咨询与建议

限定检索结果

文献类型

  • 365 篇 期刊文献
  • 286 篇 会议
  • 7 册 图书

馆藏范围

  • 658 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 439 篇 工学
    • 352 篇 计算机科学与技术...
    • 299 篇 软件工程
    • 90 篇 生物工程
    • 80 篇 信息与通信工程
    • 77 篇 生物医学工程(可授...
    • 65 篇 光学工程
    • 59 篇 控制科学与工程
    • 42 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 18 篇 安全科学与工程
    • 13 篇 建筑学
    • 13 篇 土木工程
    • 13 篇 化学工程与技术
    • 13 篇 交通运输工程
  • 238 篇 理学
    • 115 篇 数学
    • 102 篇 生物学
    • 56 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 18 篇 系统科学
    • 16 篇 化学
  • 130 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 73 篇 医学
    • 65 篇 临床医学
    • 61 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
    • 29 篇 公共卫生与预防医...
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 16 篇 法学
    • 15 篇 社会学
  • 9 篇 农学
  • 8 篇 教育学
  • 2 篇 艺术学

主题

  • 27 篇 deep learning
  • 26 篇 accuracy
  • 22 篇 machine learning
  • 22 篇 training
  • 19 篇 semantics
  • 17 篇 computational mo...
  • 17 篇 feature extracti...
  • 14 篇 image segmentati...
  • 14 篇 federated learni...
  • 14 篇 data models
  • 14 篇 convolutional ne...
  • 13 篇 optimization
  • 11 篇 reinforcement le...
  • 11 篇 predictive model...
  • 11 篇 artificial intel...
  • 9 篇 object detection
  • 9 篇 transformers
  • 9 篇 graph neural net...
  • 9 篇 real-time system...
  • 9 篇 decision making

机构

  • 35 篇 college of compu...
  • 18 篇 school of big da...
  • 17 篇 national enginee...
  • 16 篇 department of co...
  • 12 篇 shenzhen researc...
  • 10 篇 university of sc...
  • 9 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 university of ch...
  • 9 篇 state key labora...
  • 9 篇 artificial intel...
  • 9 篇 school of big da...
  • 8 篇 national enginee...
  • 8 篇 college of intel...
  • 8 篇 iconix software ...
  • 8 篇 college of compu...
  • 7 篇 institute of art...
  • 7 篇 department of co...
  • 7 篇 department of co...
  • 7 篇 moe key lab of a...

作者

  • 12 篇 seifedine kadry
  • 12 篇 xiaofei wang
  • 12 篇 jin hai
  • 11 篇 victor c. m. leu...
  • 11 篇 xiong hui
  • 10 篇 xiuhua li
  • 10 篇 leung victor c. ...
  • 8 篇 wang shuai
  • 8 篇 jungeun kim
  • 8 篇 r. saravanakumar
  • 7 篇 niyato dusit
  • 7 篇 qilin fan
  • 7 篇 timofte radu
  • 7 篇 shuai wang
  • 7 篇 gao can
  • 7 篇 hai jin
  • 6 篇 wang xiaofei
  • 6 篇 tian chunwei
  • 6 篇 zou deqing
  • 6 篇 wang yan

语言

  • 575 篇 英文
  • 80 篇 其他
  • 3 篇 中文
检索条件"机构=Big Data Intelligence Lab Department of Computer Science and Software Engineering"
658 条 记 录,以下是61-70 订阅
排序:
NC-ALG: Graph-Based Active Learning under Noisy Crowd  40
NC-ALG: Graph-Based Active Learning under Noisy Crowd
收藏 引用
40th IEEE International Conference on data engineering, ICDE 2024
作者: Zhang, Wentao Wang, Yexin You, Zhenbang Li, Yang Cao, Gang Yang, Zhi Cui, Bin Center for Machine Learning Research Peking University China Key Lab of High Confidence Software Technologies Peking University China Institute of Advanced Algorithms Research Shanghai China Institute of Computational Social Science Peking University Qingdao China National Engineering Labratory for Big Data Analytics and Applications China TEG Tencent Inc. Department of Data Platform China Beijing Academy of Artificial Intelligence China
Graph Neural Networks (GNNs) have achieved great success in various data mining tasks but they heavily rely on a large number of annotated nodes, requiring considerable human efforts. Despite the effectiveness of exis... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
DCML: Boosting Applying Experience of NILM with Dilated Convolution and Multi-Task Learning
DCML: Boosting Applying Experience of NILM with Dilated Conv...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: ZhangMengru Zhao Fan Wu Huaqing Wu Tong Liu Conghao Zhou Jun Ma Yongmin Zhang Feng Lyu School of Computer Science and Engineering Central South University Changsha China Department of Electrical and Software Engineering University of Calgary Calgary AB Canada Big Data Institute Central South University Changsha China Department of Electrical and Computer Engineering University of Waterloo Waterloo Ontario Canada Hunan Energy Big Data Intelligence Limited Changsha China
Non-intrusive load monitoring (NILM) is a promising approach for recognizing various electrical equipment energy usage patterns from aggregate load data. In this paper, we investigate the development of an NILM model ... 详细信息
来源: 评论
Investigation on Analog and Digital Modulations Recognition Using Machine Learning Algorithms
收藏 引用
World Journal of engineering and Technology 2024年 第4期12卷 867-884页
作者: Jean Ndoumbe Ivan Basile Kabeina Gaelle Patricia Talotsing Soubiel-Noël Nkomo Biloo Laboratory of Computer Engineering Data Science and Artificial Intelligence National Higher Polytechnic School of Douala Douala Cameroon Mobile Computing and Networking Research Laboratory Department of Computer and Software Engineering Polytechnique Montreal Montreal Canada
In the field of radiocommunication, modulation type identification is one of the most important characteristics in signal processing. This study aims to implement a modulation recognition system on two approaches to m... 详细信息
来源: 评论
Estimating fish weight growth in aquaponic farming through machine learning techniques  3
Estimating fish weight growth in aquaponic farming through m...
收藏 引用
3rd IEEE International Conference on Intelligent Technologies, CONIT 2023
作者: Kumar, Purushottam Tiwari, Pranav Srinivasulu Reddy, U. Machine Learning & Data Analytics Lab CoE in Artificial Intelligence National Institute of Technology Trichy India Indian Institute of Information Technology Tiruchirappalli Computer Science and Engineering Trichy India National Institute of Technology Machine Learning & Data Analytics Lab Department of Computer Applications Trichy India
Due to the ever-growing population, rapid urbanization, unusual environmental change, and dwindling water supply, the food production from conventional farming techniques won't be able to keep up with increasing f... 详细信息
来源: 评论
Symmetrical Supervision with Transformer for Few-shot Medical Image Segmentation
Symmetrical Supervision with Transformer for Few-shot Medica...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Niu, Yao Luo, Zhiming Lian, Sheng Li, Lei Li, Shaozi Song, Haixin Xiamen University Department of Artificial Intelligence Fujian China Fuzhou University College of Computer and Data Science Fujian China Xiamen University Department of Software Engineering Fujian China
Few-shot learning can potentially learn the target knowledge in extremely few data regimes. Existing few-shot medical image segmentation methods fail to consider the global anatomy correlation between the support and ... 详细信息
来源: 评论
Teranga Go!: Carpooling Collaborative Consumption Community with multi-criteria hesitant fuzzy linguistic term set opinions to build confidence and trust
arXiv
收藏 引用
arXiv 2024年
作者: Montes, Rosana Morales, Jeovani Zermeño, Noe Duran, Jeronimo Herrera, Francisco Department of Software Engineering University of Granada Spain Department of Computer Science and Artificial Intelligence University of Granada Spain Andalusian Research Institute in Data Science and Computational Intelligence DaSCI Spain
Classic Delphi and Fuzzy Delphi methods are used to test content validity of a data collection tools such as questionnaires. Fuzzy Delphi takes the opinion issued by judges from a linguistic perspective reducing ambig... 详细信息
来源: 评论
Competitive and Cooperative Computation Offloading for Intensive Heterogeneous Tasks in Vehicular Edge Computing Networks
Competitive and Cooperative Computation Offloading for Inten...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yuan Chen Xiuhua Li Guozeng Xu Ling Liu Xiaofei Wang Victor C. M. Leung School of Big Data & Software Engineering Chongqing University Chongqing China TKLAN College of Intelligence & Computing Tianjin University Tianjin China College of Computer Science & Software Engineering Shenzhen University Shenzhen China Department of Electrical & Computer Engineering The University of British Columbia Vancouver Canada
Computation offloading is widely used in vehicular edge computing (VEC) networks to satisfy the computational intensity and latency sensitivity requirements. However, many existing offloading algorithms do not compreh... 详细信息
来源: 评论
Multi-Agent Deep Reinforcement Learning for Computation Offloading in Multi-IRS Assisted Mobile Edge Computing Networks
Multi-Agent Deep Reinforcement Learning for Computation Offl...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Lingxiao Chen Xiuhua Li Chuan Sun Qilin Fan Xiaofei Wang Victor C. M. Leung School of Big Data & Software Engineering Chongqing University Chongqing China TKLAN College of Intelligence & Computing Tianjin University Tianjin China College of Computer Science & Software Engineering Shenzhen University Shenzhen China Department of Electrical & Computer Engineering The University of British Columbia Vancouver Canada
Mobile edge computing (MEC) as a potential technology can offload tasks from user devices (UDs) to network edges to alleviate network congestion and reduce task execution delay. However, computation offloading faces t... 详细信息
来源: 评论
Autonomous Multi-Objective Optimization Using Large Language Model
收藏 引用
IEEE Transactions on Evolutionary Computation 2025年
作者: Huang, Yuxiao Wu, Shenghao Zhang, Wenjie Wu, Jibin Feng, Liang Tan, Kay Chen Department of Data Science and Artificial Intelligence Hong Kong Polytechnic University Hong Kong Department of Electrical and Elctronics Engineering Hong Kong Polytechnic University Hong Kong Chongqing University College of Computer Science Chongqing Key Laboratory of Big Data Intelligence and Privacy Computing Chongqing400044 China
Multi-objective optimization problems (MOPs) are ubiquitous in real-world applications, presenting a complex challenge of balancing multiple conflicting objectives. Traditional multi-objective evolutionary algorithms ... 详细信息
来源: 评论