咨询与建议

限定检索结果

文献类型

  • 507 篇 期刊文献
  • 456 篇 会议
  • 12 册 图书

馆藏范围

  • 975 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 681 篇 工学
    • 514 篇 计算机科学与技术...
    • 445 篇 软件工程
    • 155 篇 信息与通信工程
    • 109 篇 生物工程
    • 76 篇 电气工程
    • 76 篇 控制科学与工程
    • 67 篇 生物医学工程(可授...
    • 64 篇 化学工程与技术
    • 49 篇 机械工程
    • 49 篇 光学工程
    • 37 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 23 篇 动力工程及工程热...
    • 23 篇 交通运输工程
    • 19 篇 网络空间安全
  • 348 篇 理学
    • 186 篇 数学
    • 119 篇 生物学
    • 73 篇 物理学
    • 65 篇 统计学(可授理学、...
    • 31 篇 系统科学
    • 30 篇 化学
  • 204 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 88 篇 图书情报与档案管...
    • 63 篇 工商管理
  • 70 篇 医学
    • 60 篇 临床医学
    • 53 篇 基础医学(可授医学...
    • 37 篇 公共卫生与预防医...
    • 29 篇 药学(可授医学、理...
  • 35 篇 法学
    • 26 篇 社会学
  • 23 篇 经济学
    • 23 篇 应用经济学
  • 13 篇 农学
  • 10 篇 教育学
  • 7 篇 军事学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 文学

主题

  • 40 篇 deep learning
  • 36 篇 accuracy
  • 30 篇 machine learning
  • 26 篇 feature extracti...
  • 26 篇 training
  • 23 篇 data models
  • 22 篇 convolutional ne...
  • 21 篇 computational mo...
  • 21 篇 predictive model...
  • 20 篇 federated learni...
  • 19 篇 internet of thin...
  • 19 篇 artificial intel...
  • 15 篇 machine learning...
  • 14 篇 image segmentati...
  • 14 篇 decision making
  • 13 篇 optimization
  • 13 篇 real-time system...
  • 13 篇 measurement
  • 12 篇 convolution
  • 12 篇 semantics

机构

  • 48 篇 college of compu...
  • 34 篇 school of big da...
  • 31 篇 national enginee...
  • 18 篇 school of big da...
  • 17 篇 state key labora...
  • 15 篇 college of compu...
  • 14 篇 school of inform...
  • 13 篇 school of comput...
  • 11 篇 peng cheng labor...
  • 10 篇 department of co...
  • 10 篇 shenzhen univers...
  • 10 篇 school of softwa...
  • 10 篇 college of compu...
  • 9 篇 contribution: da...
  • 9 篇 department of co...
  • 9 篇 university of ch...
  • 9 篇 artificial intel...
  • 9 篇 department of el...
  • 9 篇 department of au...
  • 9 篇 guangdong provin...

作者

  • 15 篇 mahmood khalid
  • 13 篇 shen linlin
  • 12 篇 niyato dusit
  • 11 篇 victor c. m. leu...
  • 11 篇 leung victor c.m...
  • 11 篇 shamshad salman
  • 9 篇 xiuhua li
  • 9 篇 das ashok kumar
  • 9 篇 gao yang
  • 9 篇 leung victor c. ...
  • 9 篇 xiaofei wang
  • 8 篇 sun geng
  • 8 篇 seifedine kadry
  • 8 篇 li xiuhua
  • 8 篇 jungeun kim
  • 8 篇 tian chunwei
  • 8 篇 li jianqiang
  • 7 篇 shi qingjiang
  • 7 篇 qilin fan
  • 7 篇 gao can

语言

  • 801 篇 英文
  • 169 篇 其他
  • 8 篇 中文
检索条件"机构=Department of Software Engineering and Data Science"
975 条 记 录,以下是421-430 订阅
排序:
A Topology Independent Fast Rerouting Scheme with Hop-by-Hop Forwarding Can Achieve a Full Protection
SSRN
收藏 引用
SSRN 2022年
作者: Geng, Haijun Meng, Zhuo Zhang, Han Shi, Xingang Wang, Zhiliang Yin, Xia Chen, Meng Guo, Yingya The School of Automation and Software Engineering Shanxi University School of Computer and Information Technology China The Institute for Network Sciences and Cyberspace Tsinghua University China The Department of Computer Science and Technology Tsinghua University China The School of Big Data and Software Engineering Chongqing University China The College of Computer and Data Science Fuzhou University China
To support critical applications or guarantee a high quality of service, Internet Service Providers (ISPs) generally deploy a technique called routing protection algorithm for local fast rerouting. Alternate next hops... 详细信息
来源: 评论
Deep Learning based Multilabel Hateful Speech Text Comments Recognition and Classification Model for Resource Scarce Ethiopian Language: The case of Afaan Oromo
Deep Learning based Multilabel Hateful Speech Text Comments ...
收藏 引用
Current Development in engineering and Technology (CCET), IEEE International Conference on
作者: Naol Bakala Defersha Jemal Abawajy Kula Kekeba Software Engineering Department College of Electrical and Mechanical Engineering Centre of Excellence for HPC & Big Data Analytics Addis Ababa Science and Technology Ethiopia Faculty of Science Engineering and Built Environment School of Information Technology Deakin University Geelong VIC Australia Department of Software Engineering Technology Centre of Excellence for College of Electrical and Mechanical Engineering Addis Ababa Science and Technology Ethiopia
In response to the phenomenon of hate speech on popular social media such as Facebook, a number of researchers have investigated and developed different automated techniques in order to detect and moderate hate speech... 详细信息
来源: 评论
Fractional discrete neural networks with variable order: solvability, finite time stability and synchronization
收藏 引用
The European Physical Journal Special Topics 2024年 1-14页
作者: Hioual, Amel Alomari, Saleh Al-Tarawneh, Hassan Ouannas, Adel Grassi, Giuseppe Laboratory of Dynamical Systems and Control University of Oum El-Bouaghi Oum El Bouaghi Algeria Faculty of Science and Information Technology Software Engineering Jadara University Irbid Jordan Department of Data Sciences and Artificial Intelligence Al-Ahliyya Amman University Amman Jordan Department of Mathematics and Computer Science University of Oum EL-Bouaghi Oum El Bouaghi Algeria Dipartimento Ingegneria Innovazione Universita del Salento Lecce Italy
Research in the field of dynamic behaviors in neural networks with variable-order differences is currently a thriving area, marked by various significant discoveries. However, when it comes to discrete-time neural net...
来源: 评论
A Skeletal Sequence-Based Method for Assessing Motor Coordination in Children  6th
A Skeletal Sequence-Based Method for Assessing Motor Coordin...
收藏 引用
6th International Conference on Innovative Computing, IC 2023
作者: Pei, Zitong Song, Wenai Zhao, Nanbing Chen, Zhiyu Cui, Wenbo Lei, Yi Chen, Yanjie Wang, Qing School of Software Engineering North University of China Taiyuan038507 China Faculty of Information Technology Beijing University of Technology Beijing100124 China Department of Children’s Health Care Centre Beijing Children’s Hospital Capital Medical University Beijing100045 China Department of Automation Tsinghua University Beijing100084 China Pharmacovigilance Research Center for Information Technology and Data Science Cross-Strait Tsinghua Research Institute Xiamen361015 China
Children’s motor coordination is an important component of physical fitness test for young children. The development of children’s motor coordination occurs throughout children’s motor development, and it is not on... 详细信息
来源: 评论
Improving Routing Decision Algorithm for RPL Networks
Improving Routing Decision Algorithm for RPL Networks
收藏 引用
International Conference on Information Technology (ICIT)
作者: Abdullah Al Zaqebah Omar Almomani Malek Almomani Adeeb Alsaaidah Ahmad Adel Abu-Shareha Ahmad Althunibat Department of Computer Science The World IslamicSciences and Education University Amman Jordan Department of Information System and Networks The World Islamic Sciences and Education University Amman Jordan Software Engineering The World Islamic Sciences and Education University Amman Jordan Department of Networks and Information Security Al-Ahliyya Amman University Amman Jordan Department of Data Science and Artificial Intelligence Al-Ahliyya Amman University Amman Jordan Department of Software Engineering Al-Zaytoonah University of Jordan Amman Jordan
Low Power Networks are spreading worldwide, seeking to enable small devices to join wireless networks. This requires a routing mechanism that makes it possible and seamless. This research aims to create a Low Power an...
来源: 评论
Joint Admission Control and Resource Allocation of Virtual Network Embedding via Hierarchical Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Tianfu Shen, Li Fan, Qilin Xu, Tong Liu, Tongliang Xiong, Hui Anhui Province Key Laboratory of Big Data Analysis and Application School of Computer Science University of Science and Technology of China Hefei230027 China The School of Big Data and Software Engineering Chongqing University ChinaScience Chongqing401331 China JD Explore Academy The UBTECH Sydney Artificial Intelligence Centre The School of Information Technologies Faculty of Engineering and Information Technologies The University of Sydney DarlingtonNSW2008 Australia Thrust of Artificial Intelligence Nansha Guangdong Guangzhou511400 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
As an essential resource management problem in network virtualization, virtual network embedding (VNE) aims to allocate the finite resources of physical network to sequentially arriving virtual network requests (VNRs)... 详细信息
来源: 评论
FlagVNE: A Flexible and Generalizable Reinforcement Learning Framework for Network Resource Allocation
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Tianfu Fan, Qilin Wang, Chao Yang, Long Ding, Leilei Yuan, Nicholas Jing Xiong, Hui School of Computer Science and Technology University of Science and Technology of China China School of Big Data and Software Engineering Chongqing University China Guangzhou HKUST Fok Ying Tung Research Institute China School of Artificial Intelligence Peking University China Thrust of Artificial Intelligence The Hong Kong University of Science and Technology Guangzhou China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong Hong Kong
Virtual network embedding (VNE) is an essential resource allocation task in network virtualization, aiming to map virtual network requests (VNRs) onto physical infrastructure. Reinforcement learning (RL) has recently ... 详细信息
来源: 评论
Symmetrical Supervision with Transformer for Few-shot Medical Image Segmentation
Symmetrical Supervision with Transformer for Few-shot Medica...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yao Niu Zhiming Luo Sheng Lian Lei Li Shaozi Li Haixin Song Department of Artificial Intelligence Xiamen University Fujian China College of Computer and Data Science Fuzhou University Fujian China Department of Software Engineering Xiamen University Fujian China
Few-shot learning can potentially learn the target knowledge in extremely few data regimes. Existing few-shot medical image segmentation methods fail to consider the global anatomy correlation between the support and ... 详细信息
来源: 评论
A Secured and Optimized Broadcast Authentication Scheme for the Internet of Medical Things
A Secured and Optimized Broadcast Authentication Scheme for ...
收藏 引用
Electrical, Computer and Energy Technologies (ICECET), International Conference on
作者: Syed Waleed Riaz Fazlullah Khan Insaf Ullah Bandar Alshawi Ryan Alturki Mohammad Wedyan Computer Science Department Abdul Wali Khan University Mardan KPK Pakistan Faculty of Science and Engineering School of Computer Science University of Nottingham Ningbo China Ningbo Zhejiang China Institute for Analytics and Data Science University of Essex Colchester UK Department of Computer and Network Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia Department of Software Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia Department of Computer Sciences Faculty of Information Technology and Computer Sciences Yarmouk University (YU) Irbid Jordan
This Internet of Medical Things (IoMT), facilitates the medical stop regarding real-time monitoring of patients, medical emergency management, remote surgery, patient information management, medical equipment, drug mo... 详细信息
来源: 评论
software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
arXiv
收藏 引用
arXiv 2023年
作者: Akter, Mst Shapna Faruk, Md Jobair Hossain Anjum, Nafisa Masum, Mohammad Shahriar, Hossain Rahman, Akond Wu, Fan Cuzzocrea, Alfredo Department of Computer Science Kennesaw State University United States Department of Information Technology Kennesaw State University United States Department of Applied Data Science San Jose State University United States Department of Computer Science and Software Engineering Auburn University United States Department of Computer Science Tuskegee University United States iDEA Lab University of Calabria Rende Italy
The software supply chain (SSC) attack has become one of the crucial issues that are being increased rapidly with the advancement of the software development domain. In general, SSC attacks execute during the software... 详细信息
来源: 评论