咨询与建议

限定检索结果

文献类型

  • 2,667 篇 期刊文献
  • 1,526 篇 会议
  • 3 册 图书

馆藏范围

  • 4,196 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,547 篇 工学
    • 1,693 篇 计算机科学与技术...
    • 1,379 篇 软件工程
    • 595 篇 信息与通信工程
    • 377 篇 生物工程
    • 363 篇 电气工程
    • 295 篇 生物医学工程(可授...
    • 286 篇 控制科学与工程
    • 278 篇 电子科学与技术(可...
    • 242 篇 光学工程
    • 185 篇 化学工程与技术
    • 139 篇 机械工程
    • 100 篇 仪器科学与技术
    • 88 篇 动力工程及工程热...
    • 74 篇 建筑学
    • 67 篇 安全科学与工程
    • 65 篇 土木工程
  • 1,805 篇 理学
    • 722 篇 数学
    • 693 篇 物理学
    • 476 篇 生物学
    • 274 篇 统计学(可授理学、...
    • 226 篇 化学
    • 118 篇 系统科学
  • 600 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 313 篇 医学
    • 256 篇 临床医学
    • 182 篇 基础医学(可授医学...
    • 123 篇 药学(可授医学、理...
    • 93 篇 公共卫生与预防医...
  • 107 篇 法学
    • 86 篇 社会学
  • 82 篇 农学
  • 59 篇 经济学
  • 34 篇 教育学
  • 11 篇 艺术学
  • 10 篇 文学
  • 9 篇 军事学
  • 1 篇 历史学

主题

  • 109 篇 deep learning
  • 106 篇 semantics
  • 99 篇 feature extracti...
  • 95 篇 training
  • 75 篇 computational mo...
  • 74 篇 hadrons
  • 73 篇 machine learning
  • 71 篇 data models
  • 65 篇 accuracy
  • 53 篇 federated learni...
  • 50 篇 predictive model...
  • 50 篇 hadron colliders
  • 46 篇 data mining
  • 46 篇 hadronic decays
  • 42 篇 optimization
  • 42 篇 graph neural net...
  • 39 篇 image segmentati...
  • 38 篇 bottom mesons
  • 37 篇 convolution
  • 35 篇 task analysis

机构

  • 425 篇 department of ph...
  • 411 篇 horia hulubei na...
  • 405 篇 van swinderen in...
  • 398 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 392 篇 school of physic...
  • 389 篇 cavendish labora...
  • 379 篇 university of ch...
  • 378 篇 yandex school of...
  • 362 篇 department of ph...
  • 352 篇 imperial college...
  • 341 篇 stfc rutherford ...
  • 339 篇 center for high ...
  • 334 篇 institute of par...
  • 312 篇 henryk niewodnic...
  • 299 篇 nikhef national ...
  • 290 篇 physik-institut ...
  • 289 篇 school of physic...
  • 289 篇 oliver lodge lab...
  • 285 篇 school of physic...

作者

  • 250 篇 barter w.
  • 247 篇 bellee v.
  • 240 篇 beiter a.
  • 223 篇 casse g.
  • 222 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 215 篇 amato s.
  • 212 篇 boettcher t.
  • 211 篇 baryshnikov f.
  • 208 篇 brundu d.
  • 208 篇 braun s.
  • 204 篇 borisyak m.
  • 200 篇 bizzeti a.
  • 191 篇 bencivenni g.
  • 184 篇 back j.j.
  • 179 篇 bay a.
  • 173 篇 bjørn m.

语言

  • 3,297 篇 英文
  • 848 篇 其他
  • 68 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Engineering and Big Data Research Center"
4196 条 记 录,以下是701-710 订阅
排序:
IF-Font: ideographic description sequence-following font generation  24
IF-Font: ideographic description sequence-following font gen...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xinping Chen Xiao Ke Wenzhong Guo Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou University Fuzhou China and Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China
Few-shot font generation (FFG) aims to learn the target style from a limited number of reference glyphs and generate the remaining glyphs in the target font. Previous works focus on disentangling the content and style...
来源: 评论
EABC: Energy-aware Centrality-based Caching for Named data Networking in the IoT
EABC: Energy-aware Centrality-based Caching for Named Data N...
收藏 引用
IEEE International Symposium on World of Wireless Mobile and Multimedia Networks (WoWMoM)
作者: Xingyun He Hu Liu Wuyungerile Li Alvin Valera Winston K.G. Seah Inner Mongolia Key Lab. of Wireless Networking & Mobile Computing Engineering Research Center of Ecological Big Data Ministry of Education School of Computer Science Inner Mongolia University Hohhot China Wireless Networks Research Group School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand
Named data Networking (NDN) is an information-centric internet architecture that delivers packets based on the name of the content in the packet. A key component of NDN is the caching strategy designed to reduce total... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Successive Pose Estimation and Beam Tracking for mmWave Vehicular Communication Systems
Successive Pose Estimation and Beam Tracking for mmWave Vehi...
收藏 引用
2023 IEEE Globecom Workshops, GC Wkshps 2023
作者: Liu, Cen Zhu, Guangxu Liu, Fan Liu, Yuanwei Huang, Kaibin National University of Singapore Department of Electrical and Computer Engineering Singapore Shenzhen Research Institute of Big Data Shenzhen China Peng Cheng Laboratory Shenzhen China Guangzhou China Southern University of Science and Technology Department of Electronic and Electrical Engineering Shenzhen China School of Electronic Engineering and Computer Science Queen Mary University of London London United Kingdom The University of Hong Kong Department of Electrical and Electronic Engineering Hong Kong
The millimeter wave (mmWave) radar sensing-aided communications in vehicular mobile communication systems is investigated. To alleviate the beam training overhead under high mobility scenarios, a successive pose estim... 详细信息
来源: 评论
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding  9
Visible Light Positioning Method for Indoor Line-of-Sight Sc...
收藏 引用
9th IEEE International Conference on data science in Cyberspace, DSC 2024
作者: Yu, Yonghao Guo, Yongde Zhao, Dawei Fu, Kexue Tang, Yongwei Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong University School of Mechanical Engineering Key Laboratory of High Efficiency and Clean Mechanical Manufacture Ministry of Education Jinan China
Existing indoor visible light positioning methods, such as those based on fingerprint database algorithms, are complex to construct and consume significant resources. In response to this issue, the text proposes an en... 详细信息
来源: 评论
Text-guided HuBERT: Self-Supervised Speech Pre-training via Generative Adversarial Networks
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Duo Yue, Xianghu Ao, Junyi Gao, Xiaoxue Li, Haizhou Shenzhen Research Institute of Big Data School of Data Science The Chinese University of Hong Kong Shenzhen518172 China Department of Electrical and Computer and Engineering National University of Singapore Singapore119077 Singapore
Human language can be expressed in either written or spoken form, i.e. text or speech. Humans can acquire knowledge from text to improve speaking and listening. However, the quest for speech pre-trained models to leve... 详细信息
来源: 评论
IKGN: Intention-aware Knowledge Graph Network for POI Recommendation
IKGN: Intention-aware Knowledge Graph Network for POI Recomm...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Xiaoyu Zhu Chenyang Bu Bingbing Dong Shengwei Ji Yi He Xindong Wu Key Laboratory of Knowledge Engineering with Big Data (the Ministry of Education of China) Hefei University of Technology School of Computer Science and Information Engineering Hefei University of Technology China School of Artificial Intelligence and Big Data Hefei University China Department of Computer Science Old Dominion University USA Research Center for Knowledge Engineering Zhejiang Lab China
Point-of-Interest (POI) recommendation, pivotal for guiding users to their next interested locale, grapples with the persistent challenge of data sparsity. Whereas knowledge graphs (KGs) have emerged as a favored tool...
来源: 评论
Heterogeneous graph completion collaborative network for attribute-missing heterogeneous graph representation learning
收藏 引用
Expert Systems with Applications 2025年 290卷
作者: Yang, Yuanjun Ou, Weihua Fu, Sichao Chen, Jiamin Wu, Yunshun School of Mathematical Sciences Guizhou Normal University Guiyang China School of Big Data and Computer Science Guizhou Normal University Guiyang China School of Electronic Information and Communication Huazhong University of Science and Technology Hubei China Engineering Research Center of Micro-Nano and Intelligent Manufacturing Ministry of Education Kaili Guizhou China
Heterogeneous graph representation learning has attracted significant attention and found widespread application in various real-world scenarios. Due to various uncontrollable factors, heterogeneous graph data often s... 详细信息
来源: 评论
FC-NT: A crime prediction algorithm incorporating formal context and neural networks  3
FC-NT: A crime prediction algorithm incorporating formal con...
收藏 引用
3rd International Conference on Advanced Algorithms and Signal Image Processing, AASIP 2023
作者: Zao, Feifei Lv, Lingling Ding, Feng Jin, Shixian Guo, Xiaoding Henan Province Engineering Research Center of Spatial Information Processing Henan Key Laboratory of Big Data Analysis and Processing School of Computer and Information Engineering Henan University Zhengzhou450046 China School of Electrical Engineering North China University of Water Resources and Electric Power Zhengzhou450046 China School of Internet of Things Engineering Jiangnan University Wuxi214122 China Henan Provincial Educational Resources Guarantee Center Zhengzhou450003 China
The task of crime prediction is to predict the charges of a case based on the given description of the case, which has become a research hot spot. Most of the existing methods use neural networks and machine learning ... 详细信息
来源: 评论
Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture
收藏 引用
Journal of Advanced research 2024年 62卷 155-163页
作者: Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Kharel, Rupak Das, Ashok Kumar Shetty, Sachin Rodrigues, Joel J.P.C. School of Psychology and Computer Science University of Central Lancashire Preston United Kingdom Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Yunlin 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan Department of Computer Science University of Sahiwal Punjab Sahiwal 57000 Pakistan Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India Department of Modeling Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center and Center for Cybersecurity Education and Research Old Dominion University Suffolk 23435 VA United States COPELABS Lusófona University Campo Grande 376 Lisbon 1749-024 Portugal
Introduction: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical... 详细信息
来源: 评论