咨询与建议

限定检索结果

文献类型

  • 2,632 篇 期刊文献
  • 1,492 篇 会议
  • 3 册 图书

馆藏范围

  • 4,127 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,530 篇 工学
    • 1,685 篇 计算机科学与技术...
    • 1,382 篇 软件工程
    • 587 篇 信息与通信工程
    • 378 篇 生物工程
    • 344 篇 电气工程
    • 296 篇 生物医学工程(可授...
    • 276 篇 电子科学与技术(可...
    • 274 篇 控制科学与工程
    • 244 篇 光学工程
    • 185 篇 化学工程与技术
    • 137 篇 机械工程
    • 98 篇 仪器科学与技术
    • 89 篇 动力工程及工程热...
    • 72 篇 建筑学
    • 63 篇 土木工程
    • 63 篇 安全科学与工程
  • 1,801 篇 理学
    • 728 篇 数学
    • 692 篇 物理学
    • 474 篇 生物学
    • 277 篇 统计学(可授理学、...
    • 223 篇 化学
    • 119 篇 系统科学
  • 592 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 306 篇 医学
    • 252 篇 临床医学
    • 183 篇 基础医学(可授医学...
    • 120 篇 药学(可授医学、理...
    • 93 篇 公共卫生与预防医...
  • 106 篇 法学
    • 85 篇 社会学
  • 79 篇 农学
  • 58 篇 经济学
  • 33 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学
  • 9 篇 军事学
  • 1 篇 历史学

主题

  • 107 篇 deep learning
  • 101 篇 semantics
  • 91 篇 feature extracti...
  • 89 篇 training
  • 74 篇 hadrons
  • 71 篇 machine learning
  • 69 篇 computational mo...
  • 68 篇 data models
  • 55 篇 accuracy
  • 50 篇 hadron colliders
  • 49 篇 predictive model...
  • 46 篇 hadronic decays
  • 44 篇 graph neural net...
  • 44 篇 federated learni...
  • 41 篇 image segmentati...
  • 40 篇 data mining
  • 38 篇 bottom mesons
  • 38 篇 optimization
  • 36 篇 convolution
  • 35 篇 task analysis

机构

  • 426 篇 department of ph...
  • 412 篇 horia hulubei na...
  • 404 篇 van swinderen in...
  • 400 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 392 篇 school of physic...
  • 391 篇 cavendish labora...
  • 378 篇 university of ch...
  • 377 篇 yandex school of...
  • 363 篇 department of ph...
  • 354 篇 imperial college...
  • 344 篇 stfc rutherford ...
  • 340 篇 center for high ...
  • 335 篇 institute of par...
  • 314 篇 henryk niewodnic...
  • 303 篇 nikhef national ...
  • 293 篇 school of physic...
  • 293 篇 physik-institut ...
  • 293 篇 oliver lodge lab...
  • 288 篇 school of physic...

作者

  • 251 篇 barter w.
  • 248 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 221 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 214 篇 amato s.
  • 212 篇 boettcher t.
  • 210 篇 baryshnikov f.
  • 209 篇 brundu d.
  • 206 篇 braun s.
  • 203 篇 borisyak m.
  • 199 篇 bizzeti a.
  • 192 篇 bencivenni g.
  • 185 篇 back j.j.
  • 181 篇 bay a.
  • 172 篇 bjørn m.

语言

  • 3,761 篇 英文
  • 310 篇 其他
  • 69 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Engineering and Big Data Research Center"
4127 条 记 录,以下是251-260 订阅
排序:
BDLR:lncRNA identification using ensemble learning
收藏 引用
BIOCELL 2022年 第4期46卷 951-960页
作者: LEJUN GONG SHEHAI ZHOU JINGMEI CHEN YONGMIN LI LI ZHANG ZHIHONG GAO Jiangsu Key Lab of Big Data Security&Intelligent Processing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210046China Smart Health Big Data Analysis and Location Services Engineering Laboratory of Jiangsu Province Nanjing210046China Zhejiang Engineering Research Center of Intelligent Medicine Wenzhou325035China College of Computer Science and Technology Nanjing Forestry UniversityNanjing210037China
Long non-coding RNAs(lncRNAs)play an important role in many life activities such as epigenetic material regulation,cell cycle regulation,dosage compensation and cell differentiation regulation,and are associated with ... 详细信息
来源: 评论
DDoS Detection and Defense Based on FLAD and SDN  20
DDoS Detection and Defense Based on FLAD and SDN
收藏 引用
20th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Dong, Jie Fang, Wenyu Zheng, Wanling Liu, Jinkun Liu, Yanhua College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou350108 China
In order to achieve more efficient and accurate DDoS detection while ensuring data privacy, this paper proposes a DDoS detection method based on FLAD. Firstly, this paper uses the FLAD algorithm to train a global DDoS... 详细信息
来源: 评论
CITE: Compact Interactive TransformEr for Multilingual Image Captioning  23
CITE: Compact Interactive TransformEr for Multilingual Image...
收藏 引用
6th International Conference on Image and Graphics Processing, ICIGP 2023
作者: Xu, Yueyuan Hu, Zhenzhen Zhou, Yuanen Hao, Shijie Hong, Richang Key Laboratory of Knowledge Engineering with Big Data School of Computer and Information Hefei University of Technology China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei China
Current state-of-the-art image captioning models generate captions in a single language, requiring a combination of multiple language specific models to build a multilingual image captioning system. However, as the nu... 详细信息
来源: 评论
Bayesian Optimization of Double-SAC Robotic Arm Path Planning Using Recent Prioritized Experience Replay  5
Bayesian Optimization of Double-SAC Robotic Arm Path Plannin...
收藏 引用
5th World Robot Conference Symposium on Advanced Robotics and Automation, WRC SARA 2023
作者: Yuan, Shuai Wen, Ke Zhang, Feng Xiong, Jianqiang Shenyang Jianzhu University Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang Branch of National Special Computer Engineering Technology Research Center School of Computer Science and Engineering Shengyang110168 China Shenyang Jianzhu University School of Electrical and Control Engineering Shengyang110168 China
As for the path planning of robotic arms, Deep Reinforcement Learning (DRL) algorithms have recently been developed. However, the high-dimensional action space and state space will result in reward sparsity and low tr... 详细信息
来源: 评论
Channel Capacity and Power Allocation of MIMO Visible Light Communication System
收藏 引用
China Communications 2023年 第2期20卷 122-138页
作者: Shuai Ma Ruixin Yang Guanjie Zhang Hang Li Wen Cao Linqiong Jia Yanyu Zhang Shiyin Li Peng Cheng Laboratory Shenzhen 518055China School of Information and Control Engineering China University of Mining and TechnologyXuzhou 221116China Shenzhen Research Institute of Big Data Shenzhen 518172China School of Electronics and Control Engineering Chang’an UniversityXi’an 710064China School of Electronic and Optical Engineering Nanjing University of Science and TechnologyNanjing 210094China National Digital Switching System Engineering&Technological Research Center Zhengzhou 450000China
In this paper,the channel capacity of the multiple-input multiple-output(MIMO)visible light communication(VLC)system is investigated under the peak,average optical and electrical power *** the channel capacity of MIMO... 详细信息
来源: 评论
PGP: Prior-Guided Pretraining for Small-sample Esophageal Cancer Segmentation
PGP: Prior-Guided Pretraining for Small-sample Esophageal Ca...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Shi, Qinglei Duan, Wenhan Chen, Wanyi Yang, Haotian Lu, Haochen Wu, Kecan Zhu, Junxi Yuan, Juefei Ke, Qiyan Zhang, Andu Wan, Xiang Wang, Changmiao Ruan, Li Wang, Renzhi Chinese University of Hong Kong Shandong University School of Software Jinan China Sino-French School of Engineering Beihang University Beijing China School of Data Science Chinese University of Hong Kong Shenzhen China School of Computer Science Beihang University Beijing China School of Medicine Zhengzhou University Zhengzhou China School of Medicine Chinese University of Hong Kong Shenzhen Shenzhen China Hebei Medical University Fourth Afliated Hospital University Hebei China Shenzhen Research Institute of Big Data Chinese University of Hong Kong Shenzhen China Medical Big Data Lab Shenzhen Research Institute of Big Data Shenzhen China School of Computer Science and Engineering Beihang University Beijing China School of Medicine Chinese University of Hong Kong Shenzhen China
Transformer-based models have demonstrated substantial potential in medical image segmentation tasks due to their exceptional ability to capture long-range dependencies. To further enhance segmentation performance, va... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
Credibility Assessment Based Byzantine-Resilient Decentralized Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-12页
作者: Hou, Jian Wang, Fangyuan Wei, Chunling Huang, Hongyun Hu, Yong Gui, Ning School of Information Science & Technology Zhejiang Sci-Tech University China Beijing Institute of Control Engineering China Center of Multi-Media Big Data of Library Zhejiang Sci-Tech University China School of Computer Science and Engineering Central South University China
Decentralized deep learning has made significant success since it avoids the single point of failure in centralized solutions. However, the system might deviate from the correct model due to Byzantine attacks. Existin... 详细信息
来源: 评论
A topic detection method based on KM-LSH Fusion algorithm and improved BTM model
收藏 引用
Soft Computing 2024年 第19期28卷 11421-11438页
作者: Liu, Wenjun Guo, Huan Gan, Jiaxin Wang, Hai Wang, Hailan Zhang, Chao Peng, Qingcheng Sun, Yuyan Yu, Bao Hou, Mengshu Li, Bo Li, Xiaolei School of Computer and Software Engineering XiHua University Chengdu610039 China Chengdu611731 China Intelligent Policing Key Laboratory of Sichuan Province Sichuan Police College Luzhou646000 China School of Big Data and Artificial Intelligence Chengdu Technological University Chengdu611730 China Sichuan Provincial Engineering Research Center of Hydroelectric Energy Power Equipment Technology Chengdu610039 China
Topic detection is an information processing technology designed to help people deal with the growing problem of data information on the Internet. In the research literature, topic detection methods are used for topic... 详细信息
来源: 评论
λGrapher: A Resource-Efficient Serverless System for GNN Serving through Graph Sharing  24
λGrapher: A Resource-Efficient Serverless System for GNN Se...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Hu, Haichuan Liu, Fangming Pei, Qiangyu Yuan, Yongjie Xu, Zichen Wang, Lin National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab in the School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan China Peng Cheng Laboratory Huazhong University of Science and Technology China School of Mathematics and Computer Science Nanchang University China Paderborn University Paderborn Germany
Graph Neural Networks (GNNs) have been increasingly adopted for graph analysis in web applications such as social networks. Yet, efficient GNN serving remains a critical challenge due to high workload fluctuations and... 详细信息
来源: 评论