咨询与建议

限定检索结果

文献类型

  • 6,688 篇 会议
  • 6,115 篇 期刊文献
  • 71 册 图书

馆藏范围

  • 12,874 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,539 篇 工学
    • 4,619 篇 计算机科学与技术...
    • 3,814 篇 软件工程
    • 1,701 篇 信息与通信工程
    • 1,148 篇 控制科学与工程
    • 980 篇 电子科学与技术(可...
    • 966 篇 电气工程
    • 887 篇 生物工程
    • 797 篇 光学工程
    • 737 篇 生物医学工程(可授...
    • 563 篇 机械工程
    • 555 篇 化学工程与技术
    • 527 篇 仪器科学与技术
    • 406 篇 网络空间安全
    • 376 篇 材料科学与工程(可...
    • 343 篇 动力工程及工程热...
    • 302 篇 核科学与技术
    • 285 篇 安全科学与工程
  • 5,357 篇 理学
    • 2,660 篇 物理学
    • 1,853 篇 数学
    • 1,026 篇 生物学
    • 682 篇 化学
    • 589 篇 统计学(可授理学、...
    • 339 篇 系统科学
  • 1,862 篇 管理学
    • 1,172 篇 管理科学与工程(可...
    • 781 篇 图书情报与档案管...
    • 402 篇 工商管理
  • 797 篇 医学
    • 614 篇 临床医学
    • 548 篇 基础医学(可授医学...
    • 362 篇 药学(可授医学、理...
    • 308 篇 公共卫生与预防医...
  • 302 篇 法学
  • 212 篇 农学
  • 149 篇 经济学
  • 78 篇 教育学
  • 72 篇 文学
  • 50 篇 军事学
  • 20 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 364 篇 deep learning
  • 340 篇 accuracy
  • 302 篇 feature extracti...
  • 251 篇 computational mo...
  • 227 篇 machine learning
  • 205 篇 hadron colliders
  • 197 篇 real-time system...
  • 183 篇 predictive model...
  • 183 篇 training
  • 182 篇 semantics
  • 178 篇 support vector m...
  • 162 篇 optimization
  • 149 篇 internet of thin...
  • 142 篇 image segmentati...
  • 131 篇 data mining
  • 109 篇 computer science
  • 107 篇 neural networks
  • 103 篇 visualization
  • 99 篇 object detection
  • 98 篇 hadrons

机构

  • 1,100 篇 cavendish labora...
  • 1,027 篇 department of ph...
  • 1,000 篇 university of ch...
  • 979 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 643 篇 infn laboratori ...
  • 621 篇 infn sezione di ...
  • 607 篇 fakultät physik ...
  • 602 篇 infn sezione di ...
  • 595 篇 infn sezione di ...
  • 565 篇 school of physic...
  • 563 篇 horia hulubei na...
  • 545 篇 iccub universita...
  • 536 篇 school of physic...
  • 536 篇 department of ph...
  • 535 篇 h.h. wills physi...
  • 518 篇 imperial college...
  • 514 篇 nikhef national ...
  • 510 篇 stfc rutherford ...
  • 507 篇 school of physic...

作者

  • 269 篇 barter w.
  • 258 篇 a. gomes
  • 256 篇 beiter a.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 244 篇 blake t.
  • 242 篇 g. bella
  • 242 篇 j. strandberg
  • 242 篇 bellee v.
  • 239 篇 c. amelung
  • 238 篇 d. calvet
  • 236 篇 bowcock t.j.v.
  • 234 篇 g. spigo
  • 233 篇 brundu d.
  • 233 篇 betancourt c.
  • 232 篇 f. siegert
  • 231 篇 borsato m.
  • 228 篇 s. chen
  • 227 篇 amato s.
  • 221 篇 boettcher t.

语言

  • 11,809 篇 英文
  • 885 篇 其他
  • 185 篇 中文
  • 2 篇 法文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering Vidya Academy of Science and Technology"
12874 条 记 录,以下是4991-5000 订阅
排序:
Information-density Masking Strategy for Masked Image Modeling
Information-density Masking Strategy for Masked Image Modeli...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: He Zhu Yang Chen Guyue Hu Shan Yu Brainnetome Center National Laboratory of Pattern Recognition (NLPR) Institute of Automation Chinese Academy of Sciences(CASIA) School of Future Technology University of Chinese Academy of Sciences(UCAS) School of Computer Science and Engineering Nanyang Technological University School of Artificial Intelligence University of Chinese Academy of Sciences(UCAS)
Recent representation learning approaches mainly fall into two paradigms: contrastive learning (CL) and masked image modeling (MIM). Combining these two methods may boost the performance, but its learning process stil...
来源: 评论
Dynamic Identity-Based Cryptography using RSA
Dynamic Identity-Based Cryptography using RSA
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Gopala Krishnan M.P. Karnik S. Hemelatha Simranjeet Nanda P Allirani Amit Kansal School of Mangement-PG Management JAIN (Deemed to be University) Bangalore Karnataka India Computer Engineering Vishwakarma Institute of Technology Pune India Department of Computer Science Engineering Karpagam Academy of Higher Education Coimbatore India Centre of Research Impact and Outcome Chitkara University Rajpura Punjab India Department of Information Technology Prince Shri Venkateshwara Padmavathy Engineering College Chennai India Quantum University Research Center Quantum University
Dynamic identification-based cryptography is a rising shape of cryptographic era that makes use of best an identity in place of a pair of public and personal keys to encrypt facts. This technology is based totally at ... 详细信息
来源: 评论
Learning from models beyond fine-tuning
arXiv
收藏 引用
arXiv 2023年
作者: Zheng, Hongling Shen, Li Tang, Anke Luo, Yong Hu, Han Du, Bo Wen, Yonggang Tao, Dacheng School of Computer Science School of Artificial Intelligence National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University JD Explore Academy China Beijing Institute of Technology China Nanyang Technological University Singapore
Foundation models (FM) have demonstrated remarkable performance across a wide range of tasks (especially in the fields of natural language processing and computer vision), primarily attributed to their ability to comp... 详细信息
来源: 评论
Document-level DDI relation extraction with document-entity embedding
Document-level DDI relation extraction with document-entity ...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Mingliang, Dou Jijun, Tang Fei, Guo Tianjin University College of Intelligence and Computing Tianjin China Chinese Academy of Sciences Shenzhen Institute of Advanced Technology Shenzhen China Central South University School of Computer Science and Engineering Changsha China
DDI is an important part of drug-related research and pharmacovigilance. Extracting DDI information from scientific literature has become a low-cost and highly reliable way. Currently, existing works are all sentence-... 详细信息
来源: 评论
Automatic Topic Classification And Document Clustering Using Lda Based Machine Learning Techniques
Automatic Topic Classification And Document Clustering Using...
收藏 引用
Communications and Information Technologies (GCCIT), Global Conference on
作者: K. Yuvaraj Nipun Setia Sangeetha S Prakhar Goyal Thomas P K Vishal A. Meshram Department of Computer Science Karpagam Academy of Higher Education Coimbatore Centre of Research Impact and Outcome Chitkara University Rajpura Punjab India Department of Science and Humanities Prince Shri Venkateshwara Padmavathy Engineering College Chennai Quantum University Research Center Quantum University Roorkee Uttarakhand India Adjunct Faculty School of Management - PG Management JAIN (Deemed to be University) Bangalore Karnataka Department of Computer Engineering Vishwakarma Institute of Technology Pune India
Since more and more information is being stored in digital formats (such as databases, journals, libraries, and papers), it is crucial that this information be put to good use. However, it might be challenging to extr... 详细信息
来源: 评论
Data-consistent Unsupervised Diffusion Model for Metal Artifact Reduction
Data-consistent Unsupervised Diffusion Model for Metal Artif...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Zhan Tong Zhan Wu Yang Yang Weilong Mao Shijie Wang Yinsheng Li Yang Chen Laboratory of Image Science and Technology Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China Research Center for Medical Artificial Intelligence Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing the Laboratory of Image Science and Technology School of Computer Science and Engineering and the Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Nanjing China
Computed Tomography (CT) is an imaging technique widely used in clinical diagnosis. However, high-attenuation metallic implants result in the obstruction of low-energy Xrays and further lead to metal artifacts in the ...
来源: 评论
Pyscribe - Learning to Describe Python Code
SSRN
收藏 引用
SSRN 2022年
作者: Guo, Juncai Liu, Jin Wan, Yao Zhao, Yanjie Li, Li Liu, Kui Klein, Jacques Bissyandé, Tegawendé F. School of Computer Science Wuhan University Wuhan China Key Laboratory of Network Assessment Technology Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Faculty of Information Technology Monash University VIC Australia Huawei Software Engineering Application Technology Lab Hangzhou China SnT Centre University of Luxembourg 1855 Luxembourg
Code comment generation, which aims to describe the functionality of source code in natural language, plays an important role in automatic software development. Currently, several structural neural networks have been ... 详细信息
来源: 评论
Transformation from 5G N/W to 6G N/W Through technology Inclusion
Transformation from 5G N/W to 6G N/W Through Technology Incl...
收藏 引用
Advance Computing and Innovative Technologies in engineering (ICACITE), International Conference on
作者: Rohit Vaish V. Diana Earshia M Jeba Paulin Hassan M. Al-Jawahry B Maheshwari T. Mohanraj Department of Electronics & Communication Engineering IES College Of Technology Bhopal M. P India Vel Tech Rangarajan Dr Sagunthala R&D Institute of Science and Technology (Deemed To Be University) Avadi Chennai TamilNadu India Department of Electronics and Communication Engineering Nehru Institute of Technology T.M.Palayam Tamil Nadu India Department of computers Techniques engineering College of technical engineering The Islamic University Najaf Iraq Department of Electronics and Communication Engineering Prince Shri Venkateshwara Padmavathy Engineering College TN Department of Computer Science Engineering Karpagam Academy of Higher Education Coimbatore TN
For us, figuring out where we are or where our resources are has always been important. While technology has greatly benefited this quest, real-time interior locating remains a daunting problem, from conventional inst... 详细信息
来源: 评论
Streaming Algorithms for Graph k-Matching with Optimal or Near-Optimal Update Time  32
Streaming Algorithms for Graph k-Matching with Optimal or Ne...
收藏 引用
32nd International Symposium on Algorithms and Computation, ISAAC 2021
作者: Chen, Jianer Huang, Qin Kanj, Iyad Li, Qian Xia, Ge Department of Computer Science and Engineering Texas A&M University College StationTX United States School of Computing DePaul University ChicagoIL United States Institute of Computing Technology Chinese Academy of Sciences Beijing China Department of Computer Science Lafayette College EastonPA United States
We present streaming algorithms for the graph k-matching problem in both the insert-only and dynamic models. Our algorithms, while keeping the space complexity matching the best known upper bound, have optimal or near... 详细信息
来源: 评论
Generation of Dynamic Authorization Using Cryptography For Private-Keyless Data Sharing
SSRN
收藏 引用
SSRN 2023年
作者: Lu, Hai Zhu, Yan Yau, Stephen S. Zhu, Guizhen Lv, Kewei School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China School of Computing Informatics and Decision Systems Engineering Arizona State University TempeAZ85281 United States Data and Communication Science Technology Research Institute Beijing100191 China School of Cyber Security University of Chinese Academy of Sciences Beijing100093 China
Private-keyless access is emerging as an inevitable trend in the evolution of future information systems. It helps simplify key management, enhance security, and increase flexibility of access authorization. Hereby, w... 详细信息
来源: 评论