咨询与建议

限定检索结果

文献类型

  • 10,799 篇 会议
  • 7,325 篇 期刊文献
  • 187 册 图书

馆藏范围

  • 18,311 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,790 篇 工学
    • 9,131 篇 计算机科学与技术...
    • 7,501 篇 软件工程
    • 2,810 篇 信息与通信工程
    • 1,648 篇 控制科学与工程
    • 1,513 篇 生物工程
    • 1,359 篇 电气工程
    • 1,015 篇 生物医学工程(可授...
    • 945 篇 电子科学与技术(可...
    • 899 篇 光学工程
    • 728 篇 机械工程
    • 574 篇 网络空间安全
    • 508 篇 化学工程与技术
    • 487 篇 仪器科学与技术
    • 485 篇 动力工程及工程热...
    • 438 篇 安全科学与工程
    • 428 篇 交通运输工程
  • 6,015 篇 理学
    • 3,159 篇 数学
    • 1,661 篇 生物学
    • 1,536 篇 物理学
    • 1,004 篇 统计学(可授理学、...
    • 610 篇 系统科学
    • 575 篇 化学
  • 3,481 篇 管理学
    • 2,074 篇 管理科学与工程(可...
    • 1,573 篇 图书情报与档案管...
    • 893 篇 工商管理
  • 1,009 篇 医学
    • 853 篇 临床医学
    • 764 篇 基础医学(可授医学...
    • 464 篇 公共卫生与预防医...
    • 443 篇 药学(可授医学、理...
  • 614 篇 法学
    • 486 篇 社会学
  • 304 篇 经济学
  • 279 篇 农学
  • 216 篇 教育学
  • 60 篇 文学
  • 51 篇 艺术学
  • 30 篇 军事学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 564 篇 deep learning
  • 411 篇 feature extracti...
  • 408 篇 computer science
  • 395 篇 accuracy
  • 380 篇 computational mo...
  • 326 篇 machine learning
  • 298 篇 training
  • 270 篇 internet of thin...
  • 251 篇 predictive model...
  • 250 篇 semantics
  • 226 篇 optimization
  • 205 篇 data mining
  • 202 篇 support vector m...
  • 179 篇 real-time system...
  • 176 篇 image segmentati...
  • 168 篇 neural networks
  • 157 篇 data models
  • 151 篇 scalability
  • 149 篇 educational inst...
  • 138 篇 computer archite...

机构

  • 217 篇 institute of com...
  • 173 篇 school of comput...
  • 171 篇 school of comput...
  • 132 篇 school of comput...
  • 120 篇 department of co...
  • 115 篇 department of co...
  • 110 篇 school of comput...
  • 107 篇 school of comput...
  • 102 篇 national enginee...
  • 99 篇 key laboratory o...
  • 99 篇 school of comput...
  • 86 篇 north-west unive...
  • 85 篇 institut univers...
  • 83 篇 national centre ...
  • 81 篇 school of comput...
  • 80 篇 infn sezione di ...
  • 80 篇 university of ch...
  • 79 篇 infn sezione di ...
  • 77 篇 chitkara univers...
  • 75 篇 tno technical sc...

作者

  • 138 篇 hai jin
  • 132 篇 jin hai
  • 101 篇 niyato dusit
  • 90 篇 ferrara g.
  • 90 篇 ardid m.
  • 89 篇 calvo d.
  • 86 篇 chen a.
  • 81 篇 gal t.
  • 81 篇 bozza c.
  • 81 篇 boumaaza j.
  • 80 篇 díaz a.f.
  • 80 篇 coleiro a.
  • 79 篇 gozzini s.r.
  • 77 篇 dallier r.
  • 74 篇 kalekin o.
  • 69 篇 anguita m.
  • 67 篇 boettcher m.
  • 64 篇 enzenhöfer a.
  • 62 篇 huang f.
  • 60 篇 aly z.

语言

  • 17,108 篇 英文
  • 1,038 篇 其他
  • 178 篇 中文
  • 5 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 荷兰文
检索条件"机构=School of Computer Science and Technology Computing"
18311 条 记 录,以下是4911-4920 订阅
排序:
Paid Peering, Settlement-Free Peering, or Both?
Paid Peering, Settlement-Free Peering, or Both?
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Xin Wang Yinlong Xu Richard T. B. Ma School of Computer Science and Technology University of Science and Technology of China School of Computing National University of Singapore
With the rapid growth of congestion-sensitive and data-intensive applications, traditional settlement-free peering agreements with best-effort delivery often do not meet the QoS requirements of content providers (CPs)... 详细信息
来源: 评论
The role of data cap in two-part pricing under market competition
The role of data cap in two-part pricing under market compet...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Xin Wang Richard T. B. Ma Yinlong Xu School of Computer Science and Technology University of Science and Technology of China School of Computing National University of Singapore
Internet services are traditionally priced at flat rates; however, many Internet service providers (ISPs) have recently shifted towards two-part tariffs where a data cap is imposed to restrain data demand from heavy u...
来源: 评论
Performance evaluation of fingerprint biometrics systems for e-business access control  6th
Performance evaluation of fingerprint biometrics systems for...
收藏 引用
6th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2014
作者: Esan, O.A. Osunmakinde, I.O. Ngwira, S.M. Department of Computer System Engineerining Tshwane University of Technology Soshanguve Campus Pretoria South Africa School of Computing College of Science Engineering and Technology University of South Africa UNISA Pretoria South Africa
The performance of a fingerprint authentication system in electronic business depends on the accurate analysis of the quality of input fingerprints. This paper investigates distorted and misaligned fingerprints caused... 详细信息
来源: 评论
Text2NKG: Fine-Grained N-ary Relation Extraction for N-ary relational Knowledge Graph Construction  38
Text2NKG: Fine-Grained N-ary Relation Extraction for N-ary r...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Luo, Haoran Haihong, E. Yang, Yuhao Yao, Tianyu Guo, Yikai Tang, Zichen Zhang, Wentai Peng, Shiyao Wan, Kaiyang Song, Meina Lin, Wei Zhu, Yifan Tuan, Luu Anh School of Computer Science Beijing University of Posts and Telecommunications China School of Automation Science and Electrical Engineering Beihang University China Beijing Institute of Computer Technology and Application China Inspur Group Co. Ltd. China College of Computing and Data Science Nanyang Technological University Singapore
Beyond traditional binary relational facts, n-ary relational knowledge graphs (NKGs) are comprised of n-ary relational facts containing more than two entities, which are closer to real-world facts with broader applica...
来源: 评论
Wireless Sensor Networks: Revolutionizing Explosive Detection  5
Wireless Sensor Networks: Revolutionizing Explosive Detectio...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Sujith Kumar, P.S. Anand, C. Vasuki, N. Ramesh, V. Santhoshkumar, S.P. Sree Buddha College of Engineering Department of Computer Science and Engineering Kerala Alappuzha India Nandha College of Technology Department of Information Technology Erode India Government College of Engineering Department of Computer Science and Engineering Erode India School of Computing Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai Avadi India
One of the important technologies for protecting civilian life from terrorist attacks is explosive detection techniques. The global incidence of terrorist activities has been considerably reduced by the development of... 详细信息
来源: 评论
Support vector guided dictionary learning
收藏 引用
13th European Conference on computer Vision, ECCV 2014
作者: Wang, Ping Cai, Sijia Zuo, Wangmeng Zhang, Lei Cai, Sijia School of Science Tianjin University China School of Computer Science and Technology Harbin Institute of Technology China Dept. Of Computing The Hong Kong Polytechnic University China Dept. Of Applied Mathematics Xidian University China
Discriminative dictionary learning aims to learn a dictionary from training samples to enhance the discriminative capability of their coding vectors. Several discrimination terms have been proposed by assessing the pr... 详细信息
来源: 评论
Intelligent Analysis on Frameworks for Mobile App Development  5
Intelligent Analysis on Frameworks for Mobile App Developmen...
收藏 引用
5th International Conference on Smart Systems and Inventive technology, ICSSIT 2023
作者: Gowri, S. Pappa, C. Kanmani Tamilvizhi, T. Nelson, Leema Surendran, R. Institute of Science and Technology School of Computing Sathyabama Chennai India Veltech Rangarajan Dr Sagunthala RandD Institute of Science and Technology Department of Electronics and Communication Engineering Chennai India Panimalar Engineering College Department of Computer Science and Engineering Chennai India Chitkara University Institute of Engineering and Technology Chitkara University Department of Computer Science and Engineering Punjab India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Chennai India
Establishing new mobile applications that are adaptable across multiple cross platforms is a strenuous task. There are several frameworks for mobile application development existing in the market which has got its own... 详细信息
来源: 评论
Semi-supervised Crowd Counting via Self-training on Surrogate Tasks  1
收藏 引用
16th European Conference on computer Vision, ECCV 2020
作者: Liu, Yan Liu, Lingqiao Wang, Peng Zhang, Pingping Lei, Yinjie College of Electronics and Information Engieering Sichuan University Chengdu China School of Computer Science The University of Adelaide Adelaide Australia School of Computing and Information Technology University of Wollongong Wollongong Australia School of Artificial Intelligence Dalian University of Technology Dalian China
Most existing crowd counting systems rely on the availability of the object location annotation which can be expensive to obtain. To reduce the annotation cost, one attractive solution is to leverage a large number of... 详细信息
来源: 评论
IntNet: A novel framework using reconstructed mutation samples and a biologically informed neural network for pathway analysis
IntNet: A novel framework using reconstructed mutation sampl...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhou, Li Li, Jie Tan, Weilong Harbin Institute of Technology School of Computer Science and Technology Harbin China National Key Laboratory of Smart Farming Technology and Systems College of Computing Harbin Institute of Technology Harbin China Technology Center for Medicines Center for Medicines Nanjing China
Most pathway analysis methods based on simple nucleotide variations overlook mutations occurring in genes outside the pathway, fail to address mutation heterogeneity with targeted measures, and do not consider the fun... 详细信息
来源: 评论
LI4 : Label-Infused Iterative Information Interacting based Fact Verification in Question-answering Dialogue  30
LI4 : Label-Infused Iterative Information Interacting based ...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Zhang, Xiaocheng Wang, Chang Zhao, Guoping Su, Xiaohong Faculty of Computing Harbin Institute of Technology Harbin China School of Computer Science Engineering South China University of Technology Guangzhou China Zhengzhou Esunny Information Technology Co. Ltd. Zhengzhou China
Fact verification constitutes a pivotal application in the effort to combat the dissemination of disinformation, a concern that has recently garnered considerable attention. However, previous studies in the field of f... 详细信息
来源: 评论