP) techniques such as Q-learning have proven to be important in sequential decision-making problems. In the presence of function approximation, however, these techniques often diverge ... 详细信息
来源: 评论
Extracting Behavior Events from Epidemic Daily Reports by Combining Deep Learning and Adversarial Training  4
Extracting Behavior Events from Epidemic Daily Reports by Co...
收藏 引用
4th international conference on Computer, Big Data and artificial Intelligence, ICCBD+AI 2023
作者: Lin, Shaofu Zhou, Shiwei Xu, Zhe Chen, Jianhui Faculty of Information Technology Beijing University of Technology Beijing China Beijing University of Technology Beijing International Collaboration Base on Brain Informatics and Wisdom Services Beijing China Beijing University of Technology Beijing Key Laboratory of Mri and Brain Informatics Beijing China Ministry of Education Engineering Research Center of Intelligent Perception and Autonomous Control Beijing China Ministry of Education Engineering Research Center of Digital Community Beijing China
Extracting emergencies from network information has become an important means of public security. However, existing event extraction methods rely on large-scale annotated corpora and are difficult to be effectively ap... 详细信息
来源: 评论
Study on the temporal-spatial evolution process of axial preformed fragment power field  4
Study on the temporal-spatial evolution process of axial pre...
收藏 引用
4th international conference on Defence Technology, ICDT 2024
作者: Hao, Ruijie Yi, Jianya Guan, Siman School of Mechatronic Engineering North University of China Taiyuan030051 China
the temporal-spatial evolution process of fragment power field is the basis for calculating the state of fragment-target encounter and damage assessment. In order to accurately describe the temporal-spatial evolution ... 详细信息
来源: 评论
Commercial and Research-Based Wearable Devices in Spinal Postural Analysis: A Systematic Review  10th
Commercial and Research-Based Wearable Devices in Spinal P...
收藏 引用
10th EAI international conference on IoT Technologies for Health-Care, HealthyIoT 2023, and 4th EAI international conference on Wearables in Healthcare, HealthWear 2023
作者: Pourshahrokhi, Narges Sun, Yitong Asadipour, Ali Computer Science Research Centre Royal College of Art London United Kingdom
the widespread use of ubiquitous computing has led to people spending more time in front of screens, causing poor posture. the COVID-19 pandemic and the shift towards remote work have only worsened the situa... 详细信息
来源: 评论
Research and Development of Reducer Virtual Simulation System Based on Mixed Reality (MR) Technology  4
Research and Development of Reducer Virtual Simulation Syste...
收藏 引用
4th international conference on Applied Mathematics, Modeling and Computer Simulation, AMMCS 2024
作者: Liang, Feng Liu, Junying College of Mechanical and Electrical Engineering Heyuan Polytechnic GuangDong HeYuan517000 China
In order to improve learning pleasure and save teaching costs, this paper uses MR technology to research and develop the virtual simulation system of reducer. Take the primary reducer and the secondary reducer as the ... 详细信息
来源: 评论
Analysis and Comparison of Symmetric Key Cryptographic Algorithms on FPGA  4
Analysis and Comparison of Symmetric Key Cryptographic Algor...
收藏 引用
4th international conference on Smart Systems and Inventive Technology, ICSSIT 2022
作者: Anusha, R. Shankari, N. Shetty, Vaishnavi S. Srikanth Bhat, K. Dept. of Electronics and Communication Engineering NMAM Institute of Technology Nitte India Dept. of Information Science and Engineering NMAM Institute of Technology Nitte India
Data security is considered as one of the prime concern for every communication systems. Cryptography has come up as a resolution which plays a dynamic role in data security against various data attacks. the cryptogra... 详细信息
来源: 评论
Research on Distribution Network Planning with Distributed Generation Considering Line Margin  4
Research on Distribution Network Planning with Distributed G...
收藏 引用
4th international conference on Advanced Electrical and Energy Systems, AEES 2023
作者: Gao, Liping She, Yanjie Zhu, Lili Zhang, Jiangtao Wang, Jing Xu, Wentao Cai, Pengcheng Mi, Yang State Grid Luoyang Power Supply Company Henan China Shanghai Ocean University School of Information Shanghai China Shanghai University of Electric Power College of Electrical Engineering Shanghai China
the current planning for large-scale photovoltaic integration into the distribution network needs to balance electricity and transmission capacity, and the strategy of energy storage distribution network joint plannin... 详细信息
来源: 评论
Realization of Virtual Laboratory Application and Prototype for a Mechatronic Mechanism with Arduino Uno Board Programmed for a Customized Security Application  4th
Realization of Virtual Laboratory Application and Prototype ...
收藏 引用
4th international conference on Reliable Systems engineering, ICoRSE 2024
作者: Munteanu, Iulian Sorin Ungureanu, Liviu Marian Petrescu, Cristian Badea, Florentina Apostolescu, Tudor-Catalin Văleanu, Dana Mirela National University of Science and Technology Politehnica 313 Splaiul Independentei Bucharest Romania National Institute of Research-Development in Mechatronics and Measurement Technique - INCDMTM Bucharest Sos. Pantelimon 6-8 sector 2 Bucharest021631 Romania Titu Maiorescu University Corp M 189 Calea Vacaresti Bucharest0400511 Romania
In this work, the modeling and simulation of a mechatronic mechanism with the Arduino UNO board that ensures the security of a box of goods, through the virtual application TINKERCAD, was carried out. For the modeling... 详细信息
来源: 评论