咨询与建议

限定检索结果

文献类型

  • 22,443 篇 会议
  • 12,320 篇 期刊文献
  • 443 册 图书

馆藏范围

  • 35,206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,005 篇 工学
    • 17,351 篇 计算机科学与技术...
    • 14,360 篇 软件工程
    • 5,134 篇 信息与通信工程
    • 3,203 篇 控制科学与工程
    • 2,870 篇 生物工程
    • 2,258 篇 电气工程
    • 1,975 篇 生物医学工程(可授...
    • 1,656 篇 光学工程
    • 1,626 篇 电子科学与技术(可...
    • 1,250 篇 机械工程
    • 1,088 篇 网络空间安全
    • 906 篇 安全科学与工程
    • 869 篇 动力工程及工程热...
    • 858 篇 化学工程与技术
    • 815 篇 仪器科学与技术
    • 806 篇 交通运输工程
  • 11,339 篇 理学
    • 6,237 篇 数学
    • 3,161 篇 生物学
    • 2,728 篇 物理学
    • 1,974 篇 统计学(可授理学、...
    • 1,201 篇 系统科学
    • 1,000 篇 化学
  • 6,563 篇 管理学
    • 3,790 篇 管理科学与工程(可...
    • 3,068 篇 图书情报与档案管...
    • 1,727 篇 工商管理
  • 2,059 篇 医学
    • 1,645 篇 临床医学
    • 1,483 篇 基础医学(可授医学...
    • 1,014 篇 公共卫生与预防医...
    • 884 篇 药学(可授医学、理...
  • 1,324 篇 法学
    • 1,103 篇 社会学
  • 598 篇 经济学
  • 492 篇 农学
  • 454 篇 教育学
  • 234 篇 文学
  • 65 篇 艺术学
  • 57 篇 军事学
  • 14 篇 哲学
  • 5 篇 历史学

主题

  • 1,128 篇 deep learning
  • 1,085 篇 accuracy
  • 882 篇 computer science
  • 803 篇 computational mo...
  • 757 篇 feature extracti...
  • 727 篇 machine learning
  • 713 篇 training
  • 552 篇 semantics
  • 520 篇 predictive model...
  • 458 篇 data models
  • 457 篇 internet of thin...
  • 426 篇 support vector m...
  • 406 篇 convolutional ne...
  • 405 篇 real-time system...
  • 339 篇 artificial intel...
  • 304 篇 optimization
  • 300 篇 scalability
  • 300 篇 computer archite...
  • 273 篇 reliability
  • 272 篇 data mining

机构

  • 584 篇 school of comput...
  • 216 篇 institute of com...
  • 183 篇 department of co...
  • 170 篇 school of comput...
  • 158 篇 department of co...
  • 146 篇 department of co...
  • 138 篇 department of co...
  • 133 篇 school of comput...
  • 130 篇 school of comput...
  • 127 篇 school of comput...
  • 125 篇 school of comput...
  • 124 篇 school of comput...
  • 115 篇 school of comput...
  • 110 篇 school of comput...
  • 110 篇 school of comput...
  • 109 篇 school of comput...
  • 107 篇 department of co...
  • 102 篇 college of intel...
  • 98 篇 college of compu...
  • 98 篇 key laboratory o...

作者

  • 137 篇 hai jin
  • 124 篇 niyato dusit
  • 123 篇 jin hai
  • 106 篇 zheng wei-shi
  • 98 篇 ferrara g.
  • 98 篇 ardid m.
  • 97 篇 calvo d.
  • 94 篇 chen a.
  • 90 篇 gal t.
  • 90 篇 bozza c.
  • 87 篇 anjali t.
  • 84 篇 díaz a.f.
  • 76 篇 boumaaza j.
  • 71 篇 kalekin o.
  • 63 篇 coleiro a.
  • 62 篇 kulikovskiy v.
  • 62 篇 huang f.
  • 56 篇 eddymaoui a.
  • 55 篇 benoit d.m.
  • 54 篇 zhang lei

语言

  • 33,121 篇 英文
  • 1,860 篇 其他
  • 262 篇 中文
  • 5 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 荷兰文
  • 1 篇 朝鲜文
检索条件"机构=School of Computer and Computing Science"
35206 条 记 录,以下是4981-4990 订阅
排序:
Exponentially Decaying Quantum Simulation Error with Noisy Devices
arXiv
收藏 引用
arXiv 2025年
作者: Xu, Jue Zhao, Chu Fan, Junyu Zhao, Qi QICI Quantum Information and Computation Initiative Department of Computer Science School of Computing and Data Science The University of Hong Kong Hong Kong Center for Quantum Information Institute for Interdisciplinary Information Sciences Tsinghua University Beijing100084 China International Quantum Academy Guangdong Shenzhen China
Quantum simulation is a promising way toward practical quantum advantage, but noise in current quantum hardware poses a significant obstacle. We theoretically and numerically revealed that not only the physical error ...
来源: 评论
MT-BTRIMER: A master-slave multi-threaded dynamic binary translator
MT-BTRIMER: A master-slave multi-threaded dynamic binary tra...
收藏 引用
International Conference on Frontier of computer science and Technology
作者: Tu, Xuping Jin, Hai Yu, Zhibin Chen, Jie Hu, Yabin Services Computing Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Most of the current dynamic binary translation (DBT) systems are single-threaded and many orders of magnitude slower than native execution. Although multi-core processors are becoming more and more prevalent, the sing... 详细信息
来源: 评论
Encrypted remote user authentication scheme by using smart card
Encrypted remote user authentication scheme by using smart c...
收藏 引用
2012 International Conference on Web Information Systems and Mining, WISM 2012
作者: Yassin, Ali A. Jin, Hai Ibrahim, Ayad Zou, Deqing Services Computing Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Smart card-based authentication is considered as one of the most excessively used and applied solutions for remote user authentication. In this paper, we display Wang et al.'s scheme and indicate many shortcomings... 详细信息
来源: 评论
Evaluate the Performance Parameters for Web browsers Empowered with Fuzzy logic  2
Evaluate the Performance Parameters for Web browsers Empower...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Khaliq, Faiza Afzal, Farheen Rehman, Abd Ur Aziz, Nauman Zafar, Dr Fareeha Riphah International University Riphah School of Computing & Innovation Lahore Pakistan NCBA&E School of Computer Science Lahore Pakistan Riphah Interntional University Riphah School of Computing Lahore Pakistan NCBA &e Lahore Pakistan Applied Science Research Center Applied Science Private University School of Computer Science Amman11937 Jordan GC University Department of Computer Science Lahore Pakistan
In recent years, the Web browser achieved huge popularity in academic as well as industrial circles. A large number of web services and applications are trying to make their performance efficient. Decreasing the waiti... 详细信息
来源: 评论
Multimedia security in the distributed environment
Multimedia security in the distributed environment
收藏 引用
2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceedings, APCC/MDMC'04
作者: Yongliang, Liu Gao, Wen Liu, Shaohui School of Computer Science Harbin Institute of Technology Harbin China Institute of Computing Technology Chinese Academy of Science Beijing China
Multicast is very useful way for large-scale distributing multimedia over the network. It can significantly reduce the bandwidth required to transmit same multimedia over the network to multiple receivers. This proper... 详细信息
来源: 评论
Compliance checking for usage-constrained credentials in trust negotiation systems
Compliance checking for usage-constrained credentials in tru...
收藏 引用
15th International Conference on Information Security, ISC 2012
作者: Hu, Jinwei Khan, Khaled M. Bai, Yun Zhang, Yan Department of Computer Science TU Darmstadt Germany Department of Computer Science and Engineering Qatar University Qatar School of Computing and Mathematics University of Western Sydney Australia
We propose an approach to placing usage-constraints on RT credentials;issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of pract... 详细信息
来源: 评论
Inverse reinforcement learning for team sports: Valuing actions and players  29
Inverse reinforcement learning for team sports: Valuing acti...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Luo, Yudong Schulte, Oliver Poupart, Pascal School of Computing Science Simon Fraser University Canada David R. Cheriton School of Computer Science University of Waterloo Canada Sportlogiq Canada
A major task of sports analytics is to rank players based on the impact of their actions. Recent methods have applied reinforcement learning (RL) to assess the value of actions from a learned action value or Q-functio... 详细信息
来源: 评论
Optimizing high-utility item mining using hybrid dolphin echolocation and Boolean grey wolf optimization
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2023年 第3期14卷 2327-2339页
作者: Pazhaniraja, N. Sountharrajan, S. Suganya, E. Karthiga, M. School of Computing and Science VIT Bhopal University Madhya Pradesh Bhopal India Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Department of Information Technology Sri Sivasubramaniya Nadar College of Engineering Tamil Nadu Chennai India Bannari Amman Institute of Technology Tamilnadu Sathyamangalam India
High-utility item-set mining has become a very crucial topic of research in recent times. It is used to find profitable products utilizing both profit factors and the quantity as opposed to the association rule mining... 详细信息
来源: 评论
A comprehensive monitoring framework for virtual computing environment
A comprehensive monitoring framework for virtual computing e...
收藏 引用
26th International Conference on Information Networking 2012, ICOIN 2012
作者: Xiang, Guofu Jin, Hai Zou, Deqing Services Computing Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Virtualization can divide or aggregate the underlying resource flexibly, and it attracts attention from both academic and industry in recent years. Guest operating systems in virtual machines can be various, and the s... 详细信息
来源: 评论
The multi-relational skyline operator
The multi-relational skyline operator
收藏 引用
23rd International Conference on Data Engineering, ICDE 2007
作者: Jin, Win Ester, Martin Hu, Zengjian Han, Jiawei School of Computing Science Simon Fraser University Canada Department of Computer Science University of Illinois Urbana-Champagne United States
Most of the existing work on skyline query has been extensively used in decision support, recommending systems etc, and mainly focuses on the efficiency issue for a single table. However the data retrieved by users fo... 详细信息
来源: 评论