咨询与建议

限定检索结果

文献类型

  • 4,138 篇 期刊文献
  • 4,088 篇 会议
  • 5 册 图书

馆藏范围

  • 8,231 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,252 篇 工学
    • 3,647 篇 计算机科学与技术...
    • 3,047 篇 软件工程
    • 1,116 篇 信息与通信工程
    • 776 篇 生物工程
    • 645 篇 控制科学与工程
    • 616 篇 电气工程
    • 487 篇 生物医学工程(可授...
    • 458 篇 电子科学与技术(可...
    • 419 篇 光学工程
    • 353 篇 化学工程与技术
    • 316 篇 机械工程
    • 231 篇 动力工程及工程热...
    • 219 篇 材料科学与工程(可...
    • 212 篇 仪器科学与技术
    • 166 篇 交通运输工程
    • 161 篇 安全科学与工程
  • 3,109 篇 理学
    • 1,639 篇 数学
    • 891 篇 生物学
    • 737 篇 物理学
    • 597 篇 统计学(可授理学、...
    • 390 篇 化学
    • 270 篇 系统科学
  • 1,416 篇 管理学
    • 801 篇 管理科学与工程(可...
    • 662 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 515 篇 医学
    • 413 篇 临床医学
    • 316 篇 基础医学(可授医学...
    • 213 篇 药学(可授医学、理...
  • 242 篇 法学
    • 192 篇 社会学
  • 167 篇 经济学
    • 165 篇 应用经济学
  • 138 篇 农学
  • 74 篇 教育学
  • 23 篇 文学
  • 19 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 235 篇 semantics
  • 222 篇 feature extracti...
  • 210 篇 deep learning
  • 201 篇 training
  • 154 篇 computational mo...
  • 147 篇 machine learning
  • 135 篇 accuracy
  • 130 篇 predictive model...
  • 125 篇 data models
  • 113 篇 convolution
  • 109 篇 data mining
  • 103 篇 big data
  • 94 篇 neural networks
  • 91 篇 forecasting
  • 86 篇 graph neural net...
  • 85 篇 task analysis
  • 85 篇 optimization
  • 82 篇 federated learni...
  • 77 篇 image segmentati...
  • 75 篇 object detection

机构

  • 148 篇 shenzhen researc...
  • 127 篇 state key labora...
  • 127 篇 big data researc...
  • 111 篇 college of big d...
  • 102 篇 national enginee...
  • 99 篇 college of compu...
  • 91 篇 national enginee...
  • 86 篇 school of comput...
  • 84 篇 university of sc...
  • 74 篇 peng cheng labor...
  • 74 篇 school of comput...
  • 70 篇 state key labora...
  • 69 篇 university of ch...
  • 65 篇 beijing advanced...
  • 64 篇 school of big da...
  • 60 篇 hubei key labora...
  • 59 篇 shandong provinc...
  • 58 篇 school of comput...
  • 58 篇 school of econom...
  • 58 篇 fujian provincia...

作者

  • 78 篇 chen enhong
  • 78 篇 hai jin
  • 75 篇 liu qi
  • 52 篇 zhang rui
  • 47 篇 jin hai
  • 45 篇 qi liu
  • 41 篇 xiaofei liao
  • 40 篇 liu jun
  • 40 篇 xia yong
  • 39 篇 zhou pan
  • 36 篇 zhou tao
  • 36 篇 shen linlin
  • 36 篇 pan jeng-shyang
  • 35 篇 wang meng
  • 33 篇 li yang
  • 32 篇 wang yang
  • 30 篇 liu yang
  • 30 篇 huang zhenya
  • 30 篇 wu xindong
  • 29 篇 wang shuai

语言

  • 6,952 篇 英文
  • 1,167 篇 其他
  • 136 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 葡萄牙文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
检索条件"机构=Major in Data Science and Big Data Technology"
8231 条 记 录,以下是831-840 订阅
排序:
A Novel Price-Oriented Supply-Demand Interaction Scheduling Model Optimizing Virtual Power Plant Operations  16
A Novel Price-Oriented Supply-Demand Interaction Scheduling ...
收藏 引用
16th IEEE PES Asia-Pacific Power and Energy Engineering Conference, APPEEC 2024
作者: Wang, Yingxiao Ou, Pengfei Wu, Jianghua Shenzhen Research Institute of Big Data The Chinese University of Hong Kong-Shenzhen Shenzhen China School of Mathematics Nanjing University Nanjing China School of Engineering The Hong Kong University of Science and Technology Hong Kong
Virtual Power Plants (VPPs) provide a promising direction for managing the complexities and uncertainties in operating Distributed Energy Resources (DERs). However, existing approaches rely on a 'source-following-... 详细信息
来源: 评论
Anomaly Correction of Business Processes Using Transformer Autoencoder
SSRN
收藏 引用
SSRN 2024年
作者: Gong, Ziyou Fang, Xianwen Wu, Ping School of Mathematics and Big Data Anhui University of Science and Technology Huainan China Anhui Province Engineering Laboratory for Big Data Analysis and Early Warning Technology of Coal Mine Safety Huainan China
Event log records all events that occur during the execution of business processes, so detecting and correcting anomalies in event log can provide reliable guarantee for subsequent process analysis. The previous works... 详细信息
来源: 评论
A Novel Multi-Edge Cooperative Offloading Genetic Algorithm towards Environmental Monitoring System  5
A Novel Multi-Edge Cooperative Offloading Genetic Algorithm ...
收藏 引用
5th International Conference on Telecommunications and Communication Engineering, ICTCE 2022
作者: Fang, Jie Li, Wenzao Wang, Yue Sun, Xiulan College of Communication Engineering Chengdu University of Information Technology China Network and Data Security Key Lab of Sichuan Pro. University of Electronic Science and Technology of China China Institute of Data Application Research Educational Informalization and Big Data Center China
In environmental monitor architecture, the usual way of processing data is centralized. On the one hand, this leads to a long time of data processing, and with the increasing number of monitoring sensors, the pressure... 详细信息
来源: 评论
THE BLESSING OF RANDOMNESS: SDE BEATS ODE IN GENERAL DIFFUSION-BASED IMAGE EDITING  12
THE BLESSING OF RANDOMNESS: SDE BEATS ODE IN GENERAL DIFFUSI...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Nie, Shen Guo, Hanzhong Allan Lu, Cheng Zhou, Yuhao Zheng, Chenyu Li, Chongxuan Gaoling School of Artificial Intelligence Renmin University of China Beijing China Beijing Key Laboratory of Big Data Management and Analysis Methods Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
We present a unified probabilistic formulation for diffusion-based image editing, where a latent variable is edited in a task-specific manner and generally deviates from the corresponding marginal distribution induced... 详细信息
来源: 评论
Collusion Resistant Identity-based Proxy Re-encryption Scheme on Lattice  6
Collusion Resistant Identity-based Proxy Re-encryption Schem...
收藏 引用
6th International Conference on Computer Information science and Application technology, CISAT 2023
作者: Deng, Xiaohong Xie, Hua Xiong, Weizhi School of Electronics and Information Engineering Gannan University of Science and Technology Ganzhou341000 China College of Information Science Jiangxi University of Science and Technology Ganzhou341000 China Key Laboratory of Cloud Computing and Big Data Ganzhou341000 China
Proxy re-encryption plays an important role for data security in cloud computing and big data, but the traditional reencryption scheme based on the classical number theory problem cannot resist quantum attack, and the... 详细信息
来源: 评论
A Trajectory Tracking System for Zebrafish Based on Embedded Edge Artificial Intelligence  29
A Trajectory Tracking System for Zebrafish Based on Embedded...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zang, Chuanhao Dong, Anming Yu, Jiguo School of Computer Science and Technology Jinan China Big Data Institute Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Trajectory tracking of zebrafish is an important requirement in studying neurological disorders and developing new psychoactive drug. However, many challenges emerge for stable tracking, since zebrafish are similar in... 详细信息
来源: 评论
Accumulative Time Based Ranking Method to Reputation Evaluation in Information Networks
收藏 引用
Journal of Computer science & technology 2022年 第4期37卷 960-974页
作者: Hao Liao Qi-Xin Liu Ze-Cheng Huang Ke-Zhong Lu Chi Ho Yeung Yi-Cheng Zhang National Engineering Laboratory on Big Data System Computing Technology College of Computer Science and SoftwareEngineeringShenzhen UniversityShenzhen 518060China Guangdong Province Key Laboratory of Popular High Performance Computers Shenzhen UniversityShenzhen 518060China Guangdong Province Engineering Center of China-Made High Performance Data Computing System College of ComputerScience and Software EngineeringShenzhen UniversityShenzhen 518060China Institute of Big Data Intelligent Management and Decision Shenzhen UniversityShenzhen 518060China Department of Science and Environmental Studies The Education University of Hong KongHong Kong 999077China Department of Physics University of FribourgFribourg 1700Switzerland
Due to over-abundant information on the Web, information filtering becomes a key task for online users to obtain relevant suggestions and how to extract the most related item is always a key topic for researchers in v... 详细信息
来源: 评论
Interference Characterization and Mitigation for Multi-Beam ISAC Systems in Vehicular Networks
收藏 引用
IEEE Transactions on Wireless Communications 2024年 第10期23卷 14729-14742页
作者: Wang, Yi Zhang, Qixun Zhang, J. Andrew Wei, Zhiqing Feng, Zhiyong Peng, Jinlin The School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China University of Electronic Science and Technology of China Quzhou324003 China The Key Laboratory of Universal Wireless Communications Ministry of Education Beijing University of Posts and Telecommunications Beijing100876 China The Global Big Data Technologies Centre University of Technology Sydney SydneyNSW2007 Australia The Artificial Intelligence Research Center National Innovation Institute of Defense Technology Beijing100071 China
— Millimeter-wave Integrated Sensing and Communications (ISAC) with multi-beam design holds significant promise for vehicular networks, offering multi-target omnidirectional sensing and high-capacity communication se... 详细信息
来源: 评论
An Effective Security Comparison Protocol in Cloud Computing
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 5141-5158页
作者: Yuling Chen Junhong Tao Tao Li Jiangyuan Cai Xiaojun Ren State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550000China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin550000China POWERCHINA Guizhou Electric Power Engineering Co. Ltd.Guiyang550000China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and TechnologyWeifang261000China
With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and *** this can save customers’operating costs,it also poses privacy and se... 详细信息
来源: 评论
Three Preemption Approaches towards EDF Scheduling for Homogeneous Multiprocessors  29
Three Preemption Approaches towards EDF Scheduling for Homog...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Wu, Peng Li, Zhi Zhang, Zhicai Yan, Tao Chen, Lu Shanxi University Institute of Big Data Science and Industry Taiyuan030006 China Shanxi University School of Computer and Information Technology Taiyuan030006 China Hainan University School of Computer Science and Technology Haikou570228 China
When scheduling a set of real-time tasks, researchers can choose between preemptive and non-preemptive algorithms. However, these algorithms each have their own advantages and drawbacks, necessitating specific analysi... 详细信息
来源: 评论