咨询与建议

限定检索结果

文献类型

  • 1,767 篇 期刊文献
  • 1,316 篇 会议
  • 20 册 图书

馆藏范围

  • 3,103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,123 篇 工学
    • 1,530 篇 计算机科学与技术...
    • 1,200 篇 软件工程
    • 461 篇 信息与通信工程
    • 295 篇 生物工程
    • 280 篇 电气工程
    • 262 篇 控制科学与工程
    • 240 篇 光学工程
    • 220 篇 电子科学与技术(可...
    • 214 篇 生物医学工程(可授...
    • 111 篇 机械工程
    • 104 篇 化学工程与技术
    • 100 篇 仪器科学与技术
    • 70 篇 材料科学与工程(可...
    • 66 篇 网络空间安全
    • 58 篇 动力工程及工程热...
  • 1,239 篇 理学
    • 523 篇 数学
    • 485 篇 物理学
    • 324 篇 生物学
    • 172 篇 统计学(可授理学、...
    • 159 篇 化学
    • 87 篇 系统科学
    • 56 篇 地球物理学
  • 499 篇 管理学
    • 291 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 118 篇 工商管理
  • 202 篇 医学
    • 174 篇 临床医学
    • 144 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
    • 75 篇 公共卫生与预防医...
  • 86 篇 法学
    • 65 篇 社会学
  • 42 篇 农学
  • 39 篇 经济学
  • 31 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学
  • 3 篇 军事学

主题

  • 82 篇 deep learning
  • 77 篇 semantics
  • 77 篇 feature extracti...
  • 68 篇 machine learning
  • 67 篇 computational mo...
  • 58 篇 training
  • 42 篇 federated learni...
  • 42 篇 accuracy
  • 39 篇 data models
  • 38 篇 deep neural netw...
  • 36 篇 graph neural net...
  • 35 篇 artificial intel...
  • 33 篇 computer science
  • 32 篇 image segmentati...
  • 31 篇 data mining
  • 30 篇 convolution
  • 30 篇 servers
  • 30 篇 predictive model...
  • 29 篇 optimization
  • 28 篇 cloud computing

机构

  • 103 篇 national enginee...
  • 80 篇 school of comput...
  • 51 篇 school of comput...
  • 44 篇 infn sezione di ...
  • 44 篇 north-west unive...
  • 44 篇 université de st...
  • 43 篇 institut univers...
  • 43 篇 tno technical sc...
  • 42 篇 university of ch...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 national centre ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 40 篇 institute of phy...
  • 39 篇 dipartimento di ...

作者

  • 81 篇 hai jin
  • 77 篇 jin hai
  • 44 篇 chen a.
  • 44 篇 benoit d.m.
  • 44 篇 ferrara g.
  • 44 篇 ardid m.
  • 44 篇 calvo d.
  • 44 篇 eddymaoui a.
  • 41 篇 gagliardini s.
  • 39 篇 gal t.
  • 39 篇 bozza c.
  • 39 篇 díaz a.f.
  • 39 篇 boumaaza j.
  • 38 篇 coleiro a.
  • 38 篇 gozzini s.r.
  • 38 篇 dallier r.
  • 38 篇 benhassi m.
  • 38 篇 boettcher m.
  • 37 篇 enzenhöfer a.
  • 37 篇 celli s.

语言

  • 2,750 篇 英文
  • 317 篇 其他
  • 41 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology and Hopcroft Center on Computing Science"
3103 条 记 录,以下是2751-2760 订阅
排序:
Public-key authentication for cloud-based WBANs  9
Public-key authentication for cloud-based WBANs
收藏 引用
9th International Conference on Body Area Networks, BODYNETS 2014
作者: Hayajneh, Thaier Vasilakos, Athanasios V. Almashaqbeh, Ghada Mohd, Bassam J. Imran, Muhammad A. Shakir, Muhammad Z. Qaraqe, Khalid A. School of Engineering and Computing Sciences New York Institute of Technology New York United States Computer Science Department Kuwait University Kuwait Dept. of Computer Science and Engineering University of Notre Dame Notre DameIN United States Computer Engineering Dept. Hashemite University Zarqa Jordan Center for Communication Systems Research University of Surrey United Kingdom Dept. of Electrical and Computer Engineering Texas A and M University at Qatar Qatar
Merging WBAN systems with cloud computing is an efficient solution to overcome limitations inherent in WBAN, especially in critical human-related applications such as remote health monitoring. In cloud-based WBAN, the... 详细信息
来源: 评论
Self-Adaptive Topic Model: A Solution to the Problem of "Rich Topics Get Richer"
收藏 引用
China Communications 2014年 第12期11卷 35-43页
作者: FANG Ying School of Computer Science and Technology Beijing Institute of Technology Beijing 100081 R R. China Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Beijing 100081 P. R. China School of computer & technology ShangQiu Normal College ShangQiu HeNan 476000 P. R. China
The problem of "rich topics get richer"(RTGR) is popular to the topic models,which will bring the wrong topic distribution if the distributing process has not been *** standard LDA(Latent Dirichlet Allocatio... 详细信息
来源: 评论
Microblog Keyphrase Extraction Based on Similarity Features
Microblog Keyphrase Extraction Based on Similarity Features
收藏 引用
2013 International Conference on Advanced computer science and Electronics Information(ICACSEI 2013)
作者: Lizi Liao Heyan Huang Beijing Engineering Applications Research Center of High Volume Language Information Processing and Cloud Computing (BIT) School of Computer Science and Technology Beijing Institute of Technology
This paper proposes to extract keyphrases from microblog based on similarity features. We analyze a large number of microblogs and find an interesting phenomenon that people use various nugget phrases to express the s... 详细信息
来源: 评论
A General P2P Scheme for Constructing Large-Scale Virtual Environments
A General P2P Scheme for Constructing Large-Scale Virtual En...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW)
作者: Wei Wang Guisong Yang Naixue Xiong Xingyu He Wenzhong Guo Cloud Computing Center Chinese Academy of Science Dongguan P.R.Chinayanwan School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai P.R. China School of Computer Science Colorado Technical University CO USA College of Mathematics and Computer Science Fuzhou University China
To construct various Virtual Environments (VEs) is essential for geographically dispersed users to real-time interact and roam in various virtual worlds(e.g., virtual city, massively multiuser online games). However, ... 详细信息
来源: 评论
Reverse Engineering Web Applications for Security Mechanism Enhancement
Reverse Engineering Web Applications for Security Mechanism ...
收藏 引用
IEEE Annual computer Software and Applications Conference Workshops (COMPSACW)
作者: Hui Guan Hongji Yang Hossam Hakeem School of Computer Science and Technology Shenyang University of Chemical Technology Shenyang China Center for Creative Computing Bath Spa University England UK Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
This paper focuses on reverse engineering web application for security mechanisms detection in the current design and thereby presents a security evaluation method for web application taking consideration of potential... 详细信息
来源: 评论
Wire length of midimew-connected mesh network
Wire length of midimew-connected mesh network
收藏 引用
11th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2014
作者: Awal, Md. Rabiul Rahman, M. M. Hafizur Nor, Rizal Mohd Sembok, Tengku Mohd Bin Tengku Miura, Yasuyuki Inoguchi, Yasushi Department of Computer Science KICT IIUM Jalan Gombak Kuala Lumpur 50728 Malaysia Cyber Security Center National Defense University Malaysia Kuala Lumpur 57000 Malaysia Graduate School of Technology Shonan Institute of Technology 1-1-25 Tsujido Nishikaigan Fujisawa Kanagawa Japan Research Center for Advanced Computing Infrastructure JAIST Nomi-Shi Ishikawa 923-1292 Japan
Midimew connected Mesh Network (MMN) is a Minimal DIstance MEsh with Wrap-around links (midimew) network. In this paper, we present the architecture of MMN and evaluate the total wire length of MMN, TESH, mesh, and to... 详细信息
来源: 评论
11th German Conference on Chemoinformatics (GCC 2015) Abstracts
收藏 引用
JOURNAL OF CHEMINFORMATICS 2016年 第SUPPL 1期8卷 1-27页
作者: [Anonymous] GDCh-CIC Division Associated Board Member Beilstein-Institut zur Förderung der Chemischen Wissenschaften Trakehner Str. 7-9 60487 Frankfurt Germany. ufechner@beilstein-institut.de. Division Medicinal Chemistry Amsterdam Institute for Molecules Medicines and Systems (AIMMS) VU University Amsterdam The Netherlands. Centre for Bioinformatics Uni Hamburg Bundesstr. 43 20146 Hamburg Germany. Sanofi-Aventis Deutschland GmbH 65926 Frankfurt am Main Germany. stefan.guessregen@***. Sanofi-Aventis Deutschland GmbH 65926 Frankfurt am Main Germany. GlaxoSmithKline Stevenage SG1 2NY UK. nicola.j.richmond@***. Discngine Paris 75011 France. Organisch-Chemisches Institut Westfälische Wilhelms-Universität Münster Germany. marwin.segler@wwu.de. Organisch-Chemisches Institut Westfälische Wilhelms-Universität Münster Germany. Bundeskriminalamt Wiesbaden Central Analytics II 65173 Wiesbaden Germany. Department of Chemistry and Biochemistry University of California Santa Barbara CA 93111 USA. shea@chem.ucsb.edu. Department of Chemistry and Biochemistry University of California Santa Barbara CA 93111 USA. Chemistry Department Ludwig-Maximilians-Universität München Butenandtstr. 7 81377 Munich Germany. Inorganic Chemistry and Center for Nanointegration University of Duisburg-Essen Essen Germany. CAM-D Technologies Essen Germany. Institute for Bioinformatics and Chemoinformatics Westphalian University of Applied Sciences Recklinghausen Germany. Institute for Bioinformatics and Chemoinformatics Westphalian University of Applied Sciences Recklinghausen Germany. achim.zielesny@w-hs.de. Leiden University Leiden Netherlands. j.fraaije@chem.leidenuniv.nl. Culgi BV Berlin Germany. Physikalische Chemie III TU Dortmund 44227 Dortmund Germany. stefan.kast@tu-dortmund.de. Centre for Molecular Informatics Department of Chemistry University of Cambridge Lensfield Road Cambridge CB2 1EW United Kingdom. kcb27@cam.ac.uk. Centre for Molecular Informatics Department of Chemistry
来源: 评论
Workshops held at the ninth annual AAAI conference on artificial intelligence and interactive digital entertainment (AIIDE): A report
Workshops held at the ninth annual AAAI conference on artifi...
收藏 引用
作者: Liapis, Antonios Cook, Michael Smith, Adam M. Smith, Gillian Zook, Alexander Cavazza, Marc Si, Mei Pasquier, Philippe Center for Computer Games Research IT University of Copenhagen Denmark Computational Creativity Group Goldsmiths College London United Kingdom University of Washington United States College of Computer and Information Science and the College of Arts Media and Design Northeastern University United States School of Interactive Computing Georgia Institute of Technology United States Teesside University United States Rensselaer Polytechnic Institute United States School of Interactive Arts and Technology Simon Fraser University Canada
The Ninth Annual AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment (AIIDE) was held October 14-18, 2013, at Northeastern University in Boston, Massachusetts. Workshops were held on the t... 详细信息
来源: 评论
SSD lifespan-oriented cache optimization in SSD/HDD hybrid storage system
SSD lifespan-oriented cache optimization in SSD/HDD hybrid s...
收藏 引用
2014 International Conference on Environmental Engineering and computer Application (ICEECA 2014)
作者: X.Wang Q.X.Zhang Y.A.Tan J.Q.Qu Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Shanghai Radio Equipment Research Institute
Layered SSD/HDD hybrid storage system has been widely used. However, most traditional designs are performance oriented, and not optimized for SSD lifespan. In this paper, SSD lifespan oriented layered model and cache ... 详细信息
来源: 评论
Using Kuliback-Leibler divergence to model opponents in poker  28
Using Kuliback-Leibler divergence to model opponents in poke...
收藏 引用
28th AAAI Conference on Artificial Intelligence, AAAI 2014
作者: Zhang, Jiajia Wang, Xuan Yao, Lin Li, Jingpeng Shen, Xuedong Intelligence Computing Research Center Harbin Institute of Technology Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application China Intelligence Computing Research Center Harbin Institute of Technology Public Service Platform of Mobile Internet Application Security Industry China School of Electronics Engineering and Computer Science Peking University China C302 HIT Campus Shenzhen University Town NanShan District XiLi Shenzhen518055 China IER Building Soutn Area Shenzhen High-Tech Industrial Park Shenzhen518055 China
Opponent modeling is an essential approach for building competitive computer agents in imperfect information games. This paper presents a novel approach to develop opp onent modeling techniques. The approach applies n... 详细信息
来源: 评论