咨询与建议

限定检索结果

文献类型

  • 10,619 篇 期刊文献
  • 9,899 篇 会议
  • 75 册 图书
  • 2 篇 专利

馆藏范围

  • 20,595 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,796 篇 工学
    • 9,432 篇 计算机科学与技术...
    • 7,943 篇 软件工程
    • 2,837 篇 信息与通信工程
    • 1,951 篇 生物工程
    • 1,579 篇 控制科学与工程
    • 1,377 篇 电气工程
    • 1,317 篇 生物医学工程(可授...
    • 1,072 篇 光学工程
    • 939 篇 电子科学与技术(可...
    • 687 篇 机械工程
    • 678 篇 化学工程与技术
    • 453 篇 动力工程及工程热...
    • 435 篇 安全科学与工程
    • 422 篇 交通运输工程
    • 407 篇 仪器科学与技术
    • 404 篇 网络空间安全
  • 7,708 篇 理学
    • 3,734 篇 数学
    • 2,319 篇 生物学
    • 2,052 篇 物理学
    • 1,430 篇 统计学(可授理学、...
    • 806 篇 化学
    • 655 篇 系统科学
  • 3,703 篇 管理学
    • 1,972 篇 管理科学与工程(可...
    • 1,875 篇 图书情报与档案管...
    • 1,011 篇 工商管理
  • 1,483 篇 医学
    • 1,193 篇 临床医学
    • 1,026 篇 基础医学(可授医学...
    • 559 篇 公共卫生与预防医...
    • 549 篇 药学(可授医学、理...
  • 653 篇 法学
    • 551 篇 社会学
  • 376 篇 经济学
  • 314 篇 教育学
  • 302 篇 农学
  • 63 篇 文学
  • 33 篇 军事学
  • 23 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 590 篇 deep learning
  • 418 篇 feature extracti...
  • 385 篇 semantics
  • 363 篇 machine learning
  • 346 篇 training
  • 339 篇 computational mo...
  • 334 篇 accuracy
  • 255 篇 predictive model...
  • 218 篇 data mining
  • 213 篇 reinforcement le...
  • 204 篇 internet of thin...
  • 201 篇 neural networks
  • 201 篇 optimization
  • 196 篇 task analysis
  • 184 篇 image segmentati...
  • 184 篇 data models
  • 166 篇 real-time system...
  • 165 篇 convolution
  • 162 篇 support vector m...
  • 153 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 312 篇 university of ch...
  • 311 篇 horia hulubei na...
  • 305 篇 h.h. wills physi...
  • 297 篇 nikhef national ...
  • 291 篇 imperial college...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 287 篇 physikalisches i...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 henryk niewodnic...

作者

  • 247 篇 barter w.
  • 241 篇 beiter a.
  • 226 篇 bellee v.
  • 219 篇 casse g.
  • 212 篇 bowcock t.j.v.
  • 196 篇 brundu d.
  • 196 篇 blake t.
  • 175 篇 borsato m.
  • 169 篇 betancourt c.
  • 156 篇 baker s.
  • 148 篇 niyato dusit
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 145 篇 bediaga i.
  • 145 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 18,628 篇 英文
  • 1,839 篇 其他
  • 147 篇 中文
  • 7 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Data Science Program School of Computer Science"
20595 条 记 录,以下是4791-4800 订阅
排序:
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Yijun Hao Shusen Yang Fang Li Yifan Zhang Cong Zhao Xuebin Ren Peng Zhao Chenren Xu Shibo Wang National Engineering Laboratory for Big Data Analytics Xi’an Jiaotong University Xi’an China National Engineering Laboratory for Big Data Analytics and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Computer Science Peking University Beijing China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China National Engineering Laboratory for Big Data Analytics XiÃan Jiaotong University XiÃan China
Network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
Monocular Camera-Based Visual Truck Type Recognition
SSRN
收藏 引用
SSRN 2024年
作者: Luo, Haibo Ye, Huaisheng Feng, Chao Shi, Xin Xie, Guoqi School of Computer and Data Science Minjiang University Fuzhou350018 China College of Computer and Data Science Fuzhou University Fuzhou350018 China College of Network and Information Security Fujian Agriculture and Forestry University Fuzhou350018 China Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Changsha410082 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China
Truck overload and over-limit are the primary causes of infrastructure damage and traffic safety accidents. In the past 2 years, researchers have started to deploy intelligent Internet of Things system at the source o... 详细信息
来源: 评论
MeHyper: Accelerating Hypergraph Neural Networks by Exploring Implicit dataflows
MeHyper: Accelerating Hypergraph Neural Networks by Explorin...
收藏 引用
IEEE Symposium on High-Performance computer Architecture
作者: Wenju Zhao Pengcheng Yao Dan Chen Long Zheng Xiaofei Liao Qinggang Wang Shaobo Ma Yu Li Haifeng Liu Wenjing Xiao Yufei Sun Bing Zhu Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computing National University of Singapore Singapore School of Computer Electronics and Information Guangxi University NanNing China School of Computer Science and Engineering University of New South Wales Sydney NSW Australia
Hypergraph Neural Networks (HGNNs) are increasingly utilized to analyze complex inter-entity relationships. Traditional HGNN systems, based on a hyperedge-centric dataflow model, independently process aggregation task... 详细信息
来源: 评论
Low-complexity Multi-Channel Speaker Extraction with Pure Speech Cues
Low-complexity Multi-Channel Speaker Extraction with Pure Sp...
收藏 引用
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)
作者: Bang Zeng Hongbin Suo Yulong Wan Ming Li Data Science Research Center Duke Kunshan University Kunshan China School of Computer Science Wuhan University Wuhan China Data&AI Engineering System OPPO Beijing China
Most multi-channel speaker extraction schemes use the target speaker’s location information as a reference, which must be known in advance or derived from visual cues. In addition, memory and computation costs are en...
来源: 评论
A Lightweight Object Detection Method for Bank Operation and Maintenance Scenarios  5
A Lightweight Object Detection Method for Bank Operation and...
收藏 引用
5th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2022
作者: Xue, Junmin Rao, Yunbo Wu, Jiangang Gou, Haosong Liu, Yong Yang, Yang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu China Data Center of Postal Savings Bank of China Beijing China Chengdu Aerospace Science and Industry Big Data Research Institute Corporation Limited Chengdu China Sichuan Institute of Computer Sciences Chengdu China
Due to the complex background of bank operation and maintenance scenarios, it is extremely difficult to detect and analyze the object of operation and maintenance scenarios. The traditional target detection algorithms... 详细信息
来源: 评论
Service-Based Event Penetration from IoT Sensors to Businesses: a Case Study
Service-Based Event Penetration from IoT Sensors to Business...
收藏 引用
2022 CCF International Conference on Service science, CCF ICSS 2022
作者: Wang, Guiling Fang, Jun Wang, Jing Yu, Jian Zhang, Liang Han, Yanbo Beijing Key Laboratory on Integration and Analysis of Large-Scale Stream Data Beijing China North China University of Technology School of Information Science and Technology Beijing China Auckland University of Technology Department of Computer Science Auckland New Zealand Shanghai Key Laboratory of Data Science Shanghai China Shanghai Institute of Intelligent Electronics & Systems Shanghai China
By leveraging IoT Big data, BPM can gain real-time physical world information to make faster and more accurate decisions, but there is a technical gap between IoT sensors and businesses. To bridge the gap, an event pe... 详细信息
来源: 评论
Elevating Cystic Fibrosis Detection in Lungs using HRCT Images with a Cutting-Edge CNN-Based Approach
Elevating Cystic Fibrosis Detection in Lungs using HRCT Imag...
收藏 引用
Advanced Computing & Communication Technologies (ICACCTech), International Conference on
作者: Amrutha Sriya Ganjam Kishor Kumar Reddy C D Radhika Karthik Ganjam Monika Singh.T Keerthi Sai Akuthota Department of Computer Science Stanley College of engineering and technology for womenabids Hyderabad India Department School of informatics MSc Data Science University of Edinburgh Edinburgh Scotland UK Deptartment. of Computer Science and Engineering Stanley College of Engineering and Technology for Women Hyderabad India
The creation of an algorithm for recognizing pathological abnormalities in cystic fibrosis is investigated in this paper using the CNN model with a modified psp-net. Currently, Decision Trees, Random Forests, PSP Nets... 详细信息
来源: 评论
Calibrating a Deep Neural Network with Its Predecessors
arXiv
收藏 引用
arXiv 2023年
作者: Tao, Linwei Dong, Minjing Liu, Daochang Sun, Changming Xu, Chang School of Computer Science Faculty of Engineering University of Sydney Australia CSIRO's Data61 Australia
Confidence calibration - the process to calibrate the output probability distribution of neural networks - is essential for safety-critical applications of such networks. Recent works verify the link between mis-calib... 详细信息
来源: 评论
Unbiased Approximations for Stationary Distributions of McKean-Vlasov SDEs
arXiv
收藏 引用
arXiv 2024年
作者: Awadelkarim, Elsiddig Chada, Neil K. Jasra, Ajay Applied Mathematics and Computational Science Program Computer Electrical and Mathematical Sciences and Engineering Division King Abdullah University of Science and Technology Thuwal23955-6900 Saudi Arabia Department of Mathematics City University of Hong Kong Hong Kong School of Data Science The Chinese University of Hong Kong Shenzhen Shenzhen China
We consider the development of unbiased estimators, to approximate the stationary distribution of Mckean-Vlasov stochastic differential equations (MVSDEs). These are an important class of processes, which frequently a... 详细信息
来源: 评论
Fedward: Flexible Federated Backdoor Defense Framework with Non-IID data
Fedward: Flexible Federated Backdoor Defense Framework with ...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zekai Chen Fuyi Wang Zhiwei Zheng Ximeng Liu Yujie Lin College of Computer Science and Big Data Fuzhou University Fuzhou China School of Information Technology Deakin University
Federated learning (FL) enables multiple clients to collaboratively train deep learning models while considering sensitive local datasets’ privacy. However, adversaries can manipulate datasets and upload models by in...
来源: 评论