咨询与建议

限定检索结果

文献类型

  • 10,780 篇 会议
  • 4,813 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 15,649 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,935 篇 工学
    • 5,033 篇 计算机科学与技术...
    • 4,025 篇 软件工程
    • 1,800 篇 信息与通信工程
    • 1,652 篇 控制科学与工程
    • 1,580 篇 电气工程
    • 1,418 篇 电子科学与技术(可...
    • 838 篇 生物工程
    • 805 篇 机械工程
    • 678 篇 光学工程
    • 665 篇 动力工程及工程热...
    • 637 篇 生物医学工程(可授...
    • 619 篇 仪器科学与技术
    • 445 篇 化学工程与技术
    • 355 篇 材料科学与工程(可...
    • 320 篇 交通运输工程
    • 298 篇 土木工程
    • 257 篇 安全科学与工程
  • 4,719 篇 理学
    • 2,279 篇 数学
    • 1,502 篇 物理学
    • 919 篇 生物学
    • 707 篇 统计学(可授理学、...
    • 623 篇 系统科学
    • 452 篇 化学
  • 2,106 篇 管理学
    • 1,413 篇 管理科学与工程(可...
    • 769 篇 图书情报与档案管...
    • 613 篇 工商管理
  • 575 篇 医学
    • 496 篇 临床医学
    • 392 篇 基础医学(可授医学...
    • 251 篇 药学(可授医学、理...
  • 299 篇 法学
  • 251 篇 经济学
    • 250 篇 应用经济学
  • 140 篇 农学
  • 117 篇 教育学
  • 52 篇 文学
  • 38 篇 军事学
  • 27 篇 艺术学
  • 1 篇 哲学

主题

  • 311 篇 computer science
  • 275 篇 systems engineer...
  • 223 篇 deep learning
  • 216 篇 computational mo...
  • 205 篇 neural networks
  • 187 篇 optimization
  • 185 篇 feature extracti...
  • 180 篇 computer archite...
  • 172 篇 data mining
  • 151 篇 bandwidth
  • 142 篇 laboratories
  • 135 篇 accuracy
  • 134 篇 educational inst...
  • 128 篇 control systems
  • 115 篇 routing
  • 115 篇 application soft...
  • 114 篇 reliability
  • 113 篇 throughput
  • 112 篇 support vector m...
  • 109 篇 image segmentati...

机构

  • 103 篇 national enginee...
  • 101 篇 college of compu...
  • 71 篇 school of comput...
  • 65 篇 department of co...
  • 62 篇 national compute...
  • 48 篇 purdue universit...
  • 47 篇 college of infor...
  • 45 篇 ieee
  • 43 篇 key laboratory o...
  • 43 篇 department of el...
  • 43 篇 school of comput...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 38 篇 the key laborato...
  • 37 篇 school of inform...
  • 34 篇 university of ch...
  • 33 篇 department of el...
  • 30 篇 faculty of compu...
  • 30 篇 national enginee...
  • 30 篇 national enginee...

作者

  • 48 篇 david reigosa
  • 48 篇 hai jin
  • 36 篇 yang yang
  • 36 篇 jin hai
  • 35 篇 hamid soltanian-...
  • 33 篇 briz fernando
  • 32 篇 soltanian-zadeh ...
  • 26 篇 chen shu-ching
  • 26 篇 mei-ling shyu
  • 25 篇 robbi rahim
  • 24 篇 jianchao zeng
  • 23 篇 hongliang wang
  • 23 篇 abdelwahed motwa...
  • 23 篇 f. malek
  • 21 篇 liuchen chang
  • 20 篇 wang lei
  • 20 篇 wang xingjun
  • 20 篇 mengchu zhou
  • 19 篇 ji zhen
  • 19 篇 hu shengshan

语言

  • 14,742 篇 英文
  • 542 篇 其他
  • 322 篇 中文
  • 38 篇 日文
  • 14 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 阿拉伯文
  • 1 篇 法文
  • 1 篇 荷兰文
  • 1 篇 土耳其文
检索条件"机构=Computer Engineering and System"
15649 条 记 录,以下是4661-4670 订阅
排序:
F-HMTC: Detecting financial events for investment decisions based on neural hierarchical multi-label text classification  29
F-HMTC: Detecting financial events for investment decisions ...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Liang, Xin Cheng, Dawei Yang, Fangzhou Luo, Yifeng Qian, Weining Zhou, Aoying Shanghai Engineering Research Center on Big Data Management System Shanghai China School of Data Science and Engineering East China Normal University Shanghai China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China SeekData Inc. Shanghai China
The share prices of listed companies in the stock trading market are prone to be influenced by various events. Performing event detection could help people to timely identify investment risks and opportunities accompa... 详细信息
来源: 评论
Analysis of Age of Information in Dual Updating systems
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Zhengchuan Deng, Dapeng Yang, Howard H. Pappas, Nikolaos Hu, Limei Jia, Yunjian Wang, Min Quek, Tony Q.S. The School of Microelectronics and Communication Engineering Chongqing University China The Zhejiang University/UIUC Institute Zhejiang University China The Department of Computer and Information Science Linköping University Linköping581 83 Sweden The School of Optoelectronics Engineering Chongqing University of Posts and Telecommunications China The Information System Technology and Design Pillar Sutd Singapore487372 Singapore
We study the average Age of Information (AoI) and peak AoI (PAoI) of a dual-queue status update system that monitors a common stochastic process. Although the double queue parallel transmission is instrumental in redu... 详细信息
来源: 评论
Energy Efficiency and Delay Tradeoff in an MEC-Enabled Mobile IoT Network
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Han Song, Weiwei Wang, Qun Hu, Rose Qingyang Zhu, Hongbo Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Nanjing210003 China Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks Ministry of Education Nanjing University of Posts and Telecommunications Nanjing210003 China Department of Electrical and Computer Engineering Utah State University LoganUT United States
Mobile Edge Computing (MEC) has recently emerged as a promising technology in the 5G era. It is deemed an effective paradigm to support computation intensive and delay critical applications even at energy-constrained ... 详细信息
来源: 评论
End-to-end 2D-3D Registration between Image and LiDAR Point Cloud for Vehicle Localization
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Guangming Zheng, Yu Guo, Yanfeng Liu, Zhe Zhu, Yixiang Burgard, Wolfram Wang, Hesheng Department of Automation Shanghai Jiao Tong University Shanghai200240 China Key Laboratory of System Control and Information Processing Ministry of Education of China China Department of Artificial Intelligence Shanghai Jiao Tong University Shanghai200240 China Electrical and Computer Engineering University of California Los Angeles United States Institute of Artificial Intelligence Shanghai Jiao Tong University Shanghai200240 China Department of Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China Department of Engineering University of Technology Nuremberg Germany
Robot localization using a previously built map is essential for a variety of tasks including highly accurate navigation and mobile manipulation. A popular approach to robot localization is based on image-to-point clo... 详细信息
来源: 评论
Dynamic Hierarchical Skeleton-Based Network for Human Action Recognition in Video Content
SSRN
收藏 引用
SSRN 2024年
作者: Yang, Hualin Li, Xiying Chen, Calvin Yu-Chian Artificial Intelligence Medical Research Center School of Intelligent Systems Engineering Shenzhen Campus of Sun Yat-sen University Guangdong Shenzhen518107 China - Preferred Program Peking University Shenzhen Graduate School Guangdong Shenzhen518055 China School of Electronic and Computer Engineering Peking University Shenzhen Graduate School Guangdong Shenzhen518055 China Department of Medical Research China Medical University Hospital Taichung40447 Taiwan Department of Bioinformatics and Medical Engineering Asia University Taichung41354 Taiwan Guangdong Provincial Key Laboratory of Intelligent Transportation System Sun Yat-sen University Guangzhou China School of Intelligent Systems Engineering Sun Yat-sen University Guangdong Shenzhen518107 China
Human skeleton-based action recognition represents a pivotal field of study, capturing the intricate interplay between physical dynamics and intentional actions. Current research primarily focuses on extracting struct... 详细信息
来源: 评论
Research on Joint Operation of Wind and Solar Storage system Based on Genetic Algorithm
SSRN
收藏 引用
SSRN 2022年
作者: Lv, You Qin, Ruijun Niu, Yuguang Zhang, Yanfei Zhang, Lei State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources North China Electric Power University Changping District Beijing102206 China School of Control and Computer Engineering North China Electric Power University Changping District Beijing102206 China
With the large-scale integration of renewable energy sources such as wind power and photovoltaics, how to use energy storage systems to coordinate and control them has become an indispensable research content. After i... 详细信息
来源: 评论
A new family of feasible methods for distributed resource allocation
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Xuyang Magnússon, Sindri Johansson, Mikael The Division of Decision and Control Systems School of Electrical Engineering and Computer Science KTH Royal Institute of Technology StockholmSE-100 44 Sweden The Department of Computer and System Science Stockholm University StockholmSE-164 07 Sweden
Distributed resource allocation is a central task in network systems such as smart grids, water distribution networks, and urban transportation systems. When solving such problems in practice it is often important to ... 详细信息
来源: 评论
Evaluation of algorithms and security protocols to mitigate the risks in commercial transactions carried out by public companies
Evaluation of algorithms and security protocols to mitigate ...
收藏 引用
2020 Asia Conference on computers and Communications, ACCC 2020
作者: Toapanta, Segundo Moises Toapanta Gallegos, Luis Enrique Mafla Alvarado, Alex Enrique Aranda Solis, Maximo Prado Quito Ecuador Faculty of System Engineering Quito Ecuador Department of Computer Science Guayaquil Ecuador Universidad Técnica Luis Vargas Torres de Esmeraldas Career Social Sciences Esmeraldas Ecuador
The security problems in electronic commerce in transactions are very evident in public companies. The objective of this research is to analyze security algorithms and protocols to mitigate risks and vulnerabilities w... 详细信息
来源: 评论
MS-SAE: A General Model of Sentiment Analysis Based on Multimode Semantic Extraction and Sentiment Attention Enhancement Mechanism  6th
MS-SAE: A General Model of Sentiment Analysis Based on Multi...
收藏 引用
6th International Conference on Artificial Intelligence and Security, ICAIS 2020
作者: Yang, Kai Qu, Zhaowei Wang, Xiaoru Li, Fu Li, Yueli Jia, Dongbai Beijing Key Laboratory of Network System and Network Culture Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Portland States University PortlandOR97207-0751 United States
Recently, there is a lot of research on sentiment analysis. When existing models extract text features, semantic information can’t be fully obtained, because they ignore context connection between historical texts an... 详细信息
来源: 评论
Backdoor Defense with Machine Unlearning
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Yang Fan, Mingyuan Chen, Cen Liu, Ximeng Ma, Zhuo Wang, Li Ma, Jianfeng Xi'An China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'An China College of Computer and Data Science Fuzhou University Fuzhou China School of Data Science and Engineering East China Normal University Shanghai China Ant Group Hangzhou China
Backdoor injection attack is an emerging threat to the security of neural networks, however, there still exist limited effective defense methods against the attack. In this paper, we propose BAERASER, a novel method t... 详细信息
来源: 评论