咨询与建议

限定检索结果

文献类型

  • 8,897 篇 期刊文献
  • 8,371 篇 会议
  • 107 册 图书

馆藏范围

  • 17,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,738 篇 工学
    • 8,059 篇 计算机科学与技术...
    • 6,706 篇 软件工程
    • 2,461 篇 信息与通信工程
    • 1,810 篇 生物工程
    • 1,479 篇 控制科学与工程
    • 1,348 篇 生物医学工程(可授...
    • 1,139 篇 电气工程
    • 993 篇 光学工程
    • 781 篇 电子科学与技术(可...
    • 543 篇 化学工程与技术
    • 531 篇 机械工程
    • 433 篇 网络空间安全
    • 428 篇 安全科学与工程
    • 423 篇 仪器科学与技术
    • 417 篇 动力工程及工程热...
    • 396 篇 交通运输工程
  • 6,977 篇 理学
    • 3,683 篇 数学
    • 2,107 篇 生物学
    • 1,766 篇 物理学
    • 1,457 篇 统计学(可授理学、...
    • 706 篇 化学
    • 661 篇 系统科学
  • 3,069 篇 管理学
    • 1,659 篇 管理科学与工程(可...
    • 1,520 篇 图书情报与档案管...
    • 947 篇 工商管理
  • 1,413 篇 医学
    • 1,167 篇 临床医学
    • 1,048 篇 基础医学(可授医学...
    • 609 篇 公共卫生与预防医...
    • 589 篇 药学(可授医学、理...
  • 603 篇 法学
    • 521 篇 社会学
  • 347 篇 经济学
  • 299 篇 农学
  • 186 篇 教育学
  • 63 篇 文学
  • 25 篇 军事学
  • 20 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 642 篇 deep learning
  • 554 篇 accuracy
  • 493 篇 machine learning
  • 313 篇 feature extracti...
  • 306 篇 computational mo...
  • 292 篇 predictive model...
  • 272 篇 real-time system...
  • 256 篇 training
  • 237 篇 internet of thin...
  • 227 篇 support vector m...
  • 208 篇 semantics
  • 201 篇 optimization
  • 196 篇 data mining
  • 196 篇 convolutional ne...
  • 184 篇 reinforcement le...
  • 165 篇 artificial intel...
  • 159 篇 neural networks
  • 157 篇 data models
  • 156 篇 image segmentati...
  • 135 篇 deep neural netw...

机构

  • 428 篇 department of ph...
  • 399 篇 iccub universita...
  • 365 篇 horia hulubei na...
  • 356 篇 h.h. wills physi...
  • 297 篇 university of ch...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 288 篇 van swinderen in...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 287 篇 physikalisches i...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 284 篇 institute of par...
  • 280 篇 henryk niewodnic...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 233 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 213 篇 blake t.
  • 205 篇 brundu d.
  • 197 篇 borsato m.
  • 191 篇 betancourt c.
  • 162 篇 bediaga i.
  • 157 篇 baker s.
  • 148 篇 amato s.
  • 148 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 baryshnikov f.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 15,318 篇 英文
  • 1,996 篇 其他
  • 84 篇 中文
  • 5 篇 法文
  • 4 篇 斯洛文尼亚文
  • 3 篇 德文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science with Data Science"
17375 条 记 录,以下是121-130 订阅
排序:
The most tenuous group query
收藏 引用
Frontiers of computer science 2023年 第2期17卷 197-208页
作者: Na LI Huaijie ZHU Wenhao LU Ningning CUI Wei LIU Jian YIN Jianliang XU Wang-Chien LEE School of Computer Science and Engineering Sun Yat-Sen UniversityGuangzhou 510006China Laboratory of Big Data Analysis and Processing Guangzhou 510006China School of Artificial Intelligence Sun Yat-Sen UniversityGuangzhou 510006China Department of Computer Science Anhui UniversityHefei 230601China Department of Computer Science Hong Kong Baptist UniversityHong Kong 999077China Department of Computer Science The Pennsylvania State UniversityState College 19019USA
Rtecently a lot of works have been investigating to find the tenuous groups,i.e.,groups with few social interactions and weak relationships among members,for reviewer selection and psycho-educational group ***,the met... 详细信息
来源: 评论
Revisiting 30 years of the Network Time Protocol  24
Revisiting 30 years of the Network Time Protocol
收藏 引用
33rd Companion of the ACM World Wide Web Conference, WWW 2023
作者: Woo, Simon S. Computer Science and Engineering Department Applied Data Science Department Department of Artificial Intelligence Sungkyunkwan University Suwon Korea Republic of
Since the inception of the Internet and WWW, providing the time among multiple nodes on the Internet has been one of the most critical challenges. David Mills is the pioneer to provide time on the Internet, inventing ... 详细信息
来源: 评论
Model-based framework for exploiting sensors of IoT devices using a botnet: a case study with android
收藏 引用
Cyber-Physical Systems 2025年 第1期11卷 1-46页
作者: Khaliq, Zubair Khan, Dawood Ashraf Baba, Asif Iqbal Ali, Shahbaz Farooq, Sheikh Umar Department of Computer Science University of Kashmir Jammu and Kashmir Srinagar India AI Thndr Dubai United Arab Emirates Department of Computer Science Tuskegee University TuskegeeAL United States Data Engineering hyke.ai Dubai United Arab Emirates
Botnets have become a severe security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic, and the ever-larger number of cybercrim... 详细信息
来源: 评论
IBAttack: Being Cautious about data Labels
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第6期4卷 1484-1493页
作者: Agarwal, Akshay Singh, Richa Vatsa, Mayank Ratha, Nalini IISER Bhopal Department of Data Science and Engineering Bhopal462066 India IIT Jodhpur Department of Computer Science and Engineering Rajasthan Jodhpur342037 India University at Buffalo Department of Computer Science and Electrical Engineering BuffaloNY14260 United States
Traditional backdoor attacks insert a trigger patch in the training images and associate the trigger with the targeted class label. Backdoor attacks are one of the rapidly evolving types of attack which can have a sig... 详细信息
来源: 评论
Generalized Learning of Coefficients in Spectral Graph Convolutional Networks  15
Generalized Learning of Coefficients in Spectral Graph Convo...
收藏 引用
15th IEEE International Conference on Knowledge Graph, ICKG 2024
作者: Coskun, Mustafa Grama, Ananth Koyuturk, Mehmet Ankara University Department of Ai and Data Engineering Ankara Turkey Purdue University Department of Computer Science IN United States Case Western University Department of Data and Computer Science OH United States
Spectral Graph Convolutional Networks (GCNs) have gained popularity in graph machine learning applications due, in part, to their flexibility in specification of network propagation rules. These propagation rules are ... 详细信息
来源: 评论
A Variational Inference-Based LSTM-enhanced Deep Neural Model for Sequential Recommendations
收藏 引用
IEEE Access 2025年 13卷 95945-95962页
作者: Ngaffo, Armielle Noulapeu Kamgang, Ines Raissa Djouela Maka, Ebenezer Maka Malong, Yannick University of Douala Laboratory of Computer Science Data Science and Artificial Intelligence National Higher Polytechnic School of Douala Douala8580 Cameroon Department of computer engineering University of Buea Faculty of Engineering and Technology Cameroon
Long Short-Term Memory (LSTM) networks are particularly useful in recommender systems since user preferences change over time. Unlike traditional recommender models which assume static user-item interactions, LSTM mod... 详细信息
来源: 评论
Automated soccer event detection and highlight generation for short and long views
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Afzal, Maira Shah, Jamal Hussain ur Rehman, Saeed Khokhar, Fahad Ahmed Yasmin, Mussarat Kadry, Seifedine Department of Computer Science COMSATS University Islamabad Wah Campus Rawalpindi Pakistan Department of Mathematics and Information University of Florence Florence Italy Department of Computer Science and Mathematics Lebanese American University Beirut Lebanon Department of Applied Data Science Noroff University College Kristiansand Norway
The computer vision field has wide applications in various areas, including sports. Almost all sports events have been exploiting the best features. Sports videos are structure-based, and due to this characteristic, t... 详细信息
来源: 评论
Patterns of Widespread Structural Abnormalities in Autism Spectrum Disorder using Diffusion Tensor Imaging
Patterns of Widespread Structural Abnormalities in Autism Sp...
收藏 引用
2024 International Conference on Communication, computer sciences and Engineering, IC3SE 2024
作者: Bharti, Dilip Kumar Singh, Sanjay Kumar Kumar, Mukesh Kanaujia, Vishal Kumar Aeri, Manisha Abes Engineering College Computer Science And Engineering-Data Science Ghaziabad India Kashi Institute Of Technology Department Of Computer Science & Applications Mirzamurad U.P Varanasi India Graphic Era Hill University Computer Science And Engineering Uttarakhand Dehradun248002 India Abes Engineering College Computer Science And Engineering Data Science Department Ghaziabad India
Diffusion tensor imaging (DTI) is a neuroimaging approach that lets in for the visualization and quantification of the structural integrity of white depend fibers in the brain. In latest years, DTI has come to be an e... 详细信息
来源: 评论
Community Clustering on Fraud Transactions Applied the Louvain-Coloring Algorithm
收藏 引用
International Journal of Electronics and Telecommunications 2023年 第3期69卷 593-598页
作者: Mardiansyah, Heru Suwilo, Saib Nababan, Erna Budiarti Efendi, Syahril Department Computer Science Faculty of Computer Science and Information Technology Universitas Sumatera Utara Medan Indonesia Department Mathematics Faculty of Mathematics and Natural Sciences Universitas Sumatera Utara Medan Indonesia Department Data Science and Artificial Intelligence Faculty of Computer Science and Information Technology Universitas Sumatera Utara Medan Indonesia
The contribution main from this research is modularity and better processing time in detecting community by using K-1 coloring. Testing performed on transaction datasets remittance on P2P platforms where the Louvain C... 详细信息
来源: 评论
An Artificial Neural Network-Based Model for Effective Software Development Effort Estimation
收藏 引用
computer Systems science & Engineering 2023年 第2期44卷 1309-1324页
作者: Junaid Rashid Sumera Kanwal Muhammad Wasif Nisar Jungeun Kim Amir Hussain Department of Computer Science and Engineering Kongju National UniversityCheonan31080Korea Department of Computer Science COMSATS University IslamabadWah CampusIslamabad47040Pakistan Centre of AI and Data Science Edinburgh Napier UniversityEdinburghEH114DYUK
In project management,effective cost estimation is one of the most cru-cial activities to efficiently manage resources by predicting the required cost to fulfill a given ***,finding the best estimation results in softwar... 详细信息
来源: 评论