咨询与建议

限定检索结果

文献类型

  • 5,992 篇 期刊文献
  • 5,211 篇 会议
  • 51 册 图书

馆藏范围

  • 11,254 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,198 篇 工学
    • 5,358 篇 计算机科学与技术...
    • 4,504 篇 软件工程
    • 1,768 篇 信息与通信工程
    • 1,135 篇 生物工程
    • 898 篇 电气工程
    • 898 篇 控制科学与工程
    • 719 篇 生物医学工程(可授...
    • 648 篇 光学工程
    • 617 篇 电子科学与技术(可...
    • 402 篇 机械工程
    • 361 篇 化学工程与技术
    • 283 篇 动力工程及工程热...
    • 278 篇 交通运输工程
    • 252 篇 仪器科学与技术
    • 247 篇 网络空间安全
    • 237 篇 安全科学与工程
  • 4,265 篇 理学
    • 2,126 篇 数学
    • 1,296 篇 生物学
    • 1,173 篇 物理学
    • 795 篇 统计学(可授理学、...
    • 440 篇 化学
    • 384 篇 系统科学
  • 2,080 篇 管理学
    • 1,209 篇 管理科学与工程(可...
    • 966 篇 图书情报与档案管...
    • 584 篇 工商管理
  • 692 篇 医学
    • 573 篇 临床医学
    • 499 篇 基础医学(可授医学...
    • 295 篇 药学(可授医学、理...
    • 284 篇 公共卫生与预防医...
  • 353 篇 法学
    • 299 篇 社会学
  • 229 篇 经济学
  • 163 篇 农学
  • 112 篇 教育学
  • 43 篇 文学
  • 21 篇 军事学
  • 15 篇 艺术学

主题

  • 373 篇 deep learning
  • 299 篇 feature extracti...
  • 267 篇 accuracy
  • 245 篇 semantics
  • 237 篇 machine learning
  • 237 篇 training
  • 213 篇 computational mo...
  • 179 篇 predictive model...
  • 155 篇 internet of thin...
  • 146 篇 real-time system...
  • 138 篇 optimization
  • 135 篇 data models
  • 132 篇 data mining
  • 123 篇 reinforcement le...
  • 122 篇 convolutional ne...
  • 114 篇 neural networks
  • 106 篇 image segmentati...
  • 105 篇 convolution
  • 103 篇 object detection
  • 99 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 403 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 387 篇 h.h. wills physi...
  • 361 篇 van swinderen in...
  • 335 篇 yandex school of...
  • 309 篇 university of ch...
  • 308 篇 cavendish labora...
  • 308 篇 school of physic...
  • 293 篇 nikhef national ...
  • 289 篇 imperial college...
  • 289 篇 center for high ...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 244 篇 bellee v.
  • 241 篇 beiter a.
  • 222 篇 casse g.
  • 216 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 212 篇 borsato m.
  • 212 篇 betancourt c.
  • 208 篇 brundu d.
  • 200 篇 bediaga i.
  • 194 篇 amato s.
  • 184 篇 baryshnikov f.
  • 180 篇 boettcher t.
  • 161 篇 braun s.
  • 159 篇 borisyak m.
  • 158 篇 baker s.
  • 146 篇 bizzeti a.
  • 145 篇 bjørn m.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery

语言

  • 10,421 篇 英文
  • 757 篇 其他
  • 83 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Data Engineering"
11254 条 记 录,以下是4501-4510 订阅
排序:
UniSeg: A Prompt-driven Universal Segmentation Model as well as A Strong Representation Learner
arXiv
收藏 引用
arXiv 2023年
作者: Ye, Yiwen Xie, Yutong Zhang, Jianpeng Chen, Ziyang Xia, Yong National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering Northwestern Polytechnical University Xi’an710072 China The University of Adelaide Australia DAMO Academy Alibaba Group China
The universal model emerges as a promising trend for medical image segmentation, paving up the way to build medical imaging large model (MILM). One popular strategy to build universal models is to encode each task as ... 详细信息
来源: 评论
ISSSR 2022 Keynote Speech II: Human-Machine Cooperation in Junior Science Education: Development, Opportunities, and Challenges
ISSSR 2022 Keynote Speech II: Human-Machine Cooperation in J...
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Liang Luo Assistant Director of National & Local Joint Engineering Lab of Next Generation Internet Data Processing Technology School of Computer Science and Engineering (School of Cyberspace Security) University of Electronic Science and Technology of China
Human-Machine-Environment (HME) Tri-Co (Coexisting, Cooperative, Cognitive) Education is an indispensable prerequisite and the main content of Artificial Intelligence empowering junior science education. Moreover, it ...
来源: 评论
Learning Human-Written Commit Messages to Document Code Changes
收藏 引用
Journal of computer Science & Technology 2020年 第6期35卷 1258-1277页
作者: Yuan Huang Nan Jia Hao-Jie Zhou Xiang-Ping Chen Zi-Bin Zheng Ming-Dong Tang National Engineering Research Center of Digital Life School of Data and Computer ScienceSun Yat-sen University Guangzhou 510006China School of Information Engineering Hebei GEO UniversityShijiazhuang 050031China Guangdong Key Laboratory for Big Data Analysis and Simulation of Public Opinion School of Communication and DesignSun Yat-sen UniversityGuangzhou 510006China School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou 510006China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou 510006China
Commit messages are important complementary information used in understanding code changes. To address message scarcity, some work is proposed for automatically generating commit messages. However, most of these appro... 详细信息
来源: 评论
Safe Reinforcement Learning for Social Motor Coordination in Two Dimensional Space  26
Safe Reinforcement Learning for Social Motor Coordination in...
收藏 引用
26th International Conference on Industrial Technology, ICIT 2025
作者: Yang, Fan Huang, Yuening Zhai, Chao Zhang, Hehong China University of Geosciences School of Automation Wuhan Campus China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems China Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan China Rice University George R. Brown School of Engineering and Computing HoustonTX United States Fuzhou University School of Computer and Data Science Fuzhou China
This paper presents an interactive motion control method based on reinforcement learning, designed to assist children with autism who have social motor impairments through a mirror game intervention. The virtual teach... 详细信息
来源: 评论
Fight Fire with Fire: How Much Can We Trust ChatGPT on Source Code-Related Tasks?
arXiv
收藏 引用
arXiv 2024年
作者: Yu, Xiao Liu, Lei Hu, Xing Keung, Jacky Wai Liu, Jin Xia, Xin State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou China Faculty of Electronic and Information Engineering Xi’an Jiaotong University Shanxi Xi’an China Department of Computer Science City University of Hong Kong Hong Kong School of Computer Science Wuhan University Wuhan China College of Computer Science and Technology Zhejiang University Hangzhou China
With the increasing utilization of large language models such as ChatGPT during software development, it has become crucial to verify the quality of code content it generates. Recent studies proposed utilizing ChatGPT... 详细信息
来源: 评论
Dynamic resource provisioning for workflow scheduling under uncertainty in edge computing environment
Dynamic resource provisioning for workflow scheduling under ...
收藏 引用
作者: Xu, Xiaolong Cao, Hao Geng, Qingfan Liu, Xihua Dai, Fei Wang, Chuanjian School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Nanjing University of Information Science and Technology Nanjing China Engineering Research Center of Digital Forensics Ministry of Education Nanjing China School of Big Data and Intelligence Engineering Southwest Forestry University Kunming China College of Information Science and Technology Shihezi University Xinjiang China
Edge computing, an extension of cloud computing, is introduced to provide sufficient computing and storage resources for mobile devices. Moreover, a series of computing tasks in a mobile device are set as structured c... 详细信息
来源: 评论
Deep Learning-based Mango Leaf Disease Detection using Yolov8
Deep Learning-based Mango Leaf Disease Detection using Yolov...
收藏 引用
Advancement in Computation & computer Technologies (InCACCT), International Conference on
作者: Gladson Oliver S Prathusha Perugu Jeevitha S Rashima Mahajan Jasmine Gnana Malar A Raghavan Sheeja AhilanAppathurai Aarti Information Technology Government College of Technology Coimbatore India Department of Computer Science Engineering Sri Venkateswara College of Engineering Tirupathi India Department of Computer Science and Information Technology Kalasalingam Academy of Research and Education Krishnankoil Tamil Nadu India Manav Rachna International Institute of Research and Studies Faridabad India Department of Electrical and Electronics Engineering PSN College of Engineering and Technology Tirunelveli India Artificial Intelligence and Data Science R.M.K Engineering College Gummidipoondi Kavaraipettai Tamil Nadu India Department of Electronics and Communication Engineering PSN College of Engineering and Technology Tirunelveli Tamilnadu India School of Computer Science and Engineering Geeta University Panipat
The mango holds a significant position in India's fruit crop rotation and plays a major part in the nation's economy. The best strategy to avoid losing money and time is to recognize diseases in crops earlier.... 详细信息
来源: 评论
CShaperApp:Segmenting and analyzing cellular morphologies of the developing Caenorhabditis elegans embryo
收藏 引用
Quantitative Biology 2024年 第3期12卷 329-334页
作者: Jianfeng Cao Lihan Hu Guoye Guan Zelin Li Zhongying Zhao Chao Tang Hong Yan Department of Electrical Engineering City University of Hong KongHong KongChina Centre for Intelligent Multidimensional Data Analysis Limited Hong KongChina College of Computer and Information Hohai UniversityNanjingChina Center for Quantitative Biology Peking UniversityBeijingChina Department of Biology Hong Kong Baptist UniversityHong KongChina State Key Laboratory of Environmental and Biological Analysis Hong Kong Baptist UniversityHong KongChina Peking-Tsinghua Center for Life Sciences Peking UniversityBeijingChina School of Physics Peking UniversityBeijingChina
Caenorhabditis elegans has been widely used as a model organism in developmental biology due to its invariant *** this study,we developed a desktop software CShaperApp to segment fluorescence-labeled images of cell me... 详细信息
来源: 评论
Resource Allocation and Service Provisioning for Softwarized Network Slicing Using Game Theory: A Techno-Economic Approach
Resource Allocation and Service Provisioning for Softwarized...
收藏 引用
IEEE India Conference (INDICON)
作者: Deborsi Basu Samriddha Sanyal Goutam Das Uttam Ghosh Raja Datta G. S. Sanyal School of Telecommunications Indian Institute of Technology Kharagpur India Dept. of Electronics and Electrical Communication Engineering Indian Institute of Technology Kharagpur India Dept. of Computer Science and Data Science School of Applied Computational Sciences MMC TN USA
Softwarized Network Slicing (SNS) is a forthcoming technological advancement that is going to transform conventional resource allocation techniques. Optimizing the flow of slice resources among the key network players... 详细信息
来源: 评论
Linn: A Lightweight Image Hiding Method Based on Invertible Neural Network
SSRN
收藏 引用
SSRN 2024年
作者: Cheng, Dapeng Zhu, Minghui Mao, Yanyan Gao, Xiaolian Jing, Wanting Kong, Yue Li, Jinjiang School of Computer Science and Technology Shandong Technology and Business University Shandong Yantai264005 China Yantai Key Laboratory of Big Data Modeling and Intelligent Computingy Shandong Yantai264005 China School of Information and Electronic Engineering Shandong Technology and Business University Shandong Yantai264005 China
Image steganography aims to conceal a secret image within a cover image, allowing only those who are informed can recover it. Compared to ordinary steganography, image steganography not only demands the recovered secr... 详细信息
来源: 评论