咨询与建议

限定检索结果

文献类型

  • 2,061 篇 期刊文献
  • 1,853 篇 会议
  • 1 册 图书

馆藏范围

  • 3,915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,593 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 1,354 篇 软件工程
    • 657 篇 信息与通信工程
    • 356 篇 电气工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 280 篇 控制科学与工程
    • 254 篇 光学工程
    • 195 篇 机械工程
    • 186 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 87 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 65 篇 材料科学与工程(可...
    • 62 篇 安全科学与工程
    • 61 篇 建筑学
  • 1,496 篇 理学
    • 705 篇 数学
    • 562 篇 物理学
    • 310 篇 生物学
    • 222 篇 统计学(可授理学、...
    • 165 篇 化学
    • 100 篇 系统科学
  • 602 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 269 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 160 篇 医学
    • 128 篇 临床医学
    • 108 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 90 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 129 篇 feature extracti...
  • 112 篇 semantics
  • 95 篇 deep learning
  • 80 篇 training
  • 79 篇 accuracy
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 53 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 42 篇 object detection
  • 40 篇 image segmentati...
  • 40 篇 visualization
  • 39 篇 contrastive lear...
  • 38 篇 convolutional ne...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 36 篇 machine learning

机构

  • 269 篇 iccub universita...
  • 269 篇 university of ch...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 257 篇 infn sezione di ...
  • 254 篇 h.h. wills physi...
  • 253 篇 van swinderen in...
  • 253 篇 infn sezione di ...
  • 250 篇 horia hulubei na...
  • 243 篇 department of ph...
  • 236 篇 imperial college...
  • 236 篇 institute of par...
  • 233 篇 stfc rutherford ...
  • 225 篇 shandong provinc...
  • 218 篇 infn sezione di ...
  • 207 篇 ds4ds la salle u...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 153 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 151 篇 bowcock t.j.v.
  • 150 篇 barbetti m.
  • 150 篇 byczynski w.
  • 150 篇 bencivenni g.

语言

  • 3,497 篇 英文
  • 331 篇 其他
  • 94 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3915 条 记 录,以下是371-380 订阅
排序:
Cluster-Phys: Facial Clues Clustering Towards Efficient Remote Physiological Measurement  24
Cluster-Phys: Facial Clues Clustering Towards Efficient Remo...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Qia, Nwei Li, Kun Guo, Dan Hu, Bin Wang, Meng School of Computer Science and Information Engineering School of Artificial Intelligence Hefei University of Technology Hefei China CCAI Zhejiang University Hangzhou China Hefei Comprehensive National Science Center Hefei China Gansu Provincial Key Laboratory of Wearable Computing School of Information Science and Engineering Lanzhou University Lanzhou China
Remote photoplethysmography (rPPG) measurement aims to estimate physiological signals by analyzing subtle skin color changes induced by heartbeats in facial videos. Existing methods primarily rely on the fundamental v... 详细信息
来源: 评论
Research on Pedestrian Detection Based on Improved YOLOv3  7
Research on Pedestrian Detection Based on Improved YOLOv3
收藏 引用
2022 7th International Conference on Electronic technology and Information science, ICETIS 2022
作者: Wang, Hansong Liang, Quan Xiong, Neng Hu, Jinjing School of Computer Science and Mathematics Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Ming and Application Fuzhou China
The YOLOv3 algorithm is an anchor-based algorithm, which is difficult to cover all shapes of targets. It is often necessary to perform cluster analysis to determine the optimal anchors before training. These anchors h... 详细信息
来源: 评论
Short-term power load forecasting based on BP neural network optimized by genetic algorithm  7
Short-term power load forecasting based on BP neural network...
收藏 引用
2022 7th International Conference on Electronic technology and Information science, ICETIS 2022
作者: Xiong, Neng Liang, Quan Xiong, Neng Yu, Wenze Hong, Chuanbo Wang, Hansong School of Computer Science and Mathematics Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications Fuzhou China
Accurate short-term power load forecasting is of great significance to the safe operation of power systems. Aiming at the defects of traditional BP neural network that it is easy to fall into local optimization and lo... 详细信息
来源: 评论
A Verifiable Privacy-Preserving Outsourced Prediction Scheme Based on Blockchain in Smart Healthcare
A Verifiable Privacy-Preserving Outsourced Prediction Scheme...
收藏 引用
2023 IEEE International Conference on E-Health Networking, Application and Services, Healthcom 2023
作者: Li, Ta Tian, Youliang Xiong, Jinbo Wang, Linjie College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou350117 China School of Data Science Tongren University Tongren554300 China
The swift progression of the Internet of Things and the extensive integration of machine learning have spurred the growth of intelligent healthcare. Many intelligent healthcare devices, limited by their own computing ... 详细信息
来源: 评论
HUNTER: Releasing Persistent Memory Write Performance with A Novel PM-DRAM Collaboration Architecture  23
HUNTER: Releasing Persistent Memory Write Performance with A...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Yanqi Pan Yifeng Zhang Wen Xia Xiangyu Zou Cai Deng School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China and Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies
We present HUNTER, a POSIX-compliant persistent memory (PM) file system that fully releases PM's write performance. Compared to state-of-the-art ones, HUNTER proposes a novel PM-DRAM collaboration architecture to ...
来源: 评论
Functional Connectivity Patterns Learning for EEG-based Emotion Recognition
收藏 引用
IEEE Transactions on Cognitive and Developmental Systems 2024年 第3期17卷 480-494页
作者: Shi, Chongxing Chen, C. L. Philip Li, Shuzhen Zhang, Tong South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Eng. Res. Ctr. of the Min. of Educ. on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Neuroscience research reveals that different emotions are associated with different functional connectivity structures of brain regions. However, many existing EEG-based emotion recognition methods use these connectiv... 详细信息
来源: 评论
DRPTM: A Decoupled Read-Efficient High-Scalable Persistent Transactional Memory  23
DRPTM: A Decoupled Read-Efficient High-Scalable Persistent T...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Wenkai Liang Hao Hu Xiangyu Zou Wen Xia Yanqi Pan School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China and Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies
Persistent transactional memory (PTM) exploits transactions to provide an easy crash-consistent interface for persistent memory (PM). However, because of the substantial reader-side overhead brought on by the low band...
来源: 评论
Multi-Scale Feature Extraction with Supervised Contrastive Learning for Vulnerability Detection  36
Multi-Scale Feature Extraction with Supervised Contrastive L...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Zhao, Yahui Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Pengcheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
The capacity of Deep Learning to automatically learn features from source code has facilitated its extensive utilization in detecting software vulnerabilities. However, existing pre-trained models regard code snippets... 详细信息
来源: 评论
Cost-Effective Data Caching Optimization with Distance-aware in Edge Computing  2
Cost-Effective Data Caching Optimization with Distance-aware...
收藏 引用
2022 2nd Conference on High Performance Computing and Communication Engineering, HPCCE 2022
作者: Wang, Futian Han, Yinchao Wu, Zhimin Zhang, Cheng Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei230088 China
In recent years, edge data caching has been concerned by more and more research scholars. Caching data, especially popular data, on edge servers can significantly reduce users’ latency, while also greatly reducing di... 详细信息
来源: 评论
Cross-Store Next-Basket Recommendation  24
Cross-Store Next-Basket Recommendation
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Ma, Liang-Chen Li, Ya Mai, Zi-Feng Liang, Fei-Yao Wang, Chang-Dong Chen, Min Guizani, Mohsen School of Electronics and Information Guangdong Polytechnic Normal University Guangzhou China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Provincial Key Laboratory of Intellectual Property and Big Data Guangzhou China School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Machine Learning Department Abu Dhabi United Arab Emirates
Next-basket recommendation (NBR) infers a set of items that a user will interact with in the next basket. Existing methods often struggle with the data sparsity problem, particularly when the number of baskets is sign... 详细信息
来源: 评论