咨询与建议

限定检索结果

文献类型

  • 2,358 篇 期刊文献
  • 1,850 篇 会议
  • 18 册 图书

馆藏范围

  • 4,226 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,652 篇 工学
    • 1,900 篇 计算机科学与技术...
    • 1,596 篇 软件工程
    • 571 篇 信息与通信工程
    • 409 篇 生物工程
    • 325 篇 电气工程
    • 314 篇 控制科学与工程
    • 307 篇 生物医学工程(可授...
    • 281 篇 光学工程
    • 244 篇 电子科学与技术(可...
    • 144 篇 化学工程与技术
    • 110 篇 机械工程
    • 103 篇 仪器科学与技术
    • 101 篇 网络空间安全
    • 95 篇 安全科学与工程
    • 92 篇 动力工程及工程热...
  • 1,734 篇 理学
    • 821 篇 数学
    • 558 篇 物理学
    • 477 篇 生物学
    • 315 篇 统计学(可授理学、...
    • 177 篇 化学
    • 128 篇 系统科学
    • 116 篇 地球物理学
  • 730 篇 管理学
    • 388 篇 管理科学与工程(可...
    • 369 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 303 篇 医学
    • 266 篇 临床医学
    • 228 篇 基础医学(可授医学...
    • 137 篇 公共卫生与预防医...
    • 128 篇 药学(可授医学、理...
  • 117 篇 法学
    • 104 篇 社会学
  • 66 篇 经济学
  • 66 篇 农学
  • 53 篇 教育学
  • 14 篇 文学
  • 5 篇 军事学
  • 3 篇 艺术学

主题

  • 142 篇 deep learning
  • 135 篇 accuracy
  • 125 篇 machine learning
  • 104 篇 training
  • 98 篇 feature extracti...
  • 92 篇 real-time system...
  • 81 篇 predictive model...
  • 79 篇 computational mo...
  • 77 篇 semantics
  • 70 篇 data models
  • 63 篇 convolutional ne...
  • 52 篇 internet of thin...
  • 50 篇 generative adver...
  • 48 篇 adaptation model...
  • 47 篇 optimization
  • 47 篇 artificial intel...
  • 46 篇 image segmentati...
  • 42 篇 reinforcement le...
  • 41 篇 neural networks
  • 40 篇 deep neural netw...

机构

  • 179 篇 university of ch...
  • 165 篇 college of compu...
  • 81 篇 cas key lab of n...
  • 64 篇 school of comput...
  • 62 篇 cas key laborato...
  • 54 篇 institute of com...
  • 50 篇 institute of dat...
  • 50 篇 national enginee...
  • 44 篇 school of comput...
  • 40 篇 data science ins...
  • 39 篇 nanyang technolo...
  • 39 篇 department of co...
  • 28 篇 college of compu...
  • 28 篇 beijing advanced...
  • 27 篇 dipartimento di ...
  • 26 篇 the oskar klein ...
  • 25 篇 institute of hig...
  • 24 篇 national institu...
  • 24 篇 peng cheng labor...
  • 24 篇 center for data ...

作者

  • 157 篇 cheng xueqi
  • 94 篇 guo jiafeng
  • 65 篇 niyato dusit
  • 43 篇 shen huawei
  • 35 篇 chen mingzhe
  • 33 篇 jin xiaolong
  • 33 篇 lan yanyan
  • 30 篇 shen linlin
  • 27 篇 e. j. siskind
  • 27 篇 r. bellazzini
  • 25 篇 j. b. thayer
  • 25 篇 p. spinelli
  • 25 篇 m. kuss
  • 24 篇 s. ciprini
  • 24 篇 pang liang
  • 23 篇 p. a. caraveo
  • 23 篇 p. f. michelson
  • 23 篇 r. rando
  • 23 篇 s. guiriec
  • 23 篇 fan yixing

语言

  • 3,244 篇 英文
  • 960 篇 其他
  • 33 篇 中文
检索条件"机构=Institute for Data Science and Computing"
4226 条 记 录,以下是1071-1080 订阅
排序:
Nested Event Extraction upon Pivot Element Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Ren, Weicheng Li, Zixuan Jin, Xiaolong Bai, Long Su, Miao Liu, Yantao Guan, Saiping Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Nested Event Extraction (NEE) aims to extract complex event structures where an event contains other events as its arguments recursively. Nested events involve a kind of Pivot Elements (PEs) that simultaneously act as... 详细信息
来源: 评论
Few-shot Link Prediction on Hyper-relational Facts
arXiv
收藏 引用
arXiv 2023年
作者: Wei, Jiyao Guan, Saiping Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Hyper-relational facts, which consist of a primary triple (head entity, relation, tail entity) and auxiliary attribute-value pairs, are widely present in real-world Knowledge Graphs (KGs). Link Prediction on Hyper-rel... 详细信息
来源: 评论
Joint Class-Balanced Client Selection and Bandwidth Allocation for Cost-Efficient Federated Learning in Mobile Edge computing Networks
收藏 引用
IEEE Transactions on Mobile computing 2025年 第7期24卷 5681-5698页
作者: Tang, Jian Li, Xiuhua Li, Hui Li, Penghua Wang, Xiaofei Leung, Victor C. M. Chongqing University School of Big Data & Software Engineering Chongqing400000 China Chongqing University of Posts and Telecommunications School of Automation Chongqing400065 China Tianjin University College of Intelligence and Computing Tianjin300072 China Shenzhen MSU-BIT University Artificial Intelligence Research Institute Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T1Z4 Canada
Federated Learning (FL) has significant potential to protect data privacy and mitigate network burden in mobile edge computing (MEC) networks. However, due to the system and data heterogeneity of mobile clients (MCs),... 详细信息
来源: 评论
A Comprehensive Study on the Application of Machine Learning Algorithms in the Prognosis of Ovarian Cancer
收藏 引用
Open Biomedical Engineering Journal 2023年 17卷
作者: Sindhu, S. Hemavathi, D. Sornalakshmi, K. Sujatha, G. Srividhya, S. Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology Tamil Nadu Kattankulathur 603203 India Department of Networking and Communications School of Computing SRM Institute of Science and Technology Tamil Nadu Kattankulathur 603203 India
Ovarian cancer is the third leading type of cancer found in women in India and ranks seventh globally. Several studies have shown that the population affected by ovarian cancer is profound to increase in the future. I... 详细信息
来源: 评论
Machine Learning and OpenCV: A Powerful Combination for Driver Drowsiness Detection
Machine Learning and OpenCV: A Powerful Combination for Driv...
收藏 引用
International Conference on Communication, computing and Internet of Things (IC3IoT)
作者: A Siva Kumar Pv Gopirajan Jayaraj Ramasamy Beulah Jackson Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology Kattankulathur Chennai India Department of Computational Intelligence School of Computing SRM Institute of Science and Technology Kattankulathur Campus Chennai India Department of IT Faculty of Engineering and Technology Botho University Botswana-Africa Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology Chennai India
Driver fatigue is a significant contributor to road accidents worldwide, and there is a need for efficient driver drowsiness detection systems to prevent such accidents. Computer vision techniques like OpenCV have rec... 详细信息
来源: 评论
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection  7th
Block-gram: Mining Knowledgeable Features for Smart Contrac...
收藏 引用
7th International Conference on Smart computing and Communication, SmartCom 2022
作者: Li, Tao Wang, Haolong Fang, Yaozheng Jian, Zhaolong Wang, Zichun Xie, Xueshuo Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin... 详细信息
来源: 评论
Reversible data Hiding in Encrypted Images Based on Multi-Predictor and Quad-tree Block Encoding  2022
Reversible Data Hiding in Encrypted Images Based on Multi-Pr...
收藏 引用
7th International Conference on Intelligent Information Technology, ICIIT 2022
作者: Zhang, Huiqi Li, Lin Li, Qingyan School Of Science Jimei University Xiamen361021 China Computer Engineering College Jimei University Xiamen361021 China Digital Fujian Big Data Modeling And Intelligent Computing Institute Jimei University Xiamen361021 China
With the rapid development of the Internet, people's awareness of privacy protection is also gradually improved. Reversible data hiding of encrypted image is a technique that encrypts the original image and allows... 详细信息
来源: 评论
Unifying Multitrack Music Arrangement via Reconstruction Fine-Tuning and Efficient Tokenization
arXiv
收藏 引用
arXiv 2024年
作者: Ou, Longshen Zhao, Jingwei Wang, Ziyu Xia, Gus Wang, Ye Sound and Music Computing Lab School of Computing NUS Singapore Institute of Data Science NUS Singapore Integrative Sciences and Engineering Programme NUS Graduate School Singapore Music X Lab MBZUAI United Arab Emirates NYU Shanghai China
Automatic music arrangement streamlines the creation of musical variants for composers and arrangers, reducing reliance on extensive music expertise. However, existing methods suffer from inefficient tokenization, und... 详细信息
来源: 评论
NeuVSA: A Unified and Efficient Accelerator for Neural Vector Search
NeuVSA: A Unified and Efficient Accelerator for Neural Vecto...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Ziming Yuan Lei Dai Wen Li Jie Zhang Shengwen Liang Ying Wang Cheng Liu Huawei Li Xiaowei Li Jiafeng Guo Peng Wang Renhai Chen Gong Zhang State Key Lab of Processors Institute of Computing TechnologyCAS University of Chinese Academy of Sciences School of Computer and Information Technology Shanxi University School of Computer Science Peking University Zhongguancun National Laboratory Beijing Key Lab of Network Data Science and Technology Institute of Computing Technology CAS Huawei Technologies Co. Ltd. China
Neural Vector Search (NVS) has exhibited superior search quality over traditional key-based strategies for information retrieval tasks. An effective NVS architecture requires high recall, low latency, and high through... 详细信息
来源: 评论
Attack-in-the-Chain: Bootstrapping Large Language Models for Attacks Against Black-Box Neural Ranking Models  39
Attack-in-the-Chain: Bootstrapping Large Language Models for...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Liu, Yu-An Zhang, Ruqing Guo, Jiafeng de Rijke, Maarten Fan, Yixing Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China University of Amsterdam Amsterdam Netherlands
Neural ranking models (NRMs) have been shown to be highly effective in terms of retrieval performance. Unfortunately, they have also displayed a higher degree of sensitivity to attacks than previous generation models....
来源: 评论