咨询与建议

限定检索结果

文献类型

  • 3,443 篇 会议
  • 3,321 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 6,767 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,770 篇 工学
    • 3,307 篇 计算机科学与技术...
    • 2,788 篇 软件工程
    • 1,047 篇 信息与通信工程
    • 714 篇 生物工程
    • 665 篇 控制科学与工程
    • 512 篇 生物医学工程(可授...
    • 507 篇 电气工程
    • 490 篇 电子科学与技术(可...
    • 456 篇 光学工程
    • 335 篇 机械工程
    • 276 篇 化学工程与技术
    • 247 篇 仪器科学与技术
    • 201 篇 动力工程及工程热...
    • 138 篇 材料科学与工程(可...
    • 120 篇 交通运输工程
    • 108 篇 建筑学
  • 2,734 篇 理学
    • 1,302 篇 数学
    • 795 篇 物理学
    • 784 篇 生物学
    • 407 篇 统计学(可授理学、...
    • 304 篇 化学
    • 281 篇 系统科学
  • 1,260 篇 管理学
    • 723 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 468 篇 医学
    • 403 篇 临床医学
    • 342 篇 基础医学(可授医学...
    • 240 篇 药学(可授医学、理...
    • 126 篇 公共卫生与预防医...
  • 208 篇 法学
    • 183 篇 社会学
  • 103 篇 经济学
  • 72 篇 教育学
  • 69 篇 农学
  • 38 篇 文学
  • 24 篇 艺术学
  • 19 篇 军事学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 136 篇 machine learning
  • 127 篇 semantics
  • 115 篇 deep learning
  • 95 篇 feature extracti...
  • 87 篇 training
  • 85 篇 computational mo...
  • 77 篇 computer science
  • 72 篇 deep neural netw...
  • 65 篇 accuracy
  • 64 篇 data mining
  • 62 篇 visualization
  • 59 篇 object detection
  • 56 篇 reinforcement le...
  • 55 篇 neural networks
  • 54 篇 forecasting
  • 52 篇 computer archite...
  • 52 篇 artificial intel...
  • 51 篇 internet of thin...
  • 51 篇 computer vision
  • 50 篇 optimization

机构

  • 208 篇 department of co...
  • 78 篇 department of co...
  • 56 篇 tencent ai lab
  • 49 篇 department of co...
  • 44 篇 department of co...
  • 43 篇 college of compu...
  • 38 篇 department of co...
  • 37 篇 department of el...
  • 37 篇 pazhou lab
  • 37 篇 department of co...
  • 37 篇 peng cheng labor...
  • 36 篇 department of co...
  • 32 篇 huawei noah's ar...
  • 31 篇 tsinghua univers...
  • 30 篇 university of sc...
  • 30 篇 state key lab on...
  • 30 篇 department of co...
  • 29 篇 institute for ar...
  • 28 篇 state key lab on...
  • 26 篇 department of co...

作者

  • 71 篇 sun maosong
  • 52 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 40 篇 bhowmik biswajit
  • 36 篇 zhu jun
  • 33 篇 huang minlie
  • 31 篇 huang wenbing
  • 30 篇 biswajit bhowmik
  • 27 篇 liu yang
  • 25 篇 yu kai
  • 25 篇 timofte radu
  • 24 篇 zhang min
  • 22 篇 liu qun
  • 21 篇 zhang lei
  • 21 篇 chen hao
  • 20 篇 fuchun sun
  • 19 篇 qinghua zheng
  • 18 篇 zheng qinghua
  • 17 篇 liu xin
  • 17 篇 zhao hai

语言

  • 6,449 篇 英文
  • 245 篇 其他
  • 76 篇 中文
  • 2 篇 日文
检索条件"机构=Programming Technology Lab Computer Science Department"
6767 条 记 录,以下是401-410 订阅
排序:
EdgeMove: Pipelining Device-Edge Model Training for Mobile Intelligence  23
EdgeMove: Pipelining Device-Edge Model Training for Mobile I...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Dong, Zeqian He, Qiang Chen, Feifei Jin, Hai Gu, Tao Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia School of Computing Macquarie University Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Training machine learning (ML) models on mobile and Web-of-Things (WoT) has been widely acknowledged and employed as a promising solution to privacy-preserving ML. However, these end-devices often suffer from constrai... 详细信息
来源: 评论
Incremental SDN Deployment to Achieve Load Balance in ISP Networks  16th
Incremental SDN Deployment to Achieve Load Balance in ISP ...
收藏 引用
16th International Conference on Algorithmic Aspects in Information and Management, AAIM 2022
作者: Cheng, Yunlong Zhou, Hao Gao, Xiaofeng Zheng, Jiaqi Chen, Guihai MoE Key Lab of Artificial Intelligence Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Department of Computer Science and Technology Nanjing University Nanjing China
Software defined network (SDN) decouples control planes from data planes and integrates them into a logically centralized controller. With capture of the global view, the controller can dynamically and timely reply to... 详细信息
来源: 评论
SOFTENED SYMBOL GROUNDING FOR NEURO-SYMBOLIC SYSTEMS
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zenan Yao, Yuan Chen, Taolue Xu, Jingwei Cao, Chun Ma, Xiaoxing Lü, Jian State Key Lab of Novel Software Technology Department of Computer Science and Technology Nanjing University China Department of Computer Science Birkbeck University of London United Kingdom
Neuro-symbolic learning generally consists of two separated worlds, i.e., neural network training and symbolic constraint solving, whose success hinges on symbol grounding, a fundamental problem in AI. This paper pres... 详细信息
来源: 评论
PipeEdge: A Trusted Pipelining Collaborative Edge Training based on Blockchain  23
PipeEdge: A Trusted Pipelining Collaborative Edge Training b...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Yuan, Liang He, Qiang Chen, Feifei Dou, Ruihan Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia Faculty of Mathematics University of Waterloo Canada National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Powered by the massive data generated by the blossom of mobile and Web-of-Things (WoT) devices, Deep Neural Networks (DNNs) have developed both in accuracy and size in recent years. Conventional cloud-based DNN traini... 详细信息
来源: 评论
Medical Image Fusion Solid Works Supporting Multiple Techniques with Feature-Level Transforms  2
Medical Image Fusion Solid Works Supporting Multiple Techniq...
收藏 引用
2nd International Conference on Sustainable Computing and Data Communication Systems, ICSCDS 2023
作者: Mutha, Rakhi Pathak, Devendra Nath Ahuja, Vandana Bhandari, Prabhakar Ramesh Rahi, Pankaj Mamodiya, Udit Lovely Professional University Department of Computer Application Punjab India Poornima College of Engineering Department of Computer Science and Engineering Rajasthan Jaipur India Swami Vivekanand Institute of Engineering and Technology Department of Computer Science and Engineering Punjab India Sevadal Mahila Mahavidyalaya Department of Microbiology Umred Road Maharashtra Nagpur India Poornima Institute of Engineering and Technology Department of Artificial Intelligence & Data Science Rajasthan Jaipur India Piet Aicte Idea Lab Poornima Institute of Engineering and Technology Department of Electrical Engineering Rajasthan Jaipur India
The use of group classifiers on similar features has resulted in computationally expensive and tedious, making them unsuitable for online applications. The clustering techniques are evaluated for both inter-subject an... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching  24
BinaryAI: Binary Software Composition Analysis via Intellige...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Jiang, Ling An, Junwen Huang, Huihui Tang, Qiyi Nie, Sen Wu, Shi Zhang, Yuqun Southern University of Science and Technology Shenzhen China Tencent Security Keen Lab Shanghai China Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Southern University of Science and Technol-ogy Department of Computer Science and Engineering Shenzhen China Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation China
While third-party libraries (TPLs) are extensively reused to enhance productivity during software development, they can also introduce potential security risks such as vulnerability propagation. Software composition a... 详细信息
来源: 评论
Roland: Robust In-band Parallel Communication for Magnetic MIMO Wireless Power Transfer System  42
Roland: Robust In-band Parallel Communication for Magnetic M...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Zhou, Wangqiu Zhou, Hao Cui, Xiang Wang, Xinyu Wang, Xiaoyan Liu, Zhi Linke Lab School of Computer Science and Technology University of Science and Technology of China China University of Science and Technology of China Cas Key Laboratory of Wireless-Optical Communications China Deqing Alpha Innovation Institute Huzhou China Ibaraki University Graduate School of Science and Engineering Ibaraki Japan The University of Electro-Communications Department of Computer and Network Engineering Tokyo182-8585 Japan
In recent years, receiver (RX) feedback communication has attracted increasing attention to enhance the charging performance for magnetic resonant coupling (MRC) based wireless power transfer (WPT) systems. People pre... 详细信息
来源: 评论
Generalized Multi-protocol label Switching based Virtualization for Cloud Computing  1
Generalized Multi-protocol Label Switching based Virtualizat...
收藏 引用
1st International Conference on Connected Systems and Intelligence, CSI 2022
作者: Saxena, Rajat Patel, Ajay Singh Shri Vaishnav Institute of Information Technology Shri Vaishnav Vidyapeeth Vishwavidyalaya Cloud computing Lab Department of Computer Science and Engineering Indore India Cloud computing Lab Department of Computer Science and Engineering Indore India
Generalized Multi Protocol label Switching (GMPLS) or Multi-Protocol Lambda Switching is a new technology which produce amplification in Multi Protocol label Switching (MPLS) to provide support network switching, spac... 详细信息
来源: 评论
An Ensemble Model for Gait Classification in Children and Adolescent with Cerebral Palsy: A Low-Cost Approach  1
收藏 引用
11th International Conference on Soft Computing for Problem Solving, SocProS 2022
作者: Chakraborty, Saikat Sambhavi, Sruti Panda, Prashansa Nandy, Anup Odisha Bhubaneswar India Machine Intelligence and Bio-motion Research Lab Department of Computer Science and Engineering National Institute of Technology Rourkela Odisha Rourkela India
A fast and precise automatic gait diagnostic system is an urgent need for real-time clinical gait assessment. Existing machine intelligence-based systems to detect cerebral palsy gait have often ignored the crucial is... 详细信息
来源: 评论