咨询与建议

限定检索结果

文献类型

  • 3,450 篇 会议
  • 3,360 篇 期刊文献
  • 65 册 图书

馆藏范围

  • 6,875 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,807 篇 工学
    • 3,325 篇 计算机科学与技术...
    • 2,799 篇 软件工程
    • 1,054 篇 信息与通信工程
    • 715 篇 生物工程
    • 673 篇 控制科学与工程
    • 524 篇 电气工程
    • 514 篇 生物医学工程(可授...
    • 500 篇 电子科学与技术(可...
    • 464 篇 光学工程
    • 341 篇 机械工程
    • 279 篇 化学工程与技术
    • 249 篇 仪器科学与技术
    • 204 篇 动力工程及工程热...
    • 145 篇 材料科学与工程(可...
    • 121 篇 交通运输工程
    • 110 篇 建筑学
  • 2,758 篇 理学
    • 1,308 篇 数学
    • 808 篇 物理学
    • 789 篇 生物学
    • 412 篇 统计学(可授理学、...
    • 308 篇 化学
    • 281 篇 系统科学
  • 1,265 篇 管理学
    • 726 篇 管理科学与工程(可...
    • 569 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 477 篇 医学
    • 406 篇 临床医学
    • 347 篇 基础医学(可授医学...
    • 241 篇 药学(可授医学、理...
    • 130 篇 公共卫生与预防医...
  • 207 篇 法学
    • 182 篇 社会学
  • 104 篇 经济学
  • 71 篇 教育学
  • 69 篇 农学
  • 38 篇 文学
  • 24 篇 艺术学
  • 19 篇 军事学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 137 篇 machine learning
  • 127 篇 semantics
  • 120 篇 deep learning
  • 95 篇 feature extracti...
  • 87 篇 training
  • 85 篇 computational mo...
  • 84 篇 artificial intel...
  • 77 篇 computer science
  • 73 篇 deep neural netw...
  • 65 篇 accuracy
  • 64 篇 data mining
  • 62 篇 visualization
  • 60 篇 object detection
  • 56 篇 reinforcement le...
  • 55 篇 neural networks
  • 53 篇 computer vision
  • 53 篇 forecasting
  • 52 篇 computer archite...
  • 51 篇 internet of thin...
  • 50 篇 optimization

机构

  • 210 篇 department of co...
  • 78 篇 department of co...
  • 56 篇 tencent ai lab
  • 49 篇 department of co...
  • 44 篇 department of co...
  • 43 篇 college of compu...
  • 38 篇 department of co...
  • 38 篇 department of el...
  • 37 篇 department of co...
  • 37 篇 pazhou lab
  • 37 篇 department of co...
  • 35 篇 peng cheng labor...
  • 32 篇 huawei noah's ar...
  • 31 篇 tsinghua univers...
  • 30 篇 university of sc...
  • 30 篇 state key lab on...
  • 29 篇 institute for ar...
  • 29 篇 department of co...
  • 28 篇 state key lab on...
  • 26 篇 department of co...

作者

  • 71 篇 sun maosong
  • 52 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 41 篇 bhowmik biswajit
  • 36 篇 zhu jun
  • 33 篇 huang minlie
  • 31 篇 huang wenbing
  • 30 篇 biswajit bhowmik
  • 27 篇 liu yang
  • 26 篇 timofte radu
  • 25 篇 yu kai
  • 24 篇 zhang min
  • 22 篇 liu qun
  • 21 篇 zhang lei
  • 21 篇 chen hao
  • 20 篇 fuchun sun
  • 18 篇 qinghua zheng
  • 18 篇 zheng qinghua
  • 17 篇 liu xin
  • 17 篇 zhao hai

语言

  • 6,551 篇 英文
  • 250 篇 其他
  • 77 篇 中文
  • 2 篇 日文
检索条件"机构=Programming Technology Lab Computer Science Department"
6875 条 记 录,以下是481-490 订阅
排序:
BlindType: Eyes-free text entry on handheld touchpad by leveraging thumb's muscle memory
收藏 引用
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2017年 第2期1卷 1–24页
作者: Lu, Yiqin Yu, Chun Yi, Xin Shi, Yuanchun Zhao, Shengdong Department of Computer Science and Technology Tsinghua University Tsinghua National Laboratory for Information Science and Technology Beijing Key Lab of Networked Multimedia China National University of Singapore Singapore
Eyes-free input is desirable for ubiquitous computing, since interacting with mobile and wearable devices often competes for visual attention with other devices and tasks. In this paper, we explore eyes-free typing on... 详细信息
来源: 评论
On the Performance of CNN and GAN models for Melanoma Classification  2
On the Performance of CNN and GAN models for Melanoma Classi...
收藏 引用
2nd International Conference on Artificial Intelligence and Signal Processing, AISP 2022
作者: Joson, Nikhil Nair, Madhu S. Artificial Intelligence & Computer Vision Lab Department of Computer Science Cochin University of Science and Technology Kerala Kochi682022 India
Melanoma is the most harmful form of skin cancer and they emerge from melanocytes, a type of pigment-producing cells. Melanomas usually occur on the skin;they mostly form around the back for men, whereas the common pl... 详细信息
来源: 评论
Classification and Comprehension of Software Requirements Using Ensemble Learning
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2839-2855页
作者: Jalil Abbas Arshad Ahmad Syed Muqsit Shaheed Rubia Fatima Sajid Shah Mohammad Elaffendi Gauhar Ali School of Computer Science and Technology Anhui UniversityHefei230039China School of Computing Sciences Pak Austria FachhochschuleInstitute of Applied Sciences and TechnologyHaripur22620Pakistan Department of Computer Science and IT University of LahoreLahore55150Pakistan Department of Computer Science Emerson UniversityPunjabMultan60000Pakistan EIAS(Emerging Intelligent Autonomous Systems)Data Science Lab Prince Sultan UniversityRiyad12435Saudi Arabia
The software development process mostly depends on accurately identifying both essential and optional ***,user needs are typically expressed in free-form language,requiring significant time and human resources to tran... 详细信息
来源: 评论
Tranquility: A low disruptive alternative to quiescence for ensuring safe dynamic updates
Tranquility: A low disruptive alternative to quiescence for ...
收藏 引用
作者: Vandewoude, Yves Ebraert, Peter Berbers, Yolande D'Hondt, Theo Department of Computer Science Katholieke Universiteit Leuven Celestijnenlaan 200A 3001 Heverlee Belgium Programming Technology Lab. Vrije Universiteit Brussel Plainlaan 2 B1050 Brussels Belgium
This paper revisits a problem that was identified by Kramer and Magee: placing a system in a consistent state before and after runtime changes. We show that their notion of quiescence as a necessary and sufficient con... 详细信息
来源: 评论
Optimizing Scene Classification: A Robust Approach with Transfer Learning and Automated Machine Learning Integration
Journal of Engineering Research
收藏 引用
Journal of Engineering Research 2025年
作者: Mohamed Hammad Samia A. Chelloug Samah AlShathri Ahmed A. Abd El-Latif Department of Information Technology Faculty of Computers and Information Menoufia University Shibin El Kom 32511 Egypt EIAS Data Science Lab College of Computer and Information Sciences and Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh 11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh 11671 Saudi Arabia Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom 32511 Egypt
Scene classification is a fundamental challenge in computer vision. Recognizing the complexity of this task is the aim of our study that addresses the need for accurate and robust scene classification by leveraging th... 详细信息
来源: 评论
GreedyJump: A Fast TCAM Update Algorithm
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2022年 第1期4卷 25-29页
作者: Wan, Ying Song, Haoyu Liu, Bin Department of Computer Science and Technology Tsinghua University Beijing250000 China Network Technology Lab Futurewei Technologies Santa ClaraCA95050 United States
TCAM is widely used for rule tables in network switches. An efficient update scheme, which requires as few rule moves as possible, is often time-consuming to compute, while the fast computation likely yields a mediocr... 详细信息
来源: 评论
Aircraft Altitude Estimation Using Un-calibrated Onboard Cameras
收藏 引用
Journal of The Institution of Engineers (India): Series C 2012年 第4期93卷 287-295页
作者: Naidu, V.P.S. Mukherjee, J. MSDF Lab FMCD CSIR—National Aerospace Laboratories Bangalore India Department of Computer Science and Engineering Indian Institute of Technology Kharagpur India
In the present study, implementation and study of aircraft altitude estimation using un-calibrated onboard camera is obtained. A camera model has been implemented to simulate the test data. From the results, it was ob... 详细信息
来源: 评论
Deepfake Detection using Multi-path CNN and Convolutional Attention Mechanism  2
Deepfake Detection using Multi-path CNN and Convolutional At...
收藏 引用
2nd IEEE Mysore Sub Section International Conference, MysuruCon 2022
作者: Rineesh Babu, P. Nair, Madhu S. Cochin University of Science and Technology Artificial Intelligence & Computer Vision Lab Department of Computer Science Kerala Kochi682022 India
Image and video forgery using cutting-edge deep learning techniques has become one of the major issues in the social networking era. Media manipulation in which one person's face is swapped out for another's o... 详细信息
来源: 评论
DDoS prevention using third party auditor in cloud computing
收藏 引用
Iran Journal of computer science 2019年 第4期2卷 231-244页
作者: Saxena, Rajat Dey, Somnath Cloud Computing Lab Department of Computer Science and Engineering Indian Institute of Technology Indore Indore India
Distributed denial of service (DDoS) attack is one of the prominent risk factors for the development of cloud service. It is a very hard task for novice cloud users to identify the real source of DDoS attack because t... 详细信息
来源: 评论
Software transactional memory
收藏 引用
Queue 2008年 第5期6卷 46-58页
作者: Cascaval, Calin Blundell, Colin Michael, Maged Cain, Harold W. Wu, Peng Chiras, Stefanie Chatterjee, Siddhartha Programming models and tools for scalable systems IBM's T.J. Watson Research Center University of Pennsylvania IBM's Systems and Technology Group Austin Research Laboratory Department of Computer Science University of Texas Austin United States
No abstract available
来源: 评论