咨询与建议

限定检索结果

文献类型

  • 1,734 篇 期刊文献
  • 1,314 篇 会议
  • 20 册 图书

馆藏范围

  • 3,068 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,094 篇 工学
    • 1,490 篇 计算机科学与技术...
    • 1,192 篇 软件工程
    • 444 篇 信息与通信工程
    • 292 篇 生物工程
    • 266 篇 电气工程
    • 238 篇 光学工程
    • 233 篇 控制科学与工程
    • 215 篇 电子科学与技术(可...
    • 215 篇 生物医学工程(可授...
    • 109 篇 机械工程
    • 101 篇 仪器科学与技术
    • 100 篇 化学工程与技术
    • 71 篇 材料科学与工程(可...
    • 64 篇 网络空间安全
    • 56 篇 动力工程及工程热...
  • 1,221 篇 理学
    • 516 篇 数学
    • 483 篇 物理学
    • 320 篇 生物学
    • 166 篇 统计学(可授理学、...
    • 155 篇 化学
    • 85 篇 系统科学
    • 54 篇 地球物理学
  • 494 篇 管理学
    • 291 篇 管理科学与工程(可...
    • 214 篇 图书情报与档案管...
    • 121 篇 工商管理
  • 199 篇 医学
    • 174 篇 临床医学
    • 146 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
    • 77 篇 公共卫生与预防医...
  • 83 篇 法学
    • 63 篇 社会学
  • 43 篇 农学
  • 40 篇 经济学
  • 33 篇 教育学
  • 10 篇 艺术学
  • 8 篇 文学
  • 3 篇 军事学

主题

  • 80 篇 deep learning
  • 77 篇 feature extracti...
  • 76 篇 semantics
  • 65 篇 computational mo...
  • 65 篇 machine learning
  • 57 篇 training
  • 47 篇 accuracy
  • 46 篇 federated learni...
  • 38 篇 deep neural netw...
  • 38 篇 data models
  • 35 篇 artificial intel...
  • 32 篇 computer science
  • 32 篇 servers
  • 32 篇 graph neural net...
  • 31 篇 optimization
  • 31 篇 data mining
  • 30 篇 image segmentati...
  • 30 篇 convolution
  • 30 篇 predictive model...
  • 29 篇 cloud computing

机构

  • 101 篇 national enginee...
  • 79 篇 school of comput...
  • 50 篇 school of comput...
  • 43 篇 infn sezione di ...
  • 43 篇 north-west unive...
  • 43 篇 institut univers...
  • 43 篇 tno technical sc...
  • 43 篇 université de st...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 national centre ...
  • 40 篇 institute of phy...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 nikhef national ...
  • 39 篇 university of ch...

作者

  • 84 篇 hai jin
  • 75 篇 jin hai
  • 43 篇 chen a.
  • 43 篇 benoit d.m.
  • 43 篇 ferrara g.
  • 43 篇 ardid m.
  • 43 篇 calvo d.
  • 43 篇 eddymaoui a.
  • 41 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 39 篇 coleiro a.
  • 39 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 gozzini s.r.
  • 38 篇 dallier r.
  • 38 篇 enzenhöfer a.

语言

  • 2,521 篇 英文
  • 515 篇 其他
  • 38 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology and Hopcroft Center on Computing Science"
3068 条 记 录,以下是821-830 订阅
排序:
AIM-CP: AI-Based Multi-Visual Components Analysis for Crowd Dynamics Prediction
AIM-CP: AI-Based Multi-Visual Components Analysis for Crowd ...
收藏 引用
International Conference on Image and Vision computing New Zealand, IVCNZ
作者: Elham Basunduwah Muhammad Mohzary Sejun Song Baek-Young Choi School of Science and Engineering University of Missouri-Kansas City MO USA College of Engineering and Computing in Al-Qunfudhah Umm Al-Qura University Makkah Saudi Arabia Department of Computer Science Jazan University Jazan Saudi Arabia Engineering and Technology Research Center Jazan University Jazan Saudi Arabia School of Computer and Cyber Science Augusta University Augusta GA USA
Accurate prediction of crowd mobility dynamics is essential for effective crowd safety management. Traditional models, such as the Random Waypoint Model (RWM), have been widely employed for mobility simulation. Howeve... 详细信息
来源: 评论
Fast exact synthesis of two-qubit unitaries using a near-minimum number of T gates
收藏 引用
Physical Review A 2023年 第4期107卷 042424-042424页
作者: Longcheng Li Cheng Guo Qian Li Xiaoming Sun Institute of Computing Technology Chinese Academy of Sciences 100190 Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences 100049 Beijing China CAS Center for Excellence in Topological Quantum Computation University of Chinese Academy of Sciences 100049 Beijing China
This paper focuses on exact synthesis of two-qubit unitaries using Clifford and T gates. We propose an ancilla-free synthesis algorithm (i) which uses T gates no more than ten times the minimum possible number of T ga... 详细信息
来源: 评论
Shared Incentive System for Clinical Pathway Experience
Shared Incentive System for Clinical Pathway Experience
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Weiqi Dai Wenhao Zhao Xia Xie Song Wu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
The phenomenon of unbalanced regional medical resources has led to large differences in the implementation experience of clinical pathways in hospitals with different medical levels. However, due to the fear of privac... 详细信息
来源: 评论
Rough Fermatean fuzzy decision-based approach for modelling IDS classifiers in the federated learning of IoMT applications
收藏 引用
Neural computing and Applications 2023年 第30期35卷 22531-22549页
作者: Albahri, O.S. Al-Samarraay, Mohammed S. AlSattar, H.A. Alamoodi, A.H. Zaidan, A.A. Albahri, A.S. Zaidan, B.B. Jasim, Ali Najm Computer Techniques Engineering Department Mazaya University College Thi-Qar Nassiriya12733 Iraq Faculty of Computing and Meta-Technology Universiti Pendidikan Sultan Idris Perak Tanjong Malim35900 Malaysia Department of Business Administration College of Administrative Science The University of Mashreq Baghdad10021 Iraq SP Jain School of Global Management Lidcombe SydneyNSW2141 Australia Iraqi Commission for Computers and Informatics Baghdad10022 Iraq Future Technology Research Center College of Future National Yunlin University of Science and Technology 123 University Road Section 3 Yunlin Douliou64002 Taiwan Foundation of Alshuhda Baghdad Iraq MEU Research Unit Middle East University Amman Jordan
Intrusion detection systems (IDSs) are commonly employed to mitigate network security threats in various fields, including federated learning applications within the Internet of Medical Things (IoMT). However, IDSs fa... 详细信息
来源: 评论
DU-DARTS: Decreasing the Uncertainty of Differentiable Architecture Search  32
DU-DARTS: Decreasing the Uncertainty of Differentiable Archi...
收藏 引用
32nd British Machine Vision Conference, BMVC 2021
作者: Lu, Shun Hu, Yu Yang, Longxing Sun, Zihao Mei, Jilin Zeng, Yiming Li, Xiaowei Research Center for Intelligent Computing Systems Institute of Computing Technology Chinese Academy of Sciences China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China Tecent ADlab China
Differentiable Neural Architecture Search (DARTS) recently attracts a lot of research attention because of its high efficiency. However, the competition of candidate operations in DARTS introduces high uncertainty for... 详细信息
来源: 评论
Distributed optimization for IoT attack detection using federated learning and Siberian Tiger optimizer
收藏 引用
ICT Express 2025年 第3期11卷 542-546页
作者: Gupta, Brij B. Gaurav, Akshat Alhalabi, Wadee Arya, Varsha Alharbi, Eman Chui, Kwok Tai Department of Computer Science and Information Engineering Asia University Taichung 413 Taiwan Department of Medical Research China Medical University Hospital China Medical University Taichung Taiwan Symbiosis Centre for Information Technology (SCIT) Symbiosis International University Pune India School of Cybersecurity Korea University Seoul South Korea Kyung Hee University 26 Kyungheedae-ro Dongdaemun-gu Seoul South Korea Ronin Institute Montclair NJ United States International Center for AI and Cyber Security Research and Innovations (CCRI) Asia University Taichung 413 Taiwan Department of Computer Science Immersive Virtual Reality Research Group King Abdulaziz University Jeddah Saudi Arabia Hong Kong Metropolitan University Hong Kong SAR China Center for Interdisciplinary Research University of Petroleum and Energy Studies (UPES) Dehradun India Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
The rapid growth of IoT devices has heightened the risk of botnet attacks, calling for scalable and distributed detection solutions. In this context, this study proposes a distributed optimization system for IoT attac... 详细信息
来源: 评论
READFake: Reflection and Environment-Aware DeepFake Detection
READFake: Reflection and Environment-Aware DeepFake Detectio...
收藏 引用
IEEE Visual Communications and Image Processing (VCIP)
作者: Muhammad Mohzary Elham Basunduwah Sejun Song Baek-Young Choi Department of Computer Science Jazan University Jazan Saudi Arabia Engineering and Technology Research Center Jazan University Jazan Saudi Arabia School of Science and Engineering University of Missouri-Kansas City MO USA College of Engineering and Computing in Al-Qunfudhah Umm Al-Qura University Makkah Saudi Arabia School of Computer and Cyber Science Augusta University Augusta GA USA
This paper presents a novel Reflection and Environment-Aware DeepFake (READFake) detection technique. Using reflections on various body parts (e.g., eyes, nose, cheeks, etc.) and environmental factors, we validate the... 详细信息
来源: 评论
Auction Theory and Game Theory Based Pricing of Edge computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论
Design and Simulation of Multi-tiered Heterogeneous Memory Architecture
Design and Simulation of Multi-tiered Heterogeneous Memory A...
收藏 引用
International Symposium on Modeling, Analysis and Simulation of computer and Telecommunication Systems (MASCOTS)
作者: Jinyuan Hu Haikun Liu Hai Jin Xiaofei Liao National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Heterogeneous memory systems have become increasingly popular in recent years. Because heterogeneous storage media often show significantly different characteristics in terms of bandwidth, latency, capacity, and energ... 详细信息
来源: 评论
CPSAA: Accelerating Sparse Attention using Crossbar-based Processing-In-Memory Architecture
arXiv
收藏 引用
arXiv 2022年
作者: Li, Huize Jin, Hai Zheng, Long Liao, Xiaofei Huang, Yu Liu, Cong Xu, Jiahong Duan, Zhuohui Chen, Dan Gui, Chuangyi National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
The attention-based neural network attracts great interest due to its excellent accuracy enhancement. However, the attention mechanism requires huge computational efforts to process unnecessary calculations, significa... 详细信息
来源: 评论