咨询与建议

限定检索结果

文献类型

  • 6,181 篇 期刊文献
  • 4,911 篇 会议
  • 5 册 图书

馆藏范围

  • 11,097 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,505 篇 工学
    • 4,604 篇 计算机科学与技术...
    • 3,779 篇 软件工程
    • 1,596 篇 信息与通信工程
    • 930 篇 控制科学与工程
    • 871 篇 电气工程
    • 775 篇 生物工程
    • 761 篇 化学工程与技术
    • 737 篇 电子科学与技术(可...
    • 542 篇 光学工程
    • 527 篇 生物医学工程(可授...
    • 520 篇 机械工程
    • 358 篇 材料科学与工程(可...
    • 357 篇 仪器科学与技术
    • 314 篇 动力工程及工程热...
    • 290 篇 交通运输工程
    • 228 篇 建筑学
    • 224 篇 土木工程
  • 4,327 篇 理学
    • 2,070 篇 数学
    • 1,279 篇 物理学
    • 938 篇 生物学
    • 671 篇 统计学(可授理学、...
    • 614 篇 化学
    • 311 篇 系统科学
  • 1,909 篇 管理学
    • 1,104 篇 管理科学与工程(可...
    • 872 篇 图书情报与档案管...
    • 361 篇 工商管理
  • 535 篇 医学
    • 444 篇 临床医学
    • 319 篇 基础医学(可授医学...
    • 217 篇 药学(可授医学、理...
  • 274 篇 法学
    • 227 篇 社会学
  • 232 篇 农学
  • 156 篇 经济学
  • 83 篇 教育学
  • 33 篇 军事学
  • 30 篇 文学
  • 18 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 260 篇 semantics
  • 222 篇 feature extracti...
  • 213 篇 deep learning
  • 160 篇 data mining
  • 133 篇 computational mo...
  • 132 篇 training
  • 124 篇 machine learning
  • 113 篇 knowledge engine...
  • 113 篇 convolution
  • 102 篇 neural networks
  • 97 篇 image segmentati...
  • 97 篇 predictive model...
  • 94 篇 computer science
  • 92 篇 object detection
  • 92 篇 reinforcement le...
  • 88 篇 data models
  • 86 篇 optimization
  • 82 篇 laboratories
  • 81 篇 contrastive lear...
  • 81 篇 accuracy

机构

  • 409 篇 college of compu...
  • 302 篇 university of ch...
  • 258 篇 key laboratory o...
  • 174 篇 iccub universita...
  • 173 篇 infn sezione di ...
  • 171 篇 department of ph...
  • 167 篇 school of inform...
  • 161 篇 infn sezione di ...
  • 155 篇 horia hulubei na...
  • 151 篇 h.h. wills physi...
  • 151 篇 yandex school of...
  • 149 篇 van swinderen in...
  • 138 篇 universiteit maa...
  • 124 篇 massachusetts in...
  • 116 篇 national researc...
  • 113 篇 university of ci...
  • 113 篇 university of ma...
  • 112 篇 université clerm...
  • 112 篇 warsaw
  • 111 篇 lpnhe sorbonne u...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 116 篇 barter w.
  • 114 篇 brundu d.
  • 110 篇 bellee v.
  • 101 篇 bowcock t.j.v.
  • 101 篇 casse g.
  • 100 篇 bobulska d.
  • 100 篇 blake t.
  • 100 篇 borsato m.
  • 100 篇 betancourt c.
  • 99 篇 belin s.
  • 96 篇 afsharnia h.
  • 94 篇 belavin v.
  • 92 篇 bediaga i.
  • 88 篇 cali s.
  • 87 篇 amato s.
  • 86 篇 baryshnikov f.
  • 85 篇 bjørn m.
  • 76 篇 niyato dusit

语言

  • 10,024 篇 英文
  • 814 篇 其他
  • 274 篇 中文
  • 4 篇 德文
  • 4 篇 法文
检索条件"机构=Key Laboratory of Data Engineering & Knowledge Engineering"
11097 条 记 录,以下是4681-4690 订阅
排序:
A Multi-Stage Goal-Driven Network for Pedestrian Trajectory Prediction
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Xiuen Wang, Tao Cai, Yuanzheng Liang, Lingyu Papageorgiou, George Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China College of Computer and Data Science Fuzhou University Fuzhou China School of Electronic and Information Engineering South China University of Technology Guangzhou China SYSTEMA Research Center European University Cyprus Nicosia Cyprus
Pedestrian trajectory prediction plays a pivotal role in ensuring the safety and efficiency of various applications, including autonomous vehicles and traffic management systems. This paper proposes a novel method for... 详细信息
来源: 评论
Real-Time AIoT for UAV Antenna Interference Detection via Edge-Cloud Collaboration
arXiv
收藏 引用
arXiv 2024年
作者: Dong, Jun Cheng, Jintao Wu, Jin Zhang, Chengxi Zhao, Shunyi Tang, Xiaoyu School of Data Science and Engineering Xingzhi College South China Normal University Shanwei516600 China School of Physics South China Normal University Guangzhou510006 China Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Key Laboratory of Advanced Control for Light Industry Processes Ministry of Education Jiangnan University Wuxi214122 China School of Electronics and Information Engineering Xingzhi College South China Normal University Shanwei516600 China
In the fifth-generation (5G) era, eliminating communication interference sources is crucial for maintaining network performance. Interference often originates from unauthorized or malfunctioning antennas, and radio mo... 详细信息
来源: 评论
An Unstructured data Representation Enhanced Model for Postoperative Risk Prediction  21
An Unstructured Data Representation Enhanced Model for Posto...
收藏 引用
21st Chinese National Conference on Computational Linguistic, CCL 2022
作者: Wang, Yaqiang Yang, Xiao Hao, Xuechao Shu, Hongping Chen, Guo Zhu, Tao College of Software Engineering Chengdu University of Information Technology China Institute for Data Science and Engineering Chengdu University of Information Technology China Sichuan Key Laboratory of Software Automatic Generation and Intelligent Service China Department of Anesthesiology Sichuan University China
Postoperative risk prediction has a positive effect on clinical resource planning, emergency plan preparation and reducing postoperative risk and mortality. Postoperative risk prediction is mainly based on patient'... 详细信息
来源: 评论
Dstf: Enhancing Traffic Flow Prediction with a Diversified Spatio-Temporal Feature Extraction Model
SSRN
收藏 引用
SSRN 2024年
作者: Wang, Xing Wang, Xiaojun Zou, Fumin Liao, Lyuchao Jin, Biao Zeng, Ruihao Fujian Normal University College of Computer and Cyber Security China Fujian Normal University Digital Fujian Institute of Big Data Security Technology China Fujian University of Technology Fujian Key Laboratory of Automotive Electronic and Electrical Drive Technology China The University of Sydney School of Civil Engineering Sydney Australia
Traffic flow prediction stands as a pivotal focus within urban intelligent transportation systems, holding significant importance in enhancing road transport efficiency and ameliorating urban traffic conditions. Howev... 详细信息
来源: 评论
SDformer: similarity-driven discrete transformer for time series generation  24
SDformer: similarity-driven discrete transformer for time se...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Zhicheng Chen Shibo Feng Zhong Zhang Xi Xiao Xingyu Gao Peilin Zhao Shenzhen International Graduate School Tsinghua University and Tencent AI Lab School of Computer Science and Engineering Nanyang Technological University Tencent AI Lab Shenzhen International Graduate School Tsinghua University and Key Laboratory of Data Protection and Intelligent Management (Sichuan University) Ministry of Education Institute of Microelectronics Chinese Academy of Sciences
The superior generation capabilities of Denoised Diffusion Probabilistic Models (DDPMs) have been effectively showcased across a multitude of domains. Recently, the application of DDPMs has extended to time series gen...
来源: 评论
Research on Enhanced Perception and Attention-Driven Person Re-Identification
Research on Enhanced Perception and Attention-Driven Person ...
收藏 引用
International Conference on Fuzzy Systems and knowledge Discovery (FSKD)
作者: Cancan Wu Dong Li Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan Hubei China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan Hubei China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan Hubei China
When matching similarity among pedestrians in images, pedestrian re-identification algorithms are often disturbed by occlusions. A typical tactic is to improve the robustness of occlusion features in the model. Howeve... 详细信息
来源: 评论
Steel Surface Defect Detection Based on Improved YOLOv8
Steel Surface Defect Detection Based on Improved YOLOv8
收藏 引用
International Conference on Fuzzy Systems and knowledge Discovery (FSKD)
作者: Jichen Zhang Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan Hubei China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan Hubei China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan Hubei China
There are some defects on the surface of steel that are difficult to detect, so we propose an improved algorithm based on YOLOv8 for detecting defects that are difficult to be detected. This improvement includes the i... 详细信息
来源: 评论
Research on Ornamental Fish Recognition Base on Improved Shufflenet V2 Network
Research on Ornamental Fish Recognition Base on Improved Shu...
收藏 引用
Big data & Artificial Intelligence & Software engineering (ICBASE), International Conference on
作者: Xingyun Zhang Hongming Chen Longqing Zhang Qian Chen Key Laboratory of Oceanographic Big Data Mining & Application of Zhejiang Province Zhejiang Ocean University Zhoushan China School of Computer Science Guangdong University of Science and Technology Dongguan China College of Information Science and Electronic Engineering Zhejiang University Hangzhou China
With the advancement of computer vision technology, fish recognition plays a crucial role in various fields such as aquaculture processing and disseminating fish knowledge. In this study, we propose an enhanced and li...
来源: 评论
MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Xiping Chen, Jing Wu, Cong He, Kun Xu, Haozhe Feng, Yebo Du, Ruiying Chen, Xianhao Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Rizhao Institute of Information Technology Wuhan University Rizhao276800 China School of Computer Science and Engineering Nanyang Technological University Singapore Collaborative Innovation Center of Geospatial Technology Wuhan430079 China The Department of Electrical and Electronic Engineering HKU Musketeers Foundation Institute of Data Science University of Hong Kong Pok Fu Lam Hong Kong
Voice authentication has been widely used on smartphones. However, it remains vulnerable to spoofing attacks, where the attacker replays recorded voice samples from authentic humans using loudspeakers to bypass the vo... 详细信息
来源: 评论
Hi-SAM: Marrying Segment Anything Model for Hierarchical Text Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Ye, Maoyuan Zhang, Jing Liu, Juhua Liu, Chenyu Yin, Baocai Liu, Cong Du, Bo Tao, Dacheng School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China IFLYTEK Research IFLYTEK CO. LTD. China College of Computing & Data Science Nanyang Technological University #32 Block N4 #02a-014 50 Nanyang Avenue 639798 Singapore
The Segment Anything Model (SAM), a profound vision foundation model pretrained on a large-scale dataset, breaks the boundaries of general segmentation and sparks various downstream applications. This paper introduces... 详细信息
来源: 评论