咨询与建议

限定检索结果

文献类型

  • 3,457 篇 会议
  • 3,331 篇 期刊文献
  • 65 册 图书

馆藏范围

  • 6,853 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,771 篇 工学
    • 3,303 篇 计算机科学与技术...
    • 2,783 篇 软件工程
    • 1,045 篇 信息与通信工程
    • 713 篇 生物工程
    • 665 篇 控制科学与工程
    • 512 篇 生物医学工程(可授...
    • 509 篇 电气工程
    • 491 篇 电子科学与技术(可...
    • 453 篇 光学工程
    • 335 篇 机械工程
    • 277 篇 化学工程与技术
    • 245 篇 仪器科学与技术
    • 202 篇 动力工程及工程热...
    • 139 篇 材料科学与工程(可...
    • 119 篇 交通运输工程
    • 108 篇 建筑学
  • 2,732 篇 理学
    • 1,299 篇 数学
    • 794 篇 物理学
    • 781 篇 生物学
    • 406 篇 统计学(可授理学、...
    • 304 篇 化学
    • 282 篇 系统科学
  • 1,261 篇 管理学
    • 724 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 327 篇 工商管理
  • 466 篇 医学
    • 400 篇 临床医学
    • 339 篇 基础医学(可授医学...
    • 240 篇 药学(可授医学、理...
    • 125 篇 公共卫生与预防医...
  • 207 篇 法学
    • 182 篇 社会学
  • 102 篇 经济学
  • 70 篇 教育学
  • 70 篇 农学
  • 38 篇 文学
  • 23 篇 艺术学
  • 19 篇 军事学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 137 篇 machine learning
  • 127 篇 semantics
  • 120 篇 deep learning
  • 97 篇 feature extracti...
  • 87 篇 training
  • 85 篇 computational mo...
  • 82 篇 artificial intel...
  • 77 篇 computer science
  • 73 篇 deep neural netw...
  • 64 篇 data mining
  • 64 篇 visualization
  • 64 篇 accuracy
  • 59 篇 object detection
  • 56 篇 reinforcement le...
  • 55 篇 neural networks
  • 54 篇 forecasting
  • 52 篇 computer archite...
  • 51 篇 internet of thin...
  • 51 篇 computer vision
  • 50 篇 optimization

机构

  • 211 篇 department of co...
  • 78 篇 department of co...
  • 56 篇 tencent ai lab
  • 50 篇 department of co...
  • 44 篇 college of compu...
  • 44 篇 department of co...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 38 篇 department of el...
  • 37 篇 pazhou lab
  • 37 篇 department of co...
  • 37 篇 peng cheng labor...
  • 33 篇 huawei noah's ar...
  • 31 篇 tsinghua univers...
  • 31 篇 department of co...
  • 30 篇 university of sc...
  • 30 篇 state key lab on...
  • 29 篇 institute for ar...
  • 28 篇 state key lab on...
  • 27 篇 shanghai jiao to...

作者

  • 71 篇 sun maosong
  • 52 篇 liu zhiyuan
  • 42 篇 sun fuchun
  • 40 篇 bhowmik biswajit
  • 36 篇 zhu jun
  • 33 篇 huang minlie
  • 31 篇 huang wenbing
  • 30 篇 biswajit bhowmik
  • 27 篇 liu yang
  • 25 篇 yu kai
  • 25 篇 timofte radu
  • 24 篇 zhang min
  • 22 篇 liu qun
  • 21 篇 zhang lei
  • 21 篇 chen hao
  • 20 篇 fuchun sun
  • 20 篇 qinghua zheng
  • 19 篇 jun zhu
  • 18 篇 zheng qinghua
  • 17 篇 liu xin

语言

  • 6,529 篇 英文
  • 251 篇 其他
  • 76 篇 中文
  • 2 篇 日文
检索条件"机构=Programming Technology Lab Computer Science Department"
6853 条 记 录,以下是121-130 订阅
Rendering discrete participating media using geometrical optics approximation
收藏 引用
Computational Visual Media 2022年 第3期8卷 425-444页
作者: Jie Guo Bingyang Hu Yanjun Chen Yuanqi Li Yanwen Guo Ling-Qi Yan State Key Lab for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science UC Santa BarbaraUSA
We consider the scattering of light in participating media composed of sparsely and randomly distributed discrete *** particle size is expected to range from the scale of the wavelength to several orders of magnitude ... 详细信息
来源: 评论
AutoCov22: A Customized Deep Learning Framework for COVID-19 Detection
收藏 引用
SN computer science 2023年 第5期4卷 659页
作者: Bhowmik, Biswajit Varna, Shrinidhi Kumar, Adarsh Kumar, Rahul Ishwarchandra Vidyasagar AIT Lab BRICS Lab Department of Computer Science and Engineering National Institute of Technology Karnataka Surathkal 575025 India
The novel coronavirus disease 2019 (COVID-19) spill has spread rapidly and appeared as a pandemic affecting global public health. Due to the severe challenges faced with the increase of suspected cases, more testing m... 详细信息
来源: 评论
Detection and Localization of Channel-Short Faults in Regular On-Chip Interconnection Networks
收藏 引用
SN computer science 2023年 第5期4卷 1-18页
作者: Bhowmik, Biswajit Swami Vivekananda NoC Lab BRICS Lab Department of Computer Science and Engineering National Institute of Technology Karnataka Surathkal 575025 India
With the rapid developments in VLSI technology, the communication channels in networks-on-chip (NoCs) can place many wires for sustaining high-performance requirements over the communication bottleneck in multicore, m... 详细信息
来源: 评论
Compound Jamming Detection Technique under High Similarity Background
Compound Jamming Detection Technique under High Similarity B...
收藏 引用
2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications technology, IAICT 2024
作者: Li, Zhaobin Zhang, Jiaxiang Liu, Quanhua Zhao, Sanyuan Radar Research Lab Department of Computer Science & Technology Beijing Institute of Technology Beijing China Radar Research Lab School of Information and Electronics Beijing Institute of Technology Beijing Institute of Technology Beijing China Beijing Institute of Technology Ministry of Education Beijing Institute of Technology Chongqing Innovation Center Chongqing Beijing China Department of Computer Science & Technology Beijing Institute of Technology Beijing China
To address the issue of easy misidentification due to the similarity between suppression jamming and background noise on the time-frequency graph in radar jamming detection, this paper proposes a signal amplitude dete... 详细信息
来源: 评论
LBA: Matching Theory Based Latency-Sensitive Binary Offloading in IoT-Fog Networks  16
LBA: Matching Theory Based Latency-Sensitive Binary Offloadi...
收藏 引用
16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024
作者: Soni, Priyanka Deshlahre, Omkar Chand Satpathy, Anurag Addya, Sourav Kanti National Institute of Technology Karnataka Cloud and Smart System Services Lab Department of Computer Science and Engineering India Missouri University of Science and Technology RollaMO United States
The Internet of Things (IoT) is growing more popular with applications like healthcare services, traffic monitoring, video streaming, smart homes, etc. These applications produce an enormous amount of data, so a reali... 详细信息
来源: 评论
VQR: vulnerability analysis in quadratic residues-based authentication protocols
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第6期14卷 7559-7574页
作者: Ghahramani, Meysam HaddadPajouh, Hamed Javidan, Reza Kumari, Saru Computer Engineering and IT Department Shiraz University of Technology Shiraz Iran Cyber Science Lab School of Computer Science University of Guelph 50 Stone Rd E GuelphON Canada Department of Mathematics Ch. Charan Singh University Uttar Pradesh Meerut India
Ensuring security and respect for users’ privacy, especially in electronic health-care systems, is an important task that is achievable by authentication protocols. The security of many protocols is based on public-k... 详细信息
来源: 评论
INCENTIVE-AWARE FEDERATED LEARNING WITH TRAINING-TIME MODEL REWARDS  12
INCENTIVE-AWARE FEDERATED LEARNING WITH TRAINING-TIME MODEL ...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Wu, Zhaoxuan Amiri, Mohammad Mohammadi Raskar, Ramesh Low, Bryan Kian Hsiang Institute of Data Science National University of Singapore Singapore Department of Computer Science Rensselaer Polytechnic Institute United States Media Lab Massachusetts Institute of Technology United States Department of Computer Science National University of Singapore Singapore
In federated learning (FL), incentivizing contributions of training resources (e.g., data, compute) from potentially competitive clients is crucial. Existing incentive mechanisms often distribute post-training monetar... 详细信息
来源: 评论
An Efficient Long Short-Term Memory and Gated Recurrent Unit Based Smart Vessel Trajectory Prediction Using Automatic Identification System Data
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 1789-1808页
作者: Umar Zaman Junaid Khan Eunkyu Lee Sajjad Hussain Awatef Salim Balobaid Rua Yahya Aburasain Kyungsup Kim Department of Computer Engineering Chungnam National UniversityDaejeon34134Republic of Korea Department of Environmental IT Engineering Chungnam National UniversityDaejeon34134Republic of Korea Autonomous Ship Research Center Samsung Heavy IndustriesDaejeon34051Republic of Korea ICAROS Center(PRISMA Lab) University of Naples Federico IINaples80131Italy Department of Computer Science College of Computer Science and Information TechnologyJazan UniversityJazan45142Saudi Arabia
Maritime transportation,a cornerstone of global trade,faces increasing safety challenges due to growing sea traffic *** study proposes a novel approach to vessel trajectory prediction utilizing Automatic Identificatio... 详细信息
来源: 评论
Fingerprint Matching for Noisy and Distorted Patterns using a Siamese Network with ResNet50 and Multihead Attention
收藏 引用
IEEE Access 2025年 13卷 88047-88064页
作者: Sawhney, Tinny Sharma, Ashu Abrol, Pawanesh Lehana, Parveen Kumar Chaahat Yadav, Vaishali Scherer, Rafal Kulakov, Oleksii AlZubi, Ahmad Ali University of Jammu DSP Lab Department of Electronics India University of Jammu Department of Computer Science and IT India Chitkara University Institute of Engineering and Technology Chitkara University Department of Computer Science and Engineering Punjab India Manipal University Jaipur Jaipur India Czestochowa University of Technology Department of Artificial Intelligence Częstochowa Poland National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute" Faculty of Informatics and Software Engineering Kyiv Ukraine King Saud University Community College Department of Computer Science Riyadh Saudi Arabia
Dermatoglyphics, the study of unique ridge patterns on fingertips, plays a crucial role in fingerprint-based identification. However, skin conditions such as psoriasis, eczema, and verruca vulgaris can distort these p... 详细信息
来源: 评论
Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 125-137页
作者: Debasmita Mishra Bighnaraj Naik Janmenjoy Nayak Alireza Souri Pandit Byomakesha Dash S.Vimal Department of Computer Application Veer Surendra Sai University of TechnologyBurlaSambalpur768018OdishaIndia Department of Computer Science Maharaja Sriram Chandra Bhanja Deo(MSCB)UniversityBaripada757003OdishaIndia Department of Software Engineering HaliçUniversity34394IstanbulTurkey Department of Information Technology Aditya Institute of Technology and Management(AITAM)Tekkali532201Andhra PradeshIndia Data Analytics Lab Department of Artificial Intelligence and Data ScienceRamco Institute of TechnologyNorth Venganallur VillageRajapalayam 626117 Virudhunagar DistrictTamilnaduIndia
In this paper,an advanced and optimized Light Gradient Boosting Machine(LGBM)technique is proposed to identify the intrusive activities in the Internet of Things(IoT)*** followings are the major contributions:i)An opt... 详细信息
来源: 评论