咨询与建议

限定检索结果

文献类型

  • 21,220 篇 会议
  • 9,798 篇 期刊文献
  • 312 册 图书

馆藏范围

  • 31,330 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,488 篇 工学
    • 15,370 篇 计算机科学与技术...
    • 12,713 篇 软件工程
    • 3,979 篇 信息与通信工程
    • 2,479 篇 控制科学与工程
    • 2,028 篇 生物工程
    • 1,559 篇 电气工程
    • 1,286 篇 机械工程
    • 1,195 篇 电子科学与技术(可...
    • 1,190 篇 生物医学工程(可授...
    • 1,030 篇 光学工程
    • 673 篇 安全科学与工程
    • 666 篇 化学工程与技术
    • 651 篇 仪器科学与技术
    • 602 篇 动力工程及工程热...
    • 568 篇 交通运输工程
    • 539 篇 建筑学
  • 8,693 篇 理学
    • 5,119 篇 数学
    • 2,223 篇 生物学
    • 1,690 篇 物理学
    • 1,497 篇 统计学(可授理学、...
    • 1,024 篇 系统科学
    • 680 篇 化学
  • 5,786 篇 管理学
    • 3,437 篇 管理科学与工程(可...
    • 2,583 篇 图书情报与档案管...
    • 1,556 篇 工商管理
  • 1,069 篇 医学
    • 921 篇 临床医学
    • 830 篇 基础医学(可授医学...
  • 860 篇 法学
    • 665 篇 社会学
  • 550 篇 经济学
    • 548 篇 应用经济学
  • 523 篇 教育学
    • 508 篇 教育学
  • 287 篇 农学
  • 98 篇 文学
  • 79 篇 军事学
  • 63 篇 艺术学
  • 11 篇 哲学
  • 4 篇 历史学

主题

  • 1,610 篇 computer science
  • 1,400 篇 software enginee...
  • 635 篇 training
  • 633 篇 feature extracti...
  • 588 篇 computational mo...
  • 535 篇 semantics
  • 525 篇 deep learning
  • 423 篇 software
  • 411 篇 application soft...
  • 407 篇 machine learning
  • 395 篇 data mining
  • 390 篇 accuracy
  • 344 篇 computer archite...
  • 296 篇 support vector m...
  • 294 篇 predictive model...
  • 289 篇 internet of thin...
  • 272 篇 data models
  • 258 篇 software systems
  • 251 篇 conferences
  • 242 篇 programming

机构

  • 1,262 篇 college of compu...
  • 356 篇 school of comput...
  • 276 篇 state key labora...
  • 220 篇 school of comput...
  • 197 篇 department of co...
  • 184 篇 school of inform...
  • 167 篇 school of comput...
  • 157 篇 college of compu...
  • 148 篇 school of comput...
  • 145 篇 school of softwa...
  • 139 篇 school of electr...
  • 133 篇 school of comput...
  • 125 篇 national enginee...
  • 119 篇 department of co...
  • 114 篇 department of co...
  • 103 篇 school of softwa...
  • 98 篇 school of softwa...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 89 篇 school of big da...

作者

  • 62 篇 liu yang
  • 52 篇 chen zhong
  • 52 篇 baowen xu
  • 48 篇 chen shu-ching
  • 47 篇 rajkumar buyya
  • 44 篇 man ka lok
  • 41 篇 stuckey peter j.
  • 40 篇 zhou jie
  • 40 篇 wang ping
  • 39 篇 shen linlin
  • 37 篇 zhen ji
  • 37 篇 niyato dusit
  • 37 篇 zhang lei
  • 35 篇 sun xingming
  • 34 篇 wang lei
  • 34 篇 wang xingwei
  • 33 篇 ruimin hu
  • 32 篇 laizhong cui
  • 30 篇 kaishun wu
  • 30 篇 jun zhang

语言

  • 29,417 篇 英文
  • 1,508 篇 其他
  • 425 篇 中文
  • 10 篇 德文
  • 6 篇 朝鲜文
  • 5 篇 日文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering Miami University"
31330 条 记 录,以下是321-330 订阅
排序:
3DSN-Net: A 3-D Scale-Aware convNet With Nonlocal Context Guidance for Kidney and Tumor Segmentation From CT Volumes
收藏 引用
IEEE Transactions on Cybernetics 2024年 第5期54卷 3299-3312页
作者: Wu, Huisi Zhang, Baiming Li, Zhuoying Qin, Jing Lee, Tong-Yee Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The Hong Kong Polytechnic University Centre for Smart Health School of Nursing Hong Kong Hong Kong National Cheng-Kung University Department of Computer Science and Information Engineering Tainan70101 Taiwan
Automatic kidney and tumor segmentation from CT volumes is a critical prerequisite/tool for diagnosis and surgical treatment (such as partial nephrectomy). However, it remains a particularly challenging issue as kidne... 详细信息
来源: 评论
Detection of Conspiracy vs. Critical Narratives and Their Elements using NLP  25
Detection of Conspiracy vs. Critical Narratives and Their El...
收藏 引用
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
作者: Albladi, Aish Seals, Cheryl D. Department of Computer Science and Software Engineering Auburn University AuburnAL United States
The growing use of digital media or social media has given a platform to the people to deliver their ideas and viewpoints openly. It is facilitating the rapid spread of contrasting opinions openly. Ultimately, this ha... 详细信息
来源: 评论
Deep learning based water leakage detection for shield tunnel lining
收藏 引用
Frontiers of Structural and Civil engineering 2024年 第6期18卷 887-898页
作者: Shichang LIU Xu XU Gwanggil JEON Junxin CHEN Ben-Guo HE College of Computer Science Sichuan UniversityChengdu 610065China School of Computer Science and Engineering Northeastern UniversityShenyang 110004China Department of Embedded Systems Engineering Incheon National UniversityIncheon 22012Korea School of Software Dalian University of TechnologyDalian 116621China Key Laboratory of Ministry of Education on Safe Mining of Deep Metal Mines Northeastern UniversityShenyang 110819China
Shield tunnel lining is prone to water leakage,which may further bring about corrosion and structural damage to the walls,potentially leading to dangerous *** avoid tedious and inefficient manual inspection,many proje... 详细信息
来源: 评论
Visual News Ticker Surveillance Approach from Arabic Broadcast Streams
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6177-6193页
作者: Moeen Tayyab Ayyaz Hussain Usama Mir M.Aqeel Iqbal Muhammad Haneef Department of Computer Science and Software Engineering International Islamic UniversityIslamabad44000Pakistan Department of Computer Science Quaid-i-Azam UniversityIslamabad44000Pakistan Department of Computer Science Senior Member IEEEUniversity of WindsorN9B 3P4Canada Department of Software Engineering Foundation University IslamabadIslamabad44000Pakistan Department of Electrical Engineering Foundation University IslamabadIslamabad44000Pakistan
The news ticker is a common feature of many different news networks that display headlines and other *** ticker recognition applications are highly valuable in e-business and news surveillance for media regulatory ***... 详细信息
来源: 评论
In silico prediction methods of self-interacting proteins:an empirical and academic survey
收藏 引用
Frontiers of computer science 2023年 第3期17卷 199-216页
作者: Zhanheng CHEN Zhuhong YOU Qinhu ZHANG Zhenhao GUO Siguo WANG Yanbin WANG College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060China School of Computer Science Northwestern Polytechnical UniversityXi’an 710129China Institute of Machine Learning and Systems Biology School of Electronics and Information EngineeringTongji UniversityShanghai 201804China School of Cyber Science and Technology Zhejiang UniversityHangzhou 310058China
In silico prediction of self-interacting proteins(SIPs)has become an important part of *** is an urgent need to develop effective and reliable prediction methods to overcome the disadvantage of high cost and labor int... 详细信息
来源: 评论
Neural Operator-Based Framework for Time Efficient Denoising of Displacement Fields in Ultrasound Elastography
Neural Operator-Based Framework for Time Efficient Denoising...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhu, Yihong Peng, Bo School of Computer Science and Software Engineering Southwest Petroleum University Chengdu610500 China
In ultrasound elastography, the noise present in the measured displacement fields has been a critical factor affecting the quality of the strain or elastic distribution reconstruction. Existing partial differential eq... 详细信息
来源: 评论
Fed-BRMC: Byzantine-Robust Federated Learning via Dual-Model Contrastive Detection
Fed-BRMC: Byzantine-Robust Federated Learning via Dual-Model...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Gan, Xiaoyun Lu, Peng Gan, Shanyu Xian, Youqian Peng, Kaichen Liu, Peng Li, Dongcheng School of Computer Science and Engineering School of Software Guangxi Normal University Guilin China
Federated Learning (FL) is a distributed privacy-protecting machine learning paradigm that enables collaborative training among multiple parties without the need to share raw data. This mode of training renders FL par... 详细信息
来源: 评论
Unsupervised Insider Threat Detection Using Multi-Head Self-Attention Mechanisms  4
Unsupervised Insider Threat Detection Using Multi-Head Self-...
收藏 引用
4th Intelligent Cybersecurity Conference, ICSC 2024
作者: Bertrand, Simon Germain, Pascal Tawbi, Nadia Laval University Dept. of Computer Science & Software Engineering Québec Canada
We propose an unsupervised insider threat detection system that learns normal user behaviors through audit data using neural networks equipped with multi-head self-attention mechanisms. The attention mechanisms learn ... 详细信息
来源: 评论
Applied Technology Research on the Construction of Bidirectional Knowledge Graph Curriculum System Based on SmartKG  6
Applied Technology Research on the Construction of Bidirecti...
收藏 引用
6th International Workshop on Artificial Intelligence and Education, WAIE 2024
作者: Jiang, Su Luo, Wei Cui, Hengji School of Computer Science and Software Engineering Dalian Neusoft University of Information Dalian China
Amidst the rapid advancements in artificial intelligence technology, it is imperative to apply these technological developments to the realm of education to enhance information-based teaching methodologies. This artic... 详细信息
来源: 评论
A Brief Review on Prediction Methods for Cloud Resource Management  9
A Brief Review on Prediction Methods for Cloud Resource Mana...
收藏 引用
9th IEEE International Conference on Smart Cloud, SmartCloud 2024
作者: Kuang, Chenxing Qiu, Yunyun Cao, Weipeng Xiao, Zhijiao Ming, Zhong Shenzhen University College of Computer Science and Software Engineering Shenzhen China Shenzhen China
The complexity of apps running on cloud platforms is evident in their nature. Every application has distinct needs for processing power and memory at various times. In order to effectively cater to tenants' varied... 详细信息
来源: 评论