咨询与建议

限定检索结果

文献类型

  • 1,029 篇 期刊文献
  • 991 篇 会议
  • 13 册 图书

馆藏范围

  • 2,033 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,199 篇 工学
    • 757 篇 计算机科学与技术...
    • 602 篇 软件工程
    • 296 篇 信息与通信工程
    • 183 篇 控制科学与工程
    • 162 篇 生物工程
    • 149 篇 电气工程
    • 148 篇 电子科学与技术(可...
    • 138 篇 生物医学工程(可授...
    • 108 篇 光学工程
    • 85 篇 网络空间安全
    • 76 篇 化学工程与技术
    • 73 篇 材料科学与工程(可...
    • 67 篇 机械工程
    • 57 篇 动力工程及工程热...
    • 56 篇 仪器科学与技术
    • 51 篇 交通运输工程
    • 48 篇 安全科学与工程
  • 829 篇 理学
    • 323 篇 物理学
    • 290 篇 数学
    • 228 篇 生物学
    • 107 篇 化学
    • 107 篇 统计学(可授理学、...
  • 329 篇 管理学
    • 201 篇 管理科学与工程(可...
    • 130 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 188 篇 医学
    • 133 篇 临床医学
    • 120 篇 基础医学(可授医学...
    • 75 篇 公共卫生与预防医...
    • 50 篇 药学(可授医学、理...
  • 76 篇 法学
    • 67 篇 社会学
  • 54 篇 农学
  • 44 篇 教育学
  • 35 篇 经济学
  • 19 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 65 篇 deep learning
  • 59 篇 accuracy
  • 50 篇 machine learning
  • 40 篇 artificial intel...
  • 36 篇 feature extracti...
  • 31 篇 training
  • 29 篇 internet of thin...
  • 29 篇 convolutional ne...
  • 27 篇 computational mo...
  • 25 篇 optimization
  • 23 篇 predictive model...
  • 22 篇 real-time system...
  • 21 篇 computer science
  • 21 篇 data mining
  • 20 篇 security
  • 19 篇 support vector m...
  • 18 篇 data models
  • 17 篇 scalability
  • 17 篇 magnetic resonan...
  • 17 篇 education

机构

  • 48 篇 vivekananda glob...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 42 篇 maharishi school...
  • 41 篇 kirchhoff-instit...
  • 41 篇 department of co...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 ochanomizu unive...
  • 38 篇 graduate school ...
  • 38 篇 department physi...
  • 37 篇 fakultät für phy...
  • 37 篇 deutsches elektr...

作者

  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 34 篇 m. klein
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert
  • 33 篇 a. e. c. coimbra

语言

  • 1,816 篇 英文
  • 190 篇 其他
  • 26 篇 中文
  • 4 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Mobile Application & Technology Program Computer Science Department School of Computer Science"
2033 条 记 录,以下是971-980 订阅
排序:
How Universal Polynomial Bases Enhance Spectral Graph Neural Networks: Heterophily, Over-smoothing, and Over-squashing
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Keke Wang, Yu Guang Li, Ming Liò, Pietro School of Computing National University of Singapore Singapore Institute of Natural Sciences School of Mathematical Sciences Zhangjiang Institute for Advanced Study Shanghai Jiao Tong University Shanghai China Shanghai AI Laboratory Shanghai China School of Mathematics and Statistics University of New South Wales Sydney Australia Zhejiang Institute of Optoelectronics Jinhua China Zhejiang Key Laboratory of Intelligent Education Technology and Application Zhejiang Normal University Jinhua China Department of Computer Science and Technology Cambridge University Cambridge United Kingdom
Spectral Graph Neural Networks (GNNs), alternatively known as graph filters, have gained increasing prevalence for heterophily graphs. Optimal graph filters rely on Laplacian eigendecomposition for Fourier transform. ... 详细信息
来源: 评论
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature
Decentralized and Lightweight Cross-Chain Transaction Scheme...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Huiying Zou Jia Duan Xi Liu Wei Ren Tao Li Xianghan Zheng Kim-Kwang Raymond Choo School of Computer Science China University of Geosciences Wuhan China The Third Surveying and Mapping Institute of Hunan Province Hunan Engineering Research Center of Geographic Information Security and Application Hunan China Key Laboratory of Data Protection and Intelligent Management Sichuan University Ministry of Education China State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR CASM Beijing China College of Computer and Big Data Fuzhou University School of Information and Intelligent Engineering Sanya College China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio USA
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E... 详细信息
来源: 评论
Enhancement of Channel Capacity in 5G Ultra Dense Network-UDN
Enhancement of Channel Capacity in 5G Ultra Dense Network-UD...
收藏 引用
International Conference on Edge Computing and applications (ICECAA)
作者: Ritesh Rastogi T. Shanthi Pramod Kumar Naik M. Sahaya Sheela A.K Mishra Nandhini T J Department of IT and CS M.Tech(Int) Noida Institute of Engineering and Technology Delhi India Department of ECE Paavai Engineering College Chennai India Departmeny of Computer Science Engineering Dayananda Sagar University Bangalore India Department of ECE Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Chennai India Math Unit Foundation Program Dhofar University Salalah Oman Saveetha School of Engineering Saveetha Institute of Medical and Technical Science - (SIMATS) Chennai India
A 5G ultra dense network architecture makes use of a high density of micro cell base stations to provide increased coverage, capacity, and performance for 5G communication systems. This is accomplished by the utilizat...
来源: 评论
Behavioral Time Management Analysis: Clustering Productivity Patterns using K-Means
Behavioral Time Management Analysis: Clustering Productivity...
收藏 引用
Communication, Computing and Signal Processing (IICCCS), IEEE International Conference on
作者: D David Winster Praveenraj Mohammed I. Habelalmateen Akrati Shrivastava Amarpreet Kaur A.S. Valarmathy Chintamani Prasad Patnaik School of Business and Management CHRIST University Bangalore India Department Of Computers Techniques Engineering College Of Technical Engineering The Islamic University Najaf Iraq Department Of Computers Techniques Engineering College Of Technical Engineering The Islamic University Of Al Diwaniyah Al Diwaniyah Iraq Department of Computer Science & Engineering IES Institute of Technology and Management IES University Bhopal M.P. India Department of Computer Application Chandigarh Engineering College Chandigarh Group of Colleges Mohali Punjab India Prince Shri Venkateshwara Padmavathy Engineering College Chennai India Department of MBA Aditya Institute of Technology and Management Tekkali Andhra Pradesh India
This paper focuses on investigating the efficiency profile through the three-time management behaviors using the K-Means clustering method. In the case of the study, the data gathered from digital time management tool... 详细信息
来源: 评论
Modern extreme value statistics for Utopian extremes
arXiv
收藏 引用
arXiv 2023年
作者: Richards, Jordan Alotaibi, Noura Cisneros, Daniela Gong, Yan Guerrero, Matheus B. Redondo, Paolo Shao, Xuanjie School of Mathematics University of Edinburgh United Kingdom Statistics Program Computer Electrical and Mathematical Sciences and Engineering Division King Abdullah University of Science and Technology Thuwal Saudi Arabia Harvard School of Public Health BostonMA United States Department of Mathematics California State University FullertonCA United States
Capturing the extremal behaviour of data often requires bespoke marginal and dependence models which are grounded in rigorous asymptotic theory, and hence provide reliable extrapolation into the upper tails of the dat... 详细信息
来源: 评论
How universal polynomial bases enhance spectral graph neural networks: heterophily, over-smoothing, and over-squashing  24
How universal polynomial bases enhance spectral graph neural...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Keke Huang Yu Guang Wang Ming Li Pietro Liò School of Computing National University of Singapore Singapore Institute of Natural Sciences School of Mathematical Sciences Zhangjiang Institute for Advanced Study Shanghai Jiao Tong University Shanghai China and Shanghai AI Laboratory Shanghai China and School of Mathematics and Statistics University of New South Wales Sydney Australia Zhejiang Institute of Optoelectronics Jinhua China and Zhejiang Key Laboratory of Intelligent Education Technology and Application Zhejiang Normal University Jinhua China Department of Computer Science and Technology Cambridge University Cambridge UK
Spectral Graph Neural Networks (GNNs), alternatively known as graph filters, have gained increasing prevalence for heterophily graphs. Optimal graph filters rely on Laplacian eigendecomposition for Fourier transform. ...
来源: 评论
Generative AI-enabled Vehicular Networks: Fundamentals, Framework, and Case Study
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Ruichen Xiong, Ke Du, Hongyang Niyato, Dusit Kang, Jiawen Shen, Xuemin Poor, H. Vincent The Engineering Research Center of Network Management Technology High Speed Railway of Ministry of Education School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China The Collaborative Innovation Center of Railway Traffic Safety Beijing Jiaotong University Beijing100044 China The National Engineering Research Center of Advanced Network Technologies Beijing Jiaotong University Beijing100044 China The School of Computer Science and Engineering The Energy Research Institute @ NTU Interdisciplinary Graduate Program Nanyang Technological University Singapore The School of Automation Guangdong University of Technology China The Department of Electrical and Computer Engineering University of Waterloo Canada The Department of Electrical and Computer Engineering Princeton University PrincetonNJ08544 United States
Recognizing the tremendous improvements that the integration of generative AI can bring to intelligent transportation systems, this article explores the integration of generative AI technologies in vehicular networks,... 详细信息
来源: 评论
Development of Educational Game for Indonesian History Lesson Focusing on Indonesia Pre-Literacy Relics 'Prehistoria' for Grade X High school Student
Development of Educational Game for Indonesian History Lesso...
收藏 引用
2020 International Conference on computer Engineering, Network, and Intelligent Multimedia, CENIM 2020
作者: Nugroho, Supeno Mardi Susiki Rahman, Muhammad Daffa Abiyyu Hariadi, Mochamad Arief, Muhammad Faculty of Intelligent Electrical and Informatics Technology Sepuluh Nopember Institute of Technology Computer Engineering Department Surabaya Indonesia Tokyo University of Technology Media Science Program Graduate School of Bionics Computer and Media Sciences Tokyo Japan
The development of game technology has opened up new possibilities in learning methods through educational games. However, in Indonesia, the application of this concept is lacking. One lesson that can benefit from edu... 详细信息
来源: 评论
Probabilistic Genotype-Phenotype Maps Reveal Mutational Robustness of RNA Folding, Spin Glasses, and Quantum Circuits
arXiv
收藏 引用
arXiv 2023年
作者: Sappington, Anna Mohanty, Vaibhav Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology CambridgeMA02139 United States Program for Health Sciences and Technology Harvard Medical School BostonMA02115 United States Massachusetts Institute of Technology CambridgeMA02139 United States Harvard/MIT MD-PhD Program Harvard Medical School BostonMA02115 United States Department of Chemistry and Chemical Biology Harvard University CambridgeMA02138 United States
Recent studies of genotype-phenotype (GP) maps have reported universally enhanced phenotypic robustness to genotype mutations, a feature essential to evolution. Virtually all of these studies make a simplifying assump... 详细信息
来源: 评论
Cryptocurrency and Data Privacy in Human Resource Management
Cryptocurrency and Data Privacy in Human Resource Management
收藏 引用
Advance Computing and Innovative Technologies in Engineering (ICACITE), International Conference on
作者: Indhumathi Chandrasekeran A Dharmaraj Ashima Juyal M. Shravan Rajesh Deb Barman Melanie Lourens Department of Commerce With Computer Application PSG College of Arts & Science Coimbatore Tamil Nadu India Department of Management Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Uttaranchal Institute of Technology Uttaranchal University School of Business SR University Warangal Telangana India Department of Commerce Bodoland University Kokrajhar BTR Assam India Faculty of Management Sciences Durban University of Technology South Africa
Cryptocurrency and data privacy are two important considerations in human resource management. Cryptocurrency, such as Bitcoin, can be used to pay employees, provide incentives, and manage payroll, but it also poses r...
来源: 评论