咨询与建议

限定检索结果

文献类型

  • 10,619 篇 期刊文献
  • 9,899 篇 会议
  • 75 册 图书
  • 2 篇 专利

馆藏范围

  • 20,595 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,796 篇 工学
    • 9,432 篇 计算机科学与技术...
    • 7,943 篇 软件工程
    • 2,837 篇 信息与通信工程
    • 1,951 篇 生物工程
    • 1,579 篇 控制科学与工程
    • 1,377 篇 电气工程
    • 1,317 篇 生物医学工程(可授...
    • 1,072 篇 光学工程
    • 939 篇 电子科学与技术(可...
    • 687 篇 机械工程
    • 678 篇 化学工程与技术
    • 453 篇 动力工程及工程热...
    • 435 篇 安全科学与工程
    • 422 篇 交通运输工程
    • 407 篇 仪器科学与技术
    • 404 篇 网络空间安全
  • 7,708 篇 理学
    • 3,734 篇 数学
    • 2,319 篇 生物学
    • 2,052 篇 物理学
    • 1,430 篇 统计学(可授理学、...
    • 806 篇 化学
    • 655 篇 系统科学
  • 3,703 篇 管理学
    • 1,972 篇 管理科学与工程(可...
    • 1,875 篇 图书情报与档案管...
    • 1,011 篇 工商管理
  • 1,483 篇 医学
    • 1,193 篇 临床医学
    • 1,026 篇 基础医学(可授医学...
    • 559 篇 公共卫生与预防医...
    • 549 篇 药学(可授医学、理...
  • 653 篇 法学
    • 551 篇 社会学
  • 376 篇 经济学
  • 314 篇 教育学
  • 302 篇 农学
  • 63 篇 文学
  • 33 篇 军事学
  • 23 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 590 篇 deep learning
  • 418 篇 feature extracti...
  • 385 篇 semantics
  • 363 篇 machine learning
  • 346 篇 training
  • 339 篇 computational mo...
  • 334 篇 accuracy
  • 255 篇 predictive model...
  • 218 篇 data mining
  • 213 篇 reinforcement le...
  • 204 篇 internet of thin...
  • 201 篇 neural networks
  • 201 篇 optimization
  • 196 篇 task analysis
  • 184 篇 image segmentati...
  • 184 篇 data models
  • 166 篇 real-time system...
  • 165 篇 convolution
  • 162 篇 support vector m...
  • 153 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 312 篇 university of ch...
  • 311 篇 horia hulubei na...
  • 305 篇 h.h. wills physi...
  • 297 篇 nikhef national ...
  • 291 篇 imperial college...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 287 篇 physikalisches i...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 henryk niewodnic...

作者

  • 247 篇 barter w.
  • 241 篇 beiter a.
  • 226 篇 bellee v.
  • 219 篇 casse g.
  • 212 篇 bowcock t.j.v.
  • 196 篇 brundu d.
  • 196 篇 blake t.
  • 175 篇 borsato m.
  • 169 篇 betancourt c.
  • 156 篇 baker s.
  • 148 篇 niyato dusit
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 145 篇 bediaga i.
  • 145 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 18,628 篇 英文
  • 1,839 篇 其他
  • 147 篇 中文
  • 7 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Data Science Program School of Computer Science"
20595 条 记 录,以下是4711-4720 订阅
排序:
Joint Deployment of UAV and Edge Server In Edge Computing
Joint Deployment of UAV and Edge Server In Edge Computing
收藏 引用
2025 IEEE Wireless Communications and Networking Conference, WCNC 2025
作者: Huang, Wei Zhang, Deyu Luo, Wei Tang, Yin School of Computer Science and Engineering Central South University Changsha410083 China Big Data Institute Central South University Changsha410083 China
Edge server placement is a hot issue in mobile edge computing. It is a key prerequisite for deploying edge servers that can meet computing needs and improve resource utilization. This paper studies the joint location ... 详细信息
来源: 评论
Evaluating the Impact of dataset Size on Univariate Prediction Techniques for Moroccan Agriculture
Evaluating the Impact of Dataset Size on Univariate Predicti...
收藏 引用
International Conference on Artificial Intelligence and Smart Environment, ICAISE 2022
作者: Ed-daoudi, Rachid Alaoui, Altaf Zerouaoui, Jad Ettaki, Badia Zerouaoui, Jamal Laboratory of Engineering Sciences and Modeling Faculty of Sciences Ibn Tofail University Campus Universitaire BP 133 Kenitra Morocco LyRICA: Laboratory of Research in Computer Science Data Sciences and Knowledge Engineering School of Information Sciences Rabat Rabat Morocco
Learning models used for prediction are mostly developed without taking into account the size of datasets that can produce models of high accuracy and better performance. Although, the general believe is that, large d... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Application of constraint-based frequent closed itemsets Mining in TCM Clinical data Analysis
Application of constraint-based frequent closed itemsets Min...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Yu, Jinlong Zhang, Lei Xu, Ning Fa, Lifeng Yang, Kuo China Academy of Chinese Medical Science Institute of Information on Tcm Beijing China China Academy of Chinese Medical Sciences National Data Center of Tcm Beijing China Beijing Jiaotong University School of Computer and Information Technology Beijing China
Objective: To propose a frequent closed itemsets mining method based on item constraints to study the combination rules between symptoms, diagnoses, and herbs in clinical data of TCM. Methods: Based on the Charm algor... 详细信息
来源: 评论
Contactless Respiratory Rate Monitoring For ICU Patients Based On Unsupervised Learning
Contactless Respiratory Rate Monitoring For ICU Patients Bas...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Liu, Zimeng Huang, Bin Lin, Chun-Liang Wu, Chieh-Liang Zhao, Changchen Chao, Wen-Cheng Wu, Yu-Cheng Zheng, Yadan Wang, Zhiru Beihang University Hangzhou Innovataion Institute China Beihang University School of Automation Science and Electrical Engineering China National Chung Hsing University College of Electrical Engineering and Computer Science Taiwan Taichung Veterans General Hospital Department of Critical Care Medicine Taiwan National Chung Hsing University College of Medicine Department of Post-Baccalaureate Medicine Taiwan National Chung Hsing University Big Data Center Taiwan Beijing University of Posts and Telecommunications Computer Science School China Beijing Foreign Studies University Graduate School of Translation and Interpretation China
Recently, the task of contactless physiological signal monitoring based on deep learning technologies has attracted a large number of scholars. However, few studies focus on the application of real-world scenarios, es... 详细信息
来源: 评论
Towards Insider Threat Resilience: A Proposed Mitigation Model
Towards Insider Threat Resilience: A Proposed Mitigation Mod...
收藏 引用
Emerging Systems and Intelligent Computing (ESIC), International Conference on
作者: Navyansh Kothari Chanakya Bhardwaj Shruti Mishra Sandeep Kumar Satapathy Sung-Bae Cho Pradeep Kumar Mallick School of Computer Science and Engineering (SCOPE) Vellore Institute of Technology Chennai Chennai India Centre for Advanced Data Science Vellore Institute of Technology Chennai Tamil Nadu India Department of Computer Science 50 Yonsei-ro Sudaemoon-gu Yonsei University Seoul South Korea School of Computer Engineeing KIIT University Odisha India
Businesses are increasingly concerned about insider threats, which highlights the need for effective mitigation strategies. This paper examines the variety of insider threats and provides a thorough plan for lowering ...
来源: 评论
LEARNING LONG-TERM MUSIC REPRESENTATIONS VIA HIERARCHICAL CONTEXTUAL CONSTRAINTS  22
LEARNING LONG-TERM MUSIC REPRESENTATIONS VIA HIERARCHICAL CO...
收藏 引用
22nd International Conference on Music Information Retrieval, ISMIR 2021
作者: Wei, Shiqi Xia, Gus School of Data Science Fudan University China Music X Lab Computer Science Department New York University Shanghai China
Learning symbolic music representations, especially disentangled representations with probabilistic interpretations, has been shown to benefit both music understanding and generation. However, most models are only app... 详细信息
来源: 评论
Exfiltration-resistant Proxy Re-Encryption for IoT data Sharing in Unreliable Clouds
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhou, Yuyang Zhao, Liang Li, Fagen Takagi, Tsuyoshi School of Cyberspace Security Hainan University Haikou570000 China Department of Mathematical Informatics Graduate School of Information Science and Technology The university of Tokyo Tokyo113-8656 Japan School of Cyber Science and Engineering Sichuan University Chengdu610065 China Key Laboratory of Data Protection and Intelligent Management [Sichuan University Ministry of Education China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
The sharing of Internet of Things (IoT) data plays an extensive role in our everyday lives. Exploring secure and efficient methods for data sharing is a prominent area of research. Proxy re-encryption (PRE) in the clo... 详细信息
来源: 评论
MatchNAS: Optimizing Edge AI in Sparse-Label data Contexts via Automating Deep Neural Network Porting for Mobile Deployment  24
MatchNAS: Optimizing Edge AI in Sparse-Label Data Contexts v...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Huang, Hongtao Chang, Xiaojun Hu, Wen Yao, Lina School of Computer Science and Engineering University of New South Wales KensingtonNSW2052 Australia Faculty of Engineering and Information Technology University of Technology Sydney UltimoNSW2007 Australia CSIRO's Data61 University of New South Wales EveleighNSW2015 Australia
Recent years have seen the explosion of edge intelligence with powerful Deep Neural Networks (DNNs). One popular scheme is training DNNs on powerful cloud servers and subsequently porting them to mobile devices after ... 详细信息
来源: 评论
Joint Sensing, Computation, and DAI Resource Management for Integrated Non-Terrestrial and Terrestrial Networks
收藏 引用
IEEE Network 2024年
作者: Gong, Yongkang Liu, Xiaonan Yao, Haipeng Xiong, Zehui Cheng, Xiuzhen Niyato, Dusit Shandong University School of Computer Science and Technology China University of Aberdeen School of Natural and Computing Science United Kingdom Beijing University of Posts and Telecommunications School of Information and Communication Engineering China Singapore University of Technology and Design Pillar of Information Systems Technology and Design Singapore Nanyang Technological University College of Computing and Data Science China
Integrated Non-Terrestrial and Terrestrial Networks (NTN-TN) have been emerging as a promising architecture to facilitate state sensing, computation migration, and privacy protection for terrestrial users, where both ... 详细信息
来源: 评论