咨询与建议

限定检索结果

文献类型

  • 3,445 篇 会议
  • 3,325 篇 期刊文献
  • 65 册 图书

馆藏范围

  • 6,835 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,774 篇 工学
    • 3,309 篇 计算机科学与技术...
    • 2,788 篇 软件工程
    • 1,047 篇 信息与通信工程
    • 714 篇 生物工程
    • 665 篇 控制科学与工程
    • 512 篇 生物医学工程(可授...
    • 508 篇 电气工程
    • 491 篇 电子科学与技术(可...
    • 457 篇 光学工程
    • 336 篇 机械工程
    • 277 篇 化学工程与技术
    • 247 篇 仪器科学与技术
    • 202 篇 动力工程及工程热...
    • 139 篇 材料科学与工程(可...
    • 120 篇 交通运输工程
    • 108 篇 建筑学
  • 2,735 篇 理学
    • 1,302 篇 数学
    • 796 篇 物理学
    • 784 篇 生物学
    • 407 篇 统计学(可授理学、...
    • 305 篇 化学
    • 281 篇 系统科学
  • 1,260 篇 管理学
    • 723 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 468 篇 医学
    • 403 篇 临床医学
    • 342 篇 基础医学(可授医学...
    • 240 篇 药学(可授医学、理...
    • 126 篇 公共卫生与预防医...
  • 208 篇 法学
    • 183 篇 社会学
  • 103 篇 经济学
  • 72 篇 教育学
  • 69 篇 农学
  • 38 篇 文学
  • 24 篇 艺术学
  • 19 篇 军事学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 136 篇 machine learning
  • 127 篇 semantics
  • 115 篇 deep learning
  • 95 篇 feature extracti...
  • 86 篇 training
  • 85 篇 computational mo...
  • 82 篇 artificial intel...
  • 77 篇 computer science
  • 73 篇 deep neural netw...
  • 65 篇 accuracy
  • 64 篇 data mining
  • 62 篇 visualization
  • 59 篇 object detection
  • 56 篇 reinforcement le...
  • 55 篇 neural networks
  • 54 篇 forecasting
  • 52 篇 computer archite...
  • 51 篇 internet of thin...
  • 51 篇 computer vision
  • 50 篇 optimization

机构

  • 210 篇 department of co...
  • 78 篇 department of co...
  • 56 篇 tencent ai lab
  • 49 篇 department of co...
  • 44 篇 department of co...
  • 43 篇 college of compu...
  • 38 篇 department of co...
  • 38 篇 department of el...
  • 37 篇 department of co...
  • 37 篇 pazhou lab
  • 37 篇 department of co...
  • 36 篇 peng cheng labor...
  • 32 篇 huawei noah's ar...
  • 31 篇 tsinghua univers...
  • 30 篇 university of sc...
  • 30 篇 state key lab on...
  • 30 篇 department of co...
  • 29 篇 institute for ar...
  • 28 篇 state key lab on...
  • 26 篇 department of co...

作者

  • 71 篇 sun maosong
  • 52 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 40 篇 bhowmik biswajit
  • 36 篇 zhu jun
  • 33 篇 huang minlie
  • 31 篇 huang wenbing
  • 30 篇 biswajit bhowmik
  • 27 篇 liu yang
  • 25 篇 yu kai
  • 25 篇 timofte radu
  • 24 篇 zhang min
  • 22 篇 liu qun
  • 21 篇 zhang lei
  • 21 篇 chen hao
  • 20 篇 fuchun sun
  • 19 篇 qinghua zheng
  • 18 篇 zheng qinghua
  • 17 篇 liu xin
  • 17 篇 zhao hai

语言

  • 6,517 篇 英文
  • 245 篇 其他
  • 76 篇 中文
  • 2 篇 日文
检索条件"机构=Programming Technology Lab Computer Science Department"
6835 条 记 录,以下是531-540 订阅
排序:
Rectangular unfoldings of polycubes  31
Rectangular unfoldings of polycubes
收藏 引用
31st Canadian Conference on Computational Geometry, CCCG 2019
作者: Demaine, Martin L. Hearn, Robert Ku, Jason Uehara, Ryuhei Computer Science and Artificial Intelligence Lab MIT Electrical Engineering and Computer Science Department MIT Japan Advanced Institute of Science and Technology School of Information Science Japan
In this paper, we investigate the problem that asks if there exists a net of a polycube that is exactly a rectangle with slits. For this nontrivial question, we show affirmative solutions. First, we show some concrete...
来源: 评论
DICE: Dynamically Induced Cross Entropy for Robust Learning with Noisy labels  6th
DICE: Dynamically Induced Cross Entropy for Robust Learning ...
收藏 引用
6th International Conference on Cognitive Systems and Signal Processing, ICCSIP 2021
作者: Liu, Tianyu State Key Lab on Intelligence Technology and Systems Department of Computer Science and Technology Tsinghua University Beijing China
Image classification has lead to the revolution of artificial intelligence in the past five years. However, image classification algorithms are significantly affected by the inherent variance in sensory input and nois... 详细信息
来源: 评论
Voltage island generation in cell based dual-Vdd design
Voltage island generation in cell based dual-Vdd design
收藏 引用
作者: Cai, Yici Liu, Bin Zhou, Qiang Hong, Xianlong EDA lab. Department of Computer Science and Technology Tsinghua University Beijing China Department of Computer Science University of California Los Angeles United States
The voltage island style has been widely accepted as an effective way to design low power high performance chips. This paper proposes an automated voltage island generation flow in standard cell based designs. Two imp... 详细信息
来源: 评论
Secure key-aggregation authorized searchable encryption
收藏 引用
science China(Information sciences) 2019年 第3期62卷 220-222页
作者: Haijiang WANG Xiaolei DONG Zhenfu CAO Dongmei LI Nanyuan CAO School of Information and Electronic Engineering Zhejiang University of Science and Technology Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai Key Lab for Trustworthy Computing East China Normal University
Dear editor,Selective sharing of encrypted documents with other users makes the cloud storage system more flexible and effective [1]. For safety reasons, data owners use different keys to encrypt different documents. ... 详细信息
来源: 评论
Query Augmentation with Brain Signals  24
Query Augmentation with Brain Signals
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ye, Ziyi Zhan, Jingtao Ai, Qingyao Liu, Yiqun De Rijke, Maarten Lioma, Christina Ruotsalo, Tuukka Department of Computer Science and Technology Tsinghua University Quancheng Lab Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Zhongguancun Lab Beijing China University of Amsterdam Amsterdam Netherlands University of Copenhagen Copenhagen Denmark Lut University Lahti Finland
In the information retrieval scenario, query augmentation is an essential technique to refine semantically imprecise queries to align more closely with users' actual information needs. Traditional methods typicall... 详细信息
来源: 评论
Dual training and dual prediction for polarity classification
Dual training and dual prediction for polarity classificatio...
收藏 引用
51st Annual Meeting of the Association for Computational Linguistics, ACL 2013
作者: Xia, Rui Wang, Tao Hu, Xuelei Li, Shoushan Zong, Chengqing Department of Computer Science Nanjing University of Science and Technology China NLP Lab. Department of Computer Science Soochow University China National Lab. of Pattern Recognition Institute of Automation CAS China
Bag-of-words (BOW) is now the most popular way to model text in machine learning based sentiment classification. However, the performance of such approach sometimes remains rather limited due to some fundamental defic... 详细信息
来源: 评论
The Regularization of Small Sub-Constraint Satisfaction Problems  22nd
The Regularization of Small Sub-Constraint Satisfaction Prob...
收藏 引用
22nd International Conference on Applications of Declarative programming and Knowledge Management, INAP 2019, the 33rd Workshop on Logic programming, WLP 2019, and the 27th Workshop on Functional and Constraint Logic programming, WFLP 2019
作者: Löffler, Sven Liu, Ke Hofstedt, Petra Department of Mathematics and Computer Science MINT Programming Languages and Compiler Construction Group Brandenburg University of Technology Cottbus-Senftenberg Konrad-Wachsmann-Allee 5 Cottbus03044 Germany
This paper describes a new approach on optimization of constraint satisfaction problems (CSPs) by means of substituting sub-CSPs with locally consistent regular membership constraints. The purpose of this approach is ... 详细信息
来源: 评论
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3515-3537页
作者: Iman Almomani Walid El-Shafai Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Computer Science Department King Abdullah II School of Information TechnologyThe University of Jordan11942Jordan Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Computer Science Department Applied CollegeImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Computer Science Department College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia
Nowadays,there is tremendous growth in biometric authentication and cybersecurity ***,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private ***,designing a... 详细信息
来源: 评论
Find truth in the hands of the few:acquiring specific knowledge with crowdsourcing
收藏 引用
Frontiers of computer science 2021年 第4期15卷 5-16页
作者: Tao HAN Hailong SUN Yangqiu SONG Yili FANG Xudong LIU SKLSDE Lab School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang UniversityBeijing 100191China Department of Computer Science and Engineering Hong Kong University of Science and TechnologyClearwater BayHong Kong 999077China School of Computer and Information Engineering Zhejiang Gongshang UniversityHangzhou 310018China
Crowdsourcing has been a helpful mechanism to leverage human intelligence to acquire useful ***,when we aggregate the crowd knowledge based on the currently developed voting algorithms,it often results in common knowl... 详细信息
来源: 评论
Unknown Intent Detection Using Multi-Objective Optimization on Deep Learning Classifiers
Unknown Intent Detection Using Multi-Objective Optimization ...
收藏 引用
International Conference on Recent Advances in Natural Language Processing: Deep Learning for Natural Language Processing Methods and Applications, RANLP 2021
作者: Prem, Prerna Ahmad, Zishan Ekbal, Asif Sengupta, Shubhashis Jain, Sakshi C. Ramnani, Roshni Department of Computer Science and Engineering Indian Institute of Technology Patna India Accenture Technology Lab Bangalore India
Modelling and understanding dialogues in a conversation depends on identifying the user intent from the given text. Unknown or new intent detection is a critical task, as in a realistic scenario a user intent may freq... 详细信息
来源: 评论