咨询与建议

限定检索结果

文献类型

  • 43,619 篇 期刊文献
  • 35,007 篇 会议
  • 338 册 图书
  • 6 篇 专利

馆藏范围

  • 78,970 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 46,068 篇 工学
    • 30,713 篇 计算机科学与技术...
    • 25,929 篇 软件工程
    • 8,859 篇 信息与通信工程
    • 6,499 篇 生物工程
    • 5,532 篇 控制科学与工程
    • 4,529 篇 生物医学工程(可授...
    • 4,468 篇 电气工程
    • 3,822 篇 光学工程
    • 3,691 篇 电子科学与技术(可...
    • 3,109 篇 化学工程与技术
    • 2,427 篇 机械工程
    • 2,084 篇 仪器科学与技术
    • 1,890 篇 材料科学与工程(可...
    • 1,797 篇 动力工程及工程热...
  • 33,245 篇 理学
    • 17,241 篇 数学
    • 9,326 篇 物理学
    • 8,009 篇 统计学(可授理学、...
    • 7,822 篇 生物学
    • 3,380 篇 化学
    • 3,035 篇 系统科学
    • 2,495 篇 地球物理学
  • 12,539 篇 管理学
    • 6,625 篇 管理科学与工程(可...
    • 6,178 篇 图书情报与档案管...
    • 3,714 篇 工商管理
  • 6,739 篇 医学
    • 5,551 篇 临床医学
    • 3,868 篇 基础医学(可授医学...
    • 2,257 篇 公共卫生与预防医...
    • 2,068 篇 药学(可授医学、理...
  • 2,577 篇 法学
    • 2,278 篇 社会学
  • 1,848 篇 经济学
    • 1,812 篇 应用经济学
  • 1,264 篇 农学
  • 875 篇 教育学
  • 226 篇 文学
  • 110 篇 军事学
  • 62 篇 艺术学
  • 18 篇 哲学
  • 17 篇 历史学

主题

  • 2,038 篇 machine learning
  • 2,028 篇 accuracy
  • 1,997 篇 deep learning
  • 1,671 篇 training
  • 1,465 篇 feature extracti...
  • 1,222 篇 predictive model...
  • 1,220 篇 computational mo...
  • 1,125 篇 data models
  • 1,081 篇 semantics
  • 896 篇 convolutional ne...
  • 858 篇 real-time system...
  • 691 篇 forecasting
  • 684 篇 optimization
  • 665 篇 data mining
  • 635 篇 support vector m...
  • 635 篇 artificial intel...
  • 575 篇 neural networks
  • 573 篇 reinforcement le...
  • 570 篇 internet of thin...
  • 481 篇 visualization

机构

  • 854 篇 university of ch...
  • 824 篇 school of data a...
  • 666 篇 school of data s...
  • 424 篇 department of ph...
  • 418 篇 college of compu...
  • 336 篇 iccub universita...
  • 322 篇 college of compu...
  • 318 篇 imperial college...
  • 298 篇 stfc rutherford ...
  • 298 篇 school of data s...
  • 296 篇 physik-institut ...
  • 294 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 289 篇 department of ph...
  • 288 篇 cavendish labora...
  • 287 篇 institute of par...
  • 284 篇 yandex school of...
  • 281 篇 school of physic...
  • 281 篇 oliver lodge lab...

作者

  • 251 篇 niyato dusit
  • 227 篇 beiter a.
  • 178 篇 barter w.
  • 152 篇 bellee v.
  • 152 篇 betancourt c.
  • 152 篇 bencivenni g.
  • 148 篇 back j.j.
  • 148 篇 bay a.
  • 146 篇 casse g.
  • 144 篇 boettcher t.
  • 144 篇 borisyak m.
  • 142 篇 blake t.
  • 142 篇 borsato m.
  • 142 篇 amato s.
  • 140 篇 bowcock t.j.v.
  • 140 篇 bediaga i.
  • 140 篇 braun s.
  • 140 篇 bizzeti a.
  • 140 篇 bursche a.
  • 140 篇 cattaneo m.

语言

  • 63,667 篇 英文
  • 14,715 篇 其他
  • 702 篇 中文
  • 32 篇 德文
  • 24 篇 日文
  • 17 篇 法文
  • 11 篇 斯洛文尼亚文
  • 9 篇 朝鲜文
  • 4 篇 土耳其文
  • 3 篇 西班牙文
  • 3 篇 俄文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 葡萄牙文
检索条件"机构=Data and Data Science"
78970 条 记 录,以下是751-760 订阅
排序:
A Methodology to Improve the Predictability of Solar Energy Generation: Preliminary Evidence from Great Britain  22
A Methodology to Improve the Predictability of Solar Energy ...
收藏 引用
22nd Wind and Solar Integration Workshop, WIW 2023
作者: Forbes, Kevin F. Energy and Environmental Data Science Malahide Ireland
Using data from Great Britain, this paper begins by observing that the current solar energy forecasts are inaccurate even though the capacity-weighted metric of the forecast error suggests otherwise. This occurs becau... 详细信息
来源: 评论
Peephole Optimization Strategies for Intermediate Code in the Compilation Process  1
Peephole Optimization Strategies for Intermediate Code in th...
收藏 引用
1st International Conference on Intelligent Manufacturing and Cloud Computing, ICIMCC 2024
作者: Guan, Yunxin Yun, Jing Sun, Pengfei Su, Xiaoming College of Data Science and Application Inner Mongolia University of Technology Hohhot China
In the design of modern compilers, the generation and optimization of intermediate code play a crucial role. Serving as a bridge between source code and target machine code, intermediate code provides ample opportunit... 详细信息
来源: 评论
Preserving Privacy in Healthcare Analytics: Federated Learning for Breast Cancer Prediction in a Collaborative Learning Framework  15
Preserving Privacy in Healthcare Analytics: Federated Learni...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Anuvarshini, G.B. Varshaa, D. Sujithra, M. Devi, D. Sudha Department of Computing- Data Science Coimbatore Institute of Technology Coimbatore India
Federated learning has emerged as a promising technique in machine learning, enabling collaborative training across distributed datasets. Particularly in fields like healthcare, where data privacy is paramount, federa... 详细信息
来源: 评论
The Application of Adversarial Training Based on Gradient Constraint Optimization Method to Sentiment Analysis
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第1期9卷 587-598页
作者: Xie, Zhichun Liu, Jianhua Hu, Renyuan Wang, Jiacan Wang, Xiaofeng School of Data and Computer Science Xiamen Institute of Technology Xiamen361021 China School of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China
The previous adversarial training models failed to pay attention to the influence of the changing gradient of the loss function in the current training on the model. The perturbation injected into the model is only pr... 详细信息
来源: 评论
Privacy-preserving vulnerability detection scheme for smart contracts  3
Privacy-preserving vulnerability detection scheme for smart ...
收藏 引用
3rd International Conference on Machine Vision, Automatic Identification, and Detection, MVAID 2024
作者: Shao, Xuping Ou, Zhenyang Faculty of Data Science City University of Macau Macau999078 China
Smart contracts are automated agreements encoded in the form of code, enabling functionalities such as automated asset transfers and digital asset issuance. These contracts eliminate the need for third-party trust ver... 详细信息
来源: 评论
Prompt Engineering for Curriculum Design  4
Prompt Engineering for Curriculum Design
收藏 引用
4th International Conference on Educational Technology, ICET 2024
作者: Leung, Jonathan Shen, Zhiqi Nanyang Technological University College of Computing and Data Science Singapore Singapore
Large Language Models (LLMs) have recently demonstrated successes in a broad range of areas that require language understanding and generation. The design of course curricula is a key part of the educational process, ... 详细信息
来源: 评论
Not So Atomic Payments: A Supply Chain Example  20
Not So Atomic Payments: A Supply Chain Example
收藏 引用
20th IEEE International Conference on Mobile Ad Hoc and Smart Systems, MASS 2023
作者: De Silva, Anupa Thakur, Subhasis Breslin, John University of Galway Data Science Institute Ireland
The advent of blockchain as a technology is revolutionizing the supply chain domain with its tamper-proof and traceable architecture. However, the blockchain must be fed with accurate data to actualize its immutabilit... 详细信息
来源: 评论
Combining Checkpoint/Restart and Replication for Fault Tolerance with High Performance  31
Combining Checkpoint/Restart and Replication for Fault Toler...
收藏 引用
31st IEEE International Conference on High Performance Computing, data, and Analytics Workshops, HiPCW 2024
作者: Joshi, Sarthak Vadhiyar, Sathish Department of Computational and Data Sciences Indian Institute of Science Bengaluru India
As we have entered Exascale computing, the faults in high-performance systems are expected to increase considerably. To compensate for a higher failure rate, the standard checkpoint/restart technique would need to cre... 详细信息
来源: 评论
HyperLogic: Enhancing Diversity and Accuracy in Rule Learning with HyperNets  38
HyperLogic: Enhancing Diversity and Accuracy in Rule Learnin...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Yang, Yang Ren, Wendi Li, Shuang School of Data Science The Chinese University of Hong Kong Shenzhen China
Exploring the integration of if-then logic rules within neural network architectures presents an intriguing area. This integration seamlessly transforms the rule learning task into neural network training using backpr...
来源: 评论
UNCERTAINTY-AWARE CONSTRAINT INFERENCE IN INVERSE CONSTRAINED REINFORCEMENT LEARNING  12
UNCERTAINTY-AWARE CONSTRAINT INFERENCE IN INVERSE CONSTRAINE...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Xu, Sheng Liu, Guiliang School of Data Science The Chinese University of Hong Kong Shenzhen China
Aiming for safe control, Inverse Constrained Reinforcement Learning (ICRL) considers inferring the constraints respected by expert agents from their demonstrations and learning imitation policies that adhere to these ... 详细信息
来源: 评论