咨询与建议

限定检索结果

文献类型

  • 8,975 篇 期刊文献
  • 8,159 篇 会议
  • 63 册 图书
  • 2 篇 专利

馆藏范围

  • 17,199 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,061 篇 工学
    • 8,413 篇 计算机科学与技术...
    • 6,993 篇 软件工程
    • 2,534 篇 信息与通信工程
    • 1,678 篇 生物工程
    • 1,464 篇 控制科学与工程
    • 1,166 篇 电气工程
    • 1,059 篇 生物医学工程(可授...
    • 917 篇 光学工程
    • 760 篇 电子科学与技术(可...
    • 593 篇 机械工程
    • 541 篇 化学工程与技术
    • 380 篇 动力工程及工程热...
    • 371 篇 交通运输工程
    • 369 篇 安全科学与工程
    • 361 篇 网络空间安全
    • 325 篇 仪器科学与技术
  • 6,374 篇 理学
    • 3,292 篇 数学
    • 1,891 篇 生物学
    • 1,610 篇 物理学
    • 1,238 篇 统计学(可授理学、...
    • 636 篇 化学
    • 582 篇 系统科学
  • 3,170 篇 管理学
    • 1,692 篇 管理科学与工程(可...
    • 1,605 篇 图书情报与档案管...
    • 813 篇 工商管理
  • 1,041 篇 医学
    • 860 篇 临床医学
    • 752 篇 基础医学(可授医学...
    • 441 篇 药学(可授医学、理...
    • 420 篇 公共卫生与预防医...
  • 539 篇 法学
    • 453 篇 社会学
  • 307 篇 经济学
  • 213 篇 农学
  • 178 篇 教育学
  • 55 篇 文学
  • 25 篇 军事学
  • 24 篇 艺术学
  • 2 篇 历史学

主题

  • 541 篇 deep learning
  • 422 篇 feature extracti...
  • 404 篇 semantics
  • 334 篇 machine learning
  • 321 篇 computational mo...
  • 320 篇 training
  • 305 篇 accuracy
  • 256 篇 predictive model...
  • 203 篇 reinforcement le...
  • 201 篇 data mining
  • 192 篇 optimization
  • 185 篇 task analysis
  • 182 篇 real-time system...
  • 178 篇 internet of thin...
  • 175 篇 neural networks
  • 169 篇 image segmentati...
  • 168 篇 graph neural net...
  • 162 篇 data models
  • 158 篇 convolution
  • 145 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 371 篇 horia hulubei na...
  • 361 篇 h.h. wills physi...
  • 311 篇 university of ch...
  • 303 篇 van swinderen in...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 imperial college...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...

作者

  • 249 篇 barter w.
  • 241 篇 beiter a.
  • 234 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 212 篇 blake t.
  • 204 篇 brundu d.
  • 201 篇 borsato m.
  • 199 篇 betancourt c.
  • 163 篇 bediaga i.
  • 157 篇 baker s.
  • 153 篇 amato s.
  • 148 篇 baryshnikov f.
  • 148 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman

语言

  • 15,311 篇 英文
  • 1,783 篇 其他
  • 127 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Data Science"
17199 条 记 录,以下是431-440 订阅
排序:
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Hao, Yijun Yang, Shusen Li, Fang Zhang, Yifan Zhao, Cong Ren, Xuebin Zhao, Peng Xu, Chenren Wang, Shibo Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Xi’an710049 China Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China Peking University School of Computer Science Beijing100871 China The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University Xi'an710049 China
Network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
A Transmission and Transformation Fault Detection Algorithm Based on Improved YOLOv5
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 2997-3011页
作者: Xinliang Tang Xiaotong Ru Jingfang Su Gabriel Adonis School of Information Science and Engineering Hebei University of Science and TechnologyShijiazhuang050000China Department of Computer Science and Information Systems Birkbeck Institute for Data AnalyticsLondonB100ABWC1E 7HXUK
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line *** these faults is of great significance for the s... 详细信息
来源: 评论
A Multi-QoS-Constrained Routing Algorithm for Double-Layer Satellite Networks Based on Enhanced NSGA-II Algorithm
A Multi-QoS-Constrained Routing Algorithm for Double-Layer S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Yu, Song Hao, Ning Long, Jun Liu, Limin School of Computer Science and Engineering Central South University Changsha410075 China School of Computer Science at Central South University Changsha410075 China The Big Data Institute Central South University Changsha410083 China
Addressing the issue of inadequate Quality of Service (QoS) in inter-satellite communication under high load conditions due to limited network resources and uneven user distribution in a double-layer satellite constel... 详细信息
来源: 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
science China(Information sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论
Graph Contrastive Learning for Truth Inference  40
Graph Contrastive Learning for Truth Inference
收藏 引用
40th IEEE International Conference on data Engineering, ICDE 2024
作者: Liu, Hao Liu, Jiacheng Tang, Feilong Li, Peng Chen, Long Yu, Jiadi Zhu, Yanmin Gao, Min Yang, Yanqin Hou, Xiaofeng Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong East China Normal University School of Data Science and Engineering Shanghai China Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai China University of Aizu School of Computer Science and Engineering Japan Simon Fraser University School of Computing Science Canada
Crowdsourcing has become a popular paradigm for collecting large-scale labeled datasets by leveraging numerous annotators. However, these annotators often provide noisy labels due to varying expertise. Truth inference... 详细信息
来源: 评论
A Tutorial on Federated Learning from Theory to Practice:Foundations,Software Frameworks,Exemplary Use Cases,and Selected Trends
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第4期11卷 824-850页
作者: M.Victoria Luzón Nuria Rodríguez-Barroso Alberto Argente-Garrido Daniel Jiménez-López Jose M.Moyano Javier Del Ser Weiping Ding Francisco Herrera Department of Software Engineering Andalusian Research Institute in Data Science and Computational Intelligence(DaSCI)University of GranadaGranada 18071Spain Department of Computer Science and Artificial Intelligence Andalusian Research Institute in Data Science and Computational Intelligence(DaSCI)University of GranadaGranada 18071Spain Department of Communications Engineering University of the Basque Country(UPV/EHU)and also with TECNALIABasque Research&Technology Alliance(BRTA)Spain School of Information Science and Technology Nantong UniversityNantong 226019China
When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized *** allows ML models t... 详细信息
来源: 评论
A Functional Connectivity-Based EEG Analysis for the Decision-Makings in Ultimatum Game  17
A Functional Connectivity-Based EEG Analysis for the Decisio...
收藏 引用
17th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2024
作者: Gao, Xiang Zhuang, Yue Chen, LiJun Huang, ZhiHua College of Computer and Data Science Fuzhou University Fuzhou China School of Humanities and Social Sciences Fuzhou University Fuzhou China
In the ultimatum game (UG), individuals usually reject extremely unfair offers and accept fair ones. A mid-value offer is unfair, but not to the point of immediate rejection. When faced with this, most individuals hes... 详细信息
来源: 评论
ICL: Iterative Continual Learning for Multi-domain Neural Machine Translation
ICL: Iterative Continual Learning for Multi-domain Neural Ma...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Man, Zhibo Huang, Kaiyu Zhang, Yujie Chen, Yuanmeng Chen, Yufeng Xu, Jinan Beijing Key Lab of Traffic Data Analysis and Mining School of Computer Science and Technology Beijing Jiaotong University Beijing China
In a practical scenario, multi-domain neural machine translation (MDNMT) aims to continuously acquire knowledge from new domain data while retaining old *** work separately learns each new domain knowledge based on pa... 详细信息
来源: 评论
Research on a Technology of Mail Anti-virus Gateway for Industrial Internet
Research on a Technology of Mail Anti-virus Gateway for Indu...
收藏 引用
2023 IEEE International Conference on Image Processing and computer Applications, ICIPCA 2023
作者: Wu, Yuhong Lv, Yunshan Zhang, Ling School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China
With the rapid rise of the Industrial Internet, emails that convey a large amount of information require a strong network security environment. Aiming at the increasingly complex mail virus prevention and control work... 详细信息
来源: 评论
SpeAr: A Spectral Approach for Zero-Shot Node Classification  38
SpeAr: A Spectral Approach for Zero-Shot Node Classification
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Guo, Ting Wang, Da Liang, Jiye Zhang, Kaihan Zeng, Jianchao Data Science and Technology North University of China Taiyuan China School of Computer and Information Technology Shanxi University Taiyuan China
Zero-shot node classification is a vital task in the field of graph data processing, aiming to identify nodes of classes unseen during the training process. Prediction bias is one of the primary challenges in zero-sho...
来源: 评论