咨询与建议

限定检索结果

文献类型

  • 3,445 篇 会议
  • 3,325 篇 期刊文献
  • 65 册 图书

馆藏范围

  • 6,835 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,774 篇 工学
    • 3,309 篇 计算机科学与技术...
    • 2,788 篇 软件工程
    • 1,047 篇 信息与通信工程
    • 714 篇 生物工程
    • 665 篇 控制科学与工程
    • 512 篇 生物医学工程(可授...
    • 508 篇 电气工程
    • 491 篇 电子科学与技术(可...
    • 457 篇 光学工程
    • 336 篇 机械工程
    • 277 篇 化学工程与技术
    • 247 篇 仪器科学与技术
    • 202 篇 动力工程及工程热...
    • 139 篇 材料科学与工程(可...
    • 120 篇 交通运输工程
    • 108 篇 建筑学
  • 2,735 篇 理学
    • 1,302 篇 数学
    • 796 篇 物理学
    • 784 篇 生物学
    • 407 篇 统计学(可授理学、...
    • 305 篇 化学
    • 281 篇 系统科学
  • 1,260 篇 管理学
    • 723 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 468 篇 医学
    • 403 篇 临床医学
    • 342 篇 基础医学(可授医学...
    • 240 篇 药学(可授医学、理...
    • 126 篇 公共卫生与预防医...
  • 208 篇 法学
    • 183 篇 社会学
  • 103 篇 经济学
  • 72 篇 教育学
  • 69 篇 农学
  • 38 篇 文学
  • 24 篇 艺术学
  • 19 篇 军事学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 136 篇 machine learning
  • 127 篇 semantics
  • 115 篇 deep learning
  • 95 篇 feature extracti...
  • 86 篇 training
  • 85 篇 computational mo...
  • 82 篇 artificial intel...
  • 77 篇 computer science
  • 73 篇 deep neural netw...
  • 65 篇 accuracy
  • 64 篇 data mining
  • 62 篇 visualization
  • 59 篇 object detection
  • 56 篇 reinforcement le...
  • 55 篇 neural networks
  • 54 篇 forecasting
  • 52 篇 computer archite...
  • 51 篇 internet of thin...
  • 51 篇 computer vision
  • 50 篇 optimization

机构

  • 210 篇 department of co...
  • 78 篇 department of co...
  • 56 篇 tencent ai lab
  • 49 篇 department of co...
  • 44 篇 department of co...
  • 43 篇 college of compu...
  • 38 篇 department of co...
  • 38 篇 department of el...
  • 37 篇 department of co...
  • 37 篇 pazhou lab
  • 37 篇 department of co...
  • 36 篇 peng cheng labor...
  • 32 篇 huawei noah's ar...
  • 31 篇 tsinghua univers...
  • 30 篇 university of sc...
  • 30 篇 state key lab on...
  • 30 篇 department of co...
  • 29 篇 institute for ar...
  • 28 篇 state key lab on...
  • 26 篇 department of co...

作者

  • 71 篇 sun maosong
  • 52 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 40 篇 bhowmik biswajit
  • 36 篇 zhu jun
  • 33 篇 huang minlie
  • 31 篇 huang wenbing
  • 30 篇 biswajit bhowmik
  • 27 篇 liu yang
  • 25 篇 yu kai
  • 25 篇 timofte radu
  • 24 篇 zhang min
  • 22 篇 liu qun
  • 21 篇 zhang lei
  • 21 篇 chen hao
  • 20 篇 fuchun sun
  • 19 篇 qinghua zheng
  • 18 篇 zheng qinghua
  • 17 篇 liu xin
  • 17 篇 zhao hai

语言

  • 6,517 篇 英文
  • 245 篇 其他
  • 76 篇 中文
  • 2 篇 日文
检索条件"机构=Programming Technology Lab Computer Science Department"
6835 条 记 录,以下是521-530 订阅
排序:
Privacy-Aware and AI Techniques for Healthcare Based on K-Anonymity Model in Internet of Things
收藏 引用
IEEE Transactions on Engineering Management 2024年 71卷 12448-12462页
作者: Sangaiah, Arun Kumar Javadpour, Amir Ja'fari, Forough Pinto, Pedro Chuang, Huan-Ming National Yunlin University of Science and Technology International Graduate Institute of Artificial Intelligence Douliou64002 Taiwan Lebanese American University Department of Electrical and Computer Engineering Byblos1102 2801 Lebanon Harbin Institute of Technology Department of Computer Science and Technology Shenzhen150001 China Instituto Politécnico de Viana Do Castelo ADiT-Lab Electrotechnics and Telecommunications Department Porto4900-347 Portugal Sharif University of Technology Department of Computer Engineering Tehran11155-9161 Iran National Yunlin University of Science and Technology Department of Information Management Yunlin640 Taiwan
The government and industry have given the recent development of the Internet of Things in the healthcare sector significant respect. Health service providers retain data gathered from many sources and are useful for ... 详细信息
来源: 评论
ID based signcryption scheme in standard model
ID based signcryption scheme in standard model
收藏 引用
6th International Conference on Provable Security, ProvSec 2012
作者: Selvi, S. Sharmila Deva Vivek, S. Sree Vinayagamurthy, Dhinakaran Rangan, C. Pandu Theoretical Computer Science Lab. Department of Computer Science and Engineering Indian Institute of Technology Madras India Department of Computer Science and Engineering College of Engineering Guindy Anna University Chennai India
Designing an ID based signcryption scheme in the standard model is among the most interesting and important problems in cryptography. However, all the existing systems in the ID based setting, in the standard model, d... 详细信息
来源: 评论
A Closer Look at Anonymous Proxy Re-Encryption Schemes  12th
A Closer Look at Anonymous Proxy Re-Encryption Schemes
收藏 引用
12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019
作者: Selvi, S. Sharmila Deva Harish, S. Dhanabal, Swethashree Rangan, C. Pandu Theoretical Computer Science Lab Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai600036 India PSG College of Technology Coimbatore641004 India
Anonymity is one of the most desired properties of a Proxy Re-encryption scheme. Any user communicating over the public channel, availing cloud for proxy re-encryption services requires that any entity (an attacker or... 详细信息
来源: 评论
Same same, but different: Compositionality of paraphrase granularity levels  11
Same same, but different: Compositionality of paraphrase gra...
收藏 引用
11th International Conference on Recent Advances in Natural Language Processing, RANLP 2017
作者: Benikova, Darina Zesch, Torsten Language Technology Lab. Department of Computer Science and Applied Cognitive Science University of Duisburg Essen Germany
Paraphrases exist on different granularity levels, the most frequently used one being the sentential level. However, we argue that working on the sentential level is not optimal for both machines and humans, and that ... 详细信息
来源: 评论
Assigning Fine-grained PoS tags based on high-precision coarse-grained tagging  26
Assigning Fine-grained PoS tags based on high-precision coar...
收藏 引用
26th International Conference on Computational Linguistics, COLING 2016
作者: Horsmann, Tobias Zesch, Torsten Language Technology Lab. Department of Computer Science and Applied Cognitive Science University of Duisburg-Essen Germany
We propose a new approach to PoS tagging where in a first step, we assign a coarse-grained tag corresponding to the main syntactic category. Based on this high-precision decision, in the second step we utilize special... 详细信息
来源: 评论
An Approximation for Routing Planning, Mobile Charging, and Energy Sharing for Sensing Devices
An Approximation for Routing Planning, Mobile Charging, and ...
收藏 引用
2023 IEEE International Conference on Web Services, ICWS 2023
作者: Liu, Zifeng Kong, Dejun Gao, Yucen Dai, Haipeng Gao, Xiaofeng He, Tian Shanghai Jiao Tong University MoE Key Lab of Artificial Intelligence Department of Computer Science and Engineering Shanghai China Nanjing University Department of Computer Science and Technology Nanjing China University of Minnesota Department of Computer Science and Technology MN United States
Wireless Charging Vehicles (WCVs) have been widely explored as a means of enabling continuous operation of sensors that are powered by batteries. However, the energy consumption of WCVs can be inefficient, leading to ... 详细信息
来源: 评论
Weakly-supervised Salient Instance Detection  31
Weakly-supervised Salient Instance Detection
收藏 引用
31st British Machine Vision Conference, BMVC 2020
作者: Tian, Xin Xu, Ke Yang, Xin Yin, Baocai Lau, Rynson W.H. Computer Science Department Dalian University of Technology Dalian China Computer Science Department City University of Hongkong Hong Kong Pengcheng Lab Shenzhen China
Existing salient instance detection (SID) methods typically learn from pixel-level annotated datasets. In this paper, we present the first weakly-supervised approach to the SID problem. Although weak supervision has b... 详细信息
来源: 评论
Efficient, pairing-free, authenticated identity based key agreement in a single round  1
收藏 引用
7th International Conference on Provable Security, ProvSec 2013
作者: Sree Vivek, S. Sharmila Deva Selvi, S. Renganathan Venkatesan, Layamrudhaa Pandu Rangan, C. Theoretical Computer Science Lab. Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India National Institute of Technology Tiruchi Tiruchirapalli India
Ever since Shamir introduced identity based cryptography in 1984, there has been a tremendous interest in designing efficient key agreement protocols in this paradigm. Since pairing is a costly operation and the compo... 详细信息
来源: 评论
Optics in computer architectures: Basis of WDM, technologies and potentials
Optics in computer architectures: Basis of WDM, technologies...
收藏 引用
2nd International Conference on Systems, ICONS 2007
作者: Wang, Y. Kusserrow, T. Irmer, S. Hasse, A. Bartels, M. Dharmarasu, N. Hillmer, H. Börcsök, J. Mikami, O. University of Kassel Kassel Germany Department of Computer Architecture and System Programming University of Kassel Germany Department of Information Telecommunication and Electronics School of Information Science and Technology Tokai University Hiratsuka-shi Japan
We present novel concepts, technologies and potentials of optical data communication, especially for future computer architectures. The WDM (wavelength division multiplexing) and the optical wiring technologies are ex... 详细信息
来源: 评论
Computational models of narrative: Review of the workshop
收藏 引用
AI Magazine 2010年 第2期31卷 97-100页
作者: Finlayson, Mark A. Richards, Whitman Winston, Patrick H. Electrical Engineering and Computer Science Massachusetts Institute of Technology United States Department of Brain and Cognitive Sciences Massachusetts Institute of Technology United States Department of Cognitive Science Media Arts and Sciences MIT Media Lab United States Department of Artificial Intelligence and Computer Science MIT United States MIT Artificial Intelligence Laboratory United States
On October 8-10,2009, an interdisciplinary group met in Beverley, Massachusetts, to evaluate the state of the art in the computational modeling of narrative. Three important findings emerged: (1) current work in compu... 详细信息
来源: 评论