咨询与建议

限定检索结果

文献类型

  • 16,227 篇 会议
  • 14,212 篇 期刊文献
  • 151 册 图书
  • 2 篇 专利

馆藏范围

  • 30,592 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,012 篇 工学
    • 14,543 篇 计算机科学与技术...
    • 12,265 篇 软件工程
    • 4,337 篇 信息与通信工程
    • 3,003 篇 生物工程
    • 2,450 篇 控制科学与工程
    • 1,900 篇 生物医学工程(可授...
    • 1,884 篇 电气工程
    • 1,565 篇 光学工程
    • 1,290 篇 电子科学与技术(可...
    • 993 篇 机械工程
    • 907 篇 化学工程与技术
    • 725 篇 网络空间安全
    • 710 篇 安全科学与工程
    • 661 篇 动力工程及工程热...
    • 653 篇 交通运输工程
    • 626 篇 仪器科学与技术
  • 11,274 篇 理学
    • 6,072 篇 数学
    • 3,398 篇 生物学
    • 2,657 篇 物理学
    • 2,317 篇 统计学(可授理学、...
    • 1,081 篇 化学
    • 1,073 篇 系统科学
  • 5,539 篇 管理学
    • 2,910 篇 图书情报与档案管...
    • 2,890 篇 管理科学与工程(可...
    • 1,466 篇 工商管理
  • 1,842 篇 医学
    • 1,545 篇 临床医学
    • 1,403 篇 基础医学(可授医学...
    • 812 篇 药学(可授医学、理...
    • 794 篇 公共卫生与预防医...
  • 1,028 篇 法学
    • 871 篇 社会学
  • 544 篇 经济学
  • 417 篇 农学
  • 324 篇 教育学
  • 96 篇 文学
  • 47 篇 军事学
  • 39 篇 艺术学
  • 5 篇 历史学
  • 4 篇 哲学

主题

  • 1,006 篇 deep learning
  • 888 篇 accuracy
  • 773 篇 machine learning
  • 719 篇 training
  • 713 篇 feature extracti...
  • 578 篇 semantics
  • 565 篇 computational mo...
  • 427 篇 predictive model...
  • 419 篇 data models
  • 347 篇 convolutional ne...
  • 343 篇 internet of thin...
  • 331 篇 support vector m...
  • 326 篇 reinforcement le...
  • 321 篇 real-time system...
  • 286 篇 neural networks
  • 277 篇 data mining
  • 274 篇 image segmentati...
  • 256 篇 task analysis
  • 255 篇 optimization
  • 249 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 428 篇 department of ph...
  • 397 篇 iccub universita...
  • 345 篇 university of ch...
  • 342 篇 college of compu...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 henryk niewodnic...
  • 279 篇 horia hulubei na...

作者

  • 241 篇 beiter a.
  • 241 篇 barter w.
  • 223 篇 bellee v.
  • 218 篇 casse g.
  • 212 篇 bowcock t.j.v.
  • 194 篇 brundu d.
  • 185 篇 blake t.
  • 172 篇 niyato dusit
  • 155 篇 baker s.
  • 153 篇 borsato m.
  • 149 篇 betancourt c.
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon

语言

  • 27,438 篇 英文
  • 3,008 篇 其他
  • 194 篇 中文
  • 6 篇 法文
  • 4 篇 德文
  • 4 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science and Data Science"
30592 条 记 录,以下是981-990 订阅
排序:
PROVABLE SIM-TO-REAL TRANSFER IN CONTINUOUS DOMAIN WITH PARTIAL OBSERVATIONS  11
PROVABLE SIM-TO-REAL TRANSFER IN CONTINUOUS DOMAIN WITH PART...
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Hu, Jiachen Zhong, Han Jin, Chi Wang, Liwei School of Computer Science Peking University China Center for Data Science Peking University China Department of Electrical and Computer Engineering Princeton University United States National Key Laboratory of General Artificial Intelligence School of Intelligence Science and Technology Peking University Center for Data Science Peking University Beijing Institute of Big Data Research China
Sim-to-real transfer, which trains RL agents in the simulated environments and then deploys them in the real world, has been widely used to overcome the limitations of gathering samples in the real world. Despite the ...
来源: 评论
Multi-View Multi-Modal Head-Gaze Estimation for Advanced Indoor User Interaction
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 5107-5132页
作者: Jung-Hwa Kim Jin-Woo Jeong Department of Computer Engineering Kumoh National Institute of TechnologyGumi39177Korea Department of Data Science Seoul National University of Science and TechnologySeoul01811Kore
Gaze estimation is one of the most promising technologies for supporting indoor monitoring and interaction ***,previous gaze estimation techniques generally work only in a controlled laboratory environment because the... 详细信息
来源: 评论
Temporal-Aware Deep Reinforcement Learning for Energy Storage Bidding in Energy and Contingency Reserve Markets
IEEE Transactions on Energy Markets, Policy and Regulation
收藏 引用
IEEE Transactions on Energy Markets, Policy and Regulation 2024年 第3期2卷 392-406页
作者: Li, Jinhao Wang, Changlong Zhang, Yanru Wang, Hao Monash University Department of Data Science and AI Faculty of IT and Monash Energy Institute MelbourneVIC3800 Australia Monash University Department of Civil Engineering MelbourneVIC3800 Australia University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China
The battery energy storage system (BESS) has immense potential for enhancing grid reliability and security through its participation in the electricity market. BESS often seeks various revenue streams by taking part i... 详细信息
来源: 评论
Blockchain-Empowered Asynchronous Federated Reinforcement Learning for IoT-Based Traffic Trajectory Prediction
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17095-17109页
作者: Wang, Bin Tian, Zhao Tang, Fengxiao Pan, Heng She, Wei Liu, Wei Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou450002 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou450002 China Central South University School of Computer Science and Engineering Changsha410083 China Zhongyuan University of Technology School of Cyber Space Security Zhengzhou450007 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou Key Laboratory of Blockchain and Data Intelligence Zhengzhou450002 China
Vehicle trajectory prediction plays a crucial role in IoT-based intelligent transportation systems, which can effectively address key issues, such as driving safety and multivehicle collaboration. However, the sensiti... 详细信息
来源: 评论
Seer: Accelerating Block chain Transaction Execution by Fine-Grained Branch Prediction  51st
Seer: Accelerating Block chain Transaction Execution by Fine...
收藏 引用
51st International Conference on Very Large data Bases, VLDB 2025
作者: Zhang, Shijie Cheng, Ru Liu, Xinpeng Xiao, Jiang Jin, Hai Li, Bo National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Increasingly popular decentralized applications (dApps) with complex application logic incur significant overhead for executing smart contract transactions, which greatly limits public block chain performance. Pre-exe...
来源: 评论
An effective compressed image authentication scheme based on N-variant AMBTC
收藏 引用
Multimedia Tools and Applications 2024年 第2期83卷 3801-3829页
作者: Su, Guo-Dong Chang, Chin-Chen Lin, Chia-Chen School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fuzhou350300 China Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Road Seatwen Taichung40724 Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung41170 Taiwan
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AM... 详细信息
来源: 评论
Speech Emotion Analysis Based on Vision Transformer  2
Speech Emotion Analysis Based on Vision Transformer
收藏 引用
2022 2nd Conference on High Performance Computing and Communication Engineering, HPCCE 2022
作者: Huang, Xiaogang Zheng, Qifeng Zhang, Yuanyuan Cheng, Dong Liu, Yuting Dong, Chen College of Computer and Data Science College of Software Fuzhou University Fuzhou350108 China
Emotion is an essential aspect of human life, and effectively identifying corresponding emotions from different scenarios will help promote the development of human-computer interaction ***, emotion classification has... 详细信息
来源: 评论
Automated AI-Powered Fruit Identification Using Convolutional Neural Network
Automated AI-Powered Fruit Identification Using Convolutiona...
收藏 引用
2025 International Conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Sai Tejasree, K. Surendran, R. Rajakumar, B. Gomathi, R.M. Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India J.N.N Institute of Engineering Department of Artificial Intelligence and Data Science Chennai India School of Computing Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai India
Clever system that can look at pictures of fruits and figure out what kind of fruit each picture shows. AI algorithms like deep learning, which is like giving the Machine learning model a crash course in fruit recogni... 详细信息
来源: 评论
Extremist Views Detection: Definition, Annotated Corpus, and Baseline Results  16th
Extremist Views Detection: Definition, Annotated Corpus, and...
收藏 引用
16th International Conference on Information Technology and Applications, ICITA 2022
作者: Hussain, Muhammad Anwar Shahzad, Khurram Sulaiman, Sarina Department of Computer Science University of Technology Malaysia Johor Bahru Malaysia Department of Data Science University of the Punjab Lahore Pakistan
Extremist view detection in social networks is an emerging area of research. Several attempts have been made to extremist views detection on social media. However, there is a scarcity of publicly available annotated c... 详细信息
来源: 评论
Structured Sampling for Robust Euclidean Distance Geometry  59
Structured Sampling for Robust Euclidean Distance Geometry
收藏 引用
59th Annual Conference on Information sciences and Systems, CISS 2025
作者: Kundu, Chandra Tasissa, Abiy Cai, HanQin University of Central Florida Department of Statistics and Data Science OrlandoFL32816 United States Tufts University Department of Mathematics MedfordMA02155 United States University of Central Florida Department of Statistics and Data Science Department of Computer Science OrlandoFL32816 United States
This paper addresses the problem of estimating the positions of points from distance measurements corrupted by sparse outliers. Specifically, we consider a setting with two types of nodes: anchor nodes, for which exac... 详细信息
来源: 评论