咨询与建议

限定检索结果

文献类型

  • 5,551 篇 期刊文献
  • 5,496 篇 会议
  • 80 册 图书

馆藏范围

  • 11,127 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,818 篇 工学
    • 5,036 篇 计算机科学与技术...
    • 4,221 篇 软件工程
    • 1,699 篇 信息与通信工程
    • 1,163 篇 生物工程
    • 954 篇 控制科学与工程
    • 863 篇 生物医学工程(可授...
    • 847 篇 电气工程
    • 693 篇 光学工程
    • 596 篇 电子科学与技术(可...
    • 370 篇 机械工程
    • 363 篇 化学工程与技术
    • 309 篇 仪器科学与技术
    • 309 篇 网络空间安全
    • 305 篇 交通运输工程
    • 301 篇 动力工程及工程热...
    • 290 篇 安全科学与工程
  • 4,448 篇 理学
    • 2,167 篇 数学
    • 1,367 篇 生物学
    • 1,293 篇 物理学
    • 875 篇 统计学(可授理学、...
    • 484 篇 化学
    • 396 篇 系统科学
  • 1,940 篇 管理学
    • 1,147 篇 管理科学与工程(可...
    • 861 篇 图书情报与档案管...
    • 632 篇 工商管理
  • 888 篇 医学
    • 736 篇 临床医学
    • 662 篇 基础医学(可授医学...
    • 393 篇 公共卫生与预防医...
    • 381 篇 药学(可授医学、理...
  • 372 篇 法学
    • 322 篇 社会学
  • 228 篇 经济学
  • 207 篇 农学
  • 106 篇 教育学
  • 38 篇 文学
  • 17 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 484 篇 accuracy
  • 462 篇 deep learning
  • 359 篇 machine learning
  • 277 篇 feature extracti...
  • 251 篇 real-time system...
  • 245 篇 computational mo...
  • 223 篇 training
  • 219 篇 predictive model...
  • 204 篇 internet of thin...
  • 186 篇 convolutional ne...
  • 170 篇 artificial intel...
  • 164 篇 support vector m...
  • 154 篇 optimization
  • 138 篇 semantics
  • 136 篇 data models
  • 133 篇 reinforcement le...
  • 120 篇 security
  • 111 篇 neural networks
  • 105 篇 data mining
  • 102 篇 reliability

机构

  • 426 篇 department of ph...
  • 401 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 385 篇 h.h. wills physi...
  • 349 篇 van swinderen in...
  • 323 篇 yandex school of...
  • 298 篇 school of physic...
  • 296 篇 university of ch...
  • 295 篇 cavendish labora...
  • 293 篇 nikhef national ...
  • 291 篇 imperial college...
  • 289 篇 center for high ...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 242 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 215 篇 blake t.
  • 214 篇 bowcock t.j.v.
  • 210 篇 borsato m.
  • 210 篇 betancourt c.
  • 206 篇 brundu d.
  • 200 篇 bediaga i.
  • 192 篇 amato s.
  • 182 篇 baryshnikov f.
  • 179 篇 boettcher t.
  • 161 篇 braun s.
  • 159 篇 baker s.
  • 156 篇 borisyak m.
  • 145 篇 bjørn m.
  • 145 篇 bizzeti a.
  • 144 篇 albrecht j.
  • 142 篇 a. jawahery

语言

  • 9,772 篇 英文
  • 1,309 篇 其他
  • 56 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Engineering specialization in Data Science"
11127 条 记 录,以下是4711-4720 订阅
排序:
ICGNN: Graph Neural Network Enabled Scalable Beamforming for MISO Interference Channels
arXiv
收藏 引用
arXiv 2025年
作者: He, Changpeng Lu, Yang Ai, Bo Dobre, Octavia A. Ding, Zhiguo Niyato, Dusit School of Computer Science and Technology Beijing Jiaotong University Beijing100044 China School of Electronics and Information Engineering Beijing Jiaotong University Beijing100044 China Faculty of Engineering and Applied Science Memorial University St. John’sNLA1C 5S7 Canada Department of Electrical Engineering and Computer Science Khalifa University Abu Dhabi127788 United Arab Emirates College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore
This paper investigates the graph neural network (GNN)-enabled beamforming design for interference channels. We propose a model termed interference channel GNN (ICGNN) to solve a quality-of-service constrained energy ... 详细信息
来源: 评论
Generalized Kullback-Leibler Divergence Loss
arXiv
收藏 引用
arXiv 2025年
作者: Cui, Jiequan Zhu, Beier Xu, Qingshan Tian, Zhuotao Qi, Xiaojuan Yu, Bei Zhang, Hanwang Hong, Richang College of Computing & Data Science Nanyang Technological University Singapore Department of Computer Science & Engineering The Chinese University of Hong Kong Sha Tin Hong Kong The University of Hong Kong Hong Kong Harbin Institution of Technology China Hefei University of Technology China
In this paper, we delve deeper into the Kullback–Leibler (KL) Divergence loss and mathematically prove that it is equivalent to the Decoupled Kullback-Leibler (DKL) Divergence loss that consists of 1) a weighted Mean... 详细信息
来源: 评论
Comparative Analysis of Outlier Elimination Algorithms on Pulsar Stars dataset
Comparative Analysis of Outlier Elimination Algorithms on Pu...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Tejaswini Katale Waidehi Gautam Aakash Chotrani Aishwarya Katale Parikshit N. Mahalle Gitanjali R. Shinde Department of Computer Engineering Vishwakarma Institute of Technology Pune Maharashtra India Department of Information Technology University of Cumberlands Williamsburg KY USA Department of Business Analytics Mercer University Atlanta Georgia USA Artificial Intelligence and Data Science Vishwakarma Institute of Information Technology Pune Maharashtra India Computer Science and Engineering Vishwakarma Institute of Information Technology Pune Maharashtra India
Outliers are uncommon observations that are dispersed from most of the other data Points. These points, which can be abnormally high or low, can significantly affect the entire analysis and forecasting of the data. Th...
来源: 评论
Enhancing Diabetic Retinopathy Screening with Sequential Deep Learning Models
Enhancing Diabetic Retinopathy Screening with Sequential Dee...
收藏 引用
International Conference on Image Information Processing
作者: Vankadari Mohith Kalpana Raja I. R. Oviya Department of Computer Science and Engineering (AIE) Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Section for Biomedical Informatics and Data Science School of Medicine Yale University New Haven USA
Diabetic retinopathy is a serious medical disorder that, if left untreated, can result in visual impairment or blindness. The precise and timely categorization of its severity is critical for appropriate medical manag... 详细信息
来源: 评论
Improved Deep Matrix Factorization for Signal Recovery in Random Frequency Diversity Array Radar
Improved Deep Matrix Factorization for Signal Recovery in Ra...
收藏 引用
Signal, Information and data Processing (ICSIDP), IEEE International Conference on
作者: Dayan Guo Zijian Lin Tianyao Huang Yue Qi Jie He Xiao-Ping Steven Zhang Xueqian Wang Gang Li School of Computer & Communication Engineering University of Science and Technology Beijing Beijing China Institute of Data and Information Tsinghua Shenzhen International Graduate School Shenzhen China Department of Electronic Engineering Tsinghua University Beijing China
Motivated by the success of recent deep learning researches on radar, we consider a deep learning based matrix factorization method for suppressing the high range-angle side-lobes in random frequency diversity array (... 详细信息
来源: 评论
eCeLLM: Generalizing Large Language Models for E-commerce from Large-scale, High-quality Instruction data
arXiv
收藏 引用
arXiv 2024年
作者: Peng, Bo Ling, Xinyi Chen, Ziru Sun, Huan Ning, Xia Department of Computer Science and Engineering The Ohio State University United States Translational Data Analytics Institute The Ohio State University United States Department of Biomedical Informatics The Ohio State University United States
With tremendous efforts in developing effective e-commerce models, conventional e-commerce models show limited success in generalist e-commerce modeling, and suffer from unsatisfactory performance on new users and new... 详细信息
来源: 评论
No-Regret Linear Bandits under Gap-Adjusted Misspecification
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Chong Qiao, Dan Yin, Ming Bogunovic, Ilija Wang, Yu-Xiang Department of Computer Science University at Albany State University of New York AlbanyNY12222 United States Department of Computer Science and Engineering University of California La Jolla San DiegoCA92093 United States Department of Computer Science University of California Santa Barbara Santa BarbaraCA93106 United States Department of Electronic and Electrical Engineering University College London LondonWC1E 7JE United Kingdom Halıcıoğlu Data Science Institute University of California La Jolla San DiegoCA92093 United States
This work studies linear bandits under a new notion of gap-adjusted misspecification and is an extension of Liu et al. (2023). When the underlying reward function is not linear, existing linear bandits work usually re... 详细信息
来源: 评论
Evaluating the Effectiveness of Object Detection Algorithms for Autonomous Parking
Evaluating the Effectiveness of Object Detection Algorithms ...
收藏 引用
computer, Electronics & Electrical engineering & their Applications (IC2E3), International Conference on
作者: Utkarsh Sharma Krishnan Subramonian Aaron Dsouza Sughosh P Savitha G Girisha S Department of Data Science and Computer Applications Manipal Institute of Technology Manipal Academy of Higher Education Manipal India Department of Civil Engineering Manipal Institute of Technology Manipal Academy of Higher Education Manipal India
In response to the challenges posed by increasing urbanization, traditional parking systems face numerous issues, such as inaccurate slot detection and manual tracking, which exacerbate traffic congestion and environm... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Notice of Removal: Fourier Diffusion Models: A Method to Control MTF and NPS in Score-Based Stochastic Image Generation
收藏 引用
IEEE Transactions on Medical Imaging 2023年 PP卷 1-1页
作者: Tivnan, Matthew Teneggi, Jacopo Lee, Tzu-Cheng Zhang, Ruoqiao Boedeker, Kirsten Cai, Liang Gang, Grace J. Sulam, Jeremias Stayman, J. Webster Department of Biomedical Engineering Johns Hopkins University in Baltimore MD USA Department of Computer Science and Mathematical Institute for Data Science Johns Hopkins University in Baltimore MD USA Canon Medical Research USA in Vernon Hills IL USA Canon Medical Systems Corporation Otawara Japan Department of Radiology University of Pennsylvania in Philadelphia PA USA Department of Biomedical Engineering and Mathematical Institute for Data Science Johns Hopkins University in Baltimore MD USA
Removed.
来源: 评论