咨询与建议

限定检索结果

文献类型

  • 8,836 篇 期刊文献
  • 8,358 篇 会议
  • 107 册 图书

馆藏范围

  • 17,301 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,676 篇 工学
    • 8,009 篇 计算机科学与技术...
    • 6,723 篇 软件工程
    • 2,451 篇 信息与通信工程
    • 1,799 篇 生物工程
    • 1,423 篇 控制科学与工程
    • 1,343 篇 生物医学工程(可授...
    • 1,126 篇 电气工程
    • 999 篇 光学工程
    • 774 篇 电子科学与技术(可...
    • 542 篇 化学工程与技术
    • 529 篇 机械工程
    • 433 篇 网络空间安全
    • 428 篇 安全科学与工程
    • 423 篇 仪器科学与技术
    • 414 篇 动力工程及工程热...
    • 394 篇 交通运输工程
  • 6,961 篇 理学
    • 3,685 篇 数学
    • 2,104 篇 生物学
    • 1,749 篇 物理学
    • 1,461 篇 统计学(可授理学、...
    • 692 篇 化学
    • 661 篇 系统科学
  • 3,064 篇 管理学
    • 1,662 篇 管理科学与工程(可...
    • 1,515 篇 图书情报与档案管...
    • 945 篇 工商管理
  • 1,395 篇 医学
    • 1,155 篇 临床医学
    • 1,046 篇 基础医学(可授医学...
    • 613 篇 公共卫生与预防医...
    • 588 篇 药学(可授医学、理...
  • 610 篇 法学
    • 525 篇 社会学
  • 344 篇 经济学
  • 298 篇 农学
  • 186 篇 教育学
  • 61 篇 文学
  • 25 篇 军事学
  • 20 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 632 篇 deep learning
  • 553 篇 accuracy
  • 497 篇 machine learning
  • 313 篇 feature extracti...
  • 308 篇 computational mo...
  • 292 篇 predictive model...
  • 273 篇 real-time system...
  • 256 篇 training
  • 236 篇 internet of thin...
  • 227 篇 support vector m...
  • 211 篇 semantics
  • 200 篇 optimization
  • 197 篇 data mining
  • 192 篇 convolutional ne...
  • 182 篇 reinforcement le...
  • 162 篇 artificial intel...
  • 160 篇 neural networks
  • 159 篇 data models
  • 157 篇 image segmentati...
  • 138 篇 deep neural netw...

机构

  • 428 篇 department of ph...
  • 399 篇 iccub universita...
  • 364 篇 horia hulubei na...
  • 355 篇 h.h. wills physi...
  • 297 篇 university of ch...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 288 篇 van swinderen in...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 287 篇 physikalisches i...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 284 篇 institute of par...
  • 280 篇 henryk niewodnic...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 233 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 213 篇 blake t.
  • 205 篇 brundu d.
  • 198 篇 borsato m.
  • 192 篇 betancourt c.
  • 162 篇 bediaga i.
  • 157 篇 baker s.
  • 148 篇 amato s.
  • 147 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 baryshnikov f.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 15,323 篇 英文
  • 1,917 篇 其他
  • 84 篇 中文
  • 5 篇 法文
  • 4 篇 斯洛文尼亚文
  • 3 篇 德文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science with Data Science"
17301 条 记 录,以下是561-570 订阅
排序:
Effort-aware cross-project just-in-time defect prediction framework for mobile apps
收藏 引用
Frontiers of computer science 2022年 第6期16卷 15-29页
作者: Tian CHENG Kunsong ZHAO Song SUN Muhammad MATEEN Junhao WEN School of Big Data and Software Engineering Chongqing UniversityChongqing401331China School of Computer Science Wuhan UniversityWuhan430072China Department of Computer Science Air University Multan CampusMultan60000Pakistan
As the boom of mobile devices,Android mobile apps play an irreplaceable roles in people’s daily life,which have the characteristics of frequent updates involving in many code commits to meet new ***-in-Time(JIT)defec... 详细信息
来源: 评论
Navigating Complex Multiclass Classification in High-Dimensional Spaces: A Hybrid Approach  7
Navigating Complex Multiclass Classification in High-Dimensi...
收藏 引用
7th IEEE International Conference on Computational Systems and Information Technology for Sustainable Solutions, CSITSS 2023
作者: Nemani, Praneeth Sundar Vadali, Venkata Surya Medi, Prathistith Raj Marisetty, Ashish Vollala, Satyanarayana Iiit Naya Raipur Department of Computer Science and Engineering India Iiit Naya Raipur Department of Data Science and Artificial Intelligence India
Large-scale tabular data classification is a critical task and the complexity arises from the vast amount of structured data generated in these fields, coupled with the challenges of high dimensionality and limited sa... 详细信息
来源: 评论
Learning to Communicate Among Agents for Large-Scale Dynamic Path Planning With Genetic Programming Hyperheuristic
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第5期6卷 1269-1283页
作者: Liao, Xiao-Cheng Hu, Xiao-Min Chen, Xiang-Ling Mei, Yi Jia, Ya-Hui Chen, Wei-Neng Victoria University of Wellington Centre for Data Science and Artificial Intelligence School of Engineering and Computer Science Wellington6140 New Zealand Guangdong University of Technology School of Computer Science and Technology Guangzhou510006 China Hanyang University Department of Electrical and Electronic Engineering Ansan15588 Korea Republic of South China University of Technology School of Future Technology Guangzhou510006 China Pazhou Lab Guangzhou510005 China South China University of Technology School of Computer Science and Engineering State Key Laboratory of Subtropical Building and Urban Science Guangzhou510006 China
Genetic programming hyperheuristic (GPHH) has recently become a promising methodology for large-scale dynamic path planning (LDPP) since it can produce reusable heuristics rather than disposable solutions. However, in... 详细信息
来源: 评论
Enhanced Clickbait Detection through Ensemble Machine Learning Techniques
收藏 引用
Procedia computer science 2025年 258卷 599-608页
作者: Neetu Sardana Deepika Varshney Seema Luthra Department of Computer Science & Engineering-Data Science ABES Engineering College Ghaziabad India
Nowadays online news websites are one of the quickest ways to get information. However, the credibility of news from these sources is sometimes questioned. One common problem with online news is the prevalence of clic... 详细信息
来源: 评论
ASAnalyzer: Attention based Sentiment analyzer for Real-world Sentiment Analysis  20
ASAnalyzer: Attention based Sentiment analyzer for Real-worl...
收藏 引用
20th International Conference on Frontiers of Information Technology, FIT 2023
作者: Hussain, Khadim Azhar, Muhammad Lee, Bumshik Iqbal, Asma Affan, Muhammad Ullah Khan, Sajid Comsats University Islamabad Department of Computer Science Sahiwal Pakistan Hong Kong Shue Yan University Department of Applied Data Science Hong Kong Hong Kong Chosun University Department of Computer Science and Software Engineering Korea Republic of Tsinghua University Department of Computer Science China University of Lakki Marwat Department of Computer Science Pakistan
In this era of big data, a lot of data is produced in various forms every second through various sources. Text data is one of those types that is produced mainly through social media like Twitter, Facebook, YouTube co... 详细信息
来源: 评论
Managing Vulnerabilities in Software Projects: the Case of NTT data  49
Managing Vulnerabilities in Software Projects: the Case of N...
收藏 引用
49th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2023
作者: Nocera, Sabato Romano, Simone Francese, Rita Burlon, Riccardo Scanniello, Giuseppe University of Salerno Department of Computer Science Fisciano Italy Ntt Data Salerno Italy
Background: Software vulnerabilities are flaws in application source code that can be exploited to cause harm, hence companies must devise strategies to manage ***: We want to understand how software vulnerabilities a... 详细信息
来源: 评论
Machine Learning for Mental Health: A Systematic Study of Seven Approaches for Detecting Mental Disorders
Machine Learning for Mental Health: A Systematic Study of Se...
收藏 引用
2023 International Technical Conference on Circuits/Systems, computers, and Communications, ITC-CSCC 2023
作者: Nadeem, Muhammad Rashid, Junaid Moon, Hyeonjoon Dosset, Arailym Sejong Uviversity Department of Computer Science and Engineering Seoul Korea Republic of Sejong University Department of Data Science Seoul Korea Republic of
Mental disorders are a prevalent issue among teenagers. The widespread use of smartphones and social media has revolutionized the way individuals communicate and exchange information with millions of people using thes... 详细信息
来源: 评论
Graph Contrastive Learning for Truth Inference  40
Graph Contrastive Learning for Truth Inference
收藏 引用
40th IEEE International Conference on data Engineering, ICDE 2024
作者: Liu, Hao Liu, Jiacheng Tang, Feilong Li, Peng Chen, Long Yu, Jiadi Zhu, Yanmin Gao, Min Yang, Yanqin Hou, Xiaofeng Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong East China Normal University School of Data Science and Engineering Shanghai China Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai China University of Aizu School of Computer Science and Engineering Japan Simon Fraser University School of Computing Science Canada
Crowdsourcing has become a popular paradigm for collecting large-scale labeled datasets by leveraging numerous annotators. However, these annotators often provide noisy labels due to varying expertise. Truth inference... 详细信息
来源: 评论
CNN-LSTM: Development of Offline Signature Authentication  1
CNN-LSTM: Development of Offline Signature Authentication
收藏 引用
1st IEEE International Conference on Emerging Research in Computational science, ICERCS 2023
作者: Ganapathy, Revathy Lingeshwaran, D. Suthanthiradevi, P. Harish Kumar, M.V. Vels Insitute of Science Technology and Advanced Studies Department of Computer Science and Engineering Chennai India Srm Institute of Science and Technology Department of Data Science and Business Systems Chennai India
Offline Signature Authentication is a critical task in the field of document authentication, and its accuracy is essential for ensuring security while transactions. This research proposes two approaches: Initially Pre... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论