咨询与建议

限定检索结果

文献类型

  • 3,674 篇 会议
  • 2,605 篇 期刊文献
  • 123 篇 学位论文
  • 21 篇 专利
  • 18 册 图书
  • 1 篇 资讯

馆藏范围

  • 6,441 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 4,425 篇 工学
    • 3,119 篇 计算机科学与技术...
    • 1,375 篇 电气工程
    • 1,326 篇 软件工程
    • 867 篇 信息与通信工程
    • 455 篇 控制科学与工程
    • 306 篇 生物工程
    • 263 篇 电子科学与技术(可...
    • 212 篇 仪器科学与技术
    • 173 篇 机械工程
    • 160 篇 生物医学工程(可授...
    • 134 篇 光学工程
    • 86 篇 材料科学与工程(可...
    • 83 篇 动力工程及工程热...
    • 77 篇 测绘科学与技术
    • 64 篇 化学工程与技术
  • 1,381 篇 理学
    • 517 篇 生物学
    • 469 篇 物理学
    • 409 篇 数学
    • 115 篇 统计学(可授理学、...
    • 97 篇 化学
    • 89 篇 系统科学
    • 77 篇 地球物理学
  • 638 篇 医学
    • 432 篇 临床医学
    • 386 篇 基础医学(可授医学...
    • 78 篇 特种医学
    • 73 篇 医学技术(可授医学...
  • 505 篇 管理学
    • 367 篇 管理科学与工程(可...
    • 148 篇 图书情报与档案管...
    • 61 篇 工商管理
  • 140 篇 教育学
    • 126 篇 心理学(可授教育学...
  • 89 篇 农学
  • 69 篇 法学
  • 33 篇 文学
  • 18 篇 经济学
  • 13 篇 艺术学
  • 8 篇 军事学
  • 3 篇 哲学

主题

  • 1,034 篇 neural networks
  • 435 篇 deep learning
  • 307 篇 training
  • 275 篇 computational mo...
  • 261 篇 artificial neura...
  • 252 篇 neural network
  • 218 篇 machine learning
  • 217 篇 feature extracti...
  • 180 篇 convolutional ne...
  • 169 篇 deep neural netw...
  • 165 篇 parallel process...
  • 153 篇 neurons
  • 145 篇 computer archite...
  • 132 篇 graph neural net...
  • 128 篇 convolutional ne...
  • 127 篇 distributed proc...
  • 123 篇 signal processin...
  • 106 篇 distributed comp...
  • 98 篇 data models
  • 96 篇 optimization

机构

  • 20 篇 univ chinese aca...
  • 15 篇 college of compu...
  • 13 篇 univ penn dept e...
  • 13 篇 tsinghua univ de...
  • 13 篇 science and tech...
  • 12 篇 shandong normal ...
  • 11 篇 chinese acad sci...
  • 11 篇 institute of inf...
  • 11 篇 carnegie mellon ...
  • 11 篇 beijing universi...
  • 10 篇 school of cyber ...
  • 10 篇 peng cheng lab p...
  • 9 篇 university of sc...
  • 9 篇 jilin univ coll ...
  • 9 篇 国防科技大学
  • 9 篇 univ chinese aca...
  • 9 篇 natl univ def te...
  • 9 篇 natl univ def te...
  • 8 篇 华中科技大学
  • 8 篇 ibm tj watson re...

作者

  • 17 篇 liu jie
  • 15 篇 li dongsheng
  • 15 篇 wang wei
  • 14 篇 dou yong
  • 13 篇 ribeiro alejandr...
  • 13 篇 li yue
  • 13 篇 jie liu
  • 11 篇 chen xinhai
  • 11 篇 li bo
  • 11 篇 lai zhiquan
  • 10 篇 liu yang
  • 10 篇 zhong tie
  • 10 篇 li jun
  • 8 篇 li li
  • 8 篇 chen li
  • 8 篇 niu xin
  • 8 篇 dong xintong
  • 8 篇 kokkinos yiannis
  • 8 篇 gama fernando
  • 8 篇 xu kele

语言

  • 5,717 篇 英文
  • 360 篇 中文
  • 352 篇 其他
  • 4 篇 日文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"任意字段=Neural Network and Distributed Processing"
6442 条 记 录,以下是931-940 订阅
排序:
Enabling Variable High Spatial Resolution Retrieval From a Long Pulse BOTDA Sensor
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2023年 第2期10卷 1813-1821页
作者: Ge, Zhao Shen, Li Zhao, Can Wu, Hao Zhao, Zhiyong Tang, Ming Huazhong Univ Sci & Technol Sch Opt & Elect Informat Wuhan 430074 Peoples R China
resolution (SR) is one of the most important parameters of Brillouin optical time-domain analysis (BOTDA) sensors, which determines the minimum length that a perturbation event can be distinguished. In the field of In... 详细信息
来源: 评论
A Review of Machine Learning Methods for IoT network-Centric Anomaly Detection  47
A Review of Machine Learning Methods for IoT Network-Centric...
收藏 引用
47th International Conference on Telecommunications and Signal processing, TSP 2024
作者: Nag, Anindya Hassan, Md. Mehedi Mandal, Dishari Chand, Nisarga Islam, Md Babul Meena, V.P. Benedetto, Francesco Khulna University Computer Science and Engineering Discipline Khulna9208 Bangladesh Adamas University Department of Cse Kolkata India University of Calabria Department of Dimes Cosenza Italy Amrita School of Engineering Amrita Vishwa Vidyapeetham Dept of Eee Bangalore India University of Roma Tre SP4TE - Laboratory Economics Department Via Silvio D'Amico 77 Rome00145 Italy
Anomaly detection in IoT infrastructure is a growing idea in the IoT area. The IoT enables the linking of many devices through the use of wireless and mobile communication technologies. Data received from distributed ... 详细信息
来源: 评论
Learning from distributed Users in Contextual Linear Bandits Without Sharing the Context  36
Learning from Distributed Users in Contextual Linear Bandits...
收藏 引用
36th Conference on neural Information processing Systems (NeurIPS)
作者: Hanna, Osama A. Yang, Lin F. Fragouli, Christina Univ Calif Los Angeles Los Angeles CA USA
Contextual linear bandits is a rich and theoretically important model that has many practical applications. Recently, this setup gained a lot of interest in applications over wireless where communication constraints c...
来源: 评论
Task Partitioning and Offloading in DNN-Task Enabled Mobile Edge Computing networks
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2023年 第4期22卷 2435-2445页
作者: Gao, Mingjin Shen, Rujing Shi, Long Qi, Wen Li, Jun Li, Yonghui Chinese Acad Sci Inst Comp Technol Beijing 100864 Peoples R China Beijing Key Lab Mobile Comp & Pervas Device Beijing 100190 Peoples R China Chinese Acad Sci Inst Comp Technol Beijing Peoples R China Univ Chinese Acad Sci Beijing 100049 Peoples R China Nanjing Univ Sci & Technol Sch Elect & Opt Engn Nanjing Peoples R China China Telecom Res Inst Beijing Peoples R China Univ Sydney Camperdown NSW Australia
Deep neural network (DNN)-task enabled mobile edge computing (MEC) is gaining ubiquity due to outstanding performance of artificial intelligence. By virtue of characteristics of DNN, this paper develops a joint design... 详细信息
来源: 评论
CD-Sched: An Automated Scheduling Framework for Accelerating neural network Training on Shared Memory CPU-DSP Platforms
CD-Sched: An Automated Scheduling Framework for Accelerating...
收藏 引用
2023 International Conference on Power, Communication, Computing and networking Technologies, PCCNT 2023
作者: Xiao, Yuanyuan Lai, Zhiquan Li, Dongsheng National Key Laboratory of Parallel and Distributed Processing Computer College National University of Defense Technology Changsha China
DSP holds significant potential for important applications in Deep neural networks. However, there is currently a lack of research focused on shared-memory CPU-DSP heterogeneous chips. This paper proposes CD-Sched, an... 详细信息
来源: 评论
Adaptive ResNet Architecture for distributed Inference in Resource-Constrained IoT Systems  19
Adaptive ResNet Architecture for Distributed Inference in Re...
收藏 引用
19th IEEE International Wireless Communications and Mobile Computing (IEEE IWCMC)
作者: Khan, Fazeela Mazhar Baccour, Emna Erbad, Aiman Hamdi, Mounir Hamad Bin Khalifa Univ Qatar Fdn Coll Sci & Engn Doha Qatar
As deep neural networks continue to expand and become more complex, most edge devices are unable to handle their extensive processing requirements. Therefore, the concept of distributed inference is essential to distr... 详细信息
来源: 评论
A Moving Target Defense Approach for the distributed Dynamic network  21
A Moving Target Defense Approach for the Distributed Dynamic...
收藏 引用
21st IEEE International Symposium on Parallel and distributed processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Zhang, Lin Guo, Yunchuan Leng, Siyuan Li, Zifu Li, Fenghua Fang, Liang Institute of Information Engineering Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China
The distributed dynamic network is vulnerable to scanning attacks due to the openness of wireless channels. Traditional defense systems tend to be passive and exhibit delayed responses. A moving target defense approac... 详细信息
来源: 评论
BHMVD: Binary Code-based Hybrid neural network for Multiclass Vulnerability Detection  20
BHMVD: Binary Code-based Hybrid Neural Network for Multiclas...
收藏 引用
20th IEEE Int Symposium on Parallel and distributed processing with Applicat / 15th IEEE Int Conf on Social Comp and networking / 12th IEEE Int Conf on Big Data and Cloud Comp / 12th IEEE Int Conf on Sustainable Comp and Commun
作者: Cui, Ningning Chen, Liwei Du, Gewangzi Wu, Tongshuai Zhu, Chenguang Shi, Gang Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
Precise binary code vulnerability detection is a significant research topic in software security. Currently, the majority of software is released in binary form, and the corresponding vulnerability detection approache... 详细信息
来源: 评论
Intelligent Image Captioning with InceptionV3, LSTM, and PySpark Integration  3
Intelligent Image Captioning with InceptionV3, LSTM, and PyS...
收藏 引用
3rd International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, IITCEE 2025
作者: Kurian, Thanu Mathew, Jimsha K. Syam Dev, R.S. Anand, P.K. Vignesh, A. Rakshith, B.S. New Horizon College of Engineering Dept of Artificial Intelligence and Machine Learning Bengaluru India
Image captioning is a challenging task in artificial intelligence that involves generating descriptive captions for images automatically. In this project, we propose a novel approach leveraging advanced technologies s... 详细信息
来源: 评论
Scalable Perception-Action-Communication Loops With Convolutional and Graph neural networks
收藏 引用
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION processing OVER networkS 2022年 8卷 12-24页
作者: Hu, Ting-Kuei Gama, Fernando Chen, Tianlong Zheng, Wenqing Wang, Zhangyang Ribeiro, Alejandro Sadler, Brian M. Texas A&M Univ Dept Comp Sci & Engn College Stn TX 77843 USA Rice Univ Dept Comp & Elect Engn Houston TX 77005 USA Univ Texas Austin Dept Elect & Comp Engn Austin TX 78712 USA Univ Penn Dept Elect & Syst Engn Philadelphia PA 19104 USA US Army Res Lab Adelphi MD 20783 USA
In this paper, we present a perception-action-communication loop design using Vision-based Graph Aggregation and Inference (VGAI). This multi-agent decentralized learning-to-control framework maps raw visual observati... 详细信息
来源: 评论