咨询与建议

限定检索结果

文献类型

  • 8,868 篇 期刊文献
  • 8,177 篇 会议
  • 63 册 图书
  • 2 篇 专利

馆藏范围

  • 17,110 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,941 篇 工学
    • 8,281 篇 计算机科学与技术...
    • 6,968 篇 软件工程
    • 2,501 篇 信息与通信工程
    • 1,668 篇 生物工程
    • 1,355 篇 控制科学与工程
    • 1,107 篇 电气工程
    • 1,052 篇 生物医学工程(可授...
    • 917 篇 光学工程
    • 735 篇 电子科学与技术(可...
    • 587 篇 机械工程
    • 536 篇 化学工程与技术
    • 369 篇 动力工程及工程热...
    • 364 篇 安全科学与工程
    • 363 篇 交通运输工程
    • 355 篇 网络空间安全
    • 323 篇 仪器科学与技术
  • 6,312 篇 理学
    • 3,281 篇 数学
    • 1,882 篇 生物学
    • 1,594 篇 物理学
    • 1,248 篇 统计学(可授理学、...
    • 624 篇 化学
    • 578 篇 系统科学
  • 3,152 篇 管理学
    • 1,679 篇 管理科学与工程(可...
    • 1,599 篇 图书情报与档案管...
    • 810 篇 工商管理
  • 1,022 篇 医学
    • 850 篇 临床医学
    • 745 篇 基础医学(可授医学...
    • 442 篇 药学(可授医学、理...
    • 418 篇 公共卫生与预防医...
  • 542 篇 法学
    • 455 篇 社会学
  • 307 篇 经济学
  • 212 篇 农学
  • 182 篇 教育学
  • 52 篇 文学
  • 24 篇 军事学
  • 24 篇 艺术学
  • 2 篇 历史学

主题

  • 535 篇 deep learning
  • 432 篇 feature extracti...
  • 406 篇 semantics
  • 338 篇 machine learning
  • 324 篇 training
  • 321 篇 computational mo...
  • 317 篇 accuracy
  • 265 篇 predictive model...
  • 205 篇 data mining
  • 200 篇 reinforcement le...
  • 189 篇 optimization
  • 187 篇 real-time system...
  • 184 篇 internet of thin...
  • 184 篇 task analysis
  • 173 篇 neural networks
  • 170 篇 image segmentati...
  • 165 篇 data models
  • 160 篇 convolution
  • 157 篇 graph neural net...
  • 144 篇 deep neural netw...

机构

  • 820 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 372 篇 horia hulubei na...
  • 363 篇 h.h. wills physi...
  • 311 篇 university of ch...
  • 303 篇 van swinderen in...
  • 293 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 imperial college...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...

作者

  • 249 篇 barter w.
  • 241 篇 beiter a.
  • 235 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 213 篇 blake t.
  • 203 篇 brundu d.
  • 203 篇 borsato m.
  • 199 篇 betancourt c.
  • 163 篇 bediaga i.
  • 158 篇 baker s.
  • 155 篇 amato s.
  • 148 篇 boettcher t.
  • 146 篇 baryshnikov f.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman

语言

  • 13,933 篇 英文
  • 3,083 篇 其他
  • 138 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Data Science"
17110 条 记 录,以下是781-790 订阅
排序:
RoCEL: Advancing Table Entity Linking through Distinctive Row and Column Contexts
RoCEL: Advancing Table Entity Linking through Distinctive Ro...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Wang, Yuanzheng Fan, Yixing Guo, Jiafeng Zhang, Ruqing Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Table entity linking (TEL) aims to map entity mentions in the table to their corresponding entities in a knowledge base (KB). The core of this task is to leverage structured contexts, specifically row and column conte... 详细信息
来源: 评论
Text2NKG: Fine-Grained N-ary Relation Extraction for N-ary relational Knowledge Graph Construction  38
Text2NKG: Fine-Grained N-ary Relation Extraction for N-ary r...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Luo, Haoran Haihong, E. Yang, Yuhao Yao, Tianyu Guo, Yikai Tang, Zichen Zhang, Wentai Peng, Shiyao Wan, Kaiyang Song, Meina Lin, Wei Zhu, Yifan Tuan, Luu Anh School of Computer Science Beijing University of Posts and Telecommunications China School of Automation Science and Electrical Engineering Beihang University China Beijing Institute of Computer Technology and Application China Inspur Group Co. Ltd. China College of Computing and Data Science Nanyang Technological University Singapore
Beyond traditional binary relational facts, n-ary relational knowledge graphs (NKGs) are comprised of n-ary relational facts containing more than two entities, which are closer to real-world facts with broader applica...
来源: 评论
An Intrusion Detection Scheme Based on Sequential Tri-Way Decisions of Multiple Granularity for Intelligent Connected Vehicles
An Intrusion Detection Scheme Based on Sequential Tri-Way De...
收藏 引用
International Conference on Artificial Intelligence and Autonomous Transportation, AIAT 2024
作者: Li, Yongzhong Wang, Qi Li, Yuheng Zhang, Shipeng School of Automotive Engineering Nantong Institute of Technology Nantong226010 China Internet of Things and Big Data Major of Macao Polytechnic University Macao China School of Computer Science Jiangsu University of Science and Technology Zhenjiang212003 China
With the rapid developing technology of the Internet of Things, intelligent connected vehicles are facing more and more serious cybersecurity threats and challenges. With the developing of cybersecurity technology for... 详细信息
来源: 评论
PREVALENCE OF TRESILLO RHYTHM IN CONTEMPORARY POPULAR MUSIC  21
PREVALENCE OF TRESILLO RHYTHM IN CONTEMPORARY POPULAR MUSIC
收藏 引用
21st Sound and Music Computing Conference, SMC 2024
作者: Jajoria, Pushkar Mäder, Aurel Ruben Krenn, Florian McDermott, James Data Science Institute School of Computer Science University of Galway Galway Ireland Digital and Cognitive Musicology Lab École Polytechnique Fédérale de Lausanne Lausanne Switzerland
This paper presents an investigation into the prevalence and significance of the Tresillo rhythm in contemporary popular music. Initially, the Tresillo rhythm is defined and formalized within a computational framework... 详细信息
来源: 评论
Reversible data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Low-Overhead General-Purpose Near-data Processing in CXL Memory Expanders  57
Low-Overhead General-Purpose Near-Data Processing in CXL Mem...
收藏 引用
57th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2024
作者: Ham, Hyungkyu Hong, Jeongmin Park, Geonwoo Shin, Yunseon Woo, Okkyun Yang, Wonhyuk Bae, Jinhoon Park, Eunhyeok Sung, Hyojin Lim, Euicheol Kim, Gwangsun POSTECH Department of Computer Science and Engineering Korea Republic of POSTECH Graduate School of Artificial Intelligence Korea Republic of Seoul National University Graduate School of Data Science Korea Republic of SK Hynix Korea Republic of
Emerging Compute Express Link (CXL) enables cost-efficient memory expansion beyond the local DRAM of processors. While its *** protocol provides minimal latency overhead through an optimized protocol stack, frequent C... 详细信息
来源: 评论
Internet of Things IoMT data Aggregation Using Machine Learning  2
Internet of Things IoMT Data Aggregation Using Machine Learn...
收藏 引用
2nd IEEE International Conference on Device Intelligence, Computing and Communication Technologies, DICCT 2024
作者: Pulabaigari, Lakshmi Sagar Sivakumar, C. School of Computing Mohan Babu University Dept. of Computer Science and Engineering Andhra Pradesh Tirupati India School of Computing Mohan Babu University Dept. of Data Science Andhra Pradesh Tirupati India
The Internet of Things (IoT) has revolutionized the way data is handled and collected, allowing for large amounts of information to be revolutionized quickly and efficiently. This has paved the way for Machine Learnin... 详细信息
来源: 评论
GoMatching: A Simple Baseline for Video Text Spotting via Long and Short Term Matching  38
GoMatching: A Simple Baseline for Video Text Spotting via Lo...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: He, Haibin Ye, Maoyuan Zhang, Jing Liu, Juhua Du, Bo Tao, Dacheng School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Wuhan University China College of Computing & Data Science Nanyang Technological University Singapore
Beyond the text detection and recognition tasks in image text spotting, video text spotting presents an augmented challenge with the inclusion of tracking. While advanced end-to-end trainable methods have shown commen...
来源: 评论
R2V-PPI: Enhancing Prediction of Protein-Protein Interactions Using Word2Vec Embeddings and Deep Neural Networks  4
R2V-PPI: Enhancing Prediction of Protein-Protein Interaction...
收藏 引用
4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Oviya, I.R. Sravya N, Shanmukha Raja, Kalpana Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science Engineering Chennai601103 India Yale University Section for Biomedical Informatics and Data Science School of Medicine New HavenCT United States
Proteins play a crucial role in living organisms, and understanding protein-protein interactions is vital for comprehending their functions and aiding drug discovery. In recent years, advanced deep learning models hav... 详细信息
来源: 评论
Secure Formation Control of Multi-Agent System against FDI Attack Using Fixed-Time Convergent Reinforcement Learning
收藏 引用
IEEE Transactions on Control of Network Systems 2025年 第2期12卷 1203-1214页
作者: Gong, Zhenyu Yang, Feisheng Yuan, Yuan Ma, Qian Zheng, Wei Xing Northwestern Polytechnical University School of Automation and Innovation Center NPU Chongqing Shaanxi Xi'an710129 China Northwestern Polytechnical University School of Astronautics Shaanxi Xi'an710072 China Nanjing University of Science and Technology School of Automation Jiangsu Nanjing210094 China Western Sydney University School of Computer Data and Mathematical Sciences SydneyNSW2751 Australia
In this paper, a fixed-time convergent reinforcement learning (RL) algorithm is proposed to accomplish the secure formation control of a second-order multi-agent system (MAS) under the false data injection (FDI) attac... 详细信息
来源: 评论