咨询与建议

限定检索结果

文献类型

  • 2,662 篇 期刊文献
  • 1,501 篇 会议
  • 3 册 图书

馆藏范围

  • 4,166 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,564 篇 工学
    • 1,712 篇 计算机科学与技术...
    • 1,388 篇 软件工程
    • 594 篇 信息与通信工程
    • 381 篇 生物工程
    • 355 篇 电气工程
    • 295 篇 生物医学工程(可授...
    • 294 篇 控制科学与工程
    • 284 篇 电子科学与技术(可...
    • 237 篇 光学工程
    • 189 篇 化学工程与技术
    • 140 篇 机械工程
    • 97 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 70 篇 建筑学
    • 66 篇 安全科学与工程
    • 61 篇 材料科学与工程(可...
  • 1,809 篇 理学
    • 728 篇 数学
    • 695 篇 物理学
    • 477 篇 生物学
    • 276 篇 统计学(可授理学、...
    • 228 篇 化学
    • 120 篇 系统科学
  • 600 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 253 篇 图书情报与档案管...
    • 160 篇 工商管理
  • 313 篇 医学
    • 255 篇 临床医学
    • 184 篇 基础医学(可授医学...
    • 120 篇 药学(可授医学、理...
    • 94 篇 公共卫生与预防医...
  • 105 篇 法学
    • 84 篇 社会学
  • 79 篇 农学
  • 59 篇 经济学
  • 32 篇 教育学
  • 11 篇 文学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 1 篇 历史学

主题

  • 108 篇 deep learning
  • 101 篇 semantics
  • 92 篇 feature extracti...
  • 90 篇 training
  • 74 篇 hadrons
  • 71 篇 machine learning
  • 69 篇 computational mo...
  • 68 篇 data models
  • 56 篇 accuracy
  • 50 篇 hadron colliders
  • 49 篇 predictive model...
  • 46 篇 graph neural net...
  • 46 篇 hadronic decays
  • 44 篇 federated learni...
  • 40 篇 image segmentati...
  • 40 篇 optimization
  • 40 篇 data mining
  • 38 篇 bottom mesons
  • 36 篇 convolution
  • 35 篇 task analysis

机构

  • 426 篇 department of ph...
  • 412 篇 horia hulubei na...
  • 404 篇 van swinderen in...
  • 400 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 391 篇 cavendish labora...
  • 390 篇 school of physic...
  • 379 篇 university of ch...
  • 376 篇 yandex school of...
  • 360 篇 department of ph...
  • 353 篇 imperial college...
  • 343 篇 stfc rutherford ...
  • 339 篇 center for high ...
  • 335 篇 institute of par...
  • 314 篇 henryk niewodnic...
  • 301 篇 nikhef national ...
  • 293 篇 physik-institut ...
  • 293 篇 oliver lodge lab...
  • 292 篇 school of physic...
  • 288 篇 school of physic...

作者

  • 251 篇 barter w.
  • 248 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 220 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 214 篇 amato s.
  • 212 篇 boettcher t.
  • 210 篇 baryshnikov f.
  • 209 篇 brundu d.
  • 205 篇 braun s.
  • 202 篇 borisyak m.
  • 199 篇 bizzeti a.
  • 192 篇 bencivenni g.
  • 183 篇 back j.j.
  • 179 篇 bay a.
  • 172 篇 bjørn m.

语言

  • 3,763 篇 英文
  • 345 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Research Center and School of Computer Science and Engineering"
4166 条 记 录,以下是501-510 订阅
排序:
data-Driven Active Power Dispatch for Wind Farms  13
Data-Driven Active Power Dispatch for Wind Farms
收藏 引用
13th IEEE data Driven Control and Learning Systems Conference, DDCLS 2024
作者: Jiao, Xuguo Zhang, Daoyuan Wang, Xin Ma, Zhaoxing Zhang, Zhenyong Liu, Wenfeng School of Information and Control Engineering Qingdao University of Technology Qingdao266520 China College of Control Science and Engineering Zhejiang University State Key Laboratory of Industrial Control Technology Hangzhou310027 China Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China School of Civil Engineering Qingdao University of Technology Qingdao266520 China
Active power dispatch of wind farms plays an important role in power grid scheduling. In this paper, a data-driven active power dispatch strategy for wind farms is proposed, which uses the key point of minimizing the ... 详细信息
来源: 评论
DiverseReID: Towards generalizable person re-identification via Dynamic Style Hallucination and decoupled domain experts
收藏 引用
Neural Networks 2025年 189卷 107602页
作者: Jia, Jieru Xie, Huidi Huang, Qin Song, Yantao Wu, Peng Institute of Big Data Science and Industry Shanxi University Taiyuan030006 China School of Computer and Information Technology Shanxi University Taiyuan China Engineering Research Center for Machine Vision and Data Mining of Shanxi Province Shanxi University Taiyuan030006 China
Person re-identification (re-ID) models often fail to generalize well when deployed to other camera networks with domain shift. A classical domain generalization (DG) solution is to enhance the diversity of source dat... 详细信息
来源: 评论
Poplar: Efficient Scaling of Distributed DNN Training on Heterogeneous GPU Clusters
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Wenzheng Hu, Yang Shi, Jing Bai, Xiaoying School of Computer Science Peking University China Information Research Center of Military Science PLA Academy of Military Science China Advanced Institute of Big Data China
Scaling Deep Neural Networks (DNNs) requires significant computational resources in terms of GPU quantity and compute capacity. In practice, there usually exists a large number of heterogeneous GPU devices due to the ... 详细信息
来源: 评论
Random Forest and Sobol Method Based data center PUE Prediction  12
Random Forest and Sobol Method Based Data Center PUE Predict...
收藏 引用
12th IEEE International Conference on Information and Communication Networks, ICICN 2024
作者: Yan, Longchuan Luan, Zhaofang He, Ling Jiang, Congfeng Liu, Junming Xu, Chuanqi Zhang, Liangbin State Grid Corporation of China Information & Telecommunication Branch Beijing China School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Information Technology Center Hangzhou Dianzi University Hangzhou China College of Big Data and Software Engineering Zhejiang Wanli University Ningbo China
data centers are critical infrastructures that support a multitude of business loads such as big data, artificial intelligence, and cloud computing. While providing the necessary computing power, the problem of high e... 详细信息
来源: 评论
Find truth in the hands of the few:acquiring specific knowledge with crowdsourcing
收藏 引用
Frontiers of computer science 2021年 第4期15卷 5-16页
作者: Tao HAN Hailong SUN Yangqiu SONG Yili FANG Xudong LIU SKLSDE Lab School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang UniversityBeijing 100191China Department of Computer Science and Engineering Hong Kong University of Science and TechnologyClearwater BayHong Kong 999077China School of Computer and Information Engineering Zhejiang Gongshang UniversityHangzhou 310018China
Crowdsourcing has been a helpful mechanism to leverage human intelligence to acquire useful ***,when we aggregate the crowd knowledge based on the currently developed voting algorithms,it often results in common knowl... 详细信息
来源: 评论
Correction of Read Biases Induced by Complex Reference Genome Regions for Improving Copy Number Variation Detection Using a Gaussian Mixture Model
Correction of Read Biases Induced by Complex Reference Genom...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wang, Xuwen Chang, Zhili Wang, Shenjie Liu, Ruoyu Liu, Yuqian Zhu, Xiaoyan Shao, Yang Lai, Xin Yang, Shuanying Wang, Jiayin Second Affiliated Hospital Xi'an Jiaotong University Department of Respiratory Medicine Xi'an710003 China Xi'an Jiaotong University School of Computer Science and Technology Xi'an710049 China Xi'an Jiaotong University Shaanxi Engineering Research Center of Medical and Health Big Data Xi'an710049 China Nanjing Geneseeq Technology INC. China
Copy number variations are crucial in cancer research, but their detection through next-generation sequencing is often hindered by read biases, particularly in complex genomic regions. Existing bias-correction methods... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Scavenger: Better Space-Time Trade-Offs for Key-Value Separated LSM-trees  40
Scavenger: Better Space-Time Trade-Offs for Key-Value Separa...
收藏 引用
40th IEEE International Conference on data engineering, ICDE 2024
作者: Zhang, Jianshun Wang, Fang Qiu, Sheng Wang, Yi Ou, Jiaxin Huang, Junxun Li, Baoquan Fang, Peng Feng, Dan School of Computer Science and Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China China Shenzhen Huazhong University of Science and Technology Research Institute China Bytefrance Inc.
Key-Value Stores (KVS) implemented with log-structured merge-tree (LSM-tree) have gained widespread ac-ceptance in storage systems. Nonetheless, a significant challenge arises in the form of high write amplification d... 详细信息
来源: 评论
An Unsupervised Network Architecture Search Method for Solving Partial Differential Equations
arXiv
收藏 引用
arXiv 2025年
作者: Li, Qing Chen, Jingrun School of Artificial Intelligence and Data Science University of Science and Technology of China China School of Mathematical Sciences Suzhou Institute for Advanced Research University of Science and Technology of China China Suzhou Big Data & AI Research and Engineering Center China
Solving partial differential equations (PDEs) has been indispensable in scientific and engineering applications. Recently, deep learning methods have been widely used to solve high-dimensional problems. The interplay ... 详细信息
来源: 评论
Enhancing malware detection performance: leveraging K-Nearest Neighbors with Firefly Optimization Algorithm
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10071-10094页
作者: Al Saaidah, Adeeb Abualhaj, Mosleh M. Shambour, Qusai Y. Abu-Shareha, Ahmad Adel Abualigah, Laith Al-Khatib, Sumaya N. Alraba’nah, Yousef H Department of Networks and Cybersecurity Al-Ahliyya Amman University Amman Jordan Department of Software Engineering Al-Ahliyya Amman University Amman Jordan Department of Data Science and Artificial Intelligence Al-Ahliyya Amman University Amman Jordan Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman19328 Jordan Research Center University of Tabuk Tabuk71491 Saudi Arabia MEU Research Unit Middle East University Amman11831 Jordan Department of Electrical and Computer Engineering Lebanese American University Byblos13-5053 Lebanon College of Engineering Yuan Ze University Taoyuan32003 Taiwan Applied Science Research Center Applied Science Private University Amman11931 Jordan School of Engineering and Technology Sunway University Malaysia Petaling Jaya27500 Malaysia
Malware detection plays a crucial role in ensuring robust cybersecurity amidst the ever-evolving cyber threats. This research paper delves into the realm of machine learning (ML) algorithms for malware detection, with... 详细信息
来源: 评论