咨询与建议

限定检索结果

文献类型

  • 1,718 篇 期刊文献
  • 778 篇 会议
  • 24 册 图书

馆藏范围

  • 2,520 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,320 篇 工学
    • 756 篇 计算机科学与技术...
    • 618 篇 软件工程
    • 226 篇 信息与通信工程
    • 176 篇 生物工程
    • 160 篇 核科学与技术
    • 156 篇 生物医学工程(可授...
    • 152 篇 电气工程
    • 144 篇 控制科学与工程
    • 116 篇 光学工程
    • 107 篇 化学工程与技术
    • 99 篇 电子科学与技术(可...
    • 48 篇 机械工程
    • 46 篇 仪器科学与技术
    • 39 篇 安全科学与工程
    • 37 篇 网络空间安全
  • 1,226 篇 理学
    • 659 篇 物理学
    • 366 篇 数学
    • 248 篇 生物学
    • 144 篇 统计学(可授理学、...
    • 137 篇 化学
    • 63 篇 系统科学
  • 304 篇 管理学
    • 167 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 94 篇 工商管理
  • 237 篇 医学
    • 195 篇 临床医学
    • 137 篇 基础医学(可授医学...
    • 76 篇 公共卫生与预防医...
    • 72 篇 药学(可授医学、理...
  • 70 篇 法学
    • 55 篇 社会学
  • 48 篇 农学
  • 38 篇 经济学
    • 38 篇 应用经济学
  • 30 篇 教育学
  • 5 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 155 篇 hadron colliders
  • 76 篇 hadrons
  • 62 篇 machine learning
  • 60 篇 accuracy
  • 59 篇 deep learning
  • 52 篇 semantics
  • 46 篇 hadronic decays
  • 44 篇 feature extracti...
  • 43 篇 artificial intel...
  • 41 篇 bottom mesons
  • 37 篇 branching fracti...
  • 36 篇 training
  • 34 篇 computational mo...
  • 33 篇 particle decays
  • 33 篇 data models
  • 31 篇 w & z bosons
  • 30 篇 federated learni...
  • 26 篇 leptonic, semile...
  • 26 篇 data mining
  • 26 篇 predictive model...

机构

  • 418 篇 department of ph...
  • 389 篇 iccub universita...
  • 373 篇 horia hulubei na...
  • 365 篇 h.h. wills physi...
  • 356 篇 university of ch...
  • 355 篇 van swinderen in...
  • 355 篇 cavendish labora...
  • 355 篇 school of physic...
  • 347 篇 department of ph...
  • 347 篇 imperial college...
  • 342 篇 center for high ...
  • 340 篇 stfc rutherford ...
  • 338 篇 institute of par...
  • 335 篇 yandex school of...
  • 326 篇 infn sezione di ...
  • 322 篇 henryk niewodnic...
  • 313 篇 infn sezione di ...
  • 313 篇 nikhef national ...
  • 301 篇 school of physic...
  • 301 篇 physik-institut ...

作者

  • 236 篇 beiter a.
  • 218 篇 barter w.
  • 214 篇 bellee v.
  • 200 篇 casse g.
  • 196 篇 bowcock t.j.v.
  • 194 篇 blake t.
  • 191 篇 borsato m.
  • 191 篇 betancourt c.
  • 191 篇 amato s.
  • 191 篇 boettcher t.
  • 190 篇 bediaga i.
  • 187 篇 braun s.
  • 186 篇 baryshnikov f.
  • 186 篇 borisyak m.
  • 184 篇 bizzeti a.
  • 181 篇 bencivenni g.
  • 179 篇 brundu d.
  • 177 篇 back j.j.
  • 177 篇 bay a.
  • 176 篇 bursche a.

语言

  • 2,180 篇 英文
  • 328 篇 其他
  • 22 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Computer Science and Research Network Data Science"
2520 条 记 录,以下是531-540 订阅
排序:
Mobility-aware Seamless Service Migration and Resource Allocation in Multi-edge IoV Systems
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Zheyi Huang, Sijin Min, Geyong Ning, Zhaolong Li, Jie Zhang, Yan College of Computer and Data Science Fuzhou University Fuzhou350116 China Engineering Research Center of Big Data Intelligence Ministry of Education Fujian Key Laboratory of Network Fuzhou350002 China Computing and Intelligent Information Processing [Fuzhou University Fuzhou350116 China Department of Computer Science Faculty of Environment Science and Economy University of Exeter ExeterEX4 4QF United Kingdom School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China Department of Informatics University of Oslo Oslo0316 Norway
Mobile Edge Computing (MEC) offers low-latency and high-bandwidth support for Internet-of-Vehicles (IoV) applications. However, due to high vehicle mobility and finite communication coverage of base stations, it is ha... 详细信息
来源: 评论
A Blockchain-Based Distributed Collaborative Sensing and Spectrum Access Approach for Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Peng, Yuhuai Li, Yuan Guo, Yu Zhang, Dawei Khan, Fazlullah Alturki, Ryan Alshawi, Bandar Northeastern University College of Computer Science and Engineering Shenyang110819 China Zhiyuan Research Institute Xihu District Hangzhou China Zhengzhou University School of Computer and Artificial Intelligence Henan Zhengzhou450001 China University of Nottingham Ningbo China School of Computer Science Faculty of Science and Engineering Zhejiang Ningbo315104 China KKR and KSR Institute of Technology and Sciences Department of Computer Science and Engineering Andhra Pradesh Guntur India Division of Research and Development Lovely Professional University Phagwara India University Centre of Research and Development Chandigarh University Mohali India Umm Al-Qura University Department of Software Engineering College of Computing Makkah Saudi Arabia Umm Al-Qura University College of Computing Department of Computer and Network Engineering Makkah Saudi Arabia
Cognitive radio (CR) provides key technical support for the seamless communication of consumer electronic (CE) devices through distributed cooperative sensing and spectrum access. However, its openness and dynamic nat... 详细信息
来源: 评论
Path optimization method for the sign problem caused by the fermion determinant
收藏 引用
Physical Review D 2025年 第9期111卷 094503-094503页
作者: Kazuki Hisayoshi Kouji Kashiwa Yusuke Namekawa Hayato Takase Department of Computer Science and Engineering Faculty of Information Engineering Fukuoka Institute of Technology Fukuoka 811-0295 Japan Education and Research Center for Artificial Intelligence and Data Innovation Hiroshima University Hiroshima 730-0053 Japan
The path optimization method with machine learning is applied to the one-dimensional massive lattice Thirring model, which has the sign problem caused by the fermion determinant. This study aims to investigate how the...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
VC dimensions of group convolutional neural networks
arXiv
收藏 引用
arXiv 2022年
作者: Petersen, Philipp Christian Sepliarskaia, Anna University of Vienna Faculty of Mathematics and Research Network Data Science @ Uni Vienna Kolingasse 14-16 Wien1090 Austria
We study the generalization capacity of group convolutional neural networks. We identify precise estimates for the VC dimensions of simple sets of group convolutional neural networks. In particular, we find that for i... 详细信息
来源: 评论
Retraction Note: A Systematic Survey on Implementation of Fuzzy Regression Models for Real Life Applications
收藏 引用
Archives of Computational Methods in Engineering 2025年 1-2页
作者: Khan, Mufala Kumar, Rakesh Aledaily, Arwa N. Kariri, Elham Viriyasitavat, Wattana Yadav, Kusum Dhiman, Gaurav Kaur, Amandeep Sharma, Ashutosh Vimal, S. Department of Mathematics Lovely Professional University Phagwara India College of Computer Science and Engineering University of Ha’il Hail Saudi Arabia College of Computer Science and Engineering Prince Sattam Bin Abdulaziz University Al‑Kharj Saudi Arabia Business Information Technology Division Department of Statistics Faculty of Commerce and Accountancy Chulalongkorn University Bangkok Thailand Department of Computer Science Government Bikram College of Commerce Patiala India Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon University Centre for Research and Development Department of Computer Science and Engineering Chandigarh University Gharuan India Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Chitkara University Institute of Engineering and Technology Chitkara University Rajpura India School of Computer Science University of Petroleum and Energy Studies Dehradun India Department of Artificial Intelligence and Data Science Ramco Institute of Technology Rajaplayam India
来源: 评论
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Man Su, Shuao Wang, Qian Li, Qi Zhou, Yuting Ma, Xiaojing Li, Zhengxiong School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Engineering University of Colorado Denver United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive i... 详细信息
来源: 评论
Unlabeled Imperfect Demonstrations in Adversarial Imitation Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Yunke Du, Bo Xu, Chang School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China School of Computer Science Faculty of Engineering The University of Sydney Australia
Adversarial imitation learning has become a widely used imitation learning framework. The discriminator is often trained by taking expert demonstrations and policy trajectories as examples respectively from two catego... 详细信息
来源: 评论
Automatic Deep Sparse Multi-Trial Vector-based Differential Evolution Clustering with Manifold Learning and Incremental Technique
TechRxiv
收藏 引用
TechRxiv 2023年
作者: Hadikhani, Parham Lai, Daphne Teck Ching Ong, Wee-Hong Nadimi-Shahraki, Mohammad H. The School of Digital Science Universiti Brunei Darussalam Brunei Faculty of Computer Engineering Big Data Research Center Najafabad Branch Islamic Azad University Najafabad Iran
Most deep clustering methods despite providing complex networks to learn better from data, use a shallow clustering method. These methods have difficulty in finding good clusters due to the lack of ability to handle b... 详细信息
来源: 评论