咨询与建议

限定检索结果

文献类型

  • 8,821 篇 期刊文献
  • 8,177 篇 会议
  • 63 册 图书
  • 2 篇 专利

馆藏范围

  • 17,063 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,947 篇 工学
    • 8,282 篇 计算机科学与技术...
    • 6,968 篇 软件工程
    • 2,502 篇 信息与通信工程
    • 1,668 篇 生物工程
    • 1,356 篇 控制科学与工程
    • 1,108 篇 电气工程
    • 1,052 篇 生物医学工程(可授...
    • 917 篇 光学工程
    • 735 篇 电子科学与技术(可...
    • 588 篇 机械工程
    • 535 篇 化学工程与技术
    • 369 篇 动力工程及工程热...
    • 364 篇 安全科学与工程
    • 363 篇 交通运输工程
    • 355 篇 网络空间安全
    • 322 篇 仪器科学与技术
  • 6,311 篇 理学
    • 3,287 篇 数学
    • 1,881 篇 生物学
    • 1,593 篇 物理学
    • 1,253 篇 统计学(可授理学、...
    • 624 篇 化学
    • 578 篇 系统科学
  • 3,153 篇 管理学
    • 1,679 篇 管理科学与工程(可...
    • 1,600 篇 图书情报与档案管...
    • 810 篇 工商管理
  • 1,018 篇 医学
    • 847 篇 临床医学
    • 743 篇 基础医学(可授医学...
    • 442 篇 药学(可授医学、理...
    • 418 篇 公共卫生与预防医...
  • 542 篇 法学
    • 455 篇 社会学
  • 306 篇 经济学
  • 212 篇 农学
  • 182 篇 教育学
  • 52 篇 文学
  • 24 篇 军事学
  • 23 篇 艺术学
  • 2 篇 历史学

主题

  • 534 篇 deep learning
  • 424 篇 feature extracti...
  • 400 篇 semantics
  • 341 篇 machine learning
  • 329 篇 training
  • 319 篇 computational mo...
  • 317 篇 accuracy
  • 264 篇 predictive model...
  • 205 篇 data mining
  • 200 篇 reinforcement le...
  • 189 篇 optimization
  • 184 篇 task analysis
  • 183 篇 internet of thin...
  • 183 篇 real-time system...
  • 173 篇 neural networks
  • 170 篇 image segmentati...
  • 162 篇 convolution
  • 162 篇 data models
  • 155 篇 graph neural net...
  • 144 篇 deep neural netw...

机构

  • 828 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 374 篇 horia hulubei na...
  • 366 篇 h.h. wills physi...
  • 312 篇 university of ch...
  • 305 篇 van swinderen in...
  • 293 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 imperial college...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 237 篇 bellee v.
  • 222 篇 casse g.
  • 215 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 206 篇 borsato m.
  • 204 篇 brundu d.
  • 202 篇 betancourt c.
  • 163 篇 bediaga i.
  • 158 篇 baker s.
  • 149 篇 amato s.
  • 149 篇 boettcher t.
  • 146 篇 albrecht j.
  • 145 篇 baryshnikov f.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman

语言

  • 13,886 篇 英文
  • 3,083 篇 其他
  • 138 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Data Science"
17063 条 记 录,以下是891-900 订阅
排序:
TROPICAL: Transformer-Based Hypergraph Learning for Camouflaged Fraudster Detection  24
TROPICAL: Transformer-Based Hypergraph Learning for Camoufla...
收藏 引用
24th IEEE International Conference on data Mining, ICDM 2024
作者: Haghighi, Venus Soltani, Behnaz Shabani, Nasrin Wu, Jia Zhang, Yang Yao, Lina Sheng, Quan Z. Yang, Jian School of Computing Macquarie University SydneyNSW2109 Australia School of Computer Science and Engineering University of New South Wales NSW Australia CSIRO's Data61 Australia
Graph-based fraud detection has attracted increasing attention in recent years, reflecting its growing potential in mitigating sophisticated fraudulent activities. The main objective of graph-based fraud detection is ... 详细信息
来源: 评论
Augmenting IoT Intrusion Detection System Performance Using Deep Neural Network
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1351-1374页
作者: Nasir Sayed Muhammad Shoaib Waqas Ahmed Sultan Noman Qasem Abdullah M.Albarrak Faisal Saeed Department of Computer Science Islamia College PeshawarPeshawar25120Pakistan Department of Computer Science CECOS University of IT and Emerging SciencesPeshawar25000Pakistan Department of Electrical Engineering HITEC University TaxilaTaxila47080Pakistan Computer Science Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia DAAI Research Group Department of Computing and Data ScienceSchool of Computing and Digital TechnologyBirmingham City UniversityBirminghamB47XGUK
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly ... 详细信息
来源: 评论
Artificial Intelligence Strategies for Accurate Segmentation and Categorization of Unveiling Genetic Disorders in Bioinformatics  2
Artificial Intelligence Strategies for Accurate Segmentation...
收藏 引用
2nd International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024
作者: Sarathamani, T. Kavitha, K. Thirumoorthi, C. Vagini, K Jayanthi Manikandaprabhu, P. Sumathi, P. Kolkata India Mohan Babu University School of Computing Department of Ai and Ml Sree Sainath Nagar Tirupati India Psg College of Arts and Science Department of Computer Science Tamilnadu Coimbatore India Kpr College of Arts Science and Research Department of Computer science with Data Analytics Tamilnadu Coimbatore India Amrita Vishwa Vidyapeetham School of Computing Department of Computer Science Karnataka Mysuru India Dr. G R Damodaran College of Science Department of Computer Science Tamilnadu Coimbatore India
Women all across the world are affected by the potentially fatal condition known as breast cancer. According to clinical experts, early cancer detection helps to save lives. Several machine learning algorithms have be... 详细信息
来源: 评论
A Hybrid Model Using Coordinate Attention Mechanisms for Stock Price Prediction  24
A Hybrid Model Using Coordinate Attention Mechanisms for Sto...
收藏 引用
2024 International Conference on Digital Economy, Blockchain and Artificial Intelligence, DEBAI 2024
作者: Sun, Ying Zhang, Bowen Peng, Cheng The Institute for Sustainable Development Macau University of Science and Technology China College of Big Data and Internet Shenzhen Technology University Shenzhen China School of Computer Science University of Electronic Science and Technology of China Zhongshan China
Predicting stock prices is a complex and challenging task in financial markets due to the intricate and non-linear nature of stock price movements. This study explores the application of Coordinate Attention mechanism... 详细信息
来源: 评论
AegonKV: A High Bandwidth, Low Tail Latency, and Low Storage Cost KV-Separated LSM Store with SmartSSD-based GC Offloading  23
AegonKV: A High Bandwidth, Low Tail Latency, and Low Storage...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Duan, Zhuohui Feng, Hao Liu, Haikun Liao, Xiaofei Jin, Hai Li, Bangyu National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
The key-value separation is renowned for its significant mitigation of the write amplification inherent in traditional LSM trees. However, KV separation potentially increases performance overhead in the management of ... 详细信息
来源: 评论
Dynamic Modeling of Antibody Level Changes with Individual Age: The Case of COVID-19 Spread in China
收藏 引用
International Journal of Applied and Computational Mathematics 2023年 第5期9卷 1-23页
作者: Li, Li Wang, Yangqing Zhang, Wei School of Computer and Information Technology Shanxi University Shanxi Taiyuan 030006 China Data Science and Technology North University of China Taiyuan 030051 China
COVID-19 is a ribonucleic acid virus with a high mutation frequency and will continue to mutate as time goes on. At the same time, the number of antibodies in the human body will gradually decrease with time. This pap... 详细信息
来源: 评论
Implicit Reasoning in Transformers is Reasoning through Shortcuts
arXiv
收藏 引用
arXiv 2025年
作者: Lin, Tianhe Xie, Jian Yuan, Siyu Yang, Deqing School of Data Science Fudan University China School of Computer Science Fudan University China
Test-time compute is emerging as a new paradigm for enhancing language models’ complex multi-step reasoning capabilities, as demonstrated by the success of OpenAI’s o1 and o3, as well as DeepSeek’s R1. Compared to ... 详细信息
来源: 评论
A sharding blockchain-based UAV system for search and rescue missions
收藏 引用
Frontiers of computer science 2025年 第3期19卷 103-118页
作者: Xihan ZHANG Jiashuo ZHANG Jianbo GAO Libin XIA Zhi GUAN Hao HU Zhong CHEN School of Computer Science Peking UniversityBeijing 100871China Peking University Chongqing Research Institute of Big Data Chongqing 401329China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China State Key Lab for Novel Software Technology Nanjing UniversityNanjing 210023China
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions cal... 详细信息
来源: 评论
Exploring the Efficiency of Text-Similarity Measures in Automated Resume Screening for Recruitment  10
Exploring the Efficiency of Text-Similarity Measures in Auto...
收藏 引用
17th INDIACom;2023 10th International Conference on Computing for Sustainable Global Development, INDIACom 2023
作者: Alsharef, Ahmad Sonia Nassour, Hasan Sharma, Jitender Yogananda School of AI Computer and Data Science Shoolini University Solan India School of Management Sciences and Liberal Arts Shoolini University Solan India
With many online recruitment portals requesting job applicants to upload their resumes, the automated process of screening and shortlisting candidates can accelerate selection and decision-making. This study explores ... 详细信息
来源: 评论
HOLMES: An Efficient and Lightweight Semantic Based Anomalous Email Detector  19
HOLMES: An Efficient and Lightweight Semantic Based Anomalou...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Wu, Peilun Guo, Hui Data Security & Compliance Cdo Data & Cloud PwC Cn China School of Computer Science and Engineering Australia
Email threat is a serious issue for enterprise security. The threat can be in various malicious forms, such as phishing, fraud, blackmail and malvertisement. The traditional anti-spam gateway often maintains a greylis... 详细信息
来源: 评论