咨询与建议

限定检索结果

文献类型

  • 5,647 篇 期刊文献
  • 5,637 篇 会议
  • 80 册 图书

馆藏范围

  • 11,364 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,954 篇 工学
    • 5,142 篇 计算机科学与技术...
    • 4,269 篇 软件工程
    • 1,756 篇 信息与通信工程
    • 1,168 篇 生物工程
    • 1,020 篇 控制科学与工程
    • 887 篇 电气工程
    • 872 篇 生物医学工程(可授...
    • 698 篇 光学工程
    • 618 篇 电子科学与技术(可...
    • 382 篇 机械工程
    • 371 篇 化学工程与技术
    • 338 篇 网络空间安全
    • 321 篇 仪器科学与技术
    • 314 篇 交通运输工程
    • 311 篇 动力工程及工程热...
    • 302 篇 安全科学与工程
  • 4,503 篇 理学
    • 2,191 篇 数学
    • 1,374 篇 生物学
    • 1,306 篇 物理学
    • 887 篇 统计学(可授理学、...
    • 505 篇 化学
    • 396 篇 系统科学
  • 1,986 篇 管理学
    • 1,179 篇 管理科学与工程(可...
    • 873 篇 图书情报与档案管...
    • 642 篇 工商管理
  • 907 篇 医学
    • 747 篇 临床医学
    • 663 篇 基础医学(可授医学...
    • 410 篇 公共卫生与预防医...
    • 386 篇 药学(可授医学、理...
  • 380 篇 法学
    • 329 篇 社会学
  • 239 篇 经济学
  • 211 篇 农学
  • 109 篇 教育学
  • 40 篇 文学
  • 18 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 514 篇 accuracy
  • 494 篇 deep learning
  • 371 篇 machine learning
  • 287 篇 feature extracti...
  • 273 篇 real-time system...
  • 250 篇 computational mo...
  • 231 篇 training
  • 229 篇 predictive model...
  • 213 篇 internet of thin...
  • 187 篇 convolutional ne...
  • 171 篇 artificial intel...
  • 170 篇 support vector m...
  • 167 篇 optimization
  • 139 篇 reinforcement le...
  • 139 篇 data models
  • 137 篇 semantics
  • 124 篇 security
  • 115 篇 neural networks
  • 109 篇 reliability
  • 109 篇 data mining

机构

  • 425 篇 department of ph...
  • 401 篇 horia hulubei na...
  • 398 篇 iccub universita...
  • 385 篇 h.h. wills physi...
  • 344 篇 van swinderen in...
  • 319 篇 yandex school of...
  • 295 篇 school of physic...
  • 295 篇 university of ch...
  • 292 篇 cavendish labora...
  • 289 篇 nikhef national ...
  • 288 篇 imperial college...
  • 287 篇 center for high ...
  • 284 篇 department of ph...
  • 283 篇 physik-institut ...
  • 283 篇 oliver lodge lab...
  • 283 篇 physikalisches i...
  • 281 篇 stfc rutherford ...
  • 281 篇 school of physic...
  • 281 篇 school of physic...
  • 280 篇 institute of par...

作者

  • 249 篇 barter w.
  • 240 篇 beiter a.
  • 240 篇 bellee v.
  • 223 篇 casse g.
  • 215 篇 blake t.
  • 214 篇 bowcock t.j.v.
  • 211 篇 borsato m.
  • 211 篇 betancourt c.
  • 204 篇 brundu d.
  • 198 篇 bediaga i.
  • 186 篇 amato s.
  • 181 篇 baryshnikov f.
  • 179 篇 boettcher t.
  • 161 篇 baker s.
  • 156 篇 braun s.
  • 152 篇 borisyak m.
  • 144 篇 bjørn m.
  • 144 篇 bizzeti a.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 7,901 篇 英文
  • 3,425 篇 其他
  • 67 篇 中文
  • 5 篇 斯洛文尼亚文
  • 4 篇 法文
  • 3 篇 德文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Engineering specialization in Data Science"
11364 条 记 录,以下是4771-4780 订阅
排序:
Inductive Graph-based Knowledge Tracing
Inductive Graph-based Knowledge Tracing
收藏 引用
International Conference on Big data and Smart Computing (BIGCOMP)
作者: Donghee Han Daehee Kim Keejun Han Mun Yong Yi Graduate School of Data Science Korea Advanced Institute of Science and Technology Daejeon Republic of Korea Division of Computer Engineering Hansung University Seoul Republic of Korea Department of Industrial and Systems Engineering Korea Advanced Institute of Science and Technology Daejeon Republic of Korea
The rise of virtual education and increase in distance, partly owing to the spread of COVID-19 pandemic, has made it more difficult for teachers to determine each student’s learning status. In this situation, knowled... 详细信息
来源: 评论
DAAP: privacy-preserving model accuracy estimation on unlabeled datasets through distribution-aware adversarial perturbation  24
DAAP: privacy-preserving model accuracy estimation on unlabe...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Guodong Cao Zhibo Wang Yunhe Feng Xiaowei Dong School of Cyber Science and Engineering Wuhan University P. R. China The State Key Laboratory of Blockchain and Data Security Zhejiang University P. R. China and School of Cyber Science and Technology Zhejiang University P. R. China Department of Computer Science and Engineering University of North Texas
In the dynamic field of deep learning, accurately estimating model performance while ensuring data privacy against diverse and unlabeled test datasets presents a critical challenge. This is primarily due to the signif...
来源: 评论
A Compounded Burr Probability Distribution for Fitting Heavy-Tailed data with Applications to Biological Networks
arXiv
收藏 引用
arXiv 2024年
作者: Chakraborty, Tanujit Chattopadhyay, Swarup Das, Suchismita Naik, Shraddha M. Hens, Chittaranjan SAFIR Sorbonne University Abu Dhabi United Arab Emirates Sorbonne Center for Artificial Intelligence Sorbonne University Paris France Department of Computer Science & Engineering XIM University Bhubaneswar India Department of Data Science SP Jain School of Global Management Mumbai India Department of Computer Science Khalifa University United Arab Emirates Center for Computational Natural Science and Bioinformatics International Institute of Information Technology Hyderabad India
Complex biological networks, encompassing metabolic pathways, gene regulatory systems, and protein–protein interaction networks, often exhibit scale-free structures characterized by heavy-tailed degree distributions.... 详细信息
来源: 评论
An Upscaled Framework for Emotional Reponse System: A Support Solution from AI
An Upscaled Framework for Emotional Reponse System: A Suppor...
收藏 引用
IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)
作者: Srimathi M D. Muruganandhan Aurobind. G Dept. of Computer Science (AI&ML) Rajiv Gandhi National Institute of Youth Development Sriperumbudur T.N. India Department of Electrical and Electronics Engineering Manakula Vinayagar Institute of Technology Pondicherry India Department of Computer Science (Data Science) Rajiv Gandhi National Institute of Youth Development Sriperumbudur T.N. India
Virtual assistants have become essential in simplifying tasks in our busy lives. These advancements in artificial intelligence could become even more impactful by incorporating voice emotion recognition, enabling more... 详细信息
来源: 评论
An Analytical Study of Internet Key Exchange (IKE) Protocol for Wireless Network Security
An Analytical Study of Internet Key Exchange (IKE) Protocol ...
收藏 引用
Communication & Computing (WCONF), World Conference on
作者: Vaishali Singh Pratik Pandey Santosh Chowhan S. Hemelatha Divya N Yogesh D. Deshpande Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Department of Computer Science & Engineering Vivekananda Global University Jaipur India Department of Data Analytics and Mathematical Sciences Jain (Deemed to be University) Bangalore Karnataka Department of Computer Science Engineering Karpagam Academy of Higher Education Coimbatore Department of Civil Engineering Prince Shri Venkateshwara Padmavathy Engineering College Chennai-127 Department of Information Technology Vishwakarma Institute of Information Technology Pune India
This analytical examine investigates the safety of net Key change (IKE) Protocol for wireless networks. It specializes in how IKE works and the unique additives that it involves so one can provide relaxed key trade. T... 详细信息
来源: 评论
When Graph Meets Retrieval Augmented Generation for Wireless Networks: A Tutorial and Case Study
arXiv
收藏 引用
arXiv 2024年
作者: Xiong, Yang Zhang, Ruichen Liu, Yinqiu Niyato, Dusit Xiong, Zehui Liang, Ying-Chang Mao, Shiwen Engineering Systems and Design Pillar Singapore University of Technology and Design Singapore College of Computing and Data Science Nanyang Technological University Singapore Computer Science and Design Pillar University of Technology and Design Singapore Chengdu611731 China Department of Electrical and Computer Engineering Auburn University AuburnAL36849 United States
The rapid development of next-generation networking technologies underscores their transformative role in revolutionizing modern communication systems, enabling faster, more reliable, and highly interconnected solutio... 详细信息
来源: 评论
Towards Efficient Discrete Controller Synthesis: Semantics-Aware Stepwise Policy Design via LLM
Towards Efficient Discrete Controller Synthesis: Semantics-A...
收藏 引用
IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)
作者: Yusei Ishimizu Jialong Li Takuto Yamauchi Sinan Chen Jinyu Cai Takanori Hirano Kenji Tei School of Computing Tokyo Institute of Technology Tokyo Japan Department of Computer Science and Engineering Waseda University Tokyo Japan Center of Mathematical and Data Sciences Kobe University Kobe Japan
Discrete Controller Synthesis (DCS) is an automated generation technique to generate controllers from environment models and requirements. The time and space complexities of DCS are critical because they directly gove... 详细信息
来源: 评论
Exploring Classification Models for Video Source Device Identification: A Study of CNN-SVM and Softmax Classifier
Exploring Classification Models for Video Source Device Iden...
收藏 引用
International Symposium on Networks, computers and Communications (ISNCC)
作者: Najmath Ottakath Younes Akbari Somaya Al-Maadeed Ahmed Bouridane Fouad Khelifi Department of Computer Science and Engineering Qatar University Doha Qatar Center for Data Analytics and Cybernetics University of Sharjah Sharjah UAE Department of Computer and Information Sciences Northumbria University Newcastle UK
Video Source device identification plays a crucial role in video forensics as the proliferation of video capturing devices has given rise to crimes with videos that are challenging to trace. Reliance on metadata extra...
来源: 评论
Exploring the Integration of Reinforcement Learning for Enhancing Game Performance: A Comprehensive Review
Exploring the Integration of Reinforcement Learning for Enha...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Munugapati Bhavana K Vijay Krupa Vatsal Yerra Anjali Satyavathi Navyatha Ravi J. Kavitha V. Thrimurthulu Department of CSE MLR Institute of Technology Affiliated to JNTUH Hyderabad Department of CSE Malla Reddy University Hyderabad Department of Data Science MLR Institute of Technology Hyderabad Department of CSE Koneru Lakshmaiah Education Foundation Bowrampet Hyderabad Department of Computer Science & Engineering MLR Institute of Technology Hyderabad
Reinforcement learning, a subset of machine learning, encompasses the process by which an agent learns through trial-and-error feedback to anticipate its subsequent actions. Its versatility extends across various doma... 详细信息
来源: 评论
Machine Learning for Network Traffic in Home Automation IoT Systems
Machine Learning for Network Traffic in Home Automation IoT ...
收藏 引用
2024 International Conference on Communication, Computing and Energy Efficient Technologies, I3CEET 2024
作者: Shingare, S.P. Suresh, D. Verma, Chetan K. Lakshminarasimhan, S. Raghunandan, K.R. Krishnan, R. Navaneetha Bharati Vidyapeeth College of Engineering Department of Chemical Engineering Navi Mumbai India Gmr Institute of Technology Department of Ece Andhra Pradesh Rajam India Mbit Cvm University Gujrat Anand India Department Artificial Intelligence and Data Science India Department of Computer Science and Engineering India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Mathematics Chennai India
IOT device security, which should protect the astute homeowner and family, has left hundreds of thousands, if not millions, of devices vulnerable to hacking. It is not practical to handle various sorts of gadgets unde... 详细信息
来源: 评论