咨询与建议

限定检索结果

文献类型

  • 65,927 篇 会议
  • 43,082 篇 期刊文献
  • 784 册 图书

馆藏范围

  • 109,793 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 69,206 篇 工学
    • 43,351 篇 计算机科学与技术...
    • 35,387 篇 软件工程
    • 16,133 篇 信息与通信工程
    • 10,726 篇 控制科学与工程
    • 9,230 篇 电气工程
    • 8,714 篇 电子科学与技术(可...
    • 7,515 篇 生物工程
    • 5,612 篇 机械工程
    • 5,522 篇 光学工程
    • 5,283 篇 化学工程与技术
    • 5,214 篇 生物医学工程(可授...
    • 3,875 篇 动力工程及工程热...
    • 3,851 篇 材料科学与工程(可...
    • 3,763 篇 仪器科学与技术
    • 2,680 篇 交通运输工程
    • 2,551 篇 网络空间安全
    • 2,387 篇 安全科学与工程
  • 38,809 篇 理学
    • 19,062 篇 数学
    • 12,413 篇 物理学
    • 8,514 篇 生物学
    • 6,268 篇 统计学(可授理学、...
    • 5,216 篇 化学
    • 3,892 篇 系统科学
  • 17,589 篇 管理学
    • 11,265 篇 管理科学与工程(可...
    • 6,960 篇 图书情报与档案管...
    • 4,498 篇 工商管理
  • 5,010 篇 医学
    • 4,040 篇 临床医学
    • 3,589 篇 基础医学(可授医学...
    • 2,190 篇 药学(可授医学、理...
  • 2,714 篇 法学
    • 2,206 篇 社会学
  • 1,809 篇 经济学
  • 1,395 篇 农学
  • 972 篇 教育学
  • 441 篇 文学
  • 255 篇 军事学
  • 207 篇 艺术学
  • 10 篇 哲学
  • 7 篇 历史学

主题

  • 2,766 篇 feature extracti...
  • 2,762 篇 accuracy
  • 2,471 篇 deep learning
  • 2,391 篇 training
  • 2,236 篇 computational mo...
  • 2,000 篇 computer science
  • 1,784 篇 machine learning
  • 1,585 篇 optimization
  • 1,390 篇 predictive model...
  • 1,374 篇 semantics
  • 1,194 篇 data models
  • 1,187 篇 internet of thin...
  • 1,151 篇 support vector m...
  • 1,146 篇 real-time system...
  • 1,139 篇 convolutional ne...
  • 1,128 篇 data mining
  • 1,100 篇 neural networks
  • 1,004 篇 image segmentati...
  • 911 篇 artificial intel...
  • 865 篇 educational inst...

机构

  • 2,471 篇 school of comput...
  • 1,548 篇 school of comput...
  • 1,367 篇 school of comput...
  • 1,087 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 985 篇 school of comput...
  • 947 篇 physikalisches i...
  • 935 篇 oliver lodge lab...
  • 861 篇 university of ch...
  • 697 篇 school of comput...
  • 579 篇 school of comput...
  • 547 篇 chitkara univers...
  • 538 篇 fakultät physik ...
  • 533 篇 horia hulubei na...
  • 530 篇 school of physic...
  • 530 篇 school of physic...
  • 520 篇 department of ph...
  • 516 篇 imperial college...
  • 508 篇 h.h. wills physi...
  • 505 篇 school of optica...

作者

  • 276 篇 niyato dusit
  • 269 篇 a. gomes
  • 262 篇 barter w.
  • 248 篇 c. alexa
  • 246 篇 j. m. izen
  • 244 篇 g. bella
  • 242 篇 j. strandberg
  • 240 篇 c. amelung
  • 239 篇 d. calvet
  • 239 篇 beiter a.
  • 236 篇 blake t.
  • 233 篇 s. chen
  • 229 篇 bellee v.
  • 229 篇 bowcock t.j.v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 221 篇 brundu d.
  • 221 篇 borsato m.
  • 220 篇 boettcher t.
  • 214 篇 bencivenni g.

语言

  • 94,129 篇 英文
  • 13,488 篇 其他
  • 2,249 篇 中文
  • 68 篇 日文
  • 25 篇 德文
  • 24 篇 法文
  • 8 篇 朝鲜文
  • 8 篇 斯洛文尼亚文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=School of Computer Science and Engineering Hunan University of Science and Technology"
109793 条 记 录,以下是891-900 订阅
排序:
Prediction of Social Influence in Social Networks  17
Prediction of Social Influence in Social Networks
收藏 引用
IEEE Congress on Cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
作者: Chen, Shiyu Li, Qianmu Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing China
Social influence is an individual's ability to change the thoughts or behaviors of others due to factors such as social status, social connections, and social wealth. Studying social influence, especially modeling... 详细信息
来源: 评论
Q2Cypher: Converting Natural Language Questions to Cypher with Fine-Tuned Large Language Models  5
Q2Cypher: Converting Natural Language Questions to Cypher wi...
收藏 引用
5th International Conference on Artificial Intelligence and computer engineering, ICAICE 2024
作者: Zou, Yunqi Wang, Yongli Liu, Dongmei School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
Knowledge Base Question Answering (KBQA) intends to obtain credible answers to natural language questions based on knowledge bases. Knowledge graphs, also known as graph databases, explicitly present a large amount of... 详细信息
来源: 评论
Method for Relation Extraction Based on Entity Boundary Features  24
Method for Relation Extraction Based on Entity Boundary Feat...
收藏 引用
2024 7th International Conference on computer Information science and Artificial Intelligence, CISAI 2024
作者: Wang, Zining Ge, Jike Yang, Xiaolu Tan, Jie Xiang, Yu School of Computer Science and Engineering Chongqing University of Science and Technology Chongqing China
As a key task in natural language processing, the current knowledge extraction methods mostly involve joint extraction, simultaneously extracting named entities and relationships. When conducting relationship extracti... 详细信息
来源: 评论
Reasonable Gradients for Online Training Algorithms in Spiking Neural Networks  27
Reasonable Gradients for Online Training Algorithms in Spiki...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Xue, Lang Liu, HanWen Wang, Jing Qu, Hong School of Computer Science and Engineering University of Electronic Science and Technology of China China
Spiking neural networks (SNNs) have the potential to simulate sparse and spatio-temporal dynamics observed in biological neurons, making them promising for achieving energy-efficient artificial general intelligence. W... 详细信息
来源: 评论
Multi-Modal Knowledge Graph Completion Enhanced by Muti-Level Attention Mechanisms  3
Multi-Modal Knowledge Graph Completion Enhanced by Muti-Leve...
收藏 引用
3rd International Conference on Cloud Computing, Big Data Application and Software engineering, CBASE 2024
作者: Zhang, Tingting Wang, Yongli Liu, Dongmei School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
Multimodel knowledge graph completion (MKGC) aims to predict missing entities in MKGs. Differing from prior Single-model knowledge graph completion efforts, MKGC leverages rich textual descriptions, images, and other ... 详细信息
来源: 评论
Fitness Sharing Chaotic Particle Swarm Optimization (FSCPSO): A Metaheuristic Approach for Allocating Dynamic Virtual Machine (VM) in Fog Computing Architecture
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2557-2578页
作者: Prasanna Kumar Kannughatta Ranganna Siddesh Gaddadevara Matt Chin-Ling Chen Ananda Babu Jayachandra Yong-Yuan Deng Department of Computer Science&Engineering Ramaiah Institute of TechnologyBangalore560054India Department of Artificial Intelligence&Data Science Ramaiah Institute of TechnologyBangalore560054India School of Information Engineering Changchun Sci-Tech UniversityChangchun130600China Department of Computer Science and Information Engineering Chaoyang University of TechnologyTaichung41349Taiwan Department of Information Science and Engineering Malnad College of EngineeringHassan573202India
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essenti... 详细信息
来源: 评论
A Few-Shot and Anti-Forgetting Network Intrusion Detection System based on Online Meta Learning
A Few-Shot and Anti-Forgetting Network Intrusion Detection S...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Wang, Zhen Lu, Yifei Wu, Wenxin Lu, Yun Wang, Hongxiang Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing China
In the actual Internet of Things (IoT) environment, the proportion of abnormal behavior is much lower than that of normal behavior, and abnormal samples are often scarce, so it is a significant challenge to train effi... 详细信息
来源: 评论
A Hessian Recovery Based Linear Finite Element Method for Molecular Beam Epitaxy Growth Model with Slope Selection
收藏 引用
Advances in Applied Mathematics and Mechanics 2024年 第1期16卷 1-23页
作者: Minqiang Xu Qingsong Zou College of Science Zhejiang University of TechnologyHangzhouZhejiang 310023China School of Computer Science and Engineering Sun Yat-Sen UniversityGuangzhouGuangdong 510275China School of Computer Science and Engineering and Guangdong Province Key Laboratory of Computational ScienceSun Yat-Sen UniversityGuangzhouGuangdong 510275China
In this paper,we present a Hessian recovery based linear finite element method to simulate the molecular beam epitaxy growth model with slope *** the time discretization,we apply a first-order convex splitting method ... 详细信息
来源: 评论
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4417-4452页
作者: Fauziyah Zhaoshun Wang Mujahid Tabassum School of Computer and Communication Engineering University of Science and TechnologyBeijing100000China Noroff School of Technology and Digital Media(Noroff Accelerate) Noroff University CollegeKristiansand4612Norway
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is *** cyber threats evolve in complexity,traditional cryptographic methods face in... 详细信息
来源: 评论
Forecasting Cloud Workload through Reinforcement Learning-Based Ensemble Model  4
Forecasting Cloud Workload through Reinforcement Learning-Ba...
收藏 引用
4th International Conference on Electronic Information engineering and computer Communication, EIECC 2024
作者: Kang, Yuliang Li, Yongke Zhang, Gongxuan Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing China
The escalating demand for cloud computing has intensified the need for accurate workload forecasting to optimize resource allocation and maintain service quality. This paper presents a novel approach employing a reinf... 详细信息
来源: 评论