咨询与建议

限定检索结果

文献类型

  • 10,619 篇 期刊文献
  • 9,899 篇 会议
  • 75 册 图书
  • 2 篇 专利

馆藏范围

  • 20,595 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,796 篇 工学
    • 9,432 篇 计算机科学与技术...
    • 7,943 篇 软件工程
    • 2,837 篇 信息与通信工程
    • 1,951 篇 生物工程
    • 1,579 篇 控制科学与工程
    • 1,377 篇 电气工程
    • 1,317 篇 生物医学工程(可授...
    • 1,072 篇 光学工程
    • 939 篇 电子科学与技术(可...
    • 687 篇 机械工程
    • 678 篇 化学工程与技术
    • 453 篇 动力工程及工程热...
    • 435 篇 安全科学与工程
    • 422 篇 交通运输工程
    • 407 篇 仪器科学与技术
    • 404 篇 网络空间安全
  • 7,708 篇 理学
    • 3,734 篇 数学
    • 2,319 篇 生物学
    • 2,052 篇 物理学
    • 1,430 篇 统计学(可授理学、...
    • 806 篇 化学
    • 655 篇 系统科学
  • 3,703 篇 管理学
    • 1,972 篇 管理科学与工程(可...
    • 1,875 篇 图书情报与档案管...
    • 1,011 篇 工商管理
  • 1,483 篇 医学
    • 1,193 篇 临床医学
    • 1,026 篇 基础医学(可授医学...
    • 559 篇 公共卫生与预防医...
    • 549 篇 药学(可授医学、理...
  • 653 篇 法学
    • 551 篇 社会学
  • 376 篇 经济学
  • 314 篇 教育学
  • 302 篇 农学
  • 63 篇 文学
  • 33 篇 军事学
  • 23 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 590 篇 deep learning
  • 418 篇 feature extracti...
  • 385 篇 semantics
  • 363 篇 machine learning
  • 346 篇 training
  • 339 篇 computational mo...
  • 334 篇 accuracy
  • 255 篇 predictive model...
  • 218 篇 data mining
  • 213 篇 reinforcement le...
  • 204 篇 internet of thin...
  • 201 篇 neural networks
  • 201 篇 optimization
  • 196 篇 task analysis
  • 184 篇 image segmentati...
  • 184 篇 data models
  • 166 篇 real-time system...
  • 165 篇 convolution
  • 162 篇 support vector m...
  • 153 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 312 篇 university of ch...
  • 311 篇 horia hulubei na...
  • 305 篇 h.h. wills physi...
  • 297 篇 nikhef national ...
  • 291 篇 imperial college...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 287 篇 physikalisches i...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 henryk niewodnic...

作者

  • 247 篇 barter w.
  • 241 篇 beiter a.
  • 226 篇 bellee v.
  • 219 篇 casse g.
  • 212 篇 bowcock t.j.v.
  • 196 篇 brundu d.
  • 196 篇 blake t.
  • 175 篇 borsato m.
  • 169 篇 betancourt c.
  • 156 篇 baker s.
  • 148 篇 niyato dusit
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 145 篇 bediaga i.
  • 145 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 18,628 篇 英文
  • 1,839 篇 其他
  • 147 篇 中文
  • 7 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Data Science Program School of Computer Science"
20595 条 记 录,以下是4841-4850 订阅
排序:
DeCrypt: a 3DES inspired optimised cryptographic algorithm
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第5期14卷 4745-4755页
作者: Chowdhury, Deepraj Dey, Ajoy Garai, Ritam Adhikary, Subhrangshu Dwivedi, Ashutosh Dhar Ghosh, Uttam Alnumay, Waleed S. Department of Electronics and Communication Engineering IIIT Naya Raipur India Department of Electronics and Telecommunication Engineering Jadavpur University Kolkata India Department of Computer Science and Engineering Dr. B.C. Roy Engineering College Durgapur India Centre for Business Data Analytics Department of Digitalization Copenhagen Business School Frederiksberg2000 Denmark Meharry Medical College 1005 Dr DB Todd Jr Blvd NashvilleTN37208 United States Riyadh Community College Computer Science Department King Saud University Riyadh Saudi Arabia
Triple data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by ... 详细信息
来源: 评论
An evaluation and query algorithm for the influence of spatial location based on RkNN
收藏 引用
Frontiers of computer science 2021年 第2期15卷 81-89页
作者: Jingke XU Yidan ZHAO Ge YU School of Computer Science and Engineering Northeastern UniversityShenyang110819China School of Information and Control Engineering Shenyang Jianzhu UniversityShenyang110168China Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang110168China
This paper is devoted to the investigation of the evaluation and query algorithm problem for the influence of spatial location based on RkNN(reverse k nearest neighbor).On the one hand,an object can make contribution ... 详细信息
来源: 评论
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation
arXiv
收藏 引用
arXiv 2023年
作者: Sun, Jiamou Xing, Zhenchang Lu, Qinghua Xu, Xiwei Zhu, Liming Hoang, Thong Zhao, Dehai Data61 Eveleigh CSIRO Sydney Australia Research School of Computer Science CECS Australian National University Canberra Australia School of Computer Science University of New South Wales Sydney Australia
Due to convenience, open-source software is widely used. For beneficial reasons, open-source maintainers often fix the vulnerabilities silently, exposing their users unaware of the updates to threats. Previous works a... 详细信息
来源: 评论
Multi-Scale Noise-Guided Progressive Network for Image Splicing Detection and Localization
SSRN
收藏 引用
SSRN 2024年
作者: Zhang, Dengyong Jiang, Ningjing Li, Feng Chen, Jiaxin Liao, Xin Yang, Gaobo Ding, Xiangling Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Changsha410114 China School of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China School of Computer and Communication Engineering Hunan University of Science and Technology Hunan Xiangtan411201 China
Image splicing can easily be used in illegal activities, which may have negative impact on society. Therefore, detecting splicing images and precisely localizing tampered regions are challenging tasks. In this work, w... 详细信息
来源: 评论
What Makes Good In-Context Demonstrations for Code Intelligence Tasks with LLMs?
What Makes Good In-Context Demonstrations for Code Intellige...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Shuzheng Gao Xin-Cheng Wen Cuiyun Gao Wenxuan Wang Hongyu Zhang Michael R. Lyu School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Department of Computer Science and Engineering The Chinese University of Hong Kong China School of Big Data and Software Engineering Chongqing University China
Pre-trained models of source code have gained widespread popularity in many code intelligence tasks. Recently, with the scaling of the model and corpus size, large language models have shown the ability of in-context ...
来源: 评论
Mixed-cell-height Placement with Minimum-Implant-Area and Drain-to-Drain Abutment Constraints
Mixed-cell-height Placement with Minimum-Implant-Area and Dr...
收藏 引用
Design Automation Conference
作者: Guohao Chen Zheng Zeng Benchao Zhu Jiawei Li Kun Wang Jun Yu Jianli Chen School of Microelectronics Fudan University Shanghai China College of Computer and Data Science Fuzhou University Fuzhou China
In modern circuits, mixed-cell-height standard cells have been prevailing to meet various requirements and achieve better trade-offs among timing, power, and routability. Besides, the constraints of the minimum-implan...
来源: 评论
AI-Based Feature Extraction and Cosine Similarity for Automation of Student Learning Assessment  24
AI-Based Feature Extraction and Cosine Similarity for Automa...
收藏 引用
24th International Arab Conference on Information Technology, ACIT 2023
作者: Wijanarko, Bambang Dwi Bachtiar Hassan, Rosilah Binti Murad, Dina Fitria Ihsan, Ridho Bramulya Heryadi, Yaya Kuncoro, Engkos Achmad Julianti, Eka Binus Online Learning Bina Nusantara University Computer Science Department Jakarta Indonesia Graduate School Universitas Terbuka Master of English Education Jakarta Indonesia Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Selangor Bangi43600 Malaysia Binus Online Learning Bina Nusantara University Information Systems Department Jakarta Indonesia Binus Online Learning Bina Nusantara University Manajemen Department Jakarta Indonesia Binus Graduate Program-Doctor of Computer Science Bina Nusantara University Computer Science Department Jakarta Indonesia Binus Business School Undergraduate Program Bina Nusantara University Management Department Jakarta Indonesia Universitas Terbuka Information System Department Jakarta Indonesia
This research is ongoing research into the student learning process which aims to develop artificial intelligence-based technology to calculate essay exam scores automatically, based on the textual proximity of studen... 详细信息
来源: 评论
A Novel Blockchain-Based Strategy for Energy Conservation in Cognitive Wireless Sensor Networks  4
A Novel Blockchain-Based Strategy for Energy Conservation in...
收藏 引用
4th International Conference on Blockchain Technology and Information Security, ICBCTIS 2024
作者: Sharma, Khemraj Goyal, Rohit Bhagat, Sukesh Kumar Agarwal, Sheenu Bisht, Girish Singh Hussien, Mohemmed Nanhua University Department of Business Administration Doctoral Program in Management Sciences Dalin62248 Taiwan School of Engineering and Computing Dev Bhoomi Uttarakhand University Dehradun India Uttaranchal University Department of Computer Science & Engineering Dehradun India Uttarakhand Technical University Department of Electronics and Communication Engineering Dehradun India Tula's Institute Dehradun India Department of Computer Science and Engineering Dehradun248001 India The Islamic University Najaf Iraq
Internet of Things (IoT) industrial applications have increased in internet-connected devices. As a result, accessibility, scalability, connectivity, and adaptability have become major challenges. It is possible to cr... 详细信息
来源: 评论
Asynchronous Parallel Stochastic Proximal Gradient Methods for Non-Convex Composite Optimization
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2025年 第2期10卷 638-662页
作者: He, Wen-Wu Gong, Xuan-Jin Cui, Zhuo-Xu School of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fuzhou350118 China School of Mathematics and Statistics Wuhan University Wuhan430072 China
This paper considers the parallel stochastic composite optimization for general asynchronous cases where both the objective function and the regularizer are non-convex. In particular, based on the randomized stochasti... 详细信息
来源: 评论
Design of Airborne Intelligent Computing System Oriented to Intelligent Task Processing  26
Design of Airborne Intelligent Computing System Oriented to ...
收藏 引用
26th ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD-Winter 2023
作者: Bai, Linting Wen, Pengcheng Xie, Jianchun Li, Yunxi Lin, Rongchao School of Computer Science Northwestern Polytechnical University Xi'an Aeronautics Computing Technique Research Institute Avic Xi'an China Xi'an Aeronautics Computing Technique Research Institute Avic Aviation Key Laboratory of Science and Technology on Airborne and Missile-borne Computer Xi'an China Xi'an Aeronautics Computing Technique Research Institute Avic Aeronautics Data and Sensor Business Unit Avic Xi'an China
The rapid development of artificial intelligence technology promotes the gradual evolution of the 'three integration' of mechanization, informatization and intelligence. The mass data characteristics of airbor... 详细信息
来源: 评论