咨询与建议

限定检索结果

文献类型

  • 844 篇 会议
  • 459 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 905 篇 工学
    • 615 篇 计算机科学与技术...
    • 500 篇 软件工程
    • 177 篇 信息与通信工程
    • 150 篇 控制科学与工程
    • 92 篇 机械工程
    • 82 篇 电气工程
    • 79 篇 电子科学与技术(可...
    • 78 篇 生物工程
    • 53 篇 光学工程
    • 46 篇 化学工程与技术
    • 44 篇 生物医学工程(可授...
    • 38 篇 仪器科学与技术
    • 38 篇 动力工程及工程热...
    • 32 篇 安全科学与工程
    • 22 篇 交通运输工程
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 21 篇 土木工程
    • 18 篇 冶金工程
  • 437 篇 理学
    • 250 篇 数学
    • 84 篇 生物学
    • 83 篇 物理学
    • 78 篇 系统科学
    • 64 篇 统计学(可授理学、...
    • 41 篇 化学
  • 216 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 34 篇 医学
    • 30 篇 临床医学
    • 23 篇 基础医学(可授医学...
  • 21 篇 法学
  • 17 篇 经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 40 篇 feature extracti...
  • 27 篇 training
  • 24 篇 computer science
  • 22 篇 support vector m...
  • 21 篇 heuristic algori...
  • 19 篇 computational mo...
  • 18 篇 image segmentati...
  • 18 篇 neural networks
  • 18 篇 educational inst...
  • 18 篇 optimization
  • 17 篇 software enginee...
  • 17 篇 wireless sensor ...
  • 16 篇 internet of thin...
  • 16 篇 accuracy
  • 15 篇 algorithm design...
  • 14 篇 deep learning
  • 14 篇 data mining
  • 14 篇 authentication
  • 14 篇 security
  • 14 篇 robustness

机构

  • 137 篇 school of comput...
  • 88 篇 school of comput...
  • 57 篇 school of comput...
  • 52 篇 college of compu...
  • 45 篇 school of electr...
  • 43 篇 beijing key labo...
  • 40 篇 school of comput...
  • 35 篇 department of co...
  • 28 篇 college of intel...
  • 21 篇 school of comput...
  • 20 篇 department of co...
  • 20 篇 school of comput...
  • 18 篇 school of comput...
  • 17 篇 school of mechan...
  • 16 篇 state key labora...
  • 16 篇 seventh research...
  • 16 篇 school of softwa...
  • 15 篇 tianjin key labo...
  • 15 篇 school of softwa...
  • 14 篇 school of comput...

作者

  • 36 篇 junping du
  • 35 篇 yingmin jia
  • 31 篇 wu jigang
  • 28 篇 fashan yu
  • 25 篇 jigang wu
  • 16 篇 xiaofei wang
  • 16 篇 ke yongzhen
  • 15 篇 qin jing
  • 14 篇 shun-yan ren
  • 13 篇 xiuhua li
  • 13 篇 victor c. m. leu...
  • 13 篇 du junping
  • 13 篇 jia yingmin
  • 13 篇 guozhi song
  • 12 篇 yongzhen ke
  • 12 篇 hung chih-cheng
  • 12 篇 yu fashan
  • 11 篇 lianhe yang
  • 10 篇 thambipillai sri...
  • 10 篇 jin-liang wang

语言

  • 1,172 篇 英文
  • 102 篇 其他
  • 34 篇 中文
检索条件"机构=School of Computer Science and Software Engineering Tianjin Polytechnic University"
1309 条 记 录,以下是341-350 订阅
排序:
AGMI: Attention-Guided Multi-omics Integration for Drug Response Prediction with Graph Neural Networks
AGMI: Attention-Guided Multi-omics Integration for Drug Resp...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Feng, Ruiwei Xie, Yufeng Lai, Minshan Chen, Danny Z. Cao, Ji Wu, Jian Zhejiang University Coll. of Computer Science and Technology Hangzhou China Zhejiang University School of Software Technology Hangzhou China Zhejiang University Polytechnic Institute Hangzhou China University of Notre Dame Dept. of Computer Science and Engineering Notre Dame United States Zhejiang University Coll. of Pharmaceutical Sciences Hangzhou China Zhejiang University School of Public Health Hangzhou China
Accurate drug response prediction (DRP) is a crucial yet challenging task in precision medicine. This paper presents a novel Attention-Guided Multi-omics Integration (AGMI) approach for DRP, which first constructs a M... 详细信息
来源: 评论
Network Intrusion Detection System Using Deep Learning Method with KDD Cup'99 Dataset
Network Intrusion Detection System Using Deep Learning Metho...
收藏 引用
IEEE International Symposium on Embedded Multicore Socs (MCSoC)
作者: Jesse Jeremiah Tanimu Mohamed Hamada Patience Robert Anand Mahendran Dept. Of Computer Science Bayero University Kano Kano Nigeria Software Engineering Lab. University of Aizu Aizu Japan Department of Computer Science Federal Polytechnic Bali Bali Nigeria Theoretical Computer Science Lab. Higher School of Economics Moscow Moscow Russia
This work is a deep sparse autoencoder network intrusion detection system which addresses the issue of interpretability of L2 regularization technique used in other works. The proposed model was trained using a mini-b... 详细信息
来源: 评论
Secure and Transparent Public-key Management System for Vehicular Social Networks  6
Secure and Transparent Public-key Management System for Vehi...
收藏 引用
6th IEEE International Conference on computer and Communications, ICCC 2020
作者: Noor, Abdul Wu, Youxi Khan, Salabat School of Artificial Intelligence Hebei University of Technology Tianjin China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
Vehicular Social Networks (VSNs) are expected to become a reality soon, where commuters having common interests in the virtual community of vehicles, drivers, passengers can share information, both about road conditio... 详细信息
来源: 评论
Automatic Sleep Spindle Detection and Analysis in Patients with Sleep Disorders  1
收藏 引用
2nd International Workshop on Human Brain and Artificial Intelligence, HBAI 2020 held in Conjunction with IJCAI-PRICAI 2020
作者: Chen, Chao Zhu, Xuequan Belkacem, Abdelkader Nasreddine Lu, Lin Hao, Long You, Jia Shin, Duk Tan, Wenjun Huang, Zhaoyang Ming, Dong Academy of Medical Engineering and Translational Medicine Tianjin University Tianjin300072 China Key Laboratory of Complex System Control Theory and Application Tianjin University of Technology Tianjin300384 China Department of Computer and Network Engineering College of Information Technology UAE University Al Ain15551 United Arab Emirates Zhonghuan Information College Tianjin University of Technology Tianjin300380 China Department of Electronics and Mechatronics Tokyo Polytechnic University Atsugi243-0297 Japan School of Computer Science and Engineering Northeastern University Shenyang110189 China Department of Neurology Xuanwu Hospital Capital Medical University Beijing100088 China
Nowadays, Sleep disorder is a common disease, and spindle spindles are important features of the second stage non-rapid eye movement (NREM) sleep. In this paper, we propose an improved automatic detection method of sp... 详细信息
来源: 评论
Approximation Algorithm for Connected Submodular Function Maximization Problems
Approximation Algorithm for Connected Submodular Function Ma...
收藏 引用
International Conference on Distributed Computing Systems
作者: Wenzheng Xu He Xue Jing Li Weifa Liang Zichuan Xu Pan Zhou Xiaohua Jia Sajal K. Das College of Computer Science Sichuan University Chengdu P. R. China Sichuan Fire Science and Technology Research Institute of MEM Chengdu P. R. China Department of Computing The Hong Kong Polytechnic University Hong Kong P. R. China Department of Computer Science City University of Hong Kong Hong Kong P. R. China School of Software Dalian University of Technology Dalian P. R. China School of Cyber Science and Engineering Huazhong University of Science & Technology P. R. China Department of Computer Science Missouri University of Science and Technology Rolla USA
In this paper, we study a connected submodular function maximization problem, which arises from many applications including deploying UAV networks to serve users and placing sensors to cover Points of Interest (PoIs).... 详细信息
来源: 评论
Deep High-resolution representation learning for cross-resolution person re-identification
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Guoqing Ge, Yu Dong, Zhicheng Wang, Hao Zheng, Yuhui Chen, Shengyong The School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China The Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology The School of Computer and Software Nanjing University of Information Science and Technology 210044 China The School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China
Person re-identification (re-ID) tackles the problem of matching person images with the same identity from different cameras. In practical applications, due to the differences in camera performance and distance betwee... 详细信息
来源: 评论
Device Activity Detection in mMTC with Low-Resolution ADC: A New Protocol
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Zhaorui Liu, Ya-Feng Wang, Ziyue Liu, Liang Pan, Haoyuan Cui, Shuguang The Future Network of Intelligence Institute The School of Science and Engineering The Chinese University of Hong Kong Shenzhen518172 China The State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China The Department of Electronic and Information Engineering The Hong Kong Polytechnic University Hong Kong College of Computer Science and Software Engineering Shenzhen University Shenzhen China
This paper investigates the effect of low-resolution analog-to-digital converters (ADCs) on device activity detection in massive machine-type communications (mMTC). The low-resolution ADCs induce two challenges on the... 详细信息
来源: 评论
Visual Tuning
arXiv
收藏 引用
arXiv 2023年
作者: Yu, Bruce X.B. Chang, Jianlong Wang, Haixin Liu, Lingbo Wang, Shijie Wang, Zhiyu Lin, Junfan Xie, Lingxi Li, Haojie Lin, Zhouchen Tian, Qi Chen, Chang Wen Zhejiang University University of Illinois Urbana-Champaign Institute Zhejiang University China Huawei China National Engineering Research Center for Software Engineering Peking University China Peng Cheng Laboratory China College of Computer Science and Engineering Shandong University of Science and Technology China National Key Lab of General AI School of Intelligence Science and Technology Peking University China Department of Computing The Hong Kong Polytechnic University Hong Kong
Fine-tuning visual models has been widely shown promising performance on many downstream visual tasks. With the surprising development of pre-trained visual foundation models, visual tuning jumped out of the standard ... 详细信息
来源: 评论
On the comparison of optimal NOMA and OMA in a paradigm shift of emerging technologies
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Ghosh, Joydev Ra, In-Ho Singh, Saurabh Haci, Hüseyin Al-Utaibi, Khaled A. Sait, Sadiq M. School of Computer Science and Robotics Tomsk Polytechnic University Tomsk Russia School of Computer Information and Communication Engineering Kunsan National University Gunsan Korea Republic of Department of Industrial & Systems Engineering Dongguk University Korea Republic of Department of Electrical and Electronics Engineering Near East University Mersin 10 Turkey Computer Science and Software Engineering Department University of Ha’il Saudi Arabia Department of Computer Engineering King Fahd University of Petroleum & Minerals Dhahran Saudi Arabia
Non-orthogonal multiple access (NOMA) is a better multiple access technique than orthogonal multiple access (OMA), precisely orthogonal frequency division multiple access (OFDMA) scheme, at the conceptual level for fi... 详细信息
来源: 评论
Heterophily-Aware Graph Attention Network
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Junfu Guo, Yuanfang Yang, Liang Wang, Yunhong State Key Laboratory of Software Development Environment Beihang University Beijing100191 China School of Computer Science and Engineering Beihang University Beijing100191 China Shen Yuan Honors College Beihang University Beijing100191 China School of Artificial Intelligence Hebei University of Technology Tianjin300401 China Hebei Province Key Laboratory of Big Data Calculation Hebei University of Technology Tianjin300401 China
Graph Neural Networks (GNNs) have shown remarkable success in graph representation learning. Unfortunately, current weight assignment schemes in standard GNNs, such as the calculation based on node degrees or pair-wis... 详细信息
来源: 评论