咨询与建议

限定检索结果

文献类型

  • 1,873 篇 期刊文献
  • 678 篇 会议

馆藏范围

  • 2,551 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,488 篇 工学
    • 886 篇 计算机科学与技术...
    • 756 篇 软件工程
    • 263 篇 生物工程
    • 254 篇 信息与通信工程
    • 251 篇 生物医学工程(可授...
    • 185 篇 电气工程
    • 177 篇 光学工程
    • 150 篇 控制科学与工程
    • 146 篇 核科学与技术
    • 129 篇 电子科学与技术(可...
    • 121 篇 化学工程与技术
    • 66 篇 机械工程
    • 60 篇 仪器科学与技术
    • 55 篇 动力工程及工程热...
    • 48 篇 交通运输工程
  • 1,386 篇 理学
    • 773 篇 物理学
    • 360 篇 数学
    • 337 篇 生物学
    • 175 篇 统计学(可授理学、...
    • 151 篇 化学
    • 69 篇 系统科学
    • 48 篇 地球物理学
  • 334 篇 管理学
    • 186 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 244 篇 医学
    • 204 篇 临床医学
    • 154 篇 基础医学(可授医学...
    • 99 篇 药学(可授医学、理...
    • 76 篇 公共卫生与预防医...
  • 61 篇 法学
    • 45 篇 社会学
  • 56 篇 农学
  • 29 篇 经济学
  • 24 篇 教育学
  • 7 篇 文学
  • 5 篇 艺术学
  • 2 篇 军事学

主题

  • 150 篇 hadron colliders
  • 79 篇 deep learning
  • 76 篇 hadrons
  • 57 篇 machine learning
  • 47 篇 hadronic decays
  • 42 篇 bottom mesons
  • 38 篇 branching fracti...
  • 36 篇 particle decays
  • 36 篇 accuracy
  • 32 篇 w & z bosons
  • 32 篇 training
  • 28 篇 higgs bosons
  • 28 篇 feature extracti...
  • 28 篇 flavor changing ...
  • 27 篇 leptonic, semile...
  • 24 篇 computational mo...
  • 24 篇 charmed mesons
  • 23 篇 predictive model...
  • 22 篇 semantics
  • 22 篇 artificial intel...

机构

  • 456 篇 department of ph...
  • 389 篇 iccub universita...
  • 386 篇 cavendish labora...
  • 377 篇 university of ch...
  • 373 篇 horia hulubei na...
  • 364 篇 h.h. wills physi...
  • 360 篇 van swinderen in...
  • 357 篇 school of physic...
  • 340 篇 department of ph...
  • 335 篇 imperial college...
  • 333 篇 yandex school of...
  • 333 篇 center for high ...
  • 330 篇 oliver lodge lab...
  • 329 篇 stfc rutherford ...
  • 326 篇 institute of par...
  • 323 篇 infn sezione di ...
  • 321 篇 physikalisches i...
  • 315 篇 nikhef national ...
  • 314 篇 henryk niewodnic...
  • 310 篇 infn sezione di ...

作者

  • 233 篇 beiter a.
  • 217 篇 barter w.
  • 212 篇 bellee v.
  • 196 篇 casse g.
  • 194 篇 bowcock t.j.v.
  • 189 篇 blake t.
  • 187 篇 borsato m.
  • 187 篇 betancourt c.
  • 187 篇 bediaga i.
  • 187 篇 amato s.
  • 185 篇 boettcher t.
  • 185 篇 braun s.
  • 184 篇 borisyak m.
  • 184 篇 bizzeti a.
  • 183 篇 baryshnikov f.
  • 180 篇 bencivenni g.
  • 175 篇 brundu d.
  • 173 篇 back j.j.
  • 173 篇 bay a.
  • 170 篇 bursche a.

语言

  • 2,407 篇 英文
  • 123 篇 其他
  • 22 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Computer Engineering & AI and Data Science Application and Research Center"
2551 条 记 录,以下是171-180 订阅
排序:
Beyond Normal: On the Evaluation of Mutual Information Estimators  37
Beyond Normal: On the Evaluation of Mutual Information Estim...
收藏 引用
37th Conference on Neural Information Processing Systems, NeurIPS 2023
作者: Czyż, Pawel Grabowski, Frederic Vogt, Julia E. Beerenwinkel, Niko Marx, Alexander Department of Biosystems Science and Engineering ETH Zurich Switzerland ETH AI Center ETH Zurich Switzerland Institute of Fundamental Technological Research Polish Academy of Sciences Poland Department of Computer Science ETH Zurich Switzerland SIB Swiss Institute of Bioinformatics Switzerland
Mutual information is a general statistical dependency measure which has found applications in representation learning, causality, domain generalization and computational biology. However, mutual information estimator...
来源: 评论
Multi-agent Scheduling for Shared Manufacturing Systems
收藏 引用
Procedia computer science 2025年 253卷 727-736页
作者: Ege Duran Cemalettin Ozturk Barry O’Sullivan SFI Centre for Research Training in AI School of Computer Science & IT University College Cork Ireland Department of Process Energy & Transport Engineering Munster Technological University Cork Ireland Insight SFI Research Centre for Data Analytics School of Computer Science & IT University College Cork Ireland
Advances in digitization and resource-sharing business models have created new opportunities for manufacturing companies, enhancing competitiveness and resilience. However, these benefits bring computational challenge... 详细信息
来源: 评论
LOPO: An Out-of-order Layer Pulling Orchestration Strategy for Fast Microservice Startup  42
LOPO: An Out-of-order Layer Pulling Orchestration Strategy f...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Gu, Lin Huang, Junhao Huang, Shaoxing Zeng, Deze Li, Bo Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China China University of Geosciences School of Computer Science Wuhan China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Container based microservices have been widely applied to promote the cloud elasticity. The mainstream Docker containers are structured in layers, which are organized in stack with bottom-up dependency. To start a mic... 详细信息
来源: 评论
Distributed Split Computing Using Diffusive Metrics for UAV Swarms
arXiv
收藏 引用
arXiv 2025年
作者: Sarı, Talip Tolga Seçinti, Gökhan Trotta, Angelo Department of Computer Science and Engineering University of Bologna Italy Department of Computer Engineering Istanbul Technical University Turkey BTS - Digital Twin Application and Research Center Istanbul Technical University Turkey
In large-scale UAV swarms, dynamically executing machine learning tasks can pose significant challenges due to network volatility and the heterogeneous resource constraints of each UAV. Traditional approaches often re... 详细信息
来源: 评论
Sand Cat Swarm Optimization with Deep Transfer Learning for Skin Cancer Classification
收藏 引用
computer Systems science & engineering 2023年 第11期47卷 2079-2095页
作者: C.S.S.Anupama Saud Yonbawi G.Jose Moses E.Laxmi Lydia Seifedine Kadry Jungeun Kim Department of Electronics and Instrumentation Engineering V.R.Siddhartha Engineering CollegeVijayawada520007India Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science and Engineering University Institute of Engineering and Technology(UIET)Guru Nanak UniversityHyderabadIndia Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Applied Data Science Noroff University CollegeKristiansandNorway Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjmanUnited Arab Emirates Department of Electrical and Computer Engineering Lebanese American UniversityByblosLebanon Department of Software Kongju National UniversityCheonan31080Korea
Skin cancer is one of the most dangerous *** of the high melanoma death rate,skin cancer is divided into non-melanoma and *** dermatologist finds it difficult to identify skin cancer from dermoscopy images of skin ***... 详细信息
来源: 评论
LUOJIA Explorer: An Auto-UAV for Unexposed Space Exploration
LUOJIA Explorer: An Auto-UAV for Unexposed Space Exploration
收藏 引用
2024 Symposium on Spatial Information to Empower the Metaverse
作者: Sun, Shangzhe Chen, Chi Yang, Bisheng Li, Liuchun Xu, Yuhang Jin, Ang State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan China Engineering Research Center for Spatio-temporal Data Smart Acquisition and Application Ministry of Education of China China Institute of Artificial Intelligence in Geomatics Wuhan University Wuhan China Institute of Artificial Intelligence School of Computer Science Wuhan University Wuhan China
With the advancement of technology, unexposed spaces have emerged as a new type of strategic area, attracting significant attention from researchers. These spaces often present complex environments, such as extreme li... 详细信息
来源: 评论
Optimization of 3D Holographic Projection for a Medical Image System using Taguchi Method and Fuzzy Inference System
收藏 引用
Journal of Imaging science and Technology 2023年 第4期67卷 1-7页
作者: Chou, Ming-Chung Huang, Tian-Hsiang Tsai, Jinn-Tsong Chen, Yen-Ming J. Hwang, Kao-Shing Huang, Wei-Tai Ho, Wen-Hsien Department of Medical Imaging and Radiological Sciences Kaohsiung Medical University Kaohsiung Taiwan Center for Big Data Research Kaohsiung Medical University Kaohsiung Taiwan Department of Medical Research Kaohsiung Medical University Hospital Kaohsiung Taiwan Department of Computer Science and Information Engineering National Penghu University of Science and Technology Penghu Taiwan Department of Computer Science and Artificial Intelligence National Pingtung University Pingtung Taiwan Department of Healthcare Administration and Medical Informatics Kaohsiung Medical University Kaohsiung Taiwan Department of Information Management National Kaohsiung University of Science and Technology Kaohsiung Taiwan Department of Electrical Engineering National Sun Yat-Sen University Kaohsiung Taiwan Department of Mechanical Engineering National Pingtung University of Science and Technology Pingtung Taiwan College of Professional Studies National Pingtung University of Science and Technology Pingtung Taiwan
Two dimensional projections of three dimensional (3D) objects are used to teach anatomy. These projections are relatively unrealistic, and medical students cannot easily and accurately grasp the position and shape of ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Evolutionary Approach to Security Games with Signaling  31
Evolutionary Approach to Security Games with Signaling
收藏 引用
31st International Joint Conference on Artificial Intelligence, IJCai 2022
作者: Żychowski, Adam Mańdziuk, Jacek Bondi, Elizabeth Venugopal, Aravind Tambe, Milind Ravindran, Balaraman Faculty of Mathematics and Information Science Warsaw University of Technology Poland Center for Research on Computation and Society Harvard University United States Robert Bosch Centre for Data Science and AI IIT Madras India Department of Computer Science and Engineering IIT Madras India
Green Security Games have become a popular way to model scenarios involving the protection of natural resources, such as wildlife. Sensors (e.g. drones equipped with cameras) have also begun to play a role in these sc... 详细信息
来源: 评论
SF-DQN: Provable Knowledge Transfer using Successor Feature for Deep Reinforcement Learning  41
SF-DQN: Provable Knowledge Transfer using Successor Feature ...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Zhang, Shuai Fernando, Heshan Devaka Liu, Miao Murugesan, Keerthiram Lu, Songtao Chen, Pin-Yu Chen, Tianyi Wang, Meng Department of Data Science New Jersey Institute of Technology NewarkNJ United States Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute TroyNY United States IBM Thomas J.Watson Research Center IBM Research Yorktown HeightsNY United States
This paper studies the transfer reinforcement learning (RL) problem where multiple RL problems have different reward functions but share the same underlying transition *** this setting, the Q-function of each RL probl... 详细信息
来源: 评论