咨询与建议

限定检索结果

文献类型

  • 2,959 篇 会议
  • 39 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 3,005 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,760 篇 工学
    • 1,407 篇 计算机科学与技术...
    • 684 篇 软件工程
    • 490 篇 电气工程
    • 397 篇 信息与通信工程
    • 203 篇 控制科学与工程
    • 130 篇 生物工程
    • 79 篇 电子科学与技术(可...
    • 65 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 54 篇 仪器科学与技术
    • 49 篇 光学工程
    • 34 篇 网络空间安全
    • 30 篇 动力工程及工程热...
    • 24 篇 材料科学与工程(可...
    • 24 篇 安全科学与工程
    • 22 篇 化学工程与技术
    • 20 篇 测绘科学与技术
    • 19 篇 石油与天然气工程
  • 517 篇 理学
    • 226 篇 物理学
    • 190 篇 数学
    • 143 篇 生物学
    • 58 篇 统计学(可授理学、...
    • 40 篇 系统科学
    • 27 篇 化学
  • 203 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 81 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 135 篇 医学
    • 112 篇 临床医学
    • 38 篇 基础医学(可授医学...
  • 37 篇 法学
    • 20 篇 社会学
  • 18 篇 文学
  • 14 篇 农学
  • 10 篇 教育学
  • 9 篇 经济学
  • 2 篇 军事学

主题

  • 590 篇 neural networks
  • 173 篇 training
  • 168 篇 artificial neura...
  • 165 篇 deep learning
  • 135 篇 computational mo...
  • 124 篇 feature extracti...
  • 115 篇 neural network
  • 114 篇 convolutional ne...
  • 88 篇 machine learning
  • 87 篇 neurons
  • 86 篇 parallel process...
  • 79 篇 deep neural netw...
  • 74 篇 computer archite...
  • 73 篇 distributed comp...
  • 65 篇 signal processin...
  • 62 篇 distributed proc...
  • 62 篇 accuracy
  • 60 篇 recurrent neural...
  • 55 篇 data models
  • 50 篇 convolutional ne...

机构

  • 11 篇 institute of inf...
  • 9 篇 school of cyber ...
  • 8 篇 univ chinese aca...
  • 8 篇 natl univ def te...
  • 7 篇 college of compu...
  • 7 篇 carnegie mellon ...
  • 7 篇 national laborat...
  • 7 篇 beijing universi...
  • 7 篇 natl univ def te...
  • 6 篇 shanghai jiao to...
  • 6 篇 the islamic univ...
  • 6 篇 department of co...
  • 5 篇 science and tech...
  • 5 篇 ibm tj watson re...
  • 5 篇 school of inform...
  • 5 篇 king saud univer...
  • 5 篇 shandong normal ...
  • 5 篇 kaust thuwal
  • 5 篇 university of ch...
  • 5 篇 natl univ def te...

作者

  • 8 篇 li dongsheng
  • 8 篇 dou yong
  • 8 篇 jie liu
  • 6 篇 richtarik peter
  • 6 篇 ribeiro alejandr...
  • 6 篇 liu jie
  • 6 篇 niu xin
  • 6 篇 yong dou
  • 6 篇 shulian yang
  • 6 篇 zhang wei
  • 5 篇 ryabinin max
  • 5 篇 segarra santiago
  • 5 篇 lai zhiquan
  • 5 篇 ding bo
  • 5 篇 qiao peng
  • 5 篇 xu jiren
  • 5 篇 kokkinos yiannis
  • 5 篇 peng yuxing
  • 5 篇 wang huaimin
  • 5 篇 li aiping

语言

  • 2,925 篇 英文
  • 72 篇 其他
  • 8 篇 中文
  • 2 篇 土耳其文
检索条件"任意字段=Conference on Neural Network and Distributed Processing"
3005 条 记 录,以下是1001-1010 订阅
排序:
Wireless Traffic Prediction with Series Fluctuation Pattern Clustering
Wireless Traffic Prediction with Series Fluctuation Pattern ...
收藏 引用
IEEE International conference on Communications (ICC)
作者: Xing, Xudong Lin, Yuanjie Gao, Hui Lu, Yueming Beijing Univ Posts & Telecommun Key Lab Trustworthy Distributed Comp & Serv Minist Educ Beijing 100876 Peoples R China
Accurate traffic prediction is vital in intelligent wireless network, which enables intelligent operation to improve the quality of experience of users. In this paper, we propose a wireless traffic prediction architec... 详细信息
来源: 评论
Malicious URL Detection with distributed Representation and Deep Learning  21
Malicious URL Detection with Distributed Representation and ...
收藏 引用
21st International conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2022
作者: Do, Nguyet Quang Selamat, Ali Lim, Kok Cheng Krejcar, Ondrej Universiti Teknologi Malaysia Kuala Lumpur Malaysia School of Computing Faculty of Engineering Universiti Teknologi Malaysia Johor Bahru Malaysia Universiti Teknologi Malaysia Johor Bahru Malaysia Center for Basic and Applied Research Faculty of Informatics and Management University of Hradec Kralove Rokitanskeho 62 Hradec Kralove500 03 Czech Republic Kajang Malaysia
There exist numerous solutions to detect malicious URLs based on Natural Language processing and machine learning technologies. However, there is a lack of comparative analysis among approaches using distributed repre... 详细信息
来源: 评论
Data compression methods based on neural networks  5
Data compression methods based on Neural Networks
收藏 引用
5th International conference on Future networks and distributed Systems: The Premier conference on Smart Next Generation networking Technologies, ICFNDS 2021
作者: Berezkin, Aleksandr Slepnev, Alexey Kirichek, Ruslan Kukunin, Dmitry Matveev, Daniil Bonch-Bruevich Saint-Petersburg State University of Telecommunications Saint-Petersburg Russia
The modern stage of the development of telecommunication systems is characterized by the widespread development of wired and wireless data transmission networks. The growth in the number of users of such networks, the... 详细信息
来源: 评论
A Deep Learning Framework by Leveraging CNN and LSTM Hybridization for Effective DDoS Attack Detection in IoT Environments
A Deep Learning Framework by Leveraging CNN and LSTM Hybridi...
收藏 引用
Next Generation Communication & Information processing (INCIP), International conference on
作者: S. Sathiya Devi K. Lalitha Department of Computer Science and Engineering University College of Engineering BIT Campus Anna University Tiruchirappalli India Department of Computer Science and Engineering Kongunadu College of Engineering and Technology Tiruchirappalli India
distributed Denial of Service (DDoS) attacks represent the biggest threat towards the security and stability of IoT networks, and they can even cause a server crash, severely affecting services for users. Increased gr... 详细信息
来源: 评论
Analysis of Real-Time Hostile Activitiy Detection from Spatiotemporal Features Using Time distributed Deep CNNs, RNNs and Attention-Based Mechanisms  5
Analysis of Real-Time Hostile Activitiy Detection from Spati...
收藏 引用
5th IEEE International conference on Image processing Applications and Systems (IPAS)
作者: Siddique, Labib Ahmed Junhai, Rabita Reza, Tanzim Khan, Salman Sayeed Rahman, Tanvir BRAC Univ Dept Comp Sci & Engn 66 Mohakhali Dhaka 1212 Bangladesh Univ Delaware Coll Engn Dept Comp & Informat Sci Newark DE 19716 USA
Real-time video surveillance, through CCTV camera systems has become essential for ensuring public safety which is a priority today. Although CCTV cameras help a lot in increasing security, these systems require const... 详细信息
来源: 评论
Architecture of a Multistage Anomaly Detection System in Computer networks
Architecture of a Multistage Anomaly Detection System in Com...
收藏 引用
Siberian conference on Control and Communications (SIBCON)
作者: Mikhail Grekov Department of Information Security Tula State University Tula Russia
The operation of anomaly detection systems in modern computer networks, as a rule, is associated with the processing of large amounts of traffic. With the increase in the scale of computer networks and the growing com... 详细信息
来源: 评论
Text Classification In The Wild: A Large-Scale Long-Tailed Name Normalization Dataset
Text Classification In The Wild: A Large-Scale Long-Tailed N...
收藏 引用
International conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Jiexing Qi Shuhao Li Zhixin Guo Yusheng Huang Chenghu Zhou Weinan Zhang Xinbing Wang Zhouhan Lin Shanghai Jiao Tong University Shanghai China IGSNRR Chinese Academy of Sciences Beijing China
Real-world data usually exhibits a long-tailed distribution, with a few frequent labels and a lot of few-shot labels. The study of institution name normalization is a perfect application case showing this phenomenon: ... 详细信息
来源: 评论
Enhancing Small Object Detection in Aerial Imagery Based on Strong Feature Extraction and Batch Dimension
Enhancing Small Object Detection in Aerial Imagery Based on ...
收藏 引用
International Joint conference on neural networks (IJCNN)
作者: Bingnan Cao Di Wang Ying Guo Hu Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China The Institute of Data Science City University of Macau Macau China
Object detection is a fundamental component of computer vision, playing a pivotal role in various applications. However, the accurate detection of small and densely distributed objects remains a challenging problem in... 详细信息
来源: 评论
Delayed algorithms for distributed stochastic weakly convex optimization  23
Delayed algorithms for distributed stochastic weakly convex ...
收藏 引用
Proceedings of the 37th International conference on neural Information processing Systems
作者: Wenzhi Gao Qi Dengt Stanford University Shanghai University of Finance and Economics
This paper studies delayed stochastic algorithms for weakly convex optimization in a distributed network with workers connected to a master node. Recently, Xu et al. 2022 showed that an inertial stochastic subgradient...
来源: 评论
50th International conference on Parallel processing Workshop, ICPP 2021 - Proceedings
50th International Conference on Parallel Processing Worksho...
收藏 引用
50th International conference on Parallel processing Workshop, ICPP 2021
The proceedings contain 38 papers. The topics discussed include: automated arrhythmia detection using Hilbert-Huang transform based convolutional neural network;self-stabilization with selfish agents;new evacuation gu...
来源: 评论