咨询与建议

限定检索结果

文献类型

  • 9,347 篇 会议
  • 8,216 篇 期刊文献
  • 103 册 图书

馆藏范围

  • 17,666 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,849 篇 工学
    • 8,148 篇 计算机科学与技术...
    • 6,827 篇 软件工程
    • 2,641 篇 信息与通信工程
    • 1,791 篇 生物工程
    • 1,447 篇 控制科学与工程
    • 1,265 篇 电气工程
    • 1,189 篇 生物医学工程(可授...
    • 1,013 篇 光学工程
    • 888 篇 电子科学与技术(可...
    • 589 篇 机械工程
    • 533 篇 化学工程与技术
    • 451 篇 网络空间安全
    • 434 篇 交通运输工程
    • 424 篇 动力工程及工程热...
    • 411 篇 仪器科学与技术
    • 410 篇 安全科学与工程
  • 6,456 篇 理学
    • 3,249 篇 数学
    • 2,038 篇 生物学
    • 1,719 篇 物理学
    • 1,253 篇 统计学(可授理学、...
    • 656 篇 化学
    • 587 篇 系统科学
  • 3,119 篇 管理学
    • 1,766 篇 管理科学与工程(可...
    • 1,492 篇 图书情报与档案管...
    • 891 篇 工商管理
  • 1,121 篇 医学
    • 942 篇 临床医学
    • 849 篇 基础医学(可授医学...
    • 520 篇 药学(可授医学、理...
    • 481 篇 公共卫生与预防医...
  • 560 篇 法学
    • 480 篇 社会学
  • 338 篇 经济学
  • 275 篇 农学
  • 174 篇 教育学
  • 57 篇 文学
  • 31 篇 军事学
  • 23 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 687 篇 deep learning
  • 648 篇 accuracy
  • 443 篇 feature extracti...
  • 438 篇 machine learning
  • 411 篇 computational mo...
  • 392 篇 training
  • 347 篇 real-time system...
  • 337 篇 predictive model...
  • 296 篇 semantics
  • 267 篇 internet of thin...
  • 244 篇 optimization
  • 230 篇 support vector m...
  • 225 篇 convolutional ne...
  • 199 篇 reinforcement le...
  • 197 篇 data models
  • 193 篇 neural networks
  • 192 篇 data mining
  • 164 篇 image segmentati...
  • 152 篇 reliability
  • 146 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 397 篇 iccub universita...
  • 376 篇 horia hulubei na...
  • 364 篇 h.h. wills physi...
  • 309 篇 university of ch...
  • 292 篇 van swinderen in...
  • 291 篇 nikhef national ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 289 篇 center for high ...
  • 285 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 cavendish labora...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...
  • 279 篇 departamento de ...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 236 篇 bellee v.
  • 223 篇 casse g.
  • 215 篇 bowcock t.j.v.
  • 215 篇 blake t.
  • 204 篇 brundu d.
  • 202 篇 borsato m.
  • 200 篇 betancourt c.
  • 163 篇 bediaga i.
  • 158 篇 niyato dusit
  • 158 篇 baker s.
  • 151 篇 amato s.
  • 149 篇 boettcher t.
  • 147 篇 baryshnikov f.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain

语言

  • 14,120 篇 英文
  • 3,462 篇 其他
  • 128 篇 中文
  • 5 篇 斯洛文尼亚文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Computer Science Engineering-Data Science"
17666 条 记 录,以下是4981-4990 订阅
排序:
Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
Predicting Cervical Cancer Using Deep Learning Mutation-based Atom Search Optimization (MASO) Algorithm
Predicting Cervical Cancer Using Deep Learning Mutation-base...
收藏 引用
Trends in Quantum Computing and Emerging Business Technologies (TQCEBT), International Conference on
作者: A V R Mayuri Selvekumar K Subash Anurag Aeron School of Computing Science and Engineering VIT Bhopal University Sehore Madhya Pradesh India Department of Electrical and Computer Engineering Bahir Dar Institute of Technology Bahir Dar University Ethiopia Department of Data Science St. Joseph College (Autonomous) Trichy India Department of Computer Science and Engineering MIET Meerut Uttar Pradesh India
Worldwide, women are compressed by cervical cancer, which is a prevalent malignancy. This disease, which is currently the fourth leading cause of death for women, shows no symptoms when it first arises. Cells that cau... 详细信息
来源: 评论
Adversarial Discriminative Domain Adaptation and Transformers for EEG-based Cross-Subject Emotion Recognition
Adversarial Discriminative Domain Adaptation and Transformer...
收藏 引用
International IEEE/EMBS Conference on Neural engineering, CNE
作者: Shadi Sartipi Mujdat Cetin Department of Electrical and Computer Engineering University of Rochester Rochester USA Department of Electrical and Computer Engineering Goergen Institute for Data Science University of Rochester Rochester USA
Decoding the human emotional states based on electroencephalography (EEG) in affective brain-computer interfaces (BCI) is a great challenge due to inter-subject variability. Existing methods mostly use large amounts o... 详细信息
来源: 评论
An efficient multi-attribute combinatorial auction for 4PL transportation service procurement
An efficient multi-attribute combinatorial auction for 4PL t...
收藏 引用
第35届中国控制与决策会议
作者: Na Yuan Haiming Liang Min Huang Yanfeng Zhang College of Information Science and Engineering Northeastern University Center for Network Big Data and Decision-Making Business School Sichuan University College of Computer Science and Engineering Northeastern University
In this paper,we study the mechanism design problem of combinatorial reverse auction for 4 PL transportation service procurement(TSP) considering price and multiple nonprice *** order to achieve efficient winner deter... 详细信息
来源: 评论
MTVHunter: Smart Contracts Vulnerability Detection Based on Multi-Teacher Knowledge Translation  39
MTVHunter: Smart Contracts Vulnerability Detection Based on ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Sun, Guokai Zhuang, Yuan Zhang, Shuo Feng, Xiaoyu Liu, Zhenguang Zhang, Liguo College of Computer Science and Technology Harbin Engineering University Heilongjiang China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Blockchain and Data Security Hangzhou China
Smart contracts, closely intertwined with cryptocurrency transactions, have sparked widespread concerns about considerable financial losses of security issues. To counteract this, a variety of tools have been develope... 详细信息
来源: 评论
COMET: NFT Price Prediction with Wallet Profiling
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Tianfu Deng, Liwei Wang, Chao Lian, Jianxun Yan, Yue Yuan, Nicholas Jing Zhang, Qi Xiong, Hui School of Computer Science and Technology University of Science and Technology of China Hefei China Microsoft Inc Suzhou China School of Artificial Intelligence and Data Science University of Science and Technology of China Hefei China Microsoft Research Asia Beijing China Microsoft Inc Beijing China Guangzhou China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong
As the non-fungible token (NFT) market flourishes, price prediction emerges as a pivotal direction for investors gaining valuable insight to maximize returns. However, existing works suffer from a lack of practical de... 详细信息
来源: 评论
TWO-STAGE PREDICT+OPTIMIZE FOR MIXED INTEGER LINEAR PROGRAMS WITH UNKNOWN PARAMETERS IN CONSTRAINTS
arXiv
收藏 引用
arXiv 2023年
作者: Hu, Xinyi Lee, Jasper C.H. Lee, Jimmy H.M. Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong Department of Computer Sciences Institute for Foundations of Data Science University of Wisconsin–Madison WI United States
Consider the setting of constrained optimization, with some parameters unknown at solving time and requiring prediction from relevant features. Predict+Optimize is a recent framework for end-to-end training supervised... 详细信息
来源: 评论
FullTransNet: Full Transformer with Local-Global Attention for Video Summarization
arXiv
收藏 引用
arXiv 2025年
作者: Lan, Libin Jiang, Lu Yu, Tianshu Liu, Xiaojuan He, Zhongshi The College of Computer Science and Engineering Chongqing University of Technology Chongqing400054 China The School of Data Science Chinese University of Hong Kong Shenzhen518172 China The College of Artificial Intelligence Chongqing University of Technology Chongqing401135 China The College of Computer Science Chongqing University Chongqing400044 China
Video summarization mainly aims to produce a compact, short, informative, and representative synopsis of raw videos, which is of great importance for browsing, analyzing, and understanding video content. Dominant vide... 详细信息
来源: 评论
RAUIE: A Relation-Augmented Document-Level Event Extraction Model Based on UIE
RAUIE: A Relation-Augmented Document-Level Event Extraction ...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Yiyuan Liang Hong Jia Licai Wang Yangchen Huang Zhe Yang Big data research and development center North China Institute of Computing Technology Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Department of Computer Science and Engineering The Chinese University of Hong Kong China
In document-level event extraction tasks, multiple event types often coexist within a document (the multi-event problem), and arguments may play different roles across different events (the argument intertwining probl... 详细信息
来源: 评论
Blockchain-Based Identity Management: Enhancing Privacy and Security in Digital Identity System
Blockchain-Based Identity Management: Enhancing Privacy and ...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: S Saranya Monika K Manikandan Jangam Nagaraju S. Nagendiran B. T. Geetha Computer Science and Engineering Dr. N.G.P. Institute of Technology Coimbatore Mangalmay Institute of Management and Technology Greater Noida India School of Computer Science & Engineering (SCOPE) Vellore Institute of Technology (VIT) Vellore Tamilnadu India Department of Data Science MLR Institute of Technology Dundigal Hyderabad Department of Artificial Intelligence and Data Science R. M. K. Engineering College Department of ECE Saveetha School of Engineering (SIMATS) Saveetha University Tamil Nadu India
Privacy and security are major concerns when it comes to digital identities, particularly in centralized systems where data can be easily hacked or where people engage in identity fraud. These issues can be addressed ... 详细信息
来源: 评论