咨询与建议

限定检索结果

文献类型

  • 1,836 篇 会议
  • 275 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,311 篇 工学
    • 1,052 篇 计算机科学与技术...
    • 892 篇 软件工程
    • 300 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 136 篇 生物工程
    • 122 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 98 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 59 篇 光学工程
    • 52 篇 安全科学与工程
    • 49 篇 动力工程及工程热...
    • 38 篇 建筑学
    • 37 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 35 篇 仪器科学与技术
  • 576 篇 理学
    • 339 篇 数学
    • 148 篇 生物学
    • 113 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 388 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 82 篇 医学
    • 80 篇 临床医学
    • 76 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 63 篇 software
  • 62 篇 software enginee...
  • 61 篇 accuracy
  • 56 篇 machine learning
  • 49 篇 computational mo...
  • 49 篇 feature extracti...
  • 48 篇 training
  • 40 篇 deep learning
  • 40 篇 real-time system...
  • 36 篇 semantics
  • 35 篇 computer science
  • 34 篇 analytical model...
  • 33 篇 artificial intel...
  • 31 篇 computer archite...
  • 31 篇 predictive model...
  • 30 篇 internet of thin...
  • 30 篇 data mining
  • 30 篇 data models
  • 25 篇 testing
  • 23 篇 scalability

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 10 篇 an beongku
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 1,928 篇 英文
  • 211 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2153 条 记 录,以下是931-940 订阅
排序:
Optimizing prediction intervals by tuning random forest via meta-validation
arXiv
收藏 引用
arXiv 2018年
作者: Bayley, Sean Falessi, Davide Dept. of Computer Science and Engineering Notre Dame United States Dept. of Computer Science and Software Engineering California Polytechnic State University
Recent studies have shown that tuning prediction models increases prediction accuracy and that Random Forest can be used to construct prediction intervals. However, to our best knowledge, no study has investigated the... 详细信息
来源: 评论
Underrepresented Groups Threats to Belonging in Computing
Underrepresented Groups Threats to Belonging in Computing
收藏 引用
Research in Equity and Sustained Participation in engineering, Computing, and Technology (RESPECT)
作者: Marlon Mejias Ketly Jean-Pierre Gloria Washington Legand Burge Dept. of Software & Information Systems University. of North Carolina at Charlotte Charlotte NC USA Post-Doctoral Fellow - Process Data Educcational Testing Services Princeton NJ USA Dept. of Electrical Engineering & Computer Science Howard Unversity Washingington D.C. USA
Increasing the number of students exposed to computer science (CS) may not increase throughput in the pipeline if barriers to retention are not addressed. One major barrier is student's perception of belonging. To...
来源: 评论
Android Malware Detection Using Feature Selections and Random Forest
Android Malware Detection Using Feature Selections and Rando...
收藏 引用
International Conference on software Security and Assurance (ICSSA)
作者: Taehoon Eom Heesu Kim SeongMo An Jong Sou Park Dong Seong Kim Dept. of Computer Engineering Korea Aerospace University Seoul South Korea Dept. of Computer Science and Software Engineering The University of Queensland Australia
Malicious software (Malware) applications in Android ecosystem is one of the critical issues. Manual detection of malware is not cost-effective and cannot keep up with the fast evolution of malware development in Andr... 详细信息
来源: 评论
LARNN: Linear Attention Recurrent Neural Network
arXiv
收藏 引用
arXiv 2018年
作者: Chevalier, Guillaume Dept. of Computer Science and Software Engineering Laval University Quebec Canada
The Linear Attention Recurrent Neural Network (LARNN) is a recurrent attention module derived from the LSTM cell and ideas from the consciousness Recurrent Neural Network (RNN). Yes, it LARNNs. The LARNN uses attentio... 详细信息
来源: 评论
Deep learning for automated image classification of seismic damage to built infrastructure  11
Deep learning for automated image classification of seismic ...
收藏 引用
11th National Conference on Earthquake engineering 2018: Integrating Science, engineering, and Policy, NCEE 2018
作者: Patterson, B. Leone, G. Pantoja, M. Behrouzi, A. Dept. of Computer Science & Software Engineering California Polytechnic State University - San Luis Obispo San Luis ObispoCA93407 United States Dept. of Architectural Engineering California Polytechnic State University - San Luis Obispo San Luis ObispoCA93407 United States
The amount of structural damage image data produced in the aftermath of an earthquake can be staggering. It is challenging for a few human volunteers to efficiently filter and tag these images with meaningful damage i... 详细信息
来源: 评论
Comparative Analysis of Context Based Classification of Twitter  4
Comparative Analysis of Context Based Classification of Twit...
收藏 引用
4th International Conference on Advances in Computing, Communication and Automation, ICACCA 2018
作者: Tiwana, Muhammad Salman Javeed, Farooq Lali, Muhammad Ikramullah Dar, Hafsa Bilal, Muhammad Dept. of CS and IT University of Sargodha Sargodha Pakistan Dept. of Computer Science University of Gujrat Gujrat Pakistan Dept. of Software Engineering University of Gujrat Gujrat Pakistan School of Computing and IT Taylor's University Subang Jaya Malaysia Centre for Data Science and Analytics Taylor's University Subang Jaya Malaysia
Social media offers online data source where internet users' share their opinions, views and discuss any news or events that happen around the world. Twitter is a popular social media which effectively takes part ... 详细信息
来源: 评论
ICN-Based Light-Weighted Mobility Support in IoT
ICN-Based Light-Weighted Mobility Support in IoT
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Donghyeok An Dohyung Kim Dept. of Computer Engineering Changwon National University Changwon South Korea Dept. of Software and Computer Engineering Ajou University Suwon south Korea
In Information-Centric Networking (ICN), name-based addressing and in-network caching allow content to be efficiently distributed/accessed. These properties of ICN have been researched in the arena of wireless domain ... 详细信息
来源: 评论
Towards Optimal Search: An Efficient Search Algorithm for Arabic Text using Secant Method  2
Towards Optimal Search: An Efficient Search Algorithm for Ar...
收藏 引用
2nd Borneo International Conference on Applied Mathematics and engineering, BICAME 2018
作者: Kabir, Muhammad Nomani Alginahi, Yasser Ali, Jahan Benseghir, Hocine University Malaysia Pahang Faculty of Computer Systems Software Engineering Gambang Kuantan26300 Malaysia University of Windsor Dept. of Electrical and Computer Engineering WindsorONN9B 3P4 Canada University Malaysia Faculty of Engineering Technology Pahang Kuantan26300 Malaysia
Search techniques are an integral part for text authentication and plagiarism checks. In this work, our aim is to develop an efficient search algorithm for Arabic text (words and sentences) in a large database. The da... 详细信息
来源: 评论
Fair and autonomous sharing of federate learning models in mobile Internet of Things
arXiv
收藏 引用
arXiv 2020年
作者: Hao, Xiaohan Ren, Wei Xiong, Ruoting Zheng, Xianghan Zhu, Tianqing Xiong, Neal N. School of Computer Science China University of Geoscience Wuhan China Guangxi Key Laboratory of Cryptography and Information Security Guilin541004 China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Mingbyte Technology QingDao China School of Software University of Technology Sydney UltimoNSW2007 Australia Dept. of Mathematics and Computer Science Northeastern State University United States
Federate learning can conduct machine learning as well as protect the privacy of self-owned training data on corresponding ends, instead of having to upload to a central trusted data aggregation server. In mobile scen... 详细信息
来源: 评论
CFEA: Collaborative feature ensembling adaptation for domain adaptation in unsupervised optic disc and cup segmentation
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Peng Kong, Bin Li, Zhongyu Zhang, Shaoting Fang, Ruogu J. Crayton Pruitt Family Dept. of Biomedical Engineering University of Florida GainesvilleFL United States Department of Computer Science UNC Charlotte CharlotteNC United States School of Software Engineering Xi'an Jiaotong University Xi'an China Sensetime Research
Recently, deep neural networks have demonstrated comparable and even better performance with board-certified ophthalmologists in well-annotated datasets. However, the diversity of retinal imaging devices poses a signi... 详细信息
来源: 评论