咨询与建议

限定检索结果

文献类型

  • 2,713 篇 会议
  • 2,072 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 4,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,742 篇 工学
    • 1,884 篇 计算机科学与技术...
    • 1,556 篇 软件工程
    • 528 篇 信息与通信工程
    • 400 篇 控制科学与工程
    • 285 篇 电气工程
    • 282 篇 电子科学与技术(可...
    • 273 篇 生物工程
    • 242 篇 生物医学工程(可授...
    • 212 篇 机械工程
    • 170 篇 光学工程
    • 149 篇 仪器科学与技术
    • 124 篇 化学工程与技术
    • 95 篇 材料科学与工程(可...
    • 88 篇 安全科学与工程
  • 1,917 篇 理学
    • 882 篇 物理学
    • 709 篇 数学
    • 363 篇 生物学
    • 248 篇 统计学(可授理学、...
    • 150 篇 系统科学
    • 138 篇 化学
  • 782 篇 管理学
    • 487 篇 管理科学与工程(可...
    • 338 篇 图书情报与档案管...
    • 273 篇 工商管理
  • 290 篇 医学
    • 241 篇 临床医学
    • 193 篇 基础医学(可授医学...
    • 101 篇 药学(可授医学、理...
    • 92 篇 公共卫生与预防医...
  • 146 篇 法学
    • 128 篇 社会学
  • 112 篇 教育学
    • 105 篇 教育学
  • 93 篇 经济学
    • 92 篇 应用经济学
  • 89 篇 农学
  • 17 篇 文学
  • 17 篇 军事学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 96 篇 deep learning
  • 85 篇 machine learning
  • 83 篇 computer science
  • 72 篇 computational mo...
  • 69 篇 artificial intel...
  • 68 篇 accuracy
  • 63 篇 training
  • 61 篇 students
  • 60 篇 feature extracti...
  • 51 篇 data mining
  • 49 篇 data models
  • 47 篇 proton-proton in...
  • 45 篇 higgs bosons
  • 43 篇 visualization
  • 41 篇 hadron colliders
  • 41 篇 sentiment analys...
  • 39 篇 internet of thin...
  • 39 篇 education
  • 39 篇 semantics
  • 38 篇 decision making

机构

  • 295 篇 department for p...
  • 294 篇 faculty of scien...
  • 288 篇 department of ph...
  • 279 篇 departamento de ...
  • 275 篇 department of ph...
  • 274 篇 kirchhoff-instit...
  • 273 篇 department of ph...
  • 272 篇 department of ph...
  • 271 篇 institute of phy...
  • 264 篇 institute of phy...
  • 255 篇 faculté des scie...
  • 251 篇 fakultät für phy...
  • 233 篇 institut für ast...
  • 231 篇 instituto de fís...
  • 228 篇 department of ph...
  • 227 篇 department of ph...
  • 223 篇 yerevan physics ...
  • 219 篇 department of ph...
  • 218 篇 physics division...
  • 214 篇 department of ph...

作者

  • 270 篇 c. alexa
  • 270 篇 j. m. izen
  • 270 篇 g. bella
  • 270 篇 j. strandberg
  • 270 篇 d. calvet
  • 270 篇 c. amelung
  • 270 篇 g. spigo
  • 269 篇 f. siegert
  • 265 篇 m. klein
  • 264 篇 r. ströhmer
  • 262 篇 a. c. könig
  • 262 篇 m. rijssenbeek
  • 261 篇 s. jin
  • 261 篇 g. gaudio
  • 260 篇 s. mohapatra
  • 259 篇 h. a. gordon
  • 256 篇 s. guindon
  • 255 篇 a. kaczmarska
  • 252 篇 y. nagasaka
  • 251 篇 h. sakamoto

语言

  • 4,578 篇 英文
  • 181 篇 其他
  • 36 篇 日文
  • 34 篇 中文
检索条件"机构=Graduate Program of Computer Science Faculty of Computer Science and Information Technology"
4824 条 记 录,以下是211-220 订阅
排序:
Towards Real-Time Person Search with Invariant Feature Learning  48
Towards Real-Time Person Search with Invariant Feature Learn...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Jia, Chengyou Luo, Minnan Dang, Zhuohang Chang, Xiaojun Zheng, Qinghua Xi'an Jiaotong University School of Computer Science and Technology China University of Technology Sydney Faculty of Information Technology Australia
Person search aims to locate a query person in a gallery of unconstrained scene images, which has many real-world applications. However, existing methods directly build off of advances in object detection for better p... 详细信息
来源: 评论
A Coarse to Fine Detection Method for Prohibited Object in X-ray Images Based on Progressive Transformer Decoder  24
A Coarse to Fine Detection Method for Prohibited Object in X...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ma, Chunjie Du, Lina Gao, Zan Zhuo, Li Wang, Meng Shandong Jinan China School of Computer Science and Technology Shandong Jianzhu University Shandong Jinan China Faculty of Information Technology Beijing University Of Technology Beijing China School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China
Currently, Transformer-based prohibited object detection methods in X-ray images appear constantly, but there are still some shortcomings such as poor performance and high computational complexity for prohibited objec... 详细信息
来源: 评论
Finite-time synchronization control for a class of delayed neural networks:an improved two-step control method
收藏 引用
science China(information sciences) 2025年
作者: Yue CHEN Song ZHU Mouquan SHEN Xiaoyang LIU Shiping WEN School of Mathematics China University of Mining and Technology College of Electrical Engineering and Control Science Nanjing Technology University School of Computer Science and Technology Jiangsu Normal University Faculty of Engineering and Information Technology University of Technology Sydney
In this paper,a two-step control method is proposed,leveraging the generalized Halanay inequality and existing finite-time stability theorems,to achieve finite-time synchronization for a class of neural networks with ...
来源: 评论
Novel soft robotic finger model driven by electrohydrodynamic(EHD)pump
收藏 引用
Journal of Zhejiang University-science A(Applied Physics & Engineering) 2024年 第7期25卷 596-604页
作者: Xuehang BAI Yanhong PENG Dongze LI Zhuochao LIU Zebing MAO Department of Mechanical Automotive and Materials EngineeringFaculty of EngineeringUniversity of WindsorWindsorN9B 3P4Canada Department of Information and Communication Engineering Graduate School of EngineeringNagoya UniversityNagoya464-8601Japan Department of Intelligent Science and Technology College of Computer Science and TechnologyQingdao UniversityQingdao266071China Design and Research Institute of University of Science and Technology Beijing Co.Ltd. Beijing100083China Faculty of Engineering Yamaguchi UniversityYamaguchi755-8611Japan
1Introduction In the field of robotic-human interactions,soft robotics offers enhanced safety and adaptability.A major challenge in this area is the integration of soft actuators with pump systems,which often increase... 详细信息
来源: 评论
Collecting and analyzing key-value data under shuffled differential privacy
收藏 引用
Frontiers of computer science 2023年 第2期17卷 241-243页
作者: Ning WANG Wei ZHENG Zhigang WANG Zhiqiang WEI Yu GU Peng TANG Ge YU Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266100China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Key Lab of Cryptologic Technology and Information Security Ministry of EducationShandong UniversityQingdao 266200China School of Cyber Science and Technology Shandong UniversityQingdao 266200China
1 Introduction Key-value data,as NoSQL data widely used in recent years,has been frequently collected and used for analysis in major websites and mobile *** frequency distribution estimation on the key domain,as well ... 详细信息
来源: 评论
Optimizing Big Data Implementation to Create Business Value and Architecture Proposed in the Banking Industry: A Systematic Review
Optimizing Big Data Implementation to Create Business Value ...
收藏 引用
2023 International Conference on computer science, information technology and Engineering, ICCoSITE 2023
作者: Kristiana, Idha Meyliana, Meyliana Hidayanto, Achmad Nizar Prabowo, Harjanto Bina Nusantara University Binus Graduate Program - Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University School of Information Systems Information Systems Department Jakarta11480 Indonesia Universitas Indonesia Faculty of Computer Science Depok Indonesia Bina Nusantara University BINUS Business School Undergraduate Program Management Departement Jakarta11480 Indonesia
The exponential growth of data is compelling organizations to employ data in decision-making. As one of the businesses with an ecosystem that contributes to data growth, banks have challenges in generating insight. A ... 详细信息
来源: 评论
Neuro-Mimetic Developmental Architecture for Continual Learning through Self-Organizing Multimodal Perception Coordination
收藏 引用
IEEE Access 2025年 13卷 91625-91641页
作者: Dawood, Farhan Masuyama, Naoki Loo, Chu Kiong Iqra University Department of Computing & Technology Islamabad Pakistan Osaka Metropolitan University Graduate School of Informatics 1-1 Gakuen-cho Naka-ku Sakai-Shi Osaka599-8531 Japan University of Malaya Faculty of Computer Science and Information Technology Department of Artificial Intelligence Kuala Lumpur50603 Malaysia
Developing cognitive capabilities in autonomous agents stands as a challenging yet pivotal task. In order to construct cohesive representations and extract meaningful insights from the environment, the brain utilizes ... 详细信息
来源: 评论
Semantic Literature Review on Non-Fungible Token: Expansion Area of Usage & Trends  8
Semantic Literature Review on Non-Fungible Token: Expansion ...
收藏 引用
8th International Conference on information Management and technology, ICIMTech 2023
作者: Martha, Gede Indra Raditya Warnars, Harco Leslie Hendric Spits Prabowo, Harjanto Meyliana Hidayanto, Achmad Nizar Bina Nusantara University Binus Graduate Program - Doctor of Computer Science Computer Science Department Jakarta11480 Indonesia Binus Business School Undergraduate Program Bina Nusantara University Management Department Jakarta11480 Indonesia School of Information Systems Bina Nusantara University Information System Department Jakarta11480 Indonesia University of Indonesia Faculty of Computer Science Depok Indonesia
Blockchain, Metaverse & NFT are technologies that were booming during the Pandemic. As a derivative product of blockchain, the Non-Fungible Token (NFT) is one of the technologies that has attracted the most intere... 详细信息
来源: 评论
Cloud-Native Mobile Application Applied for Law and Regulations Harmonization  3
Cloud-Native Mobile Application Applied for Law and Regulati...
收藏 引用
3rd International Conference on Intelligent Cybernetics technology and Applications, ICICyTA 2023
作者: Al Qausar, Muhammad Juan Heryadi, Yaya Lukas, Lukas Suparta, Wayan Sonata, Ilvico Doctor of Computer Science Bina Nusantara University Binus Graduate Program Computer Science Department Jakarta Indonesia Jakarta Indonesia Institut Teknologi Nasional Yogyakarta Faculty of Industrial Technology Department of Electrical Engineering Yogyakarta Indonesia
Navigating the complex legal and regulatory landscape requires a sophisticated platform that is not only comprehensive but also user-friendly and enables seamless analysis and document comparison in the legal realm. T... 详细信息
来源: 评论
A Comparative Study of DeepLabCut and Other Open-Source Pupillometry Data Analysis Algorithms – Which to Choose?
收藏 引用
Machine Graphics and Vision 2024年 第2期33卷 77-90页
作者: Badkul, Amitesh Mishra, Sonakshi Kommajosyula, Srinivasa P. Department of Electrical & Electronics Engineering Birla Institute of Technology and Science Hyderabad Campus Jawahar Nagar Hyderabad India Department of Pharmacy Birla Institute of Technology and Science Hyderabad Campus Jawahar Nagar Hyderabad India Ph.D. Program in Computer Science The Graduate Center The City University of New York New YorkNY United States
Pupillometry measures pupil size, and several open-source algorithms are available to analyse pupillometry data. However, only a few studies compared these algorithms’ accuracy and computational resources. This study... 详细信息
来源: 评论