咨询与建议

限定检索结果

文献类型

  • 1,874 篇 期刊文献
  • 687 篇 会议
  • 9 册 图书

馆藏范围

  • 2,570 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,488 篇 工学
    • 881 篇 计算机科学与技术...
    • 750 篇 软件工程
    • 261 篇 生物工程
    • 250 篇 信息与通信工程
    • 250 篇 生物医学工程(可授...
    • 185 篇 电气工程
    • 174 篇 光学工程
    • 148 篇 控制科学与工程
    • 145 篇 核科学与技术
    • 132 篇 电子科学与技术(可...
    • 122 篇 化学工程与技术
    • 66 篇 机械工程
    • 60 篇 仪器科学与技术
    • 56 篇 动力工程及工程热...
    • 47 篇 交通运输工程
  • 1,384 篇 理学
    • 773 篇 物理学
    • 360 篇 数学
    • 334 篇 生物学
    • 174 篇 统计学(可授理学、...
    • 151 篇 化学
    • 69 篇 系统科学
    • 47 篇 地球物理学
  • 332 篇 管理学
    • 184 篇 管理科学与工程(可...
    • 141 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 243 篇 医学
    • 204 篇 临床医学
    • 151 篇 基础医学(可授医学...
    • 99 篇 药学(可授医学、理...
    • 74 篇 公共卫生与预防医...
  • 61 篇 法学
    • 45 篇 社会学
  • 56 篇 农学
  • 29 篇 经济学
  • 22 篇 教育学
  • 7 篇 文学
  • 5 篇 艺术学
  • 2 篇 军事学

主题

  • 150 篇 hadron colliders
  • 80 篇 deep learning
  • 76 篇 hadrons
  • 57 篇 machine learning
  • 47 篇 hadronic decays
  • 42 篇 bottom mesons
  • 38 篇 branching fracti...
  • 37 篇 accuracy
  • 36 篇 particle decays
  • 33 篇 training
  • 32 篇 w & z bosons
  • 29 篇 feature extracti...
  • 29 篇 artificial intel...
  • 28 篇 higgs bosons
  • 28 篇 flavor changing ...
  • 27 篇 leptonic, semile...
  • 25 篇 computational mo...
  • 24 篇 charmed mesons
  • 23 篇 predictive model...
  • 22 篇 semantics

机构

  • 456 篇 department of ph...
  • 389 篇 iccub universita...
  • 387 篇 cavendish labora...
  • 377 篇 university of ch...
  • 373 篇 horia hulubei na...
  • 364 篇 h.h. wills physi...
  • 361 篇 van swinderen in...
  • 358 篇 school of physic...
  • 340 篇 department of ph...
  • 335 篇 imperial college...
  • 335 篇 center for high ...
  • 334 篇 yandex school of...
  • 330 篇 stfc rutherford ...
  • 330 篇 oliver lodge lab...
  • 328 篇 institute of par...
  • 321 篇 infn sezione di ...
  • 320 篇 physikalisches i...
  • 314 篇 henryk niewodnic...
  • 314 篇 nikhef national ...
  • 310 篇 infn sezione di ...

作者

  • 233 篇 beiter a.
  • 217 篇 barter w.
  • 212 篇 bellee v.
  • 196 篇 casse g.
  • 194 篇 bowcock t.j.v.
  • 189 篇 blake t.
  • 187 篇 borsato m.
  • 187 篇 betancourt c.
  • 187 篇 bediaga i.
  • 187 篇 amato s.
  • 185 篇 boettcher t.
  • 185 篇 braun s.
  • 184 篇 borisyak m.
  • 184 篇 bizzeti a.
  • 183 篇 baryshnikov f.
  • 181 篇 bencivenni g.
  • 175 篇 brundu d.
  • 173 篇 back j.j.
  • 173 篇 bay a.
  • 170 篇 bursche a.

语言

  • 2,430 篇 英文
  • 118 篇 其他
  • 22 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Computer Engineering & AI and Data Science Application and Research Center"
2570 条 记 录,以下是581-590 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Learner Action Patterns in the Problem-Solving Process Related to Program Code Composition Based on Tracking System Activities  7
Learner Action Patterns in the Problem-Solving Process Relat...
收藏 引用
7th International Conference on Informatics and Computing, ICIC 2022
作者: Syahidi, Aulia Akhrian Supianto, Ahmad Afif Hirashima, Tsukasa Watanobe, Yutaka Politeknik Negeri Banjarmasin Smart City Information System Applied Undergraduate Program Banjarmasin City Indonesia Research Center for Data and Information Sciences Bandung City Indonesia Graduate School of Advanced Science and Engineering Hiroshima University Kagamiyama Learning Engineering Laboratory Higashihiroshima Japan University of Aizu Division of Information Systems Department of Computer Science and Engineering Fukushima AizuWakamatsu Japan
Learning activities are an indicator of the learner's desire to learn during the learning process. The pattern of learner action is related to learning activities. In this case, in extracting the learning process,... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Imaging foundation model for universal enhancement of non-ideal measurement CT
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yuxin Ge, Rongjun He, Yuting Wu, Zhan Yang, Shangwen Gao, Yuan You, Chenyu Wang, Ge Chen, Yang Li, Shuo School of Computer Science and Engineering Southeast University China School of Instrument Science and Engineering Southeast University China Department of Computer and Data Sciences Case Western Reserve University United States Department of Biomedical Engineering Case Western Reserve University United States Department of Electrical & Computer Engineering Yale University United States Department of Radiology Nanjing Drum Tower Hospital Affiliated Hospital of Medical School Nanjing University China Shandong Fundamental Research Center for Computer Science Qilu University of Technology Shandong Academy of Sciences China Department of Biomedical Engineering Rensselaer Polytechnic Institute United States
Non-ideal measurement computed tomography (NICT) employs suboptimal imaging protocols to expand CT applications. However, the resulting trade-offs degrade image quality, limiting clinical acceptability. Although deep ... 详细信息
来源: 评论
Logical Relation Modeling and Mining in Hyperbolic Space for Recommendation
Logical Relation Modeling and Mining in Hyperbolic Space for...
收藏 引用
International Conference on data engineering
作者: Yanchao Tan Hang Lv Zihao Zhou Wenzhong Guo Bo Xiong Weiming Liu Chaochao Chen Shiping Wang Carl Yang College of Computer and Data Science Fuzhou University Fuzhou China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Institute for Artificial Intelligence University of Stuttgart Stuttgart Germany College of Computer Science Zhejiang University Hangzhou China Department of Computer Science Emory University Atlanta United States
The sparse interactions between users and items have aggravated the difficulty of their representations in recommender systems. Existing methods leverage tags to alleviate the sparsity problem but ignore prevalent log... 详细信息
来源: 评论
What Improves the Generalization of Graph Transformers? A Theoretical Dive into the Self-attention and Positional Encoding
arXiv
收藏 引用
arXiv 2024年
作者: Li, Hongkang Wang, Meng Ma, Tengfei Liu, Sijia Zhang, Zaixi Chen, Pin-Yu Department of Electrical Computer and System Engineering Rensselaer Polytechnic Institute TroyNY United States Department of Biomedical Informatics Stony Brook University Stony Brook NY United States Department of Computer Science and Engineering Michigan State University East LansingMI United States MIT-IBM Watson AI Lab IBM Research MA United States Department of Computer Science and Engineering University of Science and Technology of China Anhui Hefei China IBM Thomas J. Watson Research Center Yorktown Heights NY United States
Graph Transformers, which incorporate self-attention and positional encoding, have recently emerged as a powerful architecture for various graph learning tasks. Despite their impressive performance, the complex non-co... 详细信息
来源: 评论
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Reducing data Redundancy
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Red...
收藏 引用
International Conference on Distributed Computing Systems
作者: Xiaohai Dai Yifan Zhou Jiang Xiao Feng Cheng Xia Xie Hai Jin Bo Li National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China School of Computer Science and Technology Hainan University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
To overcome the scaling and performance limitations, the Directed Acyclic Graph (DAG) is utilized as the underlying storage model of blockchain systems, which enables concurrent transaction processing and confirmation...
来源: 评论
Pretraining Conformer with ASR for Speaker Verification
Pretraining Conformer with ASR for Speaker Verification
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Danwei Cai Weiqing Wang Ming Li Rui Xia Chuanzeng Huang Department of Electrical and Computer Engineering Duke University Durham USA Data Science Research Center Duke Kunshan University Kunshan China Speech Audio and Music (SAMI) Group Bytedance China
This paper proposes to pretrain Conformer with automatic speech recognition (ASR) task for speaker verification. Conformer combines convolution neural network (CNN) and Transformer model for modeling local and global ... 详细信息
来源: 评论
applications of Machine Learning in Medicine: Current Trends and Prospects
Applications of Machine Learning in Medicine: Current Trends...
收藏 引用
Wireless and Optical Technologies (GCWOT), 2020 Global Conference on
作者: Muhammad Aamir Sibghatullah Bazai Uzair Aslam Bhatti Zaheer Ahmed Dayo Jing Liu Kun Zhang College of Computer Science Huanggang Normal Univeristy Huanggang China Department of Computer Engineering Balochistan University of Information Technology Engineering and Management Sciences Quetta Pakistan School of Information and Communication Engineering Hainan University Haikou China Research Center for Healthcare Data Science Zhejiang Lab Hangzhou China
With the continuous development of information technology and medical data information, more and more clinicians recognize artificial intelligence or will completely change medical practice by using advanced machine l... 详细信息
来源: 评论
A Unified Framework for Preoperative Early Recurrence Prediction of Hepatocellular Carcinoma with Multi-phase CT Images  10th
A Unified Framework for Preoperative Early Recurrence Predic...
收藏 引用
10th KES International Conference on Innovation in Medicine and Healthcare, KES-InMed 2022
作者: Ouyang, Shuyi Xu, Yingying Wang, Weibin Li, Yinhao Wang, Fang Chen, Qingqing Lin, Lanfen Chen, Yen-Wei Hu, Hongjie College of Computer Science and Technology Zhejiang University Hangzhou310000 China Research Center for Healthcare Data Science Zhejiang Lab Hangzhou311121 China College of Information Science and Engineering Ritsumeikan University Shiga Kusatsu525-8577 Japan Department of Radiology Sir Run Run Shaw Hospital Zhejiang University Hangzhou310000 China
Early recurrence (ER) after surgery is one of the main causes of death in Hepatocellular Carcinoma (HCC). Making an effective prediction of the risk of ER is important in developing treatment strategies. The... 详细信息
来源: 评论