咨询与建议

限定检索结果

文献类型

  • 2,344 篇 期刊文献
  • 1,220 篇 会议
  • 9 册 图书

馆藏范围

  • 3,573 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,315 篇 工学
    • 1,522 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 566 篇 信息与通信工程
    • 358 篇 电气工程
    • 315 篇 生物工程
    • 235 篇 电子科学与技术(可...
    • 231 篇 控制科学与工程
    • 219 篇 生物医学工程(可授...
    • 176 篇 光学工程
    • 158 篇 化学工程与技术
    • 127 篇 机械工程
    • 104 篇 动力工程及工程热...
    • 86 篇 仪器科学与技术
    • 86 篇 交通运输工程
    • 69 篇 土木工程
    • 65 篇 材料科学与工程(可...
    • 65 篇 建筑学
  • 1,707 篇 理学
    • 745 篇 数学
    • 657 篇 物理学
    • 404 篇 生物学
    • 273 篇 统计学(可授理学、...
    • 184 篇 化学
    • 120 篇 系统科学
  • 595 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 274 篇 图书情报与档案管...
    • 166 篇 工商管理
  • 216 篇 医学
    • 179 篇 临床医学
    • 149 篇 基础医学(可授医学...
    • 90 篇 药学(可授医学、理...
  • 100 篇 法学
    • 80 篇 社会学
  • 63 篇 经济学
  • 46 篇 农学
  • 29 篇 教育学
  • 13 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 74 篇 hadrons
  • 67 篇 deep learning
  • 65 篇 data mining
  • 63 篇 machine learning
  • 60 篇 training
  • 56 篇 feature extracti...
  • 55 篇 semantics
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 44 篇 computational mo...
  • 44 篇 fractals
  • 38 篇 bottom mesons
  • 37 篇 reinforcement le...
  • 35 篇 laboratories
  • 34 篇 artificial intel...
  • 34 篇 branching fracti...
  • 33 篇 accuracy
  • 31 篇 object detection
  • 31 篇 image segmentati...
  • 30 篇 particle decays

机构

  • 426 篇 department of ph...
  • 411 篇 horia hulubei na...
  • 407 篇 van swinderen in...
  • 405 篇 school of physic...
  • 402 篇 cavendish labora...
  • 400 篇 iccub universita...
  • 399 篇 h.h. wills physi...
  • 386 篇 university of ch...
  • 380 篇 yandex school of...
  • 373 篇 department of ph...
  • 364 篇 imperial college...
  • 351 篇 stfc rutherford ...
  • 347 篇 center for high ...
  • 342 篇 institute of par...
  • 323 篇 henryk niewodnic...
  • 312 篇 nikhef national ...
  • 300 篇 school of physic...
  • 300 篇 physik-institut ...
  • 299 篇 oliver lodge lab...
  • 292 篇 departamento de ...

作者

  • 252 篇 barter w.
  • 249 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 bowcock t.j.v.
  • 223 篇 casse g.
  • 217 篇 blake t.
  • 215 篇 borsato m.
  • 215 篇 betancourt c.
  • 213 篇 bediaga i.
  • 213 篇 amato s.
  • 211 篇 boettcher t.
  • 210 篇 brundu d.
  • 210 篇 baryshnikov f.
  • 210 篇 braun s.
  • 207 篇 borisyak m.
  • 204 篇 bizzeti a.
  • 197 篇 bencivenni g.
  • 189 篇 back j.j.
  • 186 篇 bay a.
  • 175 篇 bursche a.

语言

  • 3,256 篇 英文
  • 292 篇 其他
  • 27 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Department of Computer Engineering and Data mining laboratory"
3573 条 记 录,以下是361-370 订阅
排序:
GPU-Based Algorithms for Processing the k Nearest-Neighbor Query on Disk-Resident data  10th
GPU-Based Algorithms for Processing the k Nearest-Neighbor Q...
收藏 引用
10th International Conference on Model and data engineering, MEDI 2021
作者: Velentzas, Polychronis Vassilakopoulos, Michael Corral, Antonio Data Structuring and Engineering Laboratory Department of Electrical and Computer Engineering University of Thessaly Volos Greece Department of Informatics University of Almeria Almería Spain
Algorithms for answering the k Nearest-Neighbor (k-NN) query are widely used for queries in spatial databases and for distance classification of a group of query points against a reference dataset to derive the domina... 详细信息
来源: 评论
KAC-Unet: A Medical Image Segmentation With the Adaptive Group Strategy and Kolmogorov-Arnold Network
收藏 引用
IEEE Transactions on Instrumentation and Measurement 2025年 74卷
作者: Lin, Shiying Hu, Rong Li, Zuoyong Lin, Qinghua Zeng, Kun Wu, Xiang Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control School of Computer and Big Data Fuzhou350121 China Fuzhou University Affiliated Provincial Hospital Provincial Clinical Medical College Fujian Medical University Department of Urology Fuzhou350001 China
In the field of deep learning-based medical image segmentation, convolutional neural networks (CNNs) extract image features by combining linear convolutional layers with nonlinear activation functions. However, excess... 详细信息
来源: 评论
A Lightweight AI Model for Anomaly Detection in Wireless Networks
A Lightweight AI Model for Anomaly Detection in Wireless Net...
收藏 引用
Artificial Intelligence, Blockchain, and Internet of Things (AIBThings), IEEE International Conference on
作者: Thomas J. Kopcho Mostafa M. Fouda Cameron J. Krome Department of Computer Science Idaho State University Pocatello ID Department of Electrical and Computer Engineering Idaho State University Pocatello ID AI Data & Visualization Idaho National Laboratory Idaho Falls ID
Detecting network anomalies is critical for wireless network security and reliability. Traditional AI methods often require substantial computational resources, particularly when deployed on cloud servers, leading to ... 详细信息
来源: 评论
Generalizable Thermal-based Depth Estimation via Pre-trained Visual Foundation Model
Generalizable Thermal-based Depth Estimation via Pre-trained...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Ruoyu Fan Wang Zhao Matthieu Lin Qi Wang Yong-Jin Liu Wenping Wang Department of Computer Science and Technology Tsinghua University China State Key Laboratory of Public Big Data Guizhou University Guiyang China Department of Computer Science and Engineering Texas A&M University USA
Depth estimation is a crucial task in computer vision, applicable to various domains such as 3D reconstruction, robotics, and autonomous driving. In particular, thermal-based depth estimation has unique advantages, in... 详细信息
来源: 评论
A Novel Explainable CNN Model for Screening COVID-19 on X-ray Images
收藏 引用
computer Systems Science & engineering 2023年 第8期46卷 1789-1809页
作者: Hicham Moujahid Bouchaib Cherradi Oussama El Gannour Wamda Nagmeldin Abdelzahir Abdelmaboud Mohammed Al-Sarem Lhoussain Bahatti Faisal Saeed Mohammed Hadwan EEIS Laboratory ENSET of MohammediaHassan II University of CasablancaMohammedia28820Morocco STIE Team CRMEF Casablanca-SettatThe Provincial Section of El JadidaEl Jadida24000Morocco Department of Information Systems College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Information Systems King Khalid UniversityMuhayel Aseer61913Saudi Arabia College of Computer Science and Engineering Taibah UniversityMedina42353Saudi Arabia Department of Computer Science University of Sheba RegionMarib14400Yemen DAAI Research Group Department of Computing and Data ScienceSchool of Computing and Digital TechnologyBirmingham City UniversityBirminghamB47XGUK Department of Information Technology College of ComputerQassim UniversityBuraydah 51452Saudi Arabia Department of Computer Science College of Applied SciencesTaiz UniversityTaiz6803Yemen
Due to the rapid propagation characteristic of the Coronavirus(COVID-19)disease,manual diagnostic methods cannot handle the large number of infected individuals to prevent the spread of ***,new automated diagnostic me... 详细信息
来源: 评论
Analyzing the Impact of Security Measures on Wi-Fi Quality of Service
Analyzing the Impact of Security Measures on Wi-Fi Quality o...
收藏 引用
Artificial Intelligence, Blockchain, and Internet of Things (AIBThings), IEEE International Conference on
作者: Thomas J. Kopcho Mostafa M. Fouda Cameron J. Krome Anna T. Quach Israel G. Olaveson Department of Computer Science Idaho State University Pocatello ID Department of Electrical and Computer Engineering Idaho State University Pocatello ID AI Data & Visualization Idaho National Laboratory Idaho Falls ID
This study examines the relationship between Quality of Service (QoS) and security in Wi-Fi networks. Using a detailed dataset consisting of QoS metrics of file transfers under various security configurations, we anal... 详细信息
来源: 评论
PISketch: Finding Persistent and Infrequent Flows  3
PISketch: Finding Persistent and Infrequent Flows
收藏 引用
3rd ACM SIGCOMM 2022 Workshop on Formal Foundations and Security of Programmable Network Infrastructures, FFSPIN 2022
作者: Fan, Zhuochen Hu, Zhoujing Wu, Yuhan Guo, Jiarui Liu, Wenrui Yang, Tong Wang, Hengrui Xu, Yifei Uhlig, Steve Tu, Yaofeng School of Computer Science National Engineering Laboratory for Big Data Analysis Technology and Application Peking University China Computer Science Department University of California Los Angeles United States School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom ZTE Corporation China
Finding persistent and inactive activity periods is very helpful in practice, for example to detect intrusion activities. Most of the literature focuses on finding persistent flows or frequent flows. No previous work ... 详细信息
来源: 评论
Deep Reinforcement Learning based Reliability-aware Resource Placement and Task Offloading in Edge Computing
Deep Reinforcement Learning based Reliability-aware Resource...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Jingyu Liang Zihan Feng Han Gao Ying Chen Jiwei Huang Hong-Linh Truong Beijing Key Laboratory of Petroleum Data Mining China University of Petroleum Beijing China School of Computer Science Beijing Information Science and Technology University Beijing China Department of Computer Science School of Science Aalto University Espoo Finland
With the rapid development of 5G technology, the service demand in various application scenarios is continuously increasing. Mobile edge computing (MEC) has become a popular computing paradigm by placing services and ... 详细信息
来源: 评论
Unleashing the Power of Large Language Model for Denoising Recommendation  25
Unleashing the Power of Large Language Model for Denoising R...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Wang, Shuyao Zheng, Zhi Sui, Yongduo Xiong, Hui School of Data Science University of Science and Technology of China Hefei China State Key Laboratory of Cognitive Intelligence University of Science and Technology of China Hefei China Tencent Shenzhen China Hong Kong Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong
Recommender systems are crucial for personalizing user experiences but often depend on implicit feedback data, which can be noisy and misleading. Existing denoising studies involve incorporating auxiliary information ... 详细信息
来源: 评论
Explainable Application Intent for Zero-Touch Networking: An Incorporation of Hypergraph and Transformer
收藏 引用
IEEE Transactions on Communications 2025年
作者: Wu, Bing Zou, Sai Liwang, Minghui Ni, Wei Wang, Xianbin Guizhou University College of Big Data and Information Engineering China National Key Laboratory of Autonomous Intelligent Unmanned Systems Department of Control Science and Engineering China Tongji University Frontiers Science Center for Intelligent Autonomous Systems Ministry of Education Shanghai China Data61 CSIRO Australia Department of Electrical and Computer Engineering Western University Canada
The autonomous interpretation of application intent (APPI) represents the primary step towards achieving closed-loop autonomy in zero-touch networking (ZTN) and also a prerequisite for intent-based networking (IBN). H... 详细信息
来源: 评论