咨询与建议

限定检索结果

文献类型

  • 2,959 篇 会议
  • 39 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 3,005 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,760 篇 工学
    • 1,407 篇 计算机科学与技术...
    • 684 篇 软件工程
    • 490 篇 电气工程
    • 397 篇 信息与通信工程
    • 203 篇 控制科学与工程
    • 130 篇 生物工程
    • 79 篇 电子科学与技术(可...
    • 65 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 54 篇 仪器科学与技术
    • 49 篇 光学工程
    • 34 篇 网络空间安全
    • 30 篇 动力工程及工程热...
    • 24 篇 材料科学与工程(可...
    • 24 篇 安全科学与工程
    • 22 篇 化学工程与技术
    • 20 篇 测绘科学与技术
    • 19 篇 石油与天然气工程
  • 517 篇 理学
    • 226 篇 物理学
    • 190 篇 数学
    • 143 篇 生物学
    • 58 篇 统计学(可授理学、...
    • 40 篇 系统科学
    • 27 篇 化学
  • 203 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 81 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 135 篇 医学
    • 112 篇 临床医学
    • 38 篇 基础医学(可授医学...
  • 37 篇 法学
    • 20 篇 社会学
  • 18 篇 文学
  • 14 篇 农学
  • 10 篇 教育学
  • 9 篇 经济学
  • 2 篇 军事学

主题

  • 590 篇 neural networks
  • 173 篇 training
  • 168 篇 artificial neura...
  • 165 篇 deep learning
  • 135 篇 computational mo...
  • 124 篇 feature extracti...
  • 115 篇 neural network
  • 114 篇 convolutional ne...
  • 88 篇 machine learning
  • 87 篇 neurons
  • 86 篇 parallel process...
  • 79 篇 deep neural netw...
  • 74 篇 computer archite...
  • 73 篇 distributed comp...
  • 65 篇 signal processin...
  • 62 篇 distributed proc...
  • 62 篇 accuracy
  • 60 篇 recurrent neural...
  • 55 篇 data models
  • 50 篇 convolutional ne...

机构

  • 11 篇 institute of inf...
  • 9 篇 school of cyber ...
  • 8 篇 univ chinese aca...
  • 8 篇 natl univ def te...
  • 7 篇 college of compu...
  • 7 篇 carnegie mellon ...
  • 7 篇 national laborat...
  • 7 篇 beijing universi...
  • 7 篇 natl univ def te...
  • 6 篇 shanghai jiao to...
  • 6 篇 the islamic univ...
  • 6 篇 department of co...
  • 5 篇 science and tech...
  • 5 篇 ibm tj watson re...
  • 5 篇 school of inform...
  • 5 篇 king saud univer...
  • 5 篇 shandong normal ...
  • 5 篇 kaust thuwal
  • 5 篇 university of ch...
  • 5 篇 natl univ def te...

作者

  • 8 篇 li dongsheng
  • 8 篇 dou yong
  • 8 篇 jie liu
  • 6 篇 richtarik peter
  • 6 篇 ribeiro alejandr...
  • 6 篇 liu jie
  • 6 篇 niu xin
  • 6 篇 yong dou
  • 6 篇 shulian yang
  • 6 篇 zhang wei
  • 5 篇 ryabinin max
  • 5 篇 segarra santiago
  • 5 篇 lai zhiquan
  • 5 篇 ding bo
  • 5 篇 qiao peng
  • 5 篇 xu jiren
  • 5 篇 kokkinos yiannis
  • 5 篇 peng yuxing
  • 5 篇 wang huaimin
  • 5 篇 li aiping

语言

  • 2,925 篇 英文
  • 72 篇 其他
  • 8 篇 中文
  • 2 篇 土耳其文
检索条件"任意字段=Conference on Neural Network and Distributed Processing"
3005 条 记 录,以下是1031-1040 订阅
排序:
Self-supervised Image Denoising with Downsampled Invariance Loss and Conditional Blind-Spot network
Self-supervised Image Denoising with Downsampled Invariance ...
收藏 引用
International conference on Computer Vision (ICCV)
作者: Yeong Il Jang Keuntek Lee Gu Yong Park Seyun Kim Nam Ik Cho Department of ECE INMC Seoul National University Seoul Korea Gauss Labs Inc. IPAI Seoul National University Seoul Korea
There have been many image denoisers using deep neural networks, which outperform conventional model-based methods by large margins. Recently, self-supervised methods have attracted attention because constructing a la...
来源: 评论
Image reconstruction attacks on distributed machine learning models  2
Image reconstruction attacks on distributed machine learning...
收藏 引用
2nd ACM International Workshop on distributed Machine Learning, distributedML 2021, co-located with the 17th International conference on emerging networking EXperiments and Technologies, CoNEXT 2021
作者: Benkraouda, Hadjer Nahrstedt, Klara University of Illinois at Urbana-Chamapaign ChamapaignIL United States
Recent developments in Deep neural networks have resulted in their wide deployment for services around many aspects of human life, including security critical domains that handle sensitive data. Congruently, we have s... 详细信息
来源: 评论
Analysis of Effective E-Commerce Coordination Big Data processing Strategies under Infinite Deep neural network Topology
Analysis of Effective E-Commerce Coordination Big Data Proce...
收藏 引用
Communications Technology and Computer Science (ACCTCS), Asia-Pacific conference on
作者: Ailing Zhang Fuxiao Yao Shandong Vocational and Technical University of International Studies Rizhao Shandong China
This paper researches and analyses the effective e-commerce coordination big data processing strategy through the infinite-depth neural network topology. This paper firstly proposes a neural network training model Neu... 详细信息
来源: 评论
Enhancing Cloud Storage Security with Intrusion Detection System using CNN and Grey Wolf Optimization Algorithm
Enhancing Cloud Storage Security with Intrusion Detection Sy...
收藏 引用
Sustainable Computing and Data Communication Systems (ICSCDS), International conference on
作者: G. Eswari G.K. Monica V. Deepak K.M. Sunil B. Prem Kumar Department of Information Technology Velammal Institute of Technology Panchetti Chennai India
Cloud Computing (CC) is the preference of all information technology (IT) organizations as it offers pay-per-use based and flexible services to its users. But the privacy and security become the main hindrances in its... 详细信息
来源: 评论
CWAI-CNER: Chinese entity recognition based on adaptive incorporation of characters and words
CWAI-CNER: Chinese entity recognition based on adaptive inco...
收藏 引用
IEEE International conference on Consumer Electronics and Computer Engineering (ICCECE)
作者: Peng, Pai Wu, Xu Xie, Xiaqing Wu, Jingchen BUPT Key Lab Trustworthy Distributed Comp & Serv Sch Cyberspace Secur Minist Educ Beijing Peoples R China BUPT Sch Cyberspace Secur Key Lab Trustworthy Distributed Comp & Serv Beijing Univ Posts & Telecommun LibMinist Educ Beijing Peoples R China
Chinese Named hint Recognition (CNER) is an portantant sub topic in the field of Chinese Natural Language processing. which plays an important role in multi tasks. however. it's difficult to determine the boundari... 详细信息
来源: 评论
A Graph Convolution neural network Based Method for Insider Threat Detection
A Graph Convolution Neural Network Based Method for Insider ...
收藏 引用
IEEE International conference on Big Data and Cloud Computing (BdCloud)
作者: Kexiong Fei Jiang Zhou Lin Su Weiping Wang Yong Chen Fan Zhang School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Computer Science Texas Tech University Lubbock USA Information Technology Center China Mobile Beijing China
In this research, we propose Log2Graph, a new insider threat detection method based on graph convolution neural network (GCN). This method first retrieves the corresponding logs and features from log files through fea... 详细信息
来源: 评论
Towards Crowdsourced Training of Large neural networks using Decentralized Mixture-of-Experts  34
Towards Crowdsourced Training of Large Neural Networks using...
收藏 引用
34th conference on neural Information processing Systems (NeurIPS)
作者: Ryabinin, Max Gusev, Anton Natl Res Univ Higher Sch Econ Yandex St Petersburg Russia
Many recent breakthroughs in deep learning were achieved by training increasingly larger models on massive datasets. However, training such models can be prohibitively expensive. For instance, the cluster used to trai... 详细信息
来源: 评论
Higher Reconstruction Performance with Dual Deep neural networks for Wireless Sensor networks Compressed Temporal Signals
Higher Reconstruction Performance with Dual Deep Neural Netw...
收藏 引用
IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
作者: Sébastien Rousseau Romain Négrier Fabien Courreges Frank Itoua Engoti Raymond Quéré XLIM Institute University of Limoges Brive-la-Gaillarde France NAIoBEE company Brive-la-Gaillarde France
In many applications using wireless sensor networks, the reliability of monitored data is crucial to analyze situations and take decisions. Compressed sensing methods are effective to ensure durability of a wireless s...
来源: 评论
Performance Modeling for distributed Training of Convolutional neural networks
Performance Modeling for Distributed Training of Convolution...
收藏 引用
Euromicro conference on Parallel, distributed and network-Based processing
作者: Adrián Castelló Mar Catalán Manuel F. Dolz Jose I. Mestre Enrique S. Quintana-Ortí José Duato Universitat Jaume I Castellón Spain Universitat Politècnica de València Valencia Spain
We perform a theoretical analysis comparing the scalability of data versus model parallelism, applied to the distributed training of deep convolutional neural networks (CNNs), along five axes: batch size, node (floati... 详细信息
来源: 评论
HyperSack: distributed Hyperparameter Optimization for Deep Learning using Resource-Aware Scheduling on Heterogeneous GPU Systems
HyperSack: Distributed Hyperparameter Optimization for Deep ...
收藏 引用
International conference on High Performance Computing
作者: Nawras Alnaasan Bharath Ramesh Jinghan Yao Aamir Shafi Hari Subramoni Dhabaleswar K Panda Department of Computer Science and Engineering The Ohio State University Columbus Ohio USA
Hyperparameter Optimization (HPO) can unlock the full potential of Deep Learning (DL) models; however, it is considered one of the most compute-intensive tasks in the DL do-main due to multi-dimensional search spaces ... 详细信息
来源: 评论