咨询与建议

限定检索结果

文献类型

  • 2,662 篇 期刊文献
  • 1,501 篇 会议
  • 3 册 图书

馆藏范围

  • 4,166 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,564 篇 工学
    • 1,712 篇 计算机科学与技术...
    • 1,388 篇 软件工程
    • 594 篇 信息与通信工程
    • 381 篇 生物工程
    • 355 篇 电气工程
    • 295 篇 生物医学工程(可授...
    • 294 篇 控制科学与工程
    • 284 篇 电子科学与技术(可...
    • 237 篇 光学工程
    • 189 篇 化学工程与技术
    • 140 篇 机械工程
    • 97 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 70 篇 建筑学
    • 66 篇 安全科学与工程
    • 61 篇 材料科学与工程(可...
  • 1,809 篇 理学
    • 728 篇 数学
    • 695 篇 物理学
    • 477 篇 生物学
    • 276 篇 统计学(可授理学、...
    • 228 篇 化学
    • 120 篇 系统科学
  • 600 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 253 篇 图书情报与档案管...
    • 160 篇 工商管理
  • 313 篇 医学
    • 255 篇 临床医学
    • 184 篇 基础医学(可授医学...
    • 120 篇 药学(可授医学、理...
    • 94 篇 公共卫生与预防医...
  • 105 篇 法学
    • 84 篇 社会学
  • 79 篇 农学
  • 59 篇 经济学
  • 32 篇 教育学
  • 11 篇 文学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 1 篇 历史学

主题

  • 108 篇 deep learning
  • 101 篇 semantics
  • 92 篇 feature extracti...
  • 90 篇 training
  • 74 篇 hadrons
  • 71 篇 machine learning
  • 69 篇 computational mo...
  • 68 篇 data models
  • 56 篇 accuracy
  • 50 篇 hadron colliders
  • 49 篇 predictive model...
  • 46 篇 graph neural net...
  • 46 篇 hadronic decays
  • 44 篇 federated learni...
  • 40 篇 image segmentati...
  • 40 篇 optimization
  • 40 篇 data mining
  • 38 篇 bottom mesons
  • 36 篇 convolution
  • 35 篇 task analysis

机构

  • 426 篇 department of ph...
  • 412 篇 horia hulubei na...
  • 404 篇 van swinderen in...
  • 400 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 391 篇 cavendish labora...
  • 390 篇 school of physic...
  • 379 篇 university of ch...
  • 376 篇 yandex school of...
  • 360 篇 department of ph...
  • 353 篇 imperial college...
  • 343 篇 stfc rutherford ...
  • 339 篇 center for high ...
  • 335 篇 institute of par...
  • 314 篇 henryk niewodnic...
  • 301 篇 nikhef national ...
  • 293 篇 physik-institut ...
  • 293 篇 oliver lodge lab...
  • 292 篇 school of physic...
  • 288 篇 school of physic...

作者

  • 251 篇 barter w.
  • 248 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 220 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 214 篇 amato s.
  • 212 篇 boettcher t.
  • 210 篇 baryshnikov f.
  • 209 篇 brundu d.
  • 205 篇 braun s.
  • 202 篇 borisyak m.
  • 199 篇 bizzeti a.
  • 192 篇 bencivenni g.
  • 183 篇 back j.j.
  • 179 篇 bay a.
  • 172 篇 bjørn m.

语言

  • 3,763 篇 英文
  • 345 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Engineering and Big Data Research Center"
4166 条 记 录,以下是51-60 订阅
排序:
Soft-GNN:towards robust graph neural networks via self-adaptive data utilization
收藏 引用
Frontiers of computer science 2025年 第4期19卷 1-12页
作者: Yao WU Hong HUANG Yu SONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China College of Information and Communication National University of Defense TechnologyWuhan 430019China Department of Computer Science and Operations Research Universitéde MontréalMontreal H3C 3J7Canada
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h... 详细信息
来源: 评论
TSR-Jack: An In-Browser Crypto-Jacking Detection Method Based on Time Series Representation Learning  26th
TSR-Jack: An In-Browser Crypto-Jacking Detection Method Base...
收藏 引用
26th International Conference on Information and Communications Security, ICICS 2024
作者: Cui, Bo Liu, Shuai Engineering Research Center of Ecological Big Data Ministry of Education Beijing China College of Computer Science Inner Mongolia University Hohhot China
As the economic value of cryptocurrencies continues to ascend, an increasing number of cybercriminals exploit malicious browser scripts to commandeer the system and network resources of victims for unauthorized crypto... 详细信息
来源: 评论
Monte Carlo Simulation-Based Robust Workflow Scheduling for Spot Instances in Cloud Environments
收藏 引用
Tsinghua science and Technology 2024年 第1期29卷 112-126页
作者: Quanwang Wu Jianzhao Fang Jie Zeng Junhao Wen Fengji Luo College of Computer Science Chongqing UniversityChongqing 400044China National Experimental Teaching Demonstration Center Chongqing UniversityChongqing 400044China College of Big Data and Software Engineering Chongqing UniversityChongqing 400044China School of Civil Engineering The University of SydneySydney 2006Australia
When deploying workflows in cloud environments,the use of Spot Instances(SIs)is intriguing as they are much cheaper than on-demand ***,Sls are volatile and may be revoked at any time,which results in a more challengin... 详细信息
来源: 评论
A structural variation genotyping algorithm enhanced by CNV quantitative transfer
收藏 引用
Frontiers of computer science 2022年 第6期16卷 159-165页
作者: Tian ZHENG Xinyang QIAN Jiayin WANG Department of Computer Science and Technology School of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an710049China Institute of Data Science and Information Quality Shaanxi Engineering Research Center of Medical and Health Big DataXi’an Jiaotong UniversityXi’an710049China
Genotyping of structural variations considering copy number variations(CNVs)is an infancy and challenging ***,a prevalent form of critical genetic variations that cause abnormal copy numbers of large genomic regions i... 详细信息
来源: 评论
An overview on IRS-enabled sensing and communications for 6G: architectures, fundamental limits, and joint beamforming designs
收藏 引用
science China(Information sciences) 2025年 第5期68卷 170-193页
作者: Xianxin SONG Yuan FANG Feng WANG Zixiang REN Xianghao YU Ye ZHANG Fan LIU Jie XU Derrick Wing Kwan NG Rui ZHANG Shuguang CUI School of Science and Engineering (SSE) Shenzhen Future Network of Intelligence Institute (FNii-Shenzhen)and Guangdong Provincial Key Laboratory of Future Networks of Intelligence The Chinese University of Hong Kong Department of Electrical Engineering City University of Hong Kong School of Information Engineering Guangdong University of Technology Key Laboratory of Wireless-Optical Communications Chinese Academy of Sciences School of Information Science and Technology University of Science and Technology of China Computer School Beijing Information Science and Technology University National Mobile Communications Research Laboratory School of Information Science and Engineering Southeast University School of Electrical Engineering and Telecommunications University of New South Wales School of Science and Engineering Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Department of Electrical and Computer Engineering National University of Singapore
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactiv... 详细信息
来源: 评论
A power optimization approach for mixed polarity Reed–Muller logic circuits based on multi-strategy fusion memetic algorithm
收藏 引用
Frontiers of Information Technology & Electronic engineering 2025年 第3期26卷 415-426页
作者: Mengyu ZHANG Zhenxue HE Yijin WANG Xiaojun ZHAO Xiaodan ZHANG Limin XIAO Xiang WANG Intelligent Agricultural Equipment Research Institute Hebei Agricultural UniversityBaoding 071001China Key Laboratory of Agricultural Big Data of Hebei Province Hebei Agricultural UniversityBaoding 071001China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Electronic Information Engineering Beihang UniversityBeijing 100191China
The power optimization of mixed polarity Reed–Muller(MPRM)logic circuits is a classic combinatorial optimization *** optimization approaches often suffer from slow convergence and a propensity to converge to local op... 详细信息
来源: 评论
Multi-trial Vector-based Whale Optimization Algorithm
收藏 引用
Journal of Bionic engineering 2024年 第3期21卷 1465-1495页
作者: Mohammad H.Nadimi-Shahraki Hajar Farhanginasab Shokooh Taghian Ali Safaa Sadiq Seyedali Mirjalili Faculty of Computer Engineering Najafabad BranchIslamic Azad UniversityNajafabad***Iran Big Data Research Center Najafabad BranchIslamic Azad UniversityNajafabad***Iran Department of Computer Science Nottingham Trent UniversityNottinghamNG118NSUK Centre for Artificial Intelligence Research and Optimisation Torrens UniversityBrisbane4006Australia
The Whale Optimization Algorithm(WOA)is a swarm intelligence metaheuristic inspired by the bubble-net hunting tactic of humpback *** spite of its popularity due to simplicity,ease of implementation,and a limited numbe... 详细信息
来源: 评论
TIPS:Tailored Information Extraction in Public Security Using Domain-Enhanced Large Language Model
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2555-2572页
作者: Yue Liu Qinglang Guo Chunyao Yang Yong Liao School of Cyber Science and Technology University of Science and Technology of ChinaHefei230026China National Engineering Research Center for Public Safety Risk Perception and Control by Big Data China Academy of Electronics and Information TechnologyBeijing100041China
Processing police incident data in public security involves complex natural language processing(NLP)tasks,including information *** data contains extensive entity information—such as people,locations,and events—whil... 详细信息
来源: 评论
Sketch2Human: Deep Human Generation with Disentangled Geometry and Appearance Constraints
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2024年 PP卷 1-14页
作者: Qu, Linzi Shang, Jiaxiang Ye, Hui Han, Xiaoguang Fu, Hongbo School of Creative Media City University of Hong Kong Hong Kong Department of Computer Science & Engineering HKUST Hong Kong Shenzhen Research Institute of Big Data Chinese University of Hong Kong Shenzhen China
Geometry- and appearance-controlled full-body human image generation is an interesting but challenging task. Existing solutions are either unconditional or dependent on coarse conditions (e.g., pose, text), thus lacki... 详细信息
来源: 评论
PD-YOLO:Colon Polyp Detection Model Based on Enhanced Small-Target Feature Extraction
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 913-928页
作者: Yicong Yu Kaixin Lin Jiajun Hong Rong-Guei Tsai Yuanzhi Huang New Engineering Industry College Putian UniversityPutian351100China Engineering Research Center of Big Data Application in Private Health Medicine(Putian University) Fujian Province UniversityPutian351100China Computer College Guangdong University of Science&TechnologyDongguan523668China
In recent years,the number of patientswith colon disease has increased *** polyps are the precursor lesions of colon *** not diagnosed in time,they can easily develop into colon cancer,posing a serious threat to patie... 详细信息
来源: 评论