咨询与建议

限定检索结果

文献类型

  • 2,607 篇 期刊文献
  • 1,513 篇 会议
  • 3 册 图书

馆藏范围

  • 4,123 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,538 篇 工学
    • 1,667 篇 计算机科学与技术...
    • 1,364 篇 软件工程
    • 584 篇 信息与通信工程
    • 377 篇 生物工程
    • 336 篇 电气工程
    • 294 篇 生物医学工程(可授...
    • 275 篇 电子科学与技术(可...
    • 271 篇 控制科学与工程
    • 242 篇 光学工程
    • 185 篇 化学工程与技术
    • 136 篇 机械工程
    • 97 篇 仪器科学与技术
    • 88 篇 动力工程及工程热...
    • 79 篇 核科学与技术
    • 75 篇 建筑学
    • 74 篇 材料科学与工程(可...
  • 1,786 篇 理学
    • 731 篇 数学
    • 690 篇 物理学
    • 471 篇 生物学
    • 288 篇 统计学(可授理学、...
    • 223 篇 化学
    • 118 篇 系统科学
  • 587 篇 管理学
    • 328 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 152 篇 工商管理
  • 300 篇 医学
    • 245 篇 临床医学
    • 177 篇 基础医学(可授医学...
    • 121 篇 药学(可授医学、理...
    • 91 篇 公共卫生与预防医...
  • 107 篇 法学
    • 86 篇 社会学
  • 80 篇 农学
  • 57 篇 经济学
  • 33 篇 教育学
  • 10 篇 艺术学
  • 9 篇 文学
  • 9 篇 军事学
  • 1 篇 历史学

主题

  • 106 篇 deep learning
  • 104 篇 semantics
  • 96 篇 feature extracti...
  • 94 篇 training
  • 74 篇 hadrons
  • 73 篇 computational mo...
  • 70 篇 machine learning
  • 70 篇 data models
  • 62 篇 accuracy
  • 53 篇 federated learni...
  • 50 篇 predictive model...
  • 49 篇 hadron colliders
  • 46 篇 hadronic decays
  • 43 篇 data mining
  • 42 篇 graph neural net...
  • 41 篇 optimization
  • 39 篇 image segmentati...
  • 38 篇 bottom mesons
  • 37 篇 convolution
  • 35 篇 task analysis

机构

  • 426 篇 department of ph...
  • 412 篇 horia hulubei na...
  • 406 篇 van swinderen in...
  • 399 篇 iccub universita...
  • 399 篇 h.h. wills physi...
  • 395 篇 cavendish labora...
  • 395 篇 school of physic...
  • 383 篇 university of ch...
  • 379 篇 yandex school of...
  • 368 篇 department of ph...
  • 360 篇 imperial college...
  • 349 篇 stfc rutherford ...
  • 345 篇 center for high ...
  • 340 篇 institute of par...
  • 314 篇 henryk niewodnic...
  • 301 篇 nikhef national ...
  • 295 篇 physik-institut ...
  • 293 篇 school of physic...
  • 292 篇 oliver lodge lab...
  • 288 篇 school of physic...

作者

  • 251 篇 barter w.
  • 247 篇 bellee v.
  • 241 篇 beiter a.
  • 224 篇 casse g.
  • 222 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 217 篇 bediaga i.
  • 216 篇 amato s.
  • 214 篇 boettcher t.
  • 212 篇 baryshnikov f.
  • 212 篇 braun s.
  • 209 篇 brundu d.
  • 207 篇 borisyak m.
  • 201 篇 bizzeti a.
  • 194 篇 bencivenni g.
  • 188 篇 back j.j.
  • 184 篇 bay a.
  • 174 篇 bjørn m.

语言

  • 3,467 篇 英文
  • 605 篇 其他
  • 64 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Engineering and Big Data Research Center"
4123 条 记 录,以下是541-550 订阅
排序:
Opportunistic Network Routing Strategy Based On Node Sleep Mechanism
Opportunistic Network Routing Strategy Based On Node Sleep M...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Zhuoyuan Li Danjie Bao Xiaodong Xu Feng Zhang Gang Xu College of Computer Science Inner Mongolia University Hohhot China The Engineering Research Center of Ecological Big Data Ministry of Education China School of Computer and Information Technology Shanxi University Taiyuan China
Opportunity networks are wireless AD-hoc networks deployed in complex and harsh environments. To mitigate energy loss in opportunistic network routing, we propose a model called Nodes Sleep Scheduling based on Q-learn... 详细信息
来源: 评论
Finding Simplex Items in data Streams  39
Finding Simplex Items in Data Streams
收藏 引用
39th IEEE International Conference on data engineering, ICDE 2023
作者: Fan, Zhuochen Guo, Jiarui Li, Xiaodong Yang, Tong Zhao, Yikai Wu, Yuhan Cui, Bin Xu, Yanwei Uhlig, Steve Zhang, Gong Peking University School of Computer Science National Engineering Laboratory for Big Data Analysis Technology and Application Beijing China Peng Cheng Laboratory Shenzhen China Central Research Institute 2012 Labs Huawei Technologies Co. Ltd. Theory Lab Hong Kong Queen Mary University of London School of Electronic Engineering and Computer Science London United Kingdom
In this paper, we propose a new type of item in data streams, called simplex items. Simplex items have frequencies in consecutive p windows that can be approximated by a polynomial of degree at most k, where k = 0, 1,... 详细信息
来源: 评论
FedEdge: Accelerating Edge-Assisted Federated Learning  23
FedEdge: Accelerating Edge-Assisted Federated Learning
收藏 引用
32nd ACM World Wide Web Conference, WWW 2023
作者: Wang, Kaibin He, Qiang Chen, Feifei Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Federated learning (FL) has been widely acknowledged as a promising solution to training machine learning (ML) model training with privacy preservation. To reduce the traffic overheads incurred by FL systems, edge ser... 详细信息
来源: 评论
Latest Technologies on dataset Distillation: A Survey  11
Latest Technologies on Dataset Distillation: A Survey
收藏 引用
11th International Conference on Information Technology and Quantitative Management, ITQM 2024
作者: Li, Muyang Qu, Yi Shi, Yong Research Center on Fictitious Economy and Data Science Chinese Academy of Sciences Beijing100190 China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing100190 China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100190 China School of Economics and Management University of Chinese Academy of Sciences Beijing100190 China College of Information Science and Technology University of Nebraska at Omaha OmahaNE68182 United States
dataset distillation refers to the process of constructing a smaller dataset based on a larger dataset, so that the training model with the smaller dataset can obtain similar results to the larger dataset. In this pap... 详细信息
来源: 评论
Federated privacy computing based on oblivious transfer in financial applications: A case study in credit risk management  3
Federated privacy computing based on oblivious transfer in f...
收藏 引用
3rd International Symposium on computer Applications and Information Systems, ISCAIS 2024
作者: Liang, Jian Quan, Fan Yang, Suyi Tao, Ping Ge, Fei Li, Hualin School of Software and Artificial Intelligence Chongqing Institute of Engineering Chongqing China Intelligent Application of Financial Big Data Chongqing Colleges Universities Engineering Research Center Chongqing China Shu Yi Xin Credit Management Co LTD Chongqing China School of Information and Communication Studies University College Dublin Dublin Ireland Department of Statistics and Data Science University of California Los Angeles United States
Invoice data is critical and highly sensitive for enterprises, yet it stands as one of the most extensively used data categories in the financial credit sector. Participants in the credit market, engaged in corporate ... 详细信息
来源: 评论
Meta-CQG: A Meta-Learning Framework for Complex Question Generation over Knowledge Bases  29
Meta-CQG: A Meta-Learning Framework for Complex Question Gen...
收藏 引用
29th International Conference on Computational Linguistics, COLING 2022
作者: Zhang, Kun Qiu, Yunqi Wang, Yuanzhuo Bai, Long Li, Wei Jiang, Xuhui Shen, Huawei Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China Big Data Academy Zhongke Baidu Inc
Complex question generation over knowledge bases (KB) aims to generate natural language questions involving multiple KB relations or functional constraints. Existing methods train one encoder-decoder-based model to fi... 详细信息
来源: 评论
Proving Linearizability of Concurrent Queues
收藏 引用
Journal of computers (Taiwan) 2024年 第5期35卷 91-103页
作者: Peng, Jie Wen, Tangliu Jiang, Dongming Department of Information Engineering Gannan University of Science and Technology Ganzhou China Ganzhou Cloud Computing and Big Data Research Center Ganzhou China School of Big Data Jiangxi Science & Technology Normal University Nanchang China
Linearizability is a commonly accepted correctness criterion for concurrent data structures. Concurrent queues are among the most fundamental concurrent data structures. In this paper, we present necessary and suffici... 详细信息
来源: 评论
Enhanced prairie dog optimization with Levy flight and dynamic opposition-based learning for global optimization and engineering design problems
收藏 引用
Neural Computing and Applications 2024年 第19期36卷 11137-11170页
作者: Biswas, Saptadeep Shaikh, Azharuddin Ezugwu, Absalom El-Shamir Greeff, Japie Mirjalili, Seyedali Bera, Uttam Kumar Abualigah, Laith Department of Mathematics National Institute of Technology Agartala Tripura Agartala India Unit for Data Science and Computing North-West University 11 Hoffman Street Potchefstroom2520 South Africa Faculty of Natural and Agricultural Sciences School of Computer Science and Information Systems North-West University Vanderbijlpark South Africa Centre for Artificial Intelligence Research and Optimization Torrens University Australia Fortitude Valley BrisbaneQLD4006 Australia Research Center University of Tabuk Tabuk71491 Saudi Arabia Computer Science Department Al al-Bayt University Mafraq25113 Jordan Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman19328 Jordan Applied Science Research Center Applied Science Private University Amman11931 Jordan Department of Electrical and Computer Engineering Lebanese American University Byblos13-5053 Lebanon School of Engineering and Technology Sunway University Malaysia Petaling Jaya27500 Malaysia College of Engineering Yuan Ze University Taoyuan32003 Taiwan MEU Research Unit Middle East University Amman11831 Jordan
This study proposes a new prairie dog optimization algorithm version called EPDO. This new version aims to address the issues of premature convergence and slow convergence that were observed in the original PDO algori... 详细信息
来源: 评论
Predicting Genotype Information Related to COVID-19 for Molecular Mechanism Based on Computational Methods
收藏 引用
computer Modeling in engineering & sciences 2021年 第10期129卷 31-45页
作者: Lejun Gong Xingxing Zhang Li Zhang Zhihong Gao Jiangsu Key Laboratory of Big Data Security&Intelligent Processing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210046China Smart Health Big Data Analysis and Location Services Engineering Laboratory of Jiangsu Province Nanjing210046China College of Computer Science and Technology Nanjing Forestry UniversityNanjing210037China Zhejiang Engineering Research Center of Intelligent Medicine Wenzhou325035China
Novel coronavirus disease 2019(COVID-19)is an ongoing health *** studies are related to ***,its molecular mechanism remains *** rapid publication of COVID-19 provides a new way to elucidate its mechanism through compu... 详细信息
来源: 评论
A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 22301-22309页
作者: Mahmood, Khalid Ghaffar, Zahid Farooq, Muhammad Yahya, Khalid Das, Ashok Kumar Chaudhry, Shehzad Ashraf National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan National Yunlin University Of Science And Technology Graduate School Of Engineering Science And Technology Douliu64002 Taiwan Abu Dhabi University Department Of Mathematics And Statistics College Of Arts And Sciences Abu Dhabi United Arab Emirates Istanbul Gelisim University Department Of Electrical And Electronics Engineering Istanbul34310 Turkey Sabratah University Department Of Electrical Engineering Faculty Of Engineering Regdalen Libya Center For Security Theory And Algorithmic Research Hyderabad500 032 India Abu Dhabi University Department Of Computer Science And Information Technology College Of Engineering Abu Dhabi United Arab Emirates Nisantasi University Faculty Of Engineering And Architecture Department Of Software Engineering Istanbul34398 Turkey
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with... 详细信息
来源: 评论