咨询与建议

限定检索结果

文献类型

  • 2,625 篇 期刊文献
  • 1,513 篇 会议
  • 3 册 图书

馆藏范围

  • 4,141 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,537 篇 工学
    • 1,665 篇 计算机科学与技术...
    • 1,364 篇 软件工程
    • 584 篇 信息与通信工程
    • 377 篇 生物工程
    • 336 篇 电气工程
    • 294 篇 生物医学工程(可授...
    • 275 篇 电子科学与技术(可...
    • 272 篇 控制科学与工程
    • 242 篇 光学工程
    • 184 篇 化学工程与技术
    • 135 篇 机械工程
    • 98 篇 仪器科学与技术
    • 88 篇 动力工程及工程热...
    • 79 篇 核科学与技术
    • 73 篇 建筑学
    • 72 篇 材料科学与工程(可...
  • 1,786 篇 理学
    • 729 篇 数学
    • 689 篇 物理学
    • 472 篇 生物学
    • 286 篇 统计学(可授理学、...
    • 222 篇 化学
    • 118 篇 系统科学
  • 589 篇 管理学
    • 330 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 152 篇 工商管理
  • 304 篇 医学
    • 248 篇 临床医学
    • 179 篇 基础医学(可授医学...
    • 121 篇 药学(可授医学、理...
    • 91 篇 公共卫生与预防医...
  • 105 篇 法学
    • 84 篇 社会学
  • 80 篇 农学
  • 58 篇 经济学
  • 33 篇 教育学
  • 11 篇 艺术学
  • 9 篇 文学
  • 9 篇 军事学
  • 1 篇 历史学

主题

  • 106 篇 deep learning
  • 104 篇 semantics
  • 96 篇 feature extracti...
  • 94 篇 training
  • 74 篇 hadrons
  • 73 篇 computational mo...
  • 71 篇 machine learning
  • 70 篇 data models
  • 62 篇 accuracy
  • 53 篇 federated learni...
  • 50 篇 predictive model...
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 43 篇 data mining
  • 42 篇 graph neural net...
  • 41 篇 optimization
  • 39 篇 image segmentati...
  • 38 篇 bottom mesons
  • 37 篇 convolution
  • 35 篇 task analysis

机构

  • 426 篇 department of ph...
  • 412 篇 horia hulubei na...
  • 406 篇 van swinderen in...
  • 400 篇 iccub universita...
  • 399 篇 h.h. wills physi...
  • 393 篇 school of physic...
  • 390 篇 cavendish labora...
  • 379 篇 yandex school of...
  • 379 篇 university of ch...
  • 366 篇 department of ph...
  • 356 篇 imperial college...
  • 345 篇 stfc rutherford ...
  • 342 篇 center for high ...
  • 337 篇 institute of par...
  • 314 篇 henryk niewodnic...
  • 301 篇 nikhef national ...
  • 292 篇 physik-institut ...
  • 291 篇 school of physic...
  • 291 篇 oliver lodge lab...
  • 287 篇 school of physic...

作者

  • 251 篇 barter w.
  • 248 篇 bellee v.
  • 241 篇 beiter a.
  • 224 篇 casse g.
  • 223 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 217 篇 bediaga i.
  • 216 篇 amato s.
  • 214 篇 boettcher t.
  • 212 篇 baryshnikov f.
  • 209 篇 brundu d.
  • 209 篇 braun s.
  • 206 篇 borisyak m.
  • 200 篇 bizzeti a.
  • 191 篇 bencivenni g.
  • 185 篇 back j.j.
  • 182 篇 bay a.
  • 174 篇 bjørn m.

语言

  • 3,484 篇 英文
  • 605 篇 其他
  • 65 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Research Center and School of Computer Science and Engineering"
4141 条 记 录,以下是741-750 订阅
排序:
The Construction and Application of Deep Integration model of Information Technology and Undergraduate Teaching  22
The Construction and Application of Deep Integration model o...
收藏 引用
Proceedings of the 2022 5th International Conference on Education Technology Management
作者: Youling Feng Xin Kang Yanan Yang Yi Han Rui Sheng Jinpin Zhou Tiezheng Sun school of management science and information engineering Jilin University of Finance and Economics School of Management Science and Information Engineering China and Business Big Data Research Center of Jilin Province China
At the background of Information Techonology 2.0 and “Internet+Education”, E-education is imperative for undergraduate education. In this article we construct a combined activity of student-centered, through higher ... 详细信息
来源: 评论
DeepCNN:Spectro-temporal feature representation for speech emotion recognition
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第2期8卷 401-417页
作者: Nasir Saleem Jiechao Gao Rizwana Irfan Ahmad Almadhor Hafiz Tayyab Rauf Yudong Zhang Seifedine Kadry Department of Electrical Engineering Faculty of Engineering and TechnologyGomal UniversityD.I.KhanPakistan Department of Computer Science University of VirginiaCharlottesvilleVirginiaUSA Department of Information Technology College of Computing and Information Technology at KhulaisUniversity of JeddahJeddahSaudi Arabia Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySkaka AljoufSaudi Arabia Centre for Smart Systems AI and CybersecurityStaffordshire UniversityStoke‐on‐TrentUK School of Computing and Mathematical Sciences University of LeicesterLeicesterUK Department of Applied Data Science Noroff University CollegeKristiansandNorway Artificial Intelligence Research Center(AIRC) Ajman UniversityAjmanUnited Arab Emirates Department of Electrical and Computer Engineering Lebanese American UniversityByblosLebanon
Speech emotion recognition(SER)is an important research problem in human-computer interaction *** representation and extraction of features are significant challenges in SER *** the promising results of recent studies... 详细信息
来源: 评论
Evaluation of China's Digital Economy: A Case Study using Entropy and TOPSIS  11
Evaluation of China's Digital Economy: A Case Study using En...
收藏 引用
11th International Conference on Information Technology and Quantitative Management, ITQM 2024
作者: Liu, Junjie Wang, Boya Xue, Jiayu Qu, Yi Shi, Yong Sino-Danish College University of Chinese Academy of Sciences Beijing100049 China Research Center on Fictitious Economy and Data Science Chinese Academy of Sciences Beijing100190 China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing100190 China Faculty of Science and Engineering University of Nottingham Ningbo China Zhejiang Ningbo315100 China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China School of Economics and Management University of Chinese Academy of Sciences Beijing100190 China College of Information Science and Technology University of Nebraska at Omaha OmahaNE68182 United States
Recently, digital economy in social science has become increasingly significant. A well-constructed evaluation structure could generally and promptly describe and reveal its overall social digitalization development. ... 详细信息
来源: 评论
Cloud-magnetic resonance imaging system:In the era of 6G and artificial intelligence
收藏 引用
Magnetic Resonance Letters 2025年 第1期5卷 52-63页
作者: Yirong Zhou Yanhuang Wu Yuhan Su Jing Li Jianyu Cai Yongfu You Jianjun Zhou Di Guo Xiaobo Qu Department of Electronic Science Intelligent Medical Imaging R&D CenterFujian Provincial Key Laboratory of Plasma and Magnetic ResonanceNational Institute for Data Science in Health and MedicineXiamen UniversityXiamen361104China Department of Electronic Science Key Laboratory of Digital Fujian on IoT CommunicationXiamen UniversityXiamen361104China Shanghai Electric Group Co. LtdShanghai200002China China Telecom Group Quanzhou362018China China Mobile Group Xiamen361009China Department of Radiology Zhongshan Hospital(Xiamen)Fudan UniversityXiamen Municipal Clinical Research Center for Medical ImagingFujian Province Key Clinical Specialty Construction Project(Medical Imaging Department)Xiamen Key Laboratory of Clinical Transformation of Imaging Big Data and Artificial IntelligenceXiamen361006China School of Computer and Information Engineering Xiamen University of TechnologyXiamen361024China
Magnetic resonance imaging(MRI)plays an important role in medical diagnosis,generating petabytes of image data annually in large *** voluminous data stream requires a significant amount of network bandwidth and extens... 详细信息
来源: 评论
A Survey of Attacks on Large Vision-Language Models: Resources, Advances, and Future Trends
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Daizong Yang, Mingyu Qu, Xiaoye Zhou, Pan Cheng, Yu Hu, Wei Wangxuan Institute of Computer Technology Peking University No. 128 Zhongguancun North Street Beijing China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China The Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong
With the significant development of large models in recent years, Large Vision-Language Models (LVLMs) have demonstrated remarkable capabilities across a wide range of multimodal understanding and reasoning tasks. Com... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
SETAR Model research Based on Support Vector Regression Parameter Estimation Method and Empirical Analysis  3
SETAR Model Research Based on Support Vector Regression Para...
收藏 引用
2021 3rd International Conference on Robotics, Intelligent Control and Artificial Intelligence, ICRICA 2021
作者: Li, Yun Yin, Xiangfeng Wen, Xueting School of Mathematics and Computational Science Hunan University of Science and Technology Xiangtan China Sch. of Mathematics and Computational Science Hunan University of Science and Technology Hunan Engineering Research Center for Big Data and Intelligent Decision-making of Industrial Development Xiangtan China
In this paper, we use support vector regression (SVR) to estimate the parameters of the SETAR model for predicting the log-return of stock price data. SETAR model is usually estimated using maximum likelihood (ML) and... 详细信息
来源: 评论
Co-Learning Bayesian Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Guo, Zhendong Ong, Yew-Soon He, Tiantian Liu, Haitao The Data Science and Artificial Intelligence Research Center School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore The School of Energy and Power Engineering Dalian University of Technology Dalian116024 China
Bayesian optimization (BO) is well known to be sample-efficient for solving black-box problems. However, the BO algorithms can sometimes get stuck in suboptimal solutions even with plenty of samples. Intrinsically, su... 详细信息
来源: 评论
Systematic Biases in LLM Simulations of Debates
Systematic Biases in LLM Simulations of Debates
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Taubenfeld, Amir Dover, Yaniv Reichart, Roi Goldstein, Ariel The Hebrew University of Jerusalem School of Computer Science and Engineering Israel Google Research United States The Hebrew University Business School Jerusalem Israel Federmann Center for the Study of Rationality Hebrew University Jerusalem Israel Faculty of Data and Decision Sciences Technion Israel Department of Cognitive and Brain Sciences Hebrew University Jerusalem Israel
The emergence of Large Language Models (LLMs), has opened exciting possibilities for constructing computational simulations designed to replicate human behavior accurately. Current research suggests that LLM-based age... 详细信息
来源: 评论
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification  39
CLNX: Bridging Code and Natural Language for C/C++ Vulnerabi...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Qin, Zeqing Wu, Yiwei Han, Lansheng School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China Wuhan JinYinHu Laboratory China
Large Language Models (LLMs) have shown great promise in vulnerability identification. As C/C++ comprise half of the open-source Software (OSS) vulnerabilities over the past decade and updates in OSS mainly occur thro... 详细信息
来源: 评论