咨询与建议

限定检索结果

文献类型

  • 1,659 篇 会议
  • 1,574 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 3,234 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,064 篇 工学
    • 1,481 篇 计算机科学与技术...
    • 1,252 篇 软件工程
    • 502 篇 信息与通信工程
    • 293 篇 生物工程
    • 270 篇 电气工程
    • 267 篇 控制科学与工程
    • 165 篇 电子科学与技术(可...
    • 159 篇 光学工程
    • 156 篇 生物医学工程(可授...
    • 138 篇 机械工程
    • 110 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 87 篇 仪器科学与技术
    • 75 篇 动力工程及工程热...
    • 68 篇 土木工程
    • 67 篇 网络空间安全
    • 65 篇 建筑学
  • 1,150 篇 理学
    • 624 篇 数学
    • 330 篇 生物学
    • 234 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 128 篇 化学
    • 96 篇 系统科学
  • 577 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 277 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 150 篇 医学
    • 128 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 101 篇 法学
    • 83 篇 社会学
  • 61 篇 农学
  • 44 篇 经济学
  • 38 篇 教育学
  • 6 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 134 篇 feature extracti...
  • 129 篇 semantics
  • 116 篇 training
  • 96 篇 deep learning
  • 69 篇 computational mo...
  • 64 篇 accuracy
  • 60 篇 predictive model...
  • 57 篇 machine learning
  • 57 篇 data models
  • 52 篇 convolution
  • 49 篇 neural networks
  • 49 篇 graph neural net...
  • 45 篇 contrastive lear...
  • 43 篇 object detection
  • 43 篇 data mining
  • 41 篇 reinforcement le...
  • 38 篇 task analysis
  • 36 篇 optimization
  • 36 篇 visualization
  • 35 篇 federated learni...

机构

  • 77 篇 beijing advanced...
  • 68 篇 key laboratory o...
  • 63 篇 college of compu...
  • 58 篇 shandong provinc...
  • 58 篇 school of comput...
  • 54 篇 university of ch...
  • 52 篇 south china univ...
  • 51 篇 key laboratory o...
  • 50 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 44 篇 school of softwa...
  • 44 篇 national enginee...
  • 41 篇 school of comput...
  • 40 篇 school of electr...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of cyber ...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 34 篇 guangdong key la...
  • 33 篇 chongqing key la...

作者

  • 38 篇 xu xiaolong
  • 35 篇 wang guoyin
  • 35 篇 tan mingkui
  • 29 篇 jin hai
  • 25 篇 huang qingming
  • 25 篇 xiaolong xu
  • 22 篇 hai jin
  • 21 篇 guo wenzhong
  • 21 篇 xu qianqian
  • 20 篇 shen linlin
  • 20 篇 hongyan ma
  • 19 篇 chen yanping
  • 18 篇 hu shengshan
  • 18 篇 wu di
  • 17 篇 guo kun
  • 16 篇 niyato dusit
  • 16 篇 chen huajun
  • 16 篇 li jianxin
  • 15 篇 xia shuyin
  • 15 篇 chen gang

语言

  • 3,033 篇 英文
  • 165 篇 其他
  • 53 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data Intelligent Computing "
3234 条 记 录,以下是401-410 订阅
排序:
Edge Intelligence Based Garbage Classification Detection Method  1
收藏 引用
3rd EAI International Conference on Edge computing and IoT, EAI ICECI 2022
作者: Zhu, Ruijia Liu, Yiwen Gao, Yanxia Shi, Yuanquan Peng, Xiaoning School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China
To address the problem that the classification and cleaning of garbage in city streets is always ineffective nowadays, the paper proposes a garbage detection method based on edge intelligence. The edge intelligence no... 详细信息
来源: 评论
Computer aided diagnosis of diabetic retinopathy based on multi-view joint learning
收藏 引用
Computers in Biology and Medicine 2024年 174卷 108428-108428页
作者: Xu, Xuebin Liu, Dehua Huang, Guohua Wang, Muyu Lei, Meng Jia, Yang School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Shaanxi Xi'an710121 China Xi'an Key Laboratory of Big Data and Intelligent Computing Shaanxi Xi'an710121 China Weinan Central Hospital Shaanxi Xi'an714099 China
Diabetic retinopathy (DR) is a kind of ocular complication of diabetes, and its degree grade is an essential basis for early diagnosis of patients. Manual diagnosis is a long and expensive process with a specific risk... 详细信息
来源: 评论
Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligence  1
收藏 引用
3rd EAI International Conference on Edge computing and IoT, EAI ICECI 2022
作者: Changkai, Lu Yiwen, Liu Yanxia, Gao Yuanquan, Shi Xiaoning, Peng School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China
In recent years, gestures have been widely used in many fields. For example, human-computer interaction, virtual reality, gesture translation, etc. The reason for its rapid development is due to the emergence of deep ... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Exploration and Practice of Course Homework Metaverse Based on Extended Reality Under Edge computing  1
收藏 引用
3rd EAI International Conference on Edge computing and IoT, EAI ICECI 2022
作者: Fu, Jinrong Liu, Yiwen Yan, Haobo Gao, Yanxia Xiao, Jianhua School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China
The metaverse originated from science fiction at first, but it gradually came into reality with the continuous power of technology. Aiming at the problems of course work in Chinese universities, such as its function i... 详细信息
来源: 评论
Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence  1
收藏 引用
3rd EAI International Conference on Edge computing and IoT, EAI ICECI 2022
作者: Gao, Yanxia Liu, Yiwen Mi, Chunqiao Tang, Pengju Shi, Yuanquan School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China
The refinement and intelligent control of shield tunneling is the development trend of modern tunnel construction technology. In order to better predict and control the surface subsidence caused by shield excavation, ... 详细信息
来源: 评论
Updating Large Language Models' Memories with Time Constraints
Updating Large Language Models' Memories with Time Constrain...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Wu, Xin Bu, Yuqi Cai, Yi Wang, Tao School of Software Engineering South China University of Technology China Key Laboratory of Big Data and Intelligent Robot South China University of Technology Ministry of Education China Department of Biostatistics and Health Informatics King's College London United Kingdom
By incorporating the latest external knowledge, large language models (LLMs) can modify their internal memory. However, in practical applications, LLMs may encounter outdated information, necessitating the filtering o... 详细信息
来源: 评论
Globally Consistent Vertical Federated Graph Autoencoder for Privacy-Preserving Community Detection  17th
Globally Consistent Vertical Federated Graph Autoencoder for...
收藏 引用
17th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2022
作者: Fang, Yutong Huang, Qingqing Ye, Enjie Guo, Wenzhong Guo, Kun Chen, Xiaoqi Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China College of Computer and Data Science/College of Software Fuzhou University Fuzhou350108 China Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fuzhou350108 China
Community detection is a trendy area in research on complex network analysis and has a wide range of real-world applications, like advertising. As people become increasingly concerned about privacy, protecting partici... 详细信息
来源: 评论
Exploring Patent Transformation Event: Forecasting Patent Transfer Time  26
Exploring Patent Transformation Event: Forecasting Patent Tr...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Huo, Jinchen Liu, Weidong Li, Yang Cao, Yan Institute of Scientific and Technical Information of China China College of Computer Science Inner Mongolia University China Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian China Inner Mongolia Key Laboratory of Social Computing and Data Processing China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
As the largest source of technical information around the world, patents are regarded as an essential crystallization and carrier of knowledge and technological innovation. Patent transformation is conducive not only ... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论