咨询与建议

限定检索结果

文献类型

  • 7,840 篇 会议
  • 7,268 篇 期刊文献
  • 243 册 图书
  • 2 篇 学位论文

馆藏范围

  • 15,353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,476 篇 工学
    • 7,082 篇 计算机科学与技术...
    • 5,763 篇 软件工程
    • 2,073 篇 信息与通信工程
    • 1,403 篇 控制科学与工程
    • 1,335 篇 生物工程
    • 1,169 篇 生物医学工程(可授...
    • 1,035 篇 电气工程
    • 886 篇 光学工程
    • 764 篇 电子科学与技术(可...
    • 565 篇 机械工程
    • 381 篇 网络空间安全
    • 362 篇 动力工程及工程热...
    • 360 篇 仪器科学与技术
    • 350 篇 化学工程与技术
    • 342 篇 安全科学与工程
    • 296 篇 交通运输工程
  • 5,654 篇 理学
    • 2,740 篇 数学
    • 1,819 篇 物理学
    • 1,549 篇 生物学
    • 874 篇 统计学(可授理学、...
    • 508 篇 系统科学
    • 430 篇 化学
  • 2,701 篇 管理学
    • 1,561 篇 管理科学与工程(可...
    • 1,197 篇 图书情报与档案管...
    • 769 篇 工商管理
  • 1,416 篇 医学
    • 1,189 篇 临床医学
    • 1,007 篇 基础医学(可授医学...
    • 591 篇 药学(可授医学、理...
    • 575 篇 公共卫生与预防医...
  • 493 篇 法学
    • 402 篇 社会学
  • 292 篇 农学
  • 281 篇 经济学
  • 268 篇 教育学
  • 49 篇 文学
  • 34 篇 艺术学
  • 21 篇 军事学
  • 17 篇 哲学
  • 9 篇 历史学

主题

  • 537 篇 deep learning
  • 424 篇 machine learning
  • 308 篇 educational inst...
  • 297 篇 computer science
  • 290 篇 internet of thin...
  • 260 篇 accuracy
  • 254 篇 computational mo...
  • 235 篇 feature extracti...
  • 212 篇 artificial intel...
  • 187 篇 predictive model...
  • 179 篇 real-time system...
  • 163 篇 optimization
  • 159 篇 support vector m...
  • 153 篇 semantics
  • 151 篇 data mining
  • 144 篇 neural networks
  • 142 篇 training
  • 128 篇 computer archite...
  • 126 篇 reinforcement le...
  • 124 篇 covid-19

机构

  • 403 篇 faculty of scien...
  • 403 篇 department for p...
  • 393 篇 department of ph...
  • 383 篇 department of ph...
  • 383 篇 department of ph...
  • 373 篇 kirchhoff-instit...
  • 334 篇 fakultät für phy...
  • 309 篇 institute of phy...
  • 304 篇 department of ph...
  • 293 篇 institute of phy...
  • 277 篇 department of ph...
  • 271 篇 department of ph...
  • 267 篇 instituto de fís...
  • 264 篇 universidade fed...
  • 260 篇 ictp trieste
  • 253 篇 yerevan physics ...
  • 250 篇 department of ph...
  • 248 篇 nikhef national ...
  • 245 篇 graduate school ...
  • 244 篇 department of ph...

作者

  • 338 篇 c. alexa
  • 336 篇 j. m. izen
  • 333 篇 g. bella
  • 333 篇 d. calvet
  • 333 篇 c. amelung
  • 331 篇 j. strandberg
  • 328 篇 g. spigo
  • 327 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 301 篇 y. tayalati
  • 296 篇 s. guindon
  • 289 篇 m. klein
  • 284 篇 a. kaczmarska
  • 267 篇 j. schaarschmidt
  • 260 篇 f. pastore
  • 254 篇 n. orlando

语言

  • 14,570 篇 英文
  • 733 篇 其他
  • 61 篇 中文
  • 4 篇 德文
  • 4 篇 法文
  • 4 篇 日文
  • 2 篇 荷兰文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science College of Computing and Informatics"
15353 条 记 录,以下是4891-4900 订阅
排序:
Task Delay and Energy Consumption Minimization for Low-altitude MEC via Evolutionary Multi-objective Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Sun, Geng Ma, Weilong Li, Jiahui Sun, Zemin Wang, Jiacheng Niyato, Dusit Mao, Shiwen College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore College of Software Jilin University Changchun130012 China Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States
The low-altitude economy (LAE), driven by unmanned aerial vehicles (UAVs) and other aircraft, has revolutionized fields such as transportation, agriculture, and environmental monitoring. In the upcoming six-generation... 详细信息
来源: 评论
TSEML: A task-specific embedding-based method for few-shot classification of cancer molecular subtypes
TSEML: A task-specific embedding-based method for few-shot c...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Ran Su Rui Shi Hui Cui Ping Xuan Chengyan Fang Xikang Feng Qiangguo Jin School of Computer Software College of Intelligence and Computing Tianjin University Tianjin China School of Software Northwestern Polytechnical University Shaanxi China Department of Computer Science and Information Technology La Trobe University Melbourne Australia Department of Computer Science School of Engineering Shantou University Guangdong China Yangtze River Delta Research Institute of Northwestern Polytechnical University Taicang China
Molecular subtyping of cancer is recognized as a critical and challenging upstream task for personalized therapy. Existing deep learning methods have achieved significant performance in this domain when abundant data ... 详细信息
来源: 评论
A survey on computationally efficient neural architecture search
收藏 引用
Journal of Automation and Intelligence 2022年 第1期1卷 8-22页
作者: Shiqing Liu Haoyu Zhang Yaochu Jin Chair of Nature Inspired Computing and Engineering Faculty of TechnologyBielefeld University33619 BielefeldGermany Department of Computer Science University of SurreyGuildfordGU27XHUnited Kingdom Engineering Research Center of Digitized Textile&Apparel Technology Ministry of EducationCollege of Information Science and TechnologyDonghua UniversityShanghai 201620China
Neural architecture search(NAS)has become increasingly popular in the deep learning community recently,mainly because it can provide an opportunity to allow interested users without rich expertise to benefit from the ... 详细信息
来源: 评论
HEET: A Heterogeneity Measure to Quantify the Difference across Distributed computing Systems
arXiv
收藏 引用
arXiv 2023年
作者: Mokhtari, Ali Ghafouri, Saeid Jamshidi, Pooyan Salehi, Mohsen Amini The School of Computing and Informatics University of Louisiana LafayetteLA United States Queen Mary University of London London United Kingdom The Computer Science and Engineering Department University of South Carolina South Carolina United States
Although system heterogeneity has been extensively studied in the past, there is yet to be a study on measuring the impact of heterogeneity on system performance. For this purpose, we propose a heterogeneity measure t... 详细信息
来源: 评论
Security Protection of Information Utilizing Halfway Speculation  1
Security Protection of Information Utilizing Halfway Specula...
收藏 引用
1st International Conference on Advances in Computational science and Engineering, ICACSE 2020
作者: Ishwarya, M.V. Suganya, J. Nalini, M. Kumaresan, A. Suresh Anand, M. Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Tamilnadu Chennai India Department of Electronics and Communication Engineering Mailam Engineering College Tamilnadu Mailam India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Science Tamilnadu Chennai India Department of Information Technology School of Computing Sciences HITS Tamilnadu Chennai India Department of Computer Science and Engineering Sri Sairam Engineering College Anna University Tamilnadu Chennai India
Securing privacy in information-digging (data mining) has become indispensable for buying and selling labelled statistics in statistical evaluation, validation, and guide. In such cases, records are either released in... 详细信息
来源: 评论
Multi-View Incremental Learning with Structured Hebbian Plasticity for Enhanced Fusion Efficiency
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Yuhong Song, Ailin Yin, Huifeng Zhong, Shuai Chen, Fuhai Xu, Qi Wang, Shiping Xu, Mingkun College of Computer and Data Science Fuzhou University Fuzhou China Guangdong Institute of Intelligence Science and Technology Hengqin Zhuhai China University of Electronic Science and Technology of China Chengdu China Center for Brain Inspired Computing Research Department of Precision Instrument Tsinghua University Beijing China School of Computer Science and Technology Dalian University of Technology Dalian China
The rapid evolution of multimedia technology has revolutionized human perception, paving the way for multi-view learning. However, traditional multi-view learning approaches are tailored for scenarios with fixed data ... 详细信息
来源: 评论
Optimized Flame Detection Using a YOLOv5 Neural Network
Optimized Flame Detection Using a YOLOv5 Neural Network
收藏 引用
computing, Robotics and System sciences (ICRSS), International Conference on
作者: Shahid Karim Muhammad Ibrar Anas Bilal Akeel Qadir Irfana Bibi School of Information Engineering Xi'an Eurasia University Xi'an China Software College Shenyang Normal University Shenyang China College of Information Science and Technology Hainan Normal University Haikou China Department of Computer Science Faculty of Computing and Information Technology University of Punjab Lahore Punjab Pakistan
With the rising prevalence of smart homes, there's an increasing demand for comprehensive automation solutions to mitigate fire risks, especially when homeowners are absent or in homes with elderly residents. This... 详细信息
来源: 评论
Conflict-Free Genetic Algorithm with Nash Equilibrium Seeking for Game-Based Battery Swapping Station Recommendation
Conflict-Free Genetic Algorithm with Nash Equilibrium Seekin...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Chang-Long Sun Xin-Xin Xu Chun-Hua Chen Jun Hong Zhenan He Dengxiu Yu Sam Kwong Zhi-Hui Zhan School of Computer Science and Engineering South China University of Technology Guangzhou China School of Computer Science and Technology Ocean University of China Qingdao China School of Software Engineering South China University of Technology Guangzhou China College of Computer Science Sichuan University Chengdu China School of Artificial Intelligence Northwestern Polytechnical University Xi'an China Department of Computing and Decision Science Lingnan University Hong Kong SAR College of Artificial Intelligence Nankai University Tianjin China
The rapid growth of electric vehicles (EVs) has led to significant challenges in providing efficient and sustainable charging solutions. This paper addresses the battery swapping station (BSS) recommendation problem b... 详细信息
来源: 评论
An Efficient Cyclic Entailment Procedure in a Fragment of Separation Logic
arXiv
收藏 引用
arXiv 2022年
作者: Le, Quang Loc Le, Xuan-Bach D. Department of Computer Science University College London United Kingdom School of Computing and Information Systems The University of Melbourne Australia
An efficient entailment proof system is essential to compositional verification using separation logic. Unfortunately, existing decision procedures are either inexpressive or inefficient. For example, Smallfoot is an ... 详细信息
来源: 评论
Guarding Voices, Protecting Homes: A Comprehensive Case Study on Voice Assistant Security in Smart Living
Guarding Voices, Protecting Homes: A Comprehensive Case Stud...
收藏 引用
International Symposium on Digital Forensic and Security (ISDFS)
作者: Fazalur Rehman Joudat Hashmi Moiz Abdullah Hafsah Zaman School of Electrical Engineering and Computer Science National University of Sciences and Technology Islamabad Pakistan Department of Analytics College of Engineering Georgia Tech University USA Department of Cyber Security Faculty of Computing and Artificial Intelligence Air University Islamabad Pakistan
The evolution of technologies in the last decades has transformed the whole human interaction experience with the digital world. Integrated into users' home voice assistant devices has rationalized personal intera... 详细信息
来源: 评论