咨询与建议

限定检索结果

文献类型

  • 5,987 篇 期刊文献
  • 5,170 篇 会议
  • 49 册 图书

馆藏范围

  • 11,206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,206 篇 工学
    • 5,360 篇 计算机科学与技术...
    • 4,518 篇 软件工程
    • 1,773 篇 信息与通信工程
    • 1,136 篇 生物工程
    • 908 篇 电气工程
    • 903 篇 控制科学与工程
    • 720 篇 生物医学工程(可授...
    • 651 篇 光学工程
    • 619 篇 电子科学与技术(可...
    • 403 篇 机械工程
    • 362 篇 化学工程与技术
    • 281 篇 动力工程及工程热...
    • 280 篇 交通运输工程
    • 253 篇 仪器科学与技术
    • 249 篇 网络空间安全
    • 238 篇 安全科学与工程
  • 4,274 篇 理学
    • 2,131 篇 数学
    • 1,299 篇 生物学
    • 1,176 篇 物理学
    • 799 篇 统计学(可授理学、...
    • 442 篇 化学
    • 384 篇 系统科学
  • 2,082 篇 管理学
    • 1,211 篇 管理科学与工程(可...
    • 966 篇 图书情报与档案管...
    • 587 篇 工商管理
  • 694 篇 医学
    • 575 篇 临床医学
    • 501 篇 基础医学(可授医学...
    • 295 篇 药学(可授医学、理...
    • 286 篇 公共卫生与预防医...
  • 356 篇 法学
    • 301 篇 社会学
  • 231 篇 经济学
  • 162 篇 农学
  • 115 篇 教育学
  • 44 篇 文学
  • 21 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 366 篇 deep learning
  • 295 篇 feature extracti...
  • 266 篇 accuracy
  • 241 篇 semantics
  • 238 篇 machine learning
  • 232 篇 training
  • 210 篇 computational mo...
  • 176 篇 predictive model...
  • 155 篇 internet of thin...
  • 143 篇 real-time system...
  • 135 篇 optimization
  • 135 篇 data models
  • 130 篇 data mining
  • 122 篇 reinforcement le...
  • 120 篇 convolutional ne...
  • 114 篇 neural networks
  • 104 篇 image segmentati...
  • 104 篇 convolution
  • 102 篇 object detection
  • 102 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 403 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 387 篇 h.h. wills physi...
  • 361 篇 van swinderen in...
  • 336 篇 yandex school of...
  • 309 篇 cavendish labora...
  • 309 篇 school of physic...
  • 308 篇 university of ch...
  • 293 篇 nikhef national ...
  • 289 篇 imperial college...
  • 289 篇 center for high ...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 244 篇 bellee v.
  • 241 篇 beiter a.
  • 222 篇 casse g.
  • 216 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 212 篇 borsato m.
  • 212 篇 betancourt c.
  • 208 篇 brundu d.
  • 201 篇 bediaga i.
  • 195 篇 amato s.
  • 187 篇 baryshnikov f.
  • 179 篇 boettcher t.
  • 161 篇 braun s.
  • 159 篇 baker s.
  • 159 篇 borisyak m.
  • 146 篇 bizzeti a.
  • 145 篇 bjørn m.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery

语言

  • 10,360 篇 英文
  • 767 篇 其他
  • 85 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Data Engineering"
11206 条 记 录,以下是4831-4840 订阅
排序:
Metadata Management for Distributed Multimedia Storage System
Metadata Management for Distributed Multimedia Storage Syste...
收藏 引用
International Symposium on Electronic Commerce and Security
作者: Ling Zhan Jiguang Wan Peng Gu Key Laboratory of Data Storage System School of Computer Science and Technology Huazhong University of Science and Technology Wuhan Hubei China School of Electrical Engineering and Computer Science University of Central Florida Orlando FL USA
As a result of the multimedia rapid growth, there has been a huge increase in the amount of information generated and shared by people all over the world. Demand for large-scale multimedia storage system is growing ra... 详细信息
来源: 评论
An Empirical Evaluation of NVM-aware File Systems on Intel Optane DC Persistent Memory Modules
An Empirical Evaluation of NVM-aware File Systems on Intel O...
收藏 引用
International Conference on Information Networking
作者: Guangyu Zhu Jaehyun Han Sangjin Lee Yongseok Son CAU Institute of Innovative Talent of Big Data Dept. of Computer Science and Engineering and Chung-Ang University Seoul South Korea School of Computer Science and Engineering Chung-Ang University Seoul South Korea
Cloud computing arouses the need for large-scale data processing which in turn promises vigorous developments on distributed file systems. The performance of the underlying storage nodes determines the performance of ... 详细信息
来源: 评论
Impact of individual behavioral changes on epidemic spreading in time-varying networks
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Bing Xie, Zeyang Han, Yuexing School of Computer Engineering and Science Shanghai University Shanghai China Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai China
Changes in individual behavior often entangles with the dynamic interaction of individuals, which complicates the epidemic process and brings great challenges for the understanding and control of the epidemic. In this... 详细信息
来源: 评论
Accessible Authentication Using Keyword Search through Homomorphic Encryption  1
Accessible Authentication Using Keyword Search through Homom...
收藏 引用
1st IEEE International Interdisciplinary Humanitarian Conference for Sustainability, IIHC 2022
作者: Vekariya, Vipul Manjunath, R. Gill, Jasmeen Gopianand, M. Kumar, Avneesh Jha, Amaresh Parul University Department of CSE PIET Gujarat Vadodara India Department of Data Science & Mathamatics Bangalore India RIMT University Department of CSE Godindgarh Mandi India PSNA College of Engineering and Technology Department of Computer Applications Dindigul India Galgotias University Department of Computer Application Uttar Pradesh Greater Noida India School of Modern Media UPES Dehradun India
data storage presents substantial issues due to concerns about data security and privacy. In this study, we provide a search-based, interoperable, verified public key cryptography system. The searchability is signific... 详细信息
来源: 评论
MRI Brain Tumor Segmentation using Cuckoo-based Dimensionality Reduction and Ensemble Convolutional Neural Network
收藏 引用
Open Biomedical engineering Journal 2024年 第spl1期18卷
作者: Shenbagarajan, A. Ragavan, K. Shenbagalakshmi, G. Venkatesh, R. Department of Artificial Intelligence and Data Science Mepco Schlenk Engineering College School of Computer Science and Engineering Vellore Institute of Technology Department of Computer Science and Engineering Mepco Schlenk Engineering College Department of Computer Science and Engineering Ramco Institute of Technology
Background: Brain tumor identification at an early stage is a challenging task that increases the lifetime of patients. Specialists' conclusions on recognizing brain tumors are difficult, as they are based on thei... 详细信息
来源: 评论
Impact of individual behavioral changes on epidemic spreading in time-varying networks
收藏 引用
Physical Review E 2021年 第4期104卷 044307-044307页
作者: Bing Wang Zeyang Xie Yuexing Han School of Computer Engineering and Science Shanghai University Shanghai 200444 P.R. China Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai 200444 P.R. China
Changes in individual behavior often entangle with the dynamic interaction of individuals, which complicates the epidemic process and brings great challenges for the understanding and control of the epidemic. In this ... 详细信息
来源: 评论
MHRNet: A Multi-stage Image Deblurring Approach with High-Resolution Representation Learning
MHRNet: A Multi-stage Image Deblurring Approach with High-Re...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Wenfu Liu Junjie Peng Haochen Yuan Luming Zhang Zesu Cai School of Computer Engineering and Science Shanghai University Shanghai China Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai China School of Computer Science and Technology Harbin Institute of Technology Harbin China
Image deblurring is a classic task in computer vision that aims to recover clean images from blurred images and is widely used in surveillance, medical imaging and so on. Existing methods typically apply a multi-stage...
来源: 评论
Sentiment Analysis in Social Media Using Deep Learning Techniques
Sentiment Analysis in Social Media Using Deep Learning Techn...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Babu, M. Shinde, Pravin Vishnu Agrawal, Neha Bhaskar, M. Vijaya Hemabala, K. Priya, Sweta Rajalakshmi Institute of Technology Department of Computer Science and Engineering Chennai600124 India Shah and Anchor Kutchhi Engineering College Affiliated to University of Mumbai Department of Artificial Intelligence & Data Science Maharashtra India Maharaja Agrasen Institute of Technology Department of It New Delhi110085 India SriVenkateswara Institute of Technology Department of Computer Science & Engineering Andhra Pradesh Anantapur India Department of Freshmen Tiruvathi517502 India Amity University Department of Amity School of Communication University Patna801503 India
This work offers a thorough investigation of sentiment analysis in social media using deep learning techniques. Understanding stoner sentiment has become essential for colourful operations like marketing, public opini... 详细信息
来源: 评论
OCI Runtime Comparison and Analysis Study  5
OCI Runtime Comparison and Analysis Study
收藏 引用
5th IEEE International Conference on Artificial Intelligence and Knowledge engineering, AIKE 2022
作者: Jeon, Sung Hwan Shim, Simon Chung, Haejin Nah, Yunmook Dept. of Data Science Graduate School Dankook University Yongin-si Korea Republic of Dept. of Computer Engineering San Jose State University San Jose United States Cha Mirisa College Duksung Women's University Seoul Korea Republic of Dept. of Applied Computer Eng. Dankook University Yongin-si Korea Republic of
Containers are one of the technologies required for cloud services. Because containers use resources directly on the host, they are lighter and faster than traditional virtual machines. However, it has the disadvantag... 详细信息
来源: 评论
Deep policy hashing network with listwise supervision
arXiv
收藏 引用
arXiv 2019年
作者: Wang, Shaoying Lai, Haijiang Yang, Yifan Yin, Jian School of Electronics and Information Engineering Sun Yat-Sen University Guangzhou China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China School of Data and Computer Science Sun Yat-Sen University Guangzhou China
Deep-networks-based hashing has become a leading approach for large-scale image retrieval, which learns a similarity-preserving network to map similar images to nearby hash codes. The pairwise and triplet losses are t... 详细信息
来源: 评论