咨询与建议

限定检索结果

文献类型

  • 10,606 篇 期刊文献
  • 9,935 篇 会议
  • 75 册 图书
  • 2 篇 专利

馆藏范围

  • 20,618 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,775 篇 工学
    • 9,394 篇 计算机科学与技术...
    • 7,894 篇 软件工程
    • 2,825 篇 信息与通信工程
    • 1,945 篇 生物工程
    • 1,566 篇 控制科学与工程
    • 1,343 篇 电气工程
    • 1,309 篇 生物医学工程(可授...
    • 1,063 篇 光学工程
    • 935 篇 电子科学与技术(可...
    • 683 篇 机械工程
    • 675 篇 化学工程与技术
    • 451 篇 动力工程及工程热...
    • 432 篇 安全科学与工程
    • 417 篇 交通运输工程
    • 406 篇 仪器科学与技术
    • 403 篇 网络空间安全
  • 7,657 篇 理学
    • 3,729 篇 数学
    • 2,308 篇 生物学
    • 2,047 篇 物理学
    • 1,440 篇 统计学(可授理学、...
    • 798 篇 化学
    • 652 篇 系统科学
  • 3,691 篇 管理学
    • 1,962 篇 管理科学与工程(可...
    • 1,871 篇 图书情报与档案管...
    • 1,009 篇 工商管理
  • 1,476 篇 医学
    • 1,194 篇 临床医学
    • 1,015 篇 基础医学(可授医学...
    • 553 篇 公共卫生与预防医...
    • 550 篇 药学(可授医学、理...
  • 649 篇 法学
    • 549 篇 社会学
  • 377 篇 经济学
  • 312 篇 教育学
  • 299 篇 农学
  • 62 篇 文学
  • 32 篇 军事学
  • 24 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 597 篇 deep learning
  • 424 篇 feature extracti...
  • 383 篇 semantics
  • 363 篇 machine learning
  • 358 篇 training
  • 345 篇 accuracy
  • 337 篇 computational mo...
  • 261 篇 predictive model...
  • 221 篇 data mining
  • 212 篇 reinforcement le...
  • 210 篇 internet of thin...
  • 199 篇 neural networks
  • 199 篇 optimization
  • 195 篇 task analysis
  • 187 篇 data models
  • 184 篇 image segmentati...
  • 172 篇 real-time system...
  • 165 篇 support vector m...
  • 162 篇 convolution
  • 150 篇 computer science

机构

  • 820 篇 school of data a...
  • 427 篇 department of ph...
  • 397 篇 iccub universita...
  • 313 篇 horia hulubei na...
  • 312 篇 university of ch...
  • 308 篇 h.h. wills physi...
  • 293 篇 nikhef national ...
  • 291 篇 imperial college...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 henryk niewodnic...

作者

  • 247 篇 barter w.
  • 241 篇 beiter a.
  • 227 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 198 篇 blake t.
  • 197 篇 brundu d.
  • 176 篇 borsato m.
  • 169 篇 betancourt c.
  • 156 篇 baker s.
  • 147 篇 niyato dusit
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 145 篇 bediaga i.
  • 145 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 16,926 篇 英文
  • 3,573 篇 其他
  • 158 篇 中文
  • 7 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 4 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Data Science Program School of Computer Science"
20618 条 记 录,以下是4701-4710 订阅
排序:
Self-supervised Learning of Orc-Bert Augmentor for Recognizing Few-Shot Oracle Characters  15th
Self-supervised Learning of Orc-Bert Augmentor for Recognizi...
收藏 引用
15th Asian Conference on computer Vision, ACCV 2020
作者: Han, Wenhui Ren, Xinlin Lin, Hangyu Fu, Yanwei Xue, Xiangyang School of Data Science Computer Science and MOE Frontiers Center for Brain Science Shanghai Key Lab of Intelligent Information Processing Fudan University Shanghai China
This paper studies the recognition of oracle character, the earliest known hieroglyphs in China. Essentially, oracle character recognition suffers from the problem of data limitation and imbalance. Recognizing the ora... 详细信息
来源: 评论
Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects
arXiv
收藏 引用
arXiv 2024年
作者: Li, Na Zhou, Chunyi Gao, Yansong Chen, Hui Fu, Anmin Zhang, Zhi Yu, Shui School of Cyberspace Science and Engineering Nanjing University of Science and Technology Nanjing210094 China State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Data61 CSIRO CanberraACT2601 Australia Department of Computer Science and Software Engineering University of Western Australia PerthWA6009 Australia School of Computer Science University of Technology Sydney SydneyNSW2007 Australia
Personal digital data is a critical asset, and governments worldwide have enforced laws and regulations to protect data privacy. data users have been endowed with the 'right to be forgotten' of their data. In ... 详细信息
来源: 评论
Searching with Extended Guard and Pivot Loop
Searching with Extended Guard and Pivot Loop
收藏 引用
2021 Prague Stringology Conference, PSC 2021
作者: Pakalén, Waltteri Tarhio, Jorma Watson, Bruce W. Department of Computer Science Aalto University Finland Information Science Centre for AI Research School for Data-Science & Computational Thinking Stellenbosch University South Africa
We explore practical optimizations on comparison-based exact string matching algorithms. We present a guard test that compares q-grams between the pattern and the text before entering the match loop, and evaluate expe... 详细信息
来源: 评论
Contract-Inspired Contest Theory for Controllable Image Generation in Mobile Edge Metaverse
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Liu, Guangyuan Du, Hongyang Wang, Jiacheng Niyato, Dusit Kim, Dong In Nanyang Technological University College of Computing and Data Science Energy Research Institute @ NTU Interdisciplinary Graduate Program Singapore University of Hong Kong Department of Electrical and Electronic Engineering Hong Kong Hong Kong Nanyang Technological University College of Computing and Data Science Singapore Sungkyunkwan University Department of Electrical and Computer Engineering Korea Republic of
The rapid advancement of immersive technologies has propelled the development of the Metaverse, where the convergence of virtual and physical realities necessitates the generation of high-quality, photorealistic image... 详细信息
来源: 评论
Noro: A Noise-Robust One-shot Voice Conversion System with Hidden Speaker Representation Capabilities
arXiv
收藏 引用
arXiv 2024年
作者: He, Haorui Song, Yuchen Wang, Yuancheng Li, Haoyang Zhang, Xueyao Wang, Li Huang, Gongping Chng, Eng Siong Wu, Zhizheng School of Data Science Chinese University of H ong Kong Shenzhen518172 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Electronic Information Wuhan University Wuhan430072 China
One-shot voice conversion (VC) aims to alter the timbre of speech from a source speaker to match that of a target speaker using just a single reference speech from the target, while preserving the semantic content of ... 详细信息
来源: 评论
Redesign Incentives in Proof-of-Stake Ethereum: An Interdisciplinary Approach of Reinforcement Learning and Mechanism Design
Redesign Incentives in Proof-of-Stake Ethereum: An Interdisc...
收藏 引用
data-driven Optimization of Complex Systems (DOCS), International Conference on
作者: Xinyu Tian Zesen Zhuang Luyao Zhang Department of Computer Science Duke University Durham United States Pratt School of Engineering Duke University Durham United States Data Science Research Center and Social Science Division Duke Kunshan University Suzhou China
The Merge changes Ethereum from Proof-of-Work (PoW) to the more secure and less energy-intensive Proof-of-Stake (PoS) mechanism. However, the existence of malicious valida tors still threatens the security of Ethereum... 详细信息
来源: 评论
H-FLTN: A Privacy-Preserving Hierarchical Framework for Electric Vehicle Spatio-Temporal Charge Prediction
arXiv
收藏 引用
arXiv 2025年
作者: Marlin, Robert Jurdak, Raja Abuadbba, Alsharif School of Computer Science Queensland University of Technology Australia CSIRO’s Data61 Cyber Security Cooperative Research Centre Australia CSIRO’s Data61 Australia
The widespread adoption of Electric Vehicles (EVs) poses critical challenges for energy providers, particularly in predicting charging time (temporal prediction), ensuring user privacy, and managing resources efficien... 详细信息
来源: 评论
RBDQ: A Reliable LLM-based Text-to-SQL System for Business data Queries  25
RBDQ: A Reliable LLM-based Text-to-SQL System for Business D...
收藏 引用
Companion Proceedings of the ACM on Web Conference 2025
作者: Fenglin Bi Dongdong Cao Zhiyu Wang Yang Chen Fangliang Zhao Tao Hu Zhi Li Yanbin Zhang Wei Wang School of Data Science and Engineering East China Normal University Shanghai China ByteDance Inc Shanghai China School of Computer Science Fudan University Shanghai China and Shanghai Key Lab of Intelligent Information Processing Shanghai China
Using large language models (LLMs) to convert natural language (NL) into SQL simplifies data access for users by allowing them to use everyday language. However, business departments often distrust LLM-based text-to-S... 详细信息
来源: 评论
TOM2C: TARGET-ORIENTED MULTI-AGENT COMMUNICATION AND COOPERATION WITH THEORY OF MIND  10
TOM2C: TARGET-ORIENTED MULTI-AGENT COMMUNICATION AND COOPERA...
收藏 引用
10th International Conference on Learning Representations, ICLR 2022
作者: Wang, Yuanfei Zhong, Fangwei Xu, Jing Wang, Yizhou Center for Data Science Peking University China School of Artificial Intelligence Peking University China Center on Frontiers of Computing Studies School of Computer Science Peking University China Adv. Inst. of Info. Tech Peking University China China
Being able to predict the mental states of others is a key factor to effective social interaction. It is also crucial for distributed multi-agent systems, where agents are required to communicate and cooperate. In thi... 详细信息
来源: 评论
Convolutional Neural Network-based image tamper detection with Error Level Analysis
Convolutional Neural Network-based image tamper detection wi...
收藏 引用
Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE), International Conference
作者: Manjunatha S Swetha M D Rashmi S Ananda Kumar Subramanian Vinoth Kumar V Mallikarjuna Swamy S Department of Information Science and Engineering Global Academy of Technology Bengaluru India Department of Computer Science and Engineering BNM Institute of Technology Bengaluru India Department of Computer Science and Engineering (Data Science) Dayananda Sagar College of Engineering Bengaluru India Dept of Computational Intelligence School of Computer Science Engineering VIT – University Vellore India School of Computer Science Engineering and Information Systems VIT – University Vellore India Dept of Electronics and Communication Engineering JSS Academy of Technical Education Bengaluru India
Photography is the most important, powerful, and reliable means of expression. Today, digital images not only provide disinformation but also act as agents for secret communication. Users and editing professionals wor...
来源: 评论