咨询与建议

限定检索结果

文献类型

  • 973 篇 期刊文献
  • 840 篇 会议
  • 26 册 图书

馆藏范围

  • 1,839 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,102 篇 工学
    • 776 篇 计算机科学与技术...
    • 631 篇 软件工程
    • 213 篇 信息与通信工程
    • 178 篇 生物工程
    • 121 篇 光学工程
    • 119 篇 控制科学与工程
    • 116 篇 生物医学工程(可授...
    • 110 篇 电气工程
    • 98 篇 电子科学与技术(可...
    • 65 篇 机械工程
    • 48 篇 化学工程与技术
    • 45 篇 材料科学与工程(可...
    • 39 篇 建筑学
    • 37 篇 动力工程及工程热...
    • 33 篇 安全科学与工程
    • 32 篇 土木工程
  • 741 篇 理学
    • 330 篇 数学
    • 254 篇 物理学
    • 220 篇 生物学
    • 109 篇 统计学(可授理学、...
    • 59 篇 化学
    • 55 篇 系统科学
  • 265 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 133 篇 图书情报与档案管...
    • 69 篇 工商管理
  • 139 篇 医学
    • 117 篇 临床医学
    • 101 篇 基础医学(可授医学...
    • 60 篇 药学(可授医学、理...
    • 38 篇 公共卫生与预防医...
  • 46 篇 法学
    • 40 篇 社会学
  • 34 篇 农学
  • 21 篇 教育学
  • 20 篇 经济学
  • 5 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 35 篇 training
  • 32 篇 informatics
  • 32 篇 data models
  • 30 篇 laboratories
  • 29 篇 machine learning
  • 27 篇 semantics
  • 27 篇 feature extracti...
  • 26 篇 optimization
  • 24 篇 deep learning
  • 23 篇 image segmentati...
  • 21 篇 computational mo...
  • 21 篇 artificial intel...
  • 21 篇 accuracy
  • 20 篇 computer archite...
  • 19 篇 educational inst...
  • 18 篇 three-dimensiona...
  • 18 篇 signal processin...
  • 18 篇 cloud computing
  • 17 篇 monitoring
  • 17 篇 servers

机构

  • 67 篇 school of inform...
  • 62 篇 fujian key labor...
  • 58 篇 institute of art...
  • 56 篇 peng cheng labor...
  • 42 篇 key laboratory o...
  • 41 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 institute of phy...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 dipartimento di ...
  • 38 篇 fakultät für phy...

作者

  • 74 篇 ji rongrong
  • 38 篇 wang cheng
  • 34 篇 wang hanzi
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto

语言

  • 1,591 篇 英文
  • 235 篇 其他
  • 14 篇 中文
检索条件"机构=Computing Laboratory Informatics"
1839 条 记 录,以下是41-50 订阅
排序:
Can Quality Survive Scale? Toward an Equal-Quality Instance-Dependent Label Noise Model
Can Quality Survive Scale? Toward an Equal-Quality Instance-...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Song, Haohao Xiang, Qiao Shu, Jiwu Institute of Artificial Intelligence Xiamen University China Xiamen Key Laboratory of Intelligent Storage and Computing School of Informatics Xiamen University China Minjiang University China
Label noise model is a technique to construct controlled noisy datasets for evaluating noise-robust algorithms. However, the quality of the generated noise has not been evaluated thoroughly. In this paper, we propose ... 详细信息
来源: 评论
P4GCN: Vertical Federated Social Recommendation with Privacy-Preserving Two-Party Graph Convolution Network  25
P4GCN: Vertical Federated Social Recommendation with Privacy...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Wang, Zheng Wang, Wanwan Huang, Yimin Peng, Zhaopeng Yang, Ziqi Yao, Ming Wang, Cheng Fan, Xiaoliang Fujian Key Laboratory of Sensing and Computing for Smart Cities School of Informatics Xiamen University Xiamen China Insightone Tech Co. Ltd Beijing China
In recent years, graph neural networks (GNNs) have been commonly utilized for social recommendation systems. However, real-world scenarios often present challenges related to user privacy and business constraints, inh... 详细信息
来源: 评论
Secure IIoT networks with hybrid CNN-GRU model using Edge-IIoTset  15
Secure IIoT networks with hybrid CNN-GRU model using Edge-II...
收藏 引用
15th International Conference on Innovations in Information Technology, IIT 2023
作者: Saadouni, Rafika Khacha, Amina Harbi, Yasmine Gherbi, Chirihane Harous, Saad Aliouat, Zibouda Ferhat Abbas University of Setif 1 LRSD Laboratory Setif Algeria University of Sharjah College of Computing and Informatics Sharjah United Arab Emirates
Industrial Internet of Things (IIoT), or Industry 4.0, is an application of IoT in the industrial sector. Its main objective is to enhance product quality and optimize production costs by leveraging advanced technolog... 详细信息
来源: 评论
Integrative Analysis of Open Datasets for Stress Prediction
收藏 引用
Journal of Medical and Biological Engineering 2025年 1-15页
作者: Ladakis, Ioannis Fotopoulos, Dimitris Chouvarda, Ioanna Laboratory of Computing Medical Informatics and Biomedical—Imaging Technologies School of Medicine Aristotle University of Thessaloniki Thessaloniki Greece
Stress is the physiological or psychological response to internal or external stressors. By causing physiological and behavioral changes, persistent stress affects psychological and physiological functionality, potent...
来源: 评论
Robust Intrusion Detection for IoT Networks: An Integrated CNN-LSTM-GRU Approach  6
Robust Intrusion Detection for IoT Networks: An Integrated C...
收藏 引用
6th International Conference on Networking and Advanced Systems, ICNAS 2023
作者: Khacha, Amina Saadouni, Rafika Harbi, Yasmine Gherbi, Chirihane Harous, Saad Aliouat, Zibouda Ferhat Abbas University of Setif 1 LRSD Laboratory Setif Algeria College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates
Ensuring IoT security is of utmost importance in today's interconnected world. IoT devices are prone to various security threats and vulnerabilities, making it essential to implement robust security measures. Intr... 详细信息
来源: 评论
A LoRa-Based Emotion Estimation Scheme for Smart Home Automated Actions Using ELMs  8
A LoRa-Based Emotion Estimation Scheme for Smart Home Automa...
收藏 引用
8th IEEE International Smart Cities Conference, ISC2 2022
作者: Karras, Christos Karras, Aristeidis Drakopoulos, Georgios Tsolis, Dimitrios Mylonas, Phivos Sioutas, Spyros Decentralized Systems Computing Group University of Patras Computer Engineering and Informatics Department Greece Ionian University Humanistic and Social Informatics Laboratory Department of Informatics Greece
Emotion detection is crucial in many IoT deployments from an operational perspective with examples ranging from digital health to smart cities. This is particularly true in smart homes where the interaction between th... 详细信息
来源: 评论
Diverse Consensuses Paired with Motion Estimation-Based Multi-Model Fitting  24
Diverse Consensuses Paired with Motion Estimation-Based Mult...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Yin, Wenyu Lin, Shuyuan Lu, Yang Wang, Hanzi Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University Xiamen China Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University Xiamen China College of Cyber Security College of Information Science and Technology Jinan University Guangzhou China
Multi-model fitting aims to robustly estimate the parameters of various model instances in data contaminated by noise and outliers. Most previous works employ only a single type of consensus or implicit fusion model t... 详细信息
来源: 评论
Spam Review Detection in E-Commerce Using Machine Learning  6
Spam Review Detection in E-Commerce Using Machine Learning
收藏 引用
6th IEEE International Conference on Artificial Intelligence in Engineering and Technology, IICAIET 2024
作者: Rizali, Muhammad Na'im Rosli, Marshima Mohd Abdullah, Nur Atiqah Sia College of Computing Informatics & Mathematics Universiti Teknologi Mara Selangor 40450 Malaysia Institute for Pathology Laboratory and Forensic Medicine University Teknologi Mara Selangor Sungai Buloh47000 Malaysia
Reviews pose a significant challenge for e-commerce platforms that rely on online reviews to attract customers. The reviews may contain spam that resembles actual genuine reviews while current spam detection methods l... 详细信息
来源: 评论
Learning to Reconnect Interrupted Trajectories for Weakly Supervised Multi-Object Tracking  48
Learning to Reconnect Interrupted Trajectories for Weakly Su...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Li, Yu-Lei Lu, Yang Li, Jie Wang, Hanzi Xiamen University Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics China Xidian University Video and Image Processing System Laboratory School of Electronic Engineering China
Recently, some weakly supervised multi-object tracking (MOT) methods learn identity embedding features with pseudo identity labels rather than the high-cost manual ones. However, these pseudo identity labels may conta... 详细信息
来源: 评论
Identity-Based Signature from Lattices Without Trapdoors  26th
Identity-Based Signature from Lattices Without Trapdoors
收藏 引用
26th International Conference on Information and Communications Security, ICICS 2024
作者: Luo, Pingbin Chen, Xinjian Susilo, Willy Huang, Qiong College of Mathematics and Informatics South China Agricultural University Guangzhou China Guangzhou Key Laboratory of Intelligent Agriculture Guangzhou510642 China School of Computing and Information Technology University of Wollongong Wollongong Australia
Currently, the majority of lattice-base identity-based signature (LB-IBS) schemes rely on lattice trapdoor technique introduced by Gentry, Peikert, and Vaikuntanathan. However, this approach significantly impacts comp... 详细信息
来源: 评论