咨询与建议

限定检索结果

文献类型

  • 4,156 篇 期刊文献
  • 4,070 篇 会议
  • 5 册 图书
  • 1 篇 科技报告

馆藏范围

  • 8,232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,265 篇 工学
    • 3,672 篇 计算机科学与技术...
    • 3,070 篇 软件工程
    • 1,125 篇 信息与通信工程
    • 777 篇 生物工程
    • 652 篇 控制科学与工程
    • 627 篇 电气工程
    • 488 篇 生物医学工程(可授...
    • 458 篇 电子科学与技术(可...
    • 421 篇 光学工程
    • 357 篇 化学工程与技术
    • 316 篇 机械工程
    • 233 篇 动力工程及工程热...
    • 213 篇 仪器科学与技术
    • 196 篇 材料科学与工程(可...
    • 168 篇 交通运输工程
    • 164 篇 安全科学与工程
  • 3,135 篇 理学
    • 1,634 篇 数学
    • 889 篇 生物学
    • 746 篇 物理学
    • 578 篇 统计学(可授理学、...
    • 394 篇 化学
    • 271 篇 系统科学
  • 1,420 篇 管理学
    • 807 篇 管理科学与工程(可...
    • 663 篇 图书情报与档案管...
    • 330 篇 工商管理
  • 513 篇 医学
    • 414 篇 临床医学
    • 316 篇 基础医学(可授医学...
    • 213 篇 药学(可授医学、理...
  • 242 篇 法学
    • 192 篇 社会学
  • 168 篇 经济学
    • 166 篇 应用经济学
  • 138 篇 农学
  • 74 篇 教育学
  • 23 篇 文学
  • 19 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 229 篇 semantics
  • 217 篇 feature extracti...
  • 208 篇 deep learning
  • 202 篇 training
  • 150 篇 computational mo...
  • 147 篇 machine learning
  • 130 篇 accuracy
  • 128 篇 predictive model...
  • 124 篇 data models
  • 111 篇 convolution
  • 105 篇 big data
  • 103 篇 data mining
  • 96 篇 neural networks
  • 91 篇 forecasting
  • 89 篇 graph neural net...
  • 86 篇 task analysis
  • 82 篇 optimization
  • 79 篇 image segmentati...
  • 76 篇 object detection
  • 72 篇 visualization

机构

  • 146 篇 shenzhen researc...
  • 128 篇 big data researc...
  • 126 篇 state key labora...
  • 115 篇 college of big d...
  • 102 篇 national enginee...
  • 101 篇 college of compu...
  • 93 篇 national enginee...
  • 87 篇 school of comput...
  • 83 篇 university of sc...
  • 75 篇 peng cheng labor...
  • 75 篇 school of comput...
  • 72 篇 state key labora...
  • 69 篇 university of ch...
  • 67 篇 beijing advanced...
  • 63 篇 school of big da...
  • 60 篇 hubei key labora...
  • 60 篇 school of econom...
  • 59 篇 shandong provinc...
  • 59 篇 fujian provincia...
  • 58 篇 school of mathem...

作者

  • 79 篇 hai jin
  • 78 篇 chen enhong
  • 75 篇 liu qi
  • 52 篇 zhang rui
  • 47 篇 jin hai
  • 44 篇 qi liu
  • 41 篇 xiaofei liao
  • 41 篇 xia yong
  • 40 篇 liu jun
  • 40 篇 zhou pan
  • 37 篇 zhou tao
  • 35 篇 shen linlin
  • 34 篇 pan jeng-shyang
  • 33 篇 li yang
  • 33 篇 wang meng
  • 32 篇 wang yang
  • 31 篇 liu yang
  • 30 篇 huang zhenya
  • 30 篇 wu xindong
  • 29 篇 wang shuai

语言

  • 7,565 篇 英文
  • 548 篇 其他
  • 127 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 葡萄牙文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 土耳其文
检索条件"机构=Major in Data Science and Big Data Technology"
8232 条 记 录,以下是611-620 订阅
排序:
Object-centered heuristic A* conformance checking method  2
Object-centered heuristic A* conformance checking method
收藏 引用
2nd International Conference on big data, Computational Intelligence, and Applications, BDCIA 2024
作者: Yang, Xiaolong Wang, Lili College of Mathematics and Big Data Anhui University of Science&Technology Anhui Huainan232001 China State Key Laboratory of Mining Response and Disaster Prevention and Control in Deep Coal Mines Anhui University of Science and Technology Anhui Huainan232001 China
Traditional approaches typically flatten the process when checking the conformance of complex processes. However, this flattening approach can result in the loss of dependencies between objects, reducing the accuracy ... 详细信息
来源: 评论
Optimizing the Copy-on-Write Mechanism of Docker by Dynamic Prefetching
收藏 引用
Tsinghua science and technology 2021年 第3期26卷 266-274页
作者: Yan Jiang Wei Liu Xuanhua Shi Weizhong Qiang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHuazhong University of Science and TechnologyWuhan 430074China
Docker,as a mainstream container solution,adopts the Copy-on-Write(CoW)mechanism in its storage *** mechanism satisfies the need of different containers to share the same ***,when a single container performs operation... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
The periodic product recommendation system based on deep reinforcement learning and the multi-objective framework  12
The periodic product recommendation system based on deep rei...
收藏 引用
12th International Conference on Awareness science and technology, iCAST 2023
作者: Dat, Dang Tien Thang, Tran Ngoc Minh, Nguyen Anh Chen, Rung Ching Ngoc Anh, Nguyen Thi School of Applied Mathematics and Informatics Hanoi University of Science and Technology Viet Nam Big Data Lab CMC Institute of Science and Technology Viet Nam Department of Information Management Chaoyang University of Technology Taiwan
The primary objective of the recommendation system is to suggest suitable products to users. The need for a personalized recommendation system has become essential with the continuous growth in the number of users and... 详细信息
来源: 评论
Resisting Membership Inference Attacks by Dynamically Adjusting Loss Targets
Resisting Membership Inference Attacks by Dynamically Adjust...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Ma, Xihua Tian, Youliang Ding, Zehua Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China College of Computer Science and Technology Guizhou University Guiyang550025 China Institute of Cryptography and Data Security Guizhou University Guiyang550025 China
Machine learning (ML) models are susceptible to membership inference attacks (MIAs), which aim to infer whether a particular sample was involved in model training. Previous research suggests that the difference in los... 详细信息
来源: 评论
Fair Personalized Learner Modeling Without Sensitive Attributes  25
Fair Personalized Learner Modeling Without Sensitive Attribu...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Xu, Hefei Hou, Min Wu, Le Liu, Fei Yang, Yonghui Bai, Haoyue Hong, Richang Wang, Meng Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Anhui Hefei China Institute of Dataspace Hefei Comprehensive National Science Center Anhui Hefei China
Personalized learner modeling uses learners’ historical behavior data to diagnose their cognitive abilities, a process known as Cognitive Diagnosis (CD). This is essential for web-based learning services such as lear... 详细信息
来源: 评论
Extremal Functions for an Improved Trudinger-Moser Inequality Involving L^(P)-Norm in R^(n)
收藏 引用
Journal of Partial Differential Equations 2023年 第4期36卷 414-434页
作者: YANG Liu LI Xiaomeng College of Education Huaibei Institute of TechnologyHuaibei 235000China School of Mathematics and Big Data Chaohu UniversityHefei 230000China School of Mathematical Science Huaibei Normal UniversityHuaibei 235000China
Let W^(1,n)(R^(n))be the standard Sobolev *** any T>0 and p>n>2,we denote■Define a norm in W^(1,n)(R^(n))by■where 0≤α<λ_(n,p).Using a rearrangement argument and blow-up analysis,we will prove■can be ... 详细信息
来源: 评论
EDISON: Enhanced Dictionary-Induced Tensorized Incomplete Multi-View Clustering with Gaussian Error Rank Minimization  41
EDISON: Enhanced Dictionary-Induced Tensorized Incomplete Mu...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Gu, Zhibin Li, Zhendong Feng, Songhe Key Laboratory of Big Data & Artificial Intelligence in Transportation Beijing Jiaotong University Ministry of Education Beijing China School of Computer Science and Technology Beijing Jiaotong University Beijing100044 China
This paper presents an efficient and scalable incomplete multi-view clustering method, referred to as Enhanced Dictionary-Induced tenSorized incomplete multi-view clustering with Gaussian errOr raNk minimization (EDIS... 详细信息
来源: 评论
Bilateral Network with Residual U-blocks and Dual-Guided Attention for Real-time Semantic Segmentation
Bilateral Network with Residual U-blocks and Dual-Guided Att...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Liao, Liang Wan, Liang Liu, Mingsheng Li, Shusheng College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China School of Computer Science and Engineering Northeastern Univiversity Shenyang China
When some application scenarios need to use semantic segmentation technology, like automatic driving, the primary concern comes to real-time performance rather than extremely high segmentation accuracy. To achieve a g... 详细信息
来源: 评论
WTUNet: A U-shaped semantic segmentation network combined with wavelet convolution  3
WTUNet: A U-shaped semantic segmentation network combined wi...
收藏 引用
3rd International Conference on Environmental Remote Sensing and Geographic Information technology, ERSGIT 2024
作者: Shi, Guangyue Wang, Lei Chen, Fang Yu, Bo Wang, Ning School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China International Research Center of Big Data for Sustainable Development Goals Beijing100094 China
Landslide extraction plays a critical role in facilitating effective rescue operations and emergency response. However, existing methods face difficulties in accurately extracting landslide areas due to complex terrai... 详细信息
来源: 评论