咨询与建议

限定检索结果

文献类型

  • 15,765 篇 会议
  • 14,028 篇 期刊文献
  • 4 册 图书
  • 2 篇 专利

馆藏范围

  • 29,799 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,632 篇 工学
    • 14,269 篇 计算机科学与技术...
    • 12,127 篇 软件工程
    • 4,284 篇 信息与通信工程
    • 2,994 篇 生物工程
    • 2,342 篇 控制科学与工程
    • 1,887 篇 生物医学工程(可授...
    • 1,835 篇 电气工程
    • 1,537 篇 光学工程
    • 1,259 篇 电子科学与技术(可...
    • 981 篇 机械工程
    • 897 篇 化学工程与技术
    • 712 篇 网络空间安全
    • 702 篇 安全科学与工程
    • 659 篇 动力工程及工程热...
    • 642 篇 交通运输工程
    • 620 篇 仪器科学与技术
  • 11,159 篇 理学
    • 6,014 篇 数学
    • 3,386 篇 生物学
    • 2,616 篇 物理学
    • 2,289 篇 统计学(可授理学、...
    • 1,068 篇 化学
    • 1,067 篇 系统科学
  • 5,506 篇 管理学
    • 2,899 篇 图书情报与档案管...
    • 2,871 篇 管理科学与工程(可...
    • 1,463 篇 工商管理
  • 1,820 篇 医学
    • 1,522 篇 临床医学
    • 1,387 篇 基础医学(可授医学...
    • 811 篇 药学(可授医学、理...
    • 774 篇 公共卫生与预防医...
  • 1,015 篇 法学
    • 864 篇 社会学
  • 545 篇 经济学
  • 413 篇 农学
  • 314 篇 教育学
  • 100 篇 文学
  • 44 篇 军事学
  • 41 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 967 篇 deep learning
  • 853 篇 accuracy
  • 758 篇 machine learning
  • 700 篇 training
  • 691 篇 feature extracti...
  • 575 篇 semantics
  • 557 篇 computational mo...
  • 413 篇 predictive model...
  • 412 篇 data models
  • 339 篇 convolutional ne...
  • 338 篇 internet of thin...
  • 327 篇 support vector m...
  • 314 篇 reinforcement le...
  • 309 篇 real-time system...
  • 290 篇 neural networks
  • 280 篇 data mining
  • 270 篇 image segmentati...
  • 256 篇 task analysis
  • 240 篇 optimization
  • 238 篇 deep neural netw...

机构

  • 817 篇 school of data a...
  • 428 篇 department of ph...
  • 398 篇 iccub universita...
  • 343 篇 university of ch...
  • 328 篇 college of compu...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 281 篇 horia hulubei na...
  • 280 篇 henryk niewodnic...

作者

  • 242 篇 barter w.
  • 241 篇 beiter a.
  • 225 篇 bellee v.
  • 218 篇 casse g.
  • 212 篇 bowcock t.j.v.
  • 194 篇 brundu d.
  • 185 篇 blake t.
  • 160 篇 niyato dusit
  • 155 篇 baker s.
  • 154 篇 borsato m.
  • 151 篇 betancourt c.
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon

语言

  • 27,760 篇 英文
  • 1,892 篇 其他
  • 180 篇 中文
  • 6 篇 法文
  • 3 篇 德文
  • 3 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer and Data Science"
29799 条 记 录,以下是61-70 订阅
排序:
From Complex to Simple: Enhancing Multi-Constraint Complex Instruction Following Ability of Large Language Models
From Complex to Simple: Enhancing Multi-Constraint Complex I...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: He, Qianyu Zeng, Jie He, Qianxi Liang, Jiaqing Xiao, Yanghua Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China School of Data Science Fudan University China
It is imperative for Large language models (LLMs) to follow instructions with elaborate requirements (i.e. Complex Instructions Following). Yet, it remains under-explored how to enhance the ability of LLMs to follow c... 详细信息
来源: 评论
StealthFace:Transfer Learning-Based Ensemble Model for Disguised Face Recognition using Skin-Segmented Images
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第4期52卷 1244-1260页
作者: Padmashree, G. Kotegar, Karunakar A Department of Data Science and Computer Applications Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India
Disguised face identification is challenging since people cover their identities by wearing masks, hats, sunglasses, or other disguises. These disguises dramatically modify face features, making identifying individual... 详细信息
来源: 评论
Proximal Policy Optimization-Based Intrusion Detection Model for Satellite Networks  5
Proximal Policy Optimization-Based Intrusion Detection Model...
收藏 引用
5th International Symposium on computer Engineering and Intelligent Communications, ISCEIC 2024
作者: Liang, Shuaishuai Feng, Huibin Wu, Jiawei He, Canfei College of Computer and Data Science Fuzhou University Fuzhou China School of Computer and Big Data Minjiang University Fuzhou China
As satellite network communication systems become an increasingly pivotal role in modern life, The routine maintenance of satellite networks is challenging due to limited resources and their susceptibility to interfer... 详细信息
来源: 评论
Is There a One-Model-Fits-All Approach to Information Extraction? Revisiting Task Definition Biases
Is There a One-Model-Fits-All Approach to Information Extrac...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Huang, Wenhao He, Qianyu Li, Zhixu Liang, Jiaqing Xiao, Yanghua Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China School of Data Science Fudan University China
Definition bias is a negative phenomenon that can mislead models. Definition bias in information extraction appears not only across datasets from different domains but also within datasets sharing the same domain. We ... 详细信息
来源: 评论
Effi-CNN: real-time vision-based system for interpretation of sign language using CNN and transfer learning
收藏 引用
Multimedia Tools and Applications 2025年 第6期84卷 3137-3159页
作者: Pranav Katarya, Rahul Big Data Analytics and Web Intelligence Laboratory Computer Science & Engineering Department Delhi Technological University New Delhi India
The deaf and mute population has difficulty conveying their thoughts and ideas to others. Sign language is their most expressive mode of communication, but the general public is callow of sign language;therefore, the ... 详细信息
来源: 评论
ENHANCED LABEL PROPAGATION THROUGH AFFINITY MATRIX FUSION FOR SOURCE-FREE DOMAIN ADAPTATION  3
ENHANCED LABEL PROPAGATION THROUGH AFFINITY MATRIX FUSION FO...
收藏 引用
3rd Conference on Lifelong Learning Agents, CoLLAs 2024
作者: Guo, Li Xia, Yuxuan Wang, Shengjie Department of Computer Science and Data Science New York University Shanghai China
Source-free domain adaptation (SFDA) has gained significant attention as a method to transfer knowledge from a pre-trained model on source domains toward target domains without accessing the source data. Recent resear... 详细信息
来源: 评论
Evaluating Character Understanding of Large Language Models via Character Profiling from Fictional Works
Evaluating Character Understanding of Large Language Models ...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Yuan, Xinfeng Yuan, Siyu Cui, Yuhan Lin, Tianhe Wang, Xintao Xu, Rui Chen, Jiangjie Yang, Deqing School of Data Science Fudan University China Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China
Large language models (LLMs) have demonstrated impressive performance and spurred numerous AI applications, in which role-playing agents (RPAs) are particularly popular, especially for fictional characters. The prereq... 详细信息
来源: 评论
Next-Speaker Prediction Based on Non-Verbal Information in Multi-Party Video Conversation  48
Next-Speaker Prediction Based on Non-Verbal Information in M...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Mizuno, Saki Hojo, Nobukatsu Kobashikawa, Satoshi Masumura, Ryo Ntt Computer & Data Science Laboratories
We propose a method for next-speaker prediction, a task to predict who speaks in the next turn among multiple current listeners, in multi-party video conversation. Previous studies used non-verbal features, such as he... 详细信息
来源: 评论
A hybrid memory architecture supporting fine-grained data migration
收藏 引用
Frontiers of computer science 2024年 第2期18卷 31-41页
作者: Ye CHI Jianhui YUE Xiaofei LIAO Haikun LIU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China Department of Computer Science Michigan Technological UniversityMichigan 49931USA
Hybrid memory systems composed of dynamic random access memory(DRAM)and Non-volatile memory(NVM)often exploit page migration technologies to fully take the advantages of different memory *** previous proposals usually... 详细信息
来源: 评论
Game Theory-Based Fastest Route Plan Method for Transportation Network Applications  6
Game Theory-Based Fastest Route Plan Method for Transportati...
收藏 引用
6th IEEE International Conference on Emerging Smart Computing and Informatics, ESCI 2024
作者: Liu, Zheng-Tan Wu, Ling Chen, Chi-Hua College of Computer and Data Science Fuzhou University Fuzhou China
This paper presents a vehicle route planning method based on game theory principles and innovative utility functions. By addressing the complexities of real-Time traffic congestion, the proposed framework offers a dyn... 详细信息
来源: 评论