咨询与建议

限定检索结果

文献类型

  • 1,744 篇 期刊文献
  • 1,314 篇 会议
  • 20 册 图书

馆藏范围

  • 3,078 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,095 篇 工学
    • 1,490 篇 计算机科学与技术...
    • 1,192 篇 软件工程
    • 444 篇 信息与通信工程
    • 292 篇 生物工程
    • 266 篇 电气工程
    • 240 篇 光学工程
    • 233 篇 控制科学与工程
    • 215 篇 电子科学与技术(可...
    • 215 篇 生物医学工程(可授...
    • 109 篇 机械工程
    • 101 篇 仪器科学与技术
    • 100 篇 化学工程与技术
    • 70 篇 材料科学与工程(可...
    • 64 篇 网络空间安全
    • 56 篇 动力工程及工程热...
  • 1,221 篇 理学
    • 516 篇 数学
    • 482 篇 物理学
    • 321 篇 生物学
    • 166 篇 统计学(可授理学、...
    • 154 篇 化学
    • 85 篇 系统科学
    • 54 篇 地球物理学
  • 494 篇 管理学
    • 291 篇 管理科学与工程(可...
    • 214 篇 图书情报与档案管...
    • 121 篇 工商管理
  • 201 篇 医学
    • 175 篇 临床医学
    • 147 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
    • 77 篇 公共卫生与预防医...
  • 84 篇 法学
    • 63 篇 社会学
  • 43 篇 农学
  • 40 篇 经济学
  • 33 篇 教育学
  • 10 篇 艺术学
  • 8 篇 文学
  • 3 篇 军事学

主题

  • 81 篇 deep learning
  • 76 篇 semantics
  • 76 篇 feature extracti...
  • 66 篇 machine learning
  • 65 篇 computational mo...
  • 57 篇 training
  • 47 篇 accuracy
  • 46 篇 federated learni...
  • 38 篇 deep neural netw...
  • 38 篇 data models
  • 36 篇 artificial intel...
  • 32 篇 computer science
  • 32 篇 servers
  • 32 篇 graph neural net...
  • 31 篇 optimization
  • 31 篇 data mining
  • 30 篇 image segmentati...
  • 30 篇 convolution
  • 30 篇 predictive model...
  • 29 篇 cloud computing

机构

  • 102 篇 national enginee...
  • 80 篇 school of comput...
  • 51 篇 school of comput...
  • 43 篇 infn sezione di ...
  • 43 篇 north-west unive...
  • 43 篇 institut univers...
  • 43 篇 tno technical sc...
  • 43 篇 université de st...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 national centre ...
  • 40 篇 institute of phy...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 university of ch...
  • 38 篇 department of ph...

作者

  • 81 篇 hai jin
  • 76 篇 jin hai
  • 43 篇 chen a.
  • 43 篇 benoit d.m.
  • 43 篇 ferrara g.
  • 43 篇 ardid m.
  • 43 篇 calvo d.
  • 43 篇 eddymaoui a.
  • 41 篇 gagliardini s.
  • 39 篇 gal t.
  • 39 篇 bozza c.
  • 39 篇 díaz a.f.
  • 39 篇 boumaaza j.
  • 38 篇 coleiro a.
  • 38 篇 gozzini s.r.
  • 38 篇 dallier r.
  • 38 篇 benhassi m.
  • 38 篇 boettcher m.
  • 37 篇 enzenhöfer a.
  • 37 篇 celli s.

语言

  • 2,531 篇 英文
  • 515 篇 其他
  • 38 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology and Hopcroft Center on Computing Science"
3078 条 记 录,以下是761-770 订阅
排序:
LGDB-Net: Dual-Branch Path for Building Extraction from Remote Sensing Image
LGDB-Net: Dual-Branch Path for Building Extraction from Remo...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ronghuan Zhang Jing Zhao Ming Li Qingzhi Zou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Intelligence and Information Engineering Shandong University of Traditional Chinese Medicine Jinan China
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural Networks (CNNs) adopt hierarchical feature representation, showcasing powerful ... 详细信息
来源: 评论
FedCache: A Knowledge Cache-driven Federated Learning Architecture for Personalized Edge Intelligence
TechRxiv
收藏 引用
TechRxiv 2024年
作者: Wu, Zhiyuan Sun, Sheng Wang, Yuwei Liu, Min Xu, Ke Wang, Wen Jiang, Xuefeng Gao, Bo Lu, Jinda Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Zhongguancun Laboratory Beijing China Department of Computer Science and Technology Tsinghua University Beijing China School of Computer and Information Technology The Engineering Research Center of Network Management Technology for High-Speed Railway Ministry of Education Beijing Jiaotong University Beijing China School of Information Science and Technology University of Science and Technology of China Hefei China
Edge Intelligence (EI) allows Artificial Intelligence (AI) applications to run at the edge, where data analysis and decision-making can be performed in real-time and close to data sources. To protect data privacy and ... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Haozhao Wang Wenchao Xu Yunfeng Fan Ruixuan Li Pan Zhou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing The Hong Kong Polytechnic University Hong Kong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co...
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论
Entirety of Quantum Uncertainty and Its Experimental Verification
收藏 引用
Chinese Physics Letters 2021年 第7期38卷 11-16页
作者: Jie Xie Li Zhou Aonan Zhang Huichao Xu Man-Hong Yung Ping Xu Nengkun Yu Lijian Zhang National Laboratory of Solid State Microstructures College of Engineering and Applied Sciences and School of PhysicsNanjing UniversityNanjing 210093China Collaborative Innovation Center of Advanced Microstructures Nanjing UniversityNanjing 210093China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Shenzhen Institute for Quantum Science and Engineering and Department of Physics Southern University of Science and TechnologyShenzhen 518055China Shenzhen Key Laboratory of Quantum Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Institute for Quantum Information&State Key Laboratory of High Performance Computing College of ComputerNational University of Defense TechnologyChangsha 410073China Centre for Quantum Software and Information School of SoftwareFaculty of Engineering and Information TechnologyUniversity of Technology SydneyNSWAustralia
As a foundation of quantum physics,uncertainty relations describe ultimate limit for the measurement uncertainty of incompatible ***,uncertainty relations are formulated by mathematical bounds for a specific *** we pr... 详细信息
来源: 评论
MGRR-SQL: Multi-Granularity Relevant Retrieval-Based in-Context Learning Approach for Text-to-SQL Generation
MGRR-SQL: Multi-Granularity Relevant Retrieval-Based in-Cont...
收藏 引用
Advanced Algorithms and Control Engineering (ICAACE), International Conference on
作者: Yiming Zhan Zhao Li Tong Chen Shiwei Wu Yang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Evay Info Technology Co. Ltd. Jinan China School of Cyberspace Security (School of Cryptology) Hainan University Haikou China
In-Context learning serves as a vital component for enhancing Text-to-SQL task performance. However, current in-context learning methodologies for Text-to-SQL applications fail to sufficiently bridge the significant c... 详细信息
来源: 评论
TarGF: learning target gradient field to rearrange objects without explicit goal specification  22
TarGF: learning target gradient field to rearrange objects w...
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Mingdong Wu Fangwei Zhong Yulong Xia Hao Dong Center on Frontiers of Computing Studies School of Computer Science Peking University and Beijing Institute for General Artificial Intelligence (BIGAI) School of Intelligence Science and Technology Peking University and Beijing Institute for General Artificial Intelligence (BIGAI) Center on Frontiers of Computing Studies School of Computer Science Peking University Center on Frontiers of Computing Studies School of Computer Science Peking University and Peng Cheng Laboratory
Object Rearrangement is to move objects from an initial state to a goal state. Here, we focus on a more practical setting in object rearrangement, i.e., rearranging objects from shuffled layouts to a normative target ...
来源: 评论
Unwritten Magic: Participatory Design of AI Dialogue to Empower Marginalized Voices  22
Unwritten Magic: Participatory Design of AI Dialogue to Empo...
收藏 引用
2nd ACM Conference on Information technology for Social Good, GoodIT 2022
作者: Buddemeyer, Amanda Nwogu, Jennifer Solyst, Jaemarie Walker, Erin Nkrumah, Tara Ogan, Amy Hatley, Leshell Stewart, Angela School of Computing and Information Learning Research and Development Center University of Pittsburgh United States Human Computer Interaction Institute Carnegie Mellon University United States Center for Gender Equity in Science and Technology Arizona State University United States Uplift Inc.
Language is an act of identity, but AI has no identity other than that which its creators assign it. technology creators who do not fully consider how identity information is encoded in AI dialogue risk creating repre... 详细信息
来源: 评论
Distributed private preserving learning based chaotic encryption framework for cognitive healthcare IoT systems
收藏 引用
Informatics in Medicine Unlocked 2024年 49卷
作者: Nabi, Shaik Abdul Kalpana, Ponugoti Chandra, N. Subhash Smitha, L. Naresh, K. Ezugwu, Absalom E. Abualigah, Laith Department of Computer Science and Engineering AVN Institute of Engineering and Technology Department of Computer Science and Engineering CVR College of Engineering Department of Information Technology G Narayanamma Institute of Technology and Science Department of Computer Science and Engineering TKR College of Engineering & Technology Unit for Data Science and Computing North-West University Computer Science Department Al Al-Bayt University MEU Research Unit Middle East University Applied Science Research Center Applied Science Private University Jadara Research Center Jadara University Artificial Intelligence and Sensing Technologies (AIST) Research Center University of Tabuk School of Engineering and Technology Sunway University Malaysia
In the field of cognitive healthcare Internet of Things (CH-IoT), there is a strong demand for reliable and minimally intrusive smart gadgets that consistently acquire, analyse, and obtain the confidential health deta... 详细信息
来源: 评论
Deep Learning-based Image Text Processing Research*
Deep Learning-based Image Text Processing Research*
收藏 引用
IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart computing (HPSC) and Intelligent Data and Security (IDS)
作者: Huixuan Xiong Kai Jin Jingnian Liu Jiahong Cai Lijun Xiao School of Computer Science and Engineering Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China the College of Computer Science and Electronics Engineering Hunan University Changsha China Big Data Development and Research Center Guangzhou College of Technology and Business Guangzhou China
Deep learning is a powerful multi-layer architecture that has important applications in image processing and text classification. This paper first introduces the development of deep learning and two important algorith... 详细信息
来源: 评论