咨询与建议

限定检索结果

文献类型

  • 477 篇 期刊文献
  • 275 篇 会议
  • 6 册 图书

馆藏范围

  • 758 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 476 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 88 篇 生物工程
    • 81 篇 信息与通信工程
    • 72 篇 生物医学工程(可授...
    • 66 篇 电气工程
    • 61 篇 控制科学与工程
    • 54 篇 电子科学与技术(可...
    • 50 篇 光学工程
    • 32 篇 化学工程与技术
    • 23 篇 材料科学与工程(可...
    • 22 篇 仪器科学与技术
    • 18 篇 动力工程及工程热...
    • 16 篇 机械工程
  • 370 篇 理学
    • 164 篇 数学
    • 116 篇 生物学
    • 93 篇 物理学
    • 75 篇 统计学(可授理学、...
    • 42 篇 化学
    • 39 篇 系统科学
  • 139 篇 管理学
    • 77 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 47 篇 工商管理
    • 16 篇 公共管理
  • 88 篇 医学
    • 67 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 45 篇 公共卫生与预防医...
    • 32 篇 药学(可授医学、理...
  • 27 篇 农学
  • 25 篇 法学
    • 23 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 6 篇 教育学
  • 2 篇 文学

主题

  • 28 篇 machine learning
  • 24 篇 deep learning
  • 19 篇 training
  • 16 篇 computational mo...
  • 15 篇 predictive model...
  • 14 篇 accuracy
  • 13 篇 semantics
  • 12 篇 generative adver...
  • 12 篇 real-time system...
  • 12 篇 feature extracti...
  • 11 篇 optimization
  • 11 篇 decision making
  • 11 篇 forecasting
  • 11 篇 adaptation model...
  • 10 篇 data models
  • 8 篇 covid-19
  • 8 篇 data mining
  • 8 篇 artificial intel...
  • 7 篇 scalability
  • 7 篇 reinforcement le...

机构

  • 9 篇 computational an...
  • 8 篇 applied mathemat...
  • 8 篇 school of data a...
  • 8 篇 computational an...
  • 8 篇 department of co...
  • 8 篇 shenzhen researc...
  • 8 篇 department of co...
  • 7 篇 department of co...
  • 7 篇 department of bi...
  • 7 篇 srm institute of...
  • 7 篇 department of ma...
  • 7 篇 department of da...
  • 6 篇 department of mo...
  • 6 篇 institute of com...
  • 6 篇 information stor...
  • 6 篇 department of co...
  • 6 篇 computer network...
  • 6 篇 faculty of scien...
  • 6 篇 department of me...
  • 6 篇 zhejiang bioinfo...

作者

  • 40 篇 masuda naoki
  • 13 篇 herrera-viedma e...
  • 11 篇 shoeibi afshin
  • 10 篇 alizadehsani roo...
  • 9 篇 akshya j.
  • 9 篇 naoki masuda
  • 9 篇 jasra ajay
  • 8 篇 choudhry mani de...
  • 8 篇 nahavandi saeid
  • 8 篇 mani deepak chou...
  • 7 篇 huang ming-chun
  • 6 篇 mitra pabitra
  • 6 篇 acharya u. rajen...
  • 6 篇 enrique herrera-...
  • 6 篇 hussain sadiq
  • 6 篇 shuai wang
  • 6 篇 jafari mahboobeh
  • 6 篇 m. sundarrajan
  • 6 篇 khosravi abbas
  • 6 篇 sundarrajan m.

语言

  • 618 篇 英文
  • 135 篇 其他
  • 8 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 罗马尼亚文
检索条件"机构=Computer Science & Engineering Computational and Data-enabled Science & Engineering"
758 条 记 录,以下是321-330 订阅
CCGRID 2023: A Holistic Approach to Inclusion and Belonging
CCGRID 2023: A Holistic Approach to Inclusion and Belonging
收藏 引用
IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID)
作者: Beth Plale Preeti Malakar Meenakshi D'Souza Hemangee K. Kapoor Yogesh Simmhan Ilkay Altintas Manohar Swaminathan School of Informatics Computing and Engineering Indiana University Bloomington IN USA Department of Computer Science and Engineering Indian Institute of Technology Kanpur Kalyanpur Kanpur India International Institute of Information Technology Bangalore Bengaluru Karnataka India Department of Computer Science and Engineering Indian Institute of Technology Guwahati Guwahati Assam India Department of Computational and Data Sciences Indian Institute of Science Bangalore India San Diego Supercomputer Center University of California San Diego MC USA Microsoft Research Lab - India Bengaluru Karnataka India
“CCGRID will act with responsibility as its primary consideration; with equity, diversity, and inclusion as its central goals.” from the CCGRID 2023 web site [1]
来源: 评论
On the Particle Approximation of Lagged Feynman-Kac Formulae
arXiv
收藏 引用
arXiv 2024年
作者: Awadelkarim, Elsiddig Caffarel, Michel Moral, Pierre Del Jasra, Ajay Applied Mathematics and Computational Science Program Computer Electrical and Mathematical Sciences and Engineering Division King Abdullah University of Science and Technology Thuwal23955-6900 Saudi Arabia University of Toulouse CNRS-Lab. de Chimie et Physique Quantiques Toulouse31062 France Centre de Recherche Inria Bordeaux Sud-Ouest Talence33405 France School of Data Science The Chinese University Hong Kong Shenzhen China
In this paper we examine the numerical approximation of the limiting invariant measure associated with Feynman-Kac formulae. These are expressed in a discrete time formulation and are associated with a Markov chain an... 详细信息
来源: 评论
Big data in healthcare:Conceptual network structure,key challenges and opportunities
收藏 引用
Digital Communications and Networks 2023年 第4期9卷 856-868页
作者: Leonardo B.Furstenaua Pedro Leivas Michele Kremer Sott Michael S.Dohan Jose Ricardo Lopez-Robles Manuel J.Cobo Nicola Luigi Bragazzi Kim-Kwang Raymond Choo Post-Graduate Program in Industrial Engineering Federal University of Rio Grande Do SulPorto Alegre90035-190Brazil University of Santa Cruz Do Sul Av.Independencia 2293Santa Cruz Do SulRSBrazil Business School Unisinos UniversityAv.Dr.Nilo Peçanha 160091330-002Porto AlegreBrazil Faculty of Business Administration Lakehead UniversityThunder BayOntarioCanada Autonomous University of Zacatecas Av.Ramon Lopez Velarde Col.CentroZacatecas98000Mexico Department of Computer Science and Artificial Intelligence Andalusian Research Institute in Data Science and Computational Intelligence(DaSCI)University of GranadaGranada 18071Spain York University ON M3J 1P3Canada Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249USA
Big data is a concept that deals with large or complex data sets by using data analysis tools(e.g.,data mining,machine learning)to analyze information extracted from several sources *** data has attracted wide attenti... 详细信息
来源: 评论
Using data Analytics to Forecast Violent Crime
Using Data Analytics to Forecast Violent Crime
收藏 引用
International Conference on computational science and computational Intelligence (CSCI)
作者: Herious Cotton Tor A. Kwembe Computational Data Enabled Science and Engineering Jackson State University Jackson MS USA Department of Mathematics and Statistical Sciences Jackson State University Jackson MS USA
In this paper, we used data analytics to analyze criminal data. Prophet model, LSTM recurrent neural network model, a linear regression model, and traditional neural network model were used to predict homicide and rap... 详细信息
来源: 评论
Travel-related Importation and Exportation Risks of SARS-CoV-2 Omicron Variant in 367 Prefectures(Cities)-China,2022
收藏 引用
China CDC weekly 2022年 第40期4卷 885-889,I0002-I0005页
作者: Yuan Bai Mingda Xu Caifen Liu Mingwang Shen Lin Wang Linwei Tian Suoyi Tan Lei Zhang Petter Holme Xin Lu Eric H.Y.Lau Benjamin J.Cowling Zhanwei Du WHO Collaborating Centre for Infectious Disease Epidemiology and Control School of Public HealthLi Ka Shing Faculty of MedicineThe University of Hong KongHong Kong Special Administrative RegionChina Laboratory of Data Discovery for Health Limited(D24H) Hong Kong Science ParkHong Kong Special Administrative RegionChina China-Australia Joint Research Center for Infectious Diseases School of Public HealthXi’an Jiaotong University Health Science CenterXi’an CityShaanxi ProvinceChina Department of Genetics University of CambridgeCambridge CB23EHUK College of Systems Engineering National University of Defense TechnologyChangsha CityHunan ProvinceChina Department of Computer Science Aalto UniversityEspooFinland Center for Computational Social Science Kobe UniversityKobeJapan
Introduction:Minimizing the importation and exportation risks of coronavirus disease 2019(COVID-19)is a primary concern for sustaining the“Dynamic COVID-zero”strategy in *** estimation is essential for cities to con... 详细信息
来源: 评论
Mining data impressions from deep models as substitute for the unavailable training data
arXiv
收藏 引用
arXiv 2021年
作者: Nayak, Gaurav Kumar Mopuri, Konda Reddy Jain, Saksham Chakraborty, Anirban Department of Computational and Data Sciences Indian Institute of Science Bangalore India Department of Computer Science and Engineering Indian Institute of Technology Tirupati
Pretrained deep models hold their learnt knowledge in the form of model parameters. These parameters act as "memory" for the trained models and help them generalize well on unseen data. However, in absence o... 详细信息
来源: 评论
Perturbation theory for evolution of cooperation on networks
arXiv
收藏 引用
arXiv 2022年
作者: Meng, Lingqi Masuda, Naoki Department of Mathematics University at Buffalo State University of New York BuffaloNY14260-2900 United States Computational and Data-Enabled Science and Engineering Program University at Buffalo State University of New York BuffaloNY14260-5030 United States
Network structure is a mechanism for promoting cooperation in social dilemma games. In the present study, we explore graph surgery, i.e., to slightly perturb the given network, towards a network that better fosters co... 详细信息
来源: 评论
An explainable COVID-19 detection system based on human sounds
收藏 引用
Smart Health 2022年 26卷 100332页
作者: Li, Huining Chen, Xingyu Qian, Xiaoye Chen, Huan Li, Zhengxiong Bhattacharjee, Soumyadeep Zhang, Hanbin Huang, Ming-Chun Xu, Wenyao Department of Computer Science and Engineering University at Buffalo United States Department of Electrical Computer and Systems Engineering Case Western Reserve University United States Department of Computer Science and Engineering University of Colorado Denver United States Department of Data and Computational Science Duke Kunshan University China Suzhou Huanmu Intelligence Technology Co. Ltd. China
Acoustic signals generated by the human body have often been used as biomarkers to diagnose and monitor diseases. As the pathogenesis of COVID-19 indicates impairments in the respiratory system, digital acoustic bioma... 详细信息
来源: 评论
Network Intrusion Detection System Using Principal Component Analysis Algorithm and Decision Tree Classifier
Network Intrusion Detection System Using Principal Component...
收藏 引用
International Conference on computational science and computational Intelligence (CSCI)
作者: Oyeyemi Osho Sungbum Hong Tor A. Kwembe Department of Computational Data-Enabled Science and Engineering(CDS&#x0026 E) Jackson State University Jackson MS USA Department of Electrical &#x0026 Computer Engineering and Computer Science Jackson State University Jackson MS USA Department of Mathematics &#x0026 Statistical Sciences Jackson State University Jackson MS USA
Network Intrusion Detection Systems (IDS) have become expedient for network security and ensures the safety of all connected devices. Network Intrusion Detection System (IDS) alludes to observing network data informat... 详细信息
来源: 评论
Automatic detection of lung nodule in CT scan slices using CNN segmentation schemes: A study
收藏 引用
Procedia computer science 2023年 218卷 2786-2794页
作者: Seifedine Kadry Enrique Herrera-Viedma Rubén González Crespo Sujatha Krishnamoorthy Venkatesan Rajinikanth Faculty of Applied Computing and Technology Noroff University College Kristiansand 94612 Norway Research Institute in Data Science and Computational Intelligence University of Granada Granada Andalusian Spain Computer Science Department School of Engineering and Technology Universidad Internacional de La Rioja 26006 Spain Zhejiang Bioinformatics International Science and Technology Cooperation Center Wenzhou-Kean University Zhejiang Province China Wenzhou Municipal Key Lab of Applied Biomedical and Biopharmaceutical Informatics Wenzhou-Kean University Zhejiang Province China Department of Electronics and Instrumentation Engineering St. Joseph's College of Engineering OMR Chennai 600119 Tamil Nadu India
The lung is one of the prime respiratory organs in human physiology, and its abnormality will severely disrupt the respiratory system. Lung Nodule (LN) is one of the abnormalities, and early screening and treatment ar... 详细信息
来源: 评论