咨询与建议

限定检索结果

文献类型

  • 9,093 篇 会议
  • 8,192 篇 期刊文献
  • 101 册 图书

馆藏范围

  • 17,386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,686 篇 工学
    • 8,060 篇 计算机科学与技术...
    • 6,798 篇 软件工程
    • 2,614 篇 信息与通信工程
    • 1,793 篇 生物工程
    • 1,391 篇 控制科学与工程
    • 1,279 篇 电气工程
    • 1,187 篇 生物医学工程(可授...
    • 1,006 篇 光学工程
    • 890 篇 电子科学与技术(可...
    • 582 篇 机械工程
    • 532 篇 化学工程与技术
    • 442 篇 网络空间安全
    • 432 篇 动力工程及工程热...
    • 430 篇 交通运输工程
    • 411 篇 仪器科学与技术
    • 408 篇 安全科学与工程
  • 6,448 篇 理学
    • 3,229 篇 数学
    • 2,042 篇 生物学
    • 1,716 篇 物理学
    • 1,236 篇 统计学(可授理学、...
    • 660 篇 化学
    • 589 篇 系统科学
  • 3,113 篇 管理学
    • 1,764 篇 管理科学与工程(可...
    • 1,484 篇 图书情报与档案管...
    • 895 篇 工商管理
  • 1,128 篇 医学
    • 937 篇 临床医学
    • 851 篇 基础医学(可授医学...
    • 517 篇 药学(可授医学、理...
    • 477 篇 公共卫生与预防医...
  • 558 篇 法学
    • 479 篇 社会学
  • 338 篇 经济学
  • 275 篇 农学
  • 166 篇 教育学
  • 61 篇 文学
  • 31 篇 军事学
  • 23 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 663 篇 deep learning
  • 596 篇 accuracy
  • 440 篇 machine learning
  • 436 篇 feature extracti...
  • 398 篇 computational mo...
  • 384 篇 training
  • 324 篇 predictive model...
  • 323 篇 real-time system...
  • 301 篇 semantics
  • 258 篇 internet of thin...
  • 237 篇 optimization
  • 223 篇 support vector m...
  • 217 篇 convolutional ne...
  • 196 篇 neural networks
  • 193 篇 reinforcement le...
  • 185 篇 data mining
  • 183 篇 data models
  • 159 篇 image segmentati...
  • 145 篇 artificial intel...
  • 144 篇 visualization

机构

  • 426 篇 department of ph...
  • 397 篇 iccub universita...
  • 375 篇 horia hulubei na...
  • 366 篇 h.h. wills physi...
  • 306 篇 university of ch...
  • 293 篇 nikhef national ...
  • 292 篇 van swinderen in...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 289 篇 center for high ...
  • 285 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 cavendish labora...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...
  • 279 篇 departamento de ...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 236 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 204 篇 brundu d.
  • 202 篇 borsato m.
  • 200 篇 betancourt c.
  • 168 篇 bediaga i.
  • 157 篇 baker s.
  • 151 篇 amato s.
  • 147 篇 niyato dusit
  • 147 篇 baryshnikov f.
  • 147 篇 boettcher t.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain

语言

  • 16,094 篇 英文
  • 1,200 篇 其他
  • 109 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 土耳其文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science and Engineering With Data Science"
17386 条 记 录,以下是4901-4910 订阅
排序:
Artificial Intelligence Strategies for Accurate Segmentation and Categorization of Unveiling Genetic Disorders in Bioinformatics
Artificial Intelligence Strategies for Accurate Segmentation...
收藏 引用
Self Sustainable Artificial Intelligence Systems (ICSSAS), International Conference on
作者: T. Sarathamani K. Kavitha C. Thirumoorthi K Jayanthi Vagini P. Manikandaprabhu P. Sumathi Department of Computer Science and Engineering (AI) Brainware University Kolkata India Department of AI and ML School of Computing Mohan Babu University Sree Sainath Nagar Tirupati India Department of Computer Science PSG College of Arts and Science Coimbatore Tamilnadu India Department of Computer science with Data Analytics KPR College of Arts Science and Research Coimbatore Tamilnadu India Department of Computer Science School of Computing Amrita Vishwa Vidyapeetham Mysuru Karnataka India Department of Computer Science Dr. G R Damodaran College of Science Coimbatore Tamilnadu India
Women all across the world are affected by the potentially fatal condition known as breast cancer. According to clinical experts, early cancer detection helps to save lives. Several machine learning algorithms have be... 详细信息
来源: 评论
EdgeMove: Pipelining Device-Edge Model Training for Mobile Intelligence  23
EdgeMove: Pipelining Device-Edge Model Training for Mobile I...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Dong, Zeqian He, Qiang Chen, Feifei Jin, Hai Gu, Tao Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia School of Computing Macquarie University Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Training machine learning (ML) models on mobile and Web-of-Things (WoT) has been widely acknowledged and employed as a promising solution to privacy-preserving ML. However, these end-devices often suffer from constrai... 详细信息
来源: 评论
PAIR: protein-aptamer interaction prediction based on language models and contrastive learning framework
PAIR: protein-aptamer interaction prediction based on langua...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jun Zhang Zhiqiang Yan Hao Zeng Zexuan Zhu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
Aptamers are single-stranded DNA or RNA oligonucleotides that selectively bind to specific targets, making them valuable for drug design and diagnostic applications. Identifying the interactions between aptamers and t... 详细信息
来源: 评论
The Sample Complexity of Online Contract Design  23
The Sample Complexity of Online Contract Design
收藏 引用
24th ACM Conference on Economics and Computation, EC 2023
作者: Zhu, Banghua Bates, Stephen Yang, Zhuoran Wang, Yixin Jiao, Jiantao Jordan, Michael I. Department of Electrical Engineering and Computer Sciences University of California BerkeleyCA United States Department of Statistics and Data Science Yale University New HavenCT United States Department of Statistics University of Michigan Ann ArborMI United States
Contract theory studies the interactions between a principal and an agent when the two parties transact in the presence of private information [Bolton and Dewatripont, 2004, Faure-Grimaud et al., 2001, Salanié, 2... 详细信息
来源: 评论
Wi-SFDAGR: WiFi-Based Cross-Domain Gesture Recognition via Source-Free Domain Adaptation
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yan, Huan Zhang, Xiang Huang, Jinyang Feng, Yuanhao Li, Meng Wang, Anzhi Ou, Weihua Wang, Hongbing Liu, Zhi Guizhou Normal University School of Big Data and Computer Science Guiyang550025 China University of Science and Technology of China CAS Key Laboratory of Electromagnetic Space Information Hefei230026 China Hefei University of Technology School of Computer and Information Hefei230601 China The University of Electro-Communications Department of Computer and Network Engineering Tokyo1828585 Japan
WiFi Channel State Information (CSI)-based gesture recognition offers unique advantages, including cost-effectiveness and enhanced privacy protection, and has garnered significant attention in recent years. However, e... 详细信息
来源: 评论
Dependency Relationships-Enhanced Attentive Group Recommendation in HINs
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Juntao Wang, Sheng Chen, Zhiyu Yang, Xiandi Peng, Zhiyong The School of Computer and Information Engineering Henan University China The School of Computer Science Wuhan University China Amazon Seattle United States The School of Computer Science Big Data Institute Wuhan University China
Recommending suitable items to a group of users, commonly referred to as the group recommendation task, is becoming increasingly urgent with the development of group activities. The challenges within the group recomme... 详细信息
来源: 评论
Enhancing Event Tagger with Automatic Speech Recognizer for Audio Multi-task Scenarios by Distillation with Pre-Trained Large Models
Enhancing Event Tagger with Automatic Speech Recognizer for ...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Cheng, Jianfeng Liu, Ye Yin, Jian Wang, Liangdao Pan, Yan Lizhi Inc. Artificial Intelligence Department Guangzhou Beijing China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China School of Artificial Intelligence Sun Yat-sen University Zhuhai China
With the continuous expansion of robotics and digital humans in practical applications, the demand for the auditory system is becoming deeper, usually requiring more efficient speech recognition framework capabilities... 详细信息
来源: 评论
PrivBox: Privacy-Preserving Deep Packet Inspection with Dual Double-masking Obfuscated Rule Generation
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wu, Pengfei Ning, Jianting Huang, Xinyi Chen, Rongmao Zhang, Kai Liang, Kaitai Wuhan University School of Cyber Science and Engineering Wuhan China Singapore Management University School of Computing and Information Systems Singapore City University of Macau Faculty of Data Science Macau China Fujian Normal University College of Computer and Cyber Security Fuzhou China Jinan University College of Cyber Security Guangzhou China National University of Defense Technology College of Computer Changsha China Shanghai University of Electric Power College of Computer Science and Technology Shanghai China Delft University of Technology Faculty of Electrical Engineering Mathematics and Computer Science Netherlands
Many network middleboxes have been deployed to perform deep packet inspection (DPI) over packet payloads. However, such middleboxes cannot accomplish their tasks when the traffic is encrypted. BlindBox (SIGCOMM 2015) ... 详细信息
来源: 评论
AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection  23
AutoLog: A Log Sequence Synthesis Framework for Anomaly Dete...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated Software engineering
作者: Yintong Huo Yichen Li Yuxin Su Pinjia He Zifan Xie Michael R. Lyu Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China School of Software Engineering Sun Yat-sen University Zhuhai China School of Data Science The Chinese University of Hong Kong Shenzhen (CUHK Shenzhen) China Huazhong University of Science and Technology Wuhan China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China.
The rapid progress of modern computing systems has led to a growing interest in informative run-time logs. Various log-based anomaly detection techniques have been proposed to ensure software reliability. However, the...
来源: 评论
Using Rough Sets to Improve the High-dimensional data Anomaly Detection Method Based on Extended Isolation Forest  26
Using Rough Sets to Improve the High-dimensional Data Anomal...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Liu, Hanlin Zhou, Jiantao Li, Hua Inner Mongolia University College of Computer Science Hohhot China Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Anomaly detection refers to the identification of data objects that deviate from the general data distribution. One of the important challenges in anomaly detection is handling high-dimensional data, especially when i... 详细信息
来源: 评论