咨询与建议

限定检索结果

文献类型

  • 133,331 篇 会议
  • 71,067 篇 期刊文献
  • 2,136 册 图书

馆藏范围

  • 206,533 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 122,279 篇 工学
    • 81,936 篇 计算机科学与技术...
    • 65,778 篇 软件工程
    • 28,246 篇 信息与通信工程
    • 18,627 篇 控制科学与工程
    • 15,065 篇 电气工程
    • 15,021 篇 电子科学与技术(可...
    • 13,127 篇 生物工程
    • 10,011 篇 生物医学工程(可授...
    • 9,172 篇 光学工程
    • 8,558 篇 机械工程
    • 7,491 篇 化学工程与技术
    • 6,293 篇 仪器科学与技术
    • 6,128 篇 动力工程及工程热...
    • 5,581 篇 材料科学与工程(可...
    • 4,362 篇 网络空间安全
    • 4,142 篇 安全科学与工程
    • 3,934 篇 交通运输工程
  • 70,636 篇 理学
    • 36,468 篇 数学
    • 22,297 篇 物理学
    • 15,044 篇 生物学
    • 11,294 篇 统计学(可授理学、...
    • 7,798 篇 化学
    • 7,590 篇 系统科学
  • 32,640 篇 管理学
    • 19,965 篇 管理科学与工程(可...
    • 13,883 篇 图书情报与档案管...
    • 8,899 篇 工商管理
  • 10,033 篇 医学
    • 8,315 篇 临床医学
    • 7,142 篇 基础医学(可授医学...
    • 4,425 篇 药学(可授医学、理...
  • 5,626 篇 法学
    • 4,668 篇 社会学
  • 3,409 篇 经济学
  • 2,555 篇 农学
  • 2,330 篇 教育学
  • 1,121 篇 文学
  • 423 篇 军事学
  • 370 篇 艺术学
  • 60 篇 哲学
  • 38 篇 历史学

主题

  • 9,208 篇 computer science
  • 4,555 篇 accuracy
  • 4,194 篇 feature extracti...
  • 4,090 篇 computational mo...
  • 3,796 篇 machine learning
  • 3,747 篇 deep learning
  • 3,378 篇 training
  • 2,881 篇 data mining
  • 2,607 篇 artificial intel...
  • 2,424 篇 support vector m...
  • 2,380 篇 optimization
  • 2,231 篇 predictive model...
  • 2,142 篇 algorithm design...
  • 2,114 篇 wireless sensor ...
  • 2,106 篇 internet of thin...
  • 2,080 篇 computer archite...
  • 2,029 篇 educational inst...
  • 1,980 篇 protocols
  • 1,890 篇 semantics
  • 1,881 篇 application soft...

机构

  • 4,985 篇 department of co...
  • 2,103 篇 college of compu...
  • 1,134 篇 university of ch...
  • 1,080 篇 cavendish labora...
  • 980 篇 department of ph...
  • 908 篇 oliver lodge lab...
  • 904 篇 physikalisches i...
  • 821 篇 department of el...
  • 655 篇 department of el...
  • 654 篇 department of co...
  • 578 篇 infn sezione di ...
  • 550 篇 infn sezione di ...
  • 547 篇 infn laboratori ...
  • 540 篇 chitkara univers...
  • 536 篇 department of co...
  • 521 篇 horia hulubei na...
  • 520 篇 infn sezione di ...
  • 514 篇 department of ph...
  • 501 篇 school of physic...
  • 497 篇 school of physic...

作者

  • 250 篇 barter w.
  • 246 篇 j. wang
  • 240 篇 cai h.
  • 232 篇 a. gomes
  • 231 篇 s. chen
  • 224 篇 c. alexa
  • 224 篇 blake t.
  • 221 篇 j. m. izen
  • 221 篇 bellee v.
  • 220 篇 bowcock t.j.v.
  • 219 篇 amato s.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 215 篇 boettcher t.
  • 213 篇 beiter a.
  • 213 篇 brundu d.
  • 208 篇 g. bella
  • 208 篇 c. amelung
  • 207 篇 j. strandberg
  • 207 篇 d. calvet

语言

  • 197,059 篇 英文
  • 6,464 篇 其他
  • 3,002 篇 中文
  • 99 篇 日文
  • 32 篇 德文
  • 19 篇 法文
  • 18 篇 朝鲜文
  • 14 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 3 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science and Technology Changchun University of Science and Technology"
206534 条 记 录,以下是4991-5000 订阅
排序:
Federated Multi-armed Bandits Under Byzantine Attacks
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第6期6卷 1488-1501页
作者: Saday, Artun Demirel, Ilker Yildirim, Yigit Tekin, Cem Bilkent University Department of Electrical and Electronics Engineering Ankara06800 Turkey Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory CambridgeMA02139 United States
Multi-armed bandits (MAB) is a sequential decision-making model in which the learner controls the trade-off between exploration and exploitation to maximize its cumulative reward. Federated multi-armed bandits (FMAB) ... 详细信息
来源: 评论
Ensemble-based Machine Learning Classification for Early Detection of Autism Spectrum Disorder  3
Ensemble-based Machine Learning Classification for Early Det...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Subhash, Ambika Rani Ashwin Kumar, U.M. School of Computer Science and Engineering REVA University Bengaluru India Department of Information Science and Engineering BMS Institute of Technology and Management Bengaluru India
A complicated neurological illness, autism spectrum disorder (ASD) impacts social skills, communication, and other behavioral elements. Because the symptoms of ASD might be confused with those of other mental health c... 详细信息
来源: 评论
X-News dataset for online news categorization
收藏 引用
International Journal of Intelligent Computing and Cybernetics 2024年 第4期17卷 737-758页
作者: Samia Nawaz Yousafzai Hooria Shahbaz Armughan Ali Amreen Qamar Inzamam Mashood Nasir Sara Tehsin Robertas Damasevicius Department of Computer Science HITEC UniversityTaxila CanttPakistan Department of Statistics Quaid-I-Azam UniversityIslamabadPakistan Centre of Real Time Computer Systems Kaunas University of TechnologyKaunasLithuania Vytautas Magnus University KaunasLithuania
Purpose-The objective is to develop a more effective model that simplifies and accelerates the news classification process using advanced text mining and deep learning(DL)techniques.A distributed framework utilizing B... 详细信息
来源: 评论
CASA: Causality-driven Argument Sufficiency Assessment
CASA: Causality-driven Argument Sufficiency Assessment
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Liu, Xiao Feng, Yansong Chang, Kai-Wei Wangxuan Institute of Computer Technology Peking University China Computer Science Department University of California Los Angeles United States
The argument sufficiency assessment task aims to determine if the premises of a given argument support its conclusion. To tackle this task, existing works often train a classifier on data annotated by humans. However,... 详细信息
来源: 评论
SDN-DDoSNet: A Deep Learning Framework for DDoS Attack Detection in Software-Defined Networks  8
SDN-DDoSNet: A Deep Learning Framework for DDoS Attack Detec...
收藏 引用
8th IEEE International Conference on Information and Communication technology, CICT 2024
作者: Ojha, Abhilash Yadav, Ashok Singh, Vrijendra Tezpur University Department of Computer Science Assam Tezpur India Indian Institute of Information Technology Department of Information Technology Allahabad Prayagraj India
Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt normal web traffic, posing an increasing threat to network infrastructures due to the growing frequency and sophistication of such attacks.... 详细信息
来源: 评论
Contribution Unveiling Cutting-Edge Machine Learning Techniques for Image Segmentation
Contribution Unveiling Cutting-Edge Machine Learning Techniq...
收藏 引用
International Conference on Electrical and Electronics Engineering, ICEEE 2023
作者: Shaik, Nazeer Gupta, Ankur Bhati, Sunita Kumar, Jaideep Singh, Jagendra Budhiraja, Ishan Department of Computer Science and Engineering Srinivasa Ramanujan Institute of Technology Andhra Pradesh Anantapur India School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Computer Applications JECRC University Jaipur India Raj Kumar Goel Institute of Technology AKTU University Lucknow India
Segregation of images is a critical step in processing images, computer vision, and a variety of other disciplines. The technique involves decomposing an illustration into numerous components or components, every sing... 详细信息
来源: 评论
Maximizing (k, L)-Core With Edge Augmentation in Multilayer Graphs
收藏 引用
IEEE Transactions on Computational Social Systems 2024年 第3期11卷 3931-3943页
作者: Chang, Chih-Chieh Lu, Chia-Hsun Teng, Shun-Jen Chang, Ming-Yi Ho, Ya-Chi Shen, Chih-Ya National Taiwan University of Science and Technology Management Undergraduate Program Taipei106 Taiwan National Tsing Hua University Department of Computer Science Hsinchu300 Taiwan Fu Jen Catholic University Department of Sociology Taipei242 Taiwan Hsinchu310 Taiwan
While most previous work pays attention on extracting dense subgraphs, such as k-cores, we argue that augmenting the graph to maximize the size of dense subgraphs is also very important and finds many applications. Th... 详细信息
来源: 评论
Multimodal Brain Tumor Segmentation Using Transformer and UNET  20
Multimodal Brain Tumor Segmentation Using Transformer and UN...
收藏 引用
20th International computer Conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2023
作者: Osei, Isaac Appiah-Kubi, Benjamin Frimpong, Bill Kissi Hayfron-Acquah, James Ben Owusu-Agyemang, Kwabena Ofori-Addo, Samuel Turkson, Regina Esi Mawuli, Cobbinah Bernard Kwame Nkrumah University of Science and Technology Department of Computer Science Kumasi Ghana Ho Technical University Department of Computer Science Ho Ghana University of Cape Coast PMB University Post Office Department of Computer Science and Information Technology Cape Coast Ghana School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China College of Management Information Systems University of Ghana Ghana
In medical image analysis, accurate 3D brain tissue segmentation is crucial. This study undertakes a meticulous comparative evaluation of two 3D segmentation models: the established 3DUnet and the innovative 3DUnet Tr... 详细信息
来源: 评论
Enhanced CNN-SVM Fusion for In-Depth Facial Acne Analysis  3
Enhanced CNN-SVM Fusion for In-Depth Facial Acne Analysis
收藏 引用
3rd IEEE World Conference on Applied Intelligence and Computing, AIC 2024
作者: Prabha, Chander Monga, Sakshra Srivastava, Prakash Singla, Gagan Saluja, Nitin Kumar, Vinod Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science & Engineering Dehradun India Chandigarh University Department of Computer Science & Engineering Punjab Mohali India
The purpose of this work is to present and access a comprehensive analysis of an advanced facial acne classification method that is focused on machine learning. Hormonal acne, pustules, papules, cysts, blackheads (ope... 详细信息
来源: 评论
New Optimization Method Based on Binary Tumbleweed Algorithm  1
收藏 引用
18th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2022
作者: Pan, Jeng-Shyang Wang, Gui-Ling Yang, Dongqiang Chu, Shu-Chuan College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China School of Computer Science and Technology Shandong Jianzhu University Jinan China Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan
Tumbleweed algorithm (TA) is a meta-heuristic algorithm that simulates the growth of Tumbleweed. Compared with other advanced meta-heuristic algorithms, TA has strong optimization performance and competitiveness. Howe... 详细信息
来源: 评论