咨询与建议

限定检索结果

文献类型

  • 14,702 篇 会议
  • 10,183 篇 期刊文献
  • 219 册 图书

馆藏范围

  • 25,104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,661 篇 工学
    • 10,413 篇 计算机科学与技术...
    • 8,517 篇 软件工程
    • 3,639 篇 信息与通信工程
    • 2,514 篇 控制科学与工程
    • 2,183 篇 电气工程
    • 1,881 篇 生物工程
    • 1,807 篇 电子科学与技术(可...
    • 1,431 篇 生物医学工程(可授...
    • 1,295 篇 光学工程
    • 1,204 篇 机械工程
    • 1,034 篇 化学工程与技术
    • 966 篇 动力工程及工程热...
    • 893 篇 仪器科学与技术
    • 759 篇 材料科学与工程(可...
    • 646 篇 网络空间安全
    • 641 篇 交通运输工程
    • 625 篇 安全科学与工程
  • 9,035 篇 理学
    • 4,352 篇 数学
    • 3,112 篇 物理学
    • 2,079 篇 生物学
    • 1,470 篇 统计学(可授理学、...
    • 1,085 篇 化学
    • 962 篇 系统科学
  • 4,123 篇 管理学
    • 2,607 篇 管理科学与工程(可...
    • 1,682 篇 图书情报与档案管...
    • 1,182 篇 工商管理
  • 1,426 篇 医学
    • 1,194 篇 临床医学
    • 1,067 篇 基础医学(可授医学...
    • 642 篇 公共卫生与预防医...
    • 626 篇 药学(可授医学、理...
  • 740 篇 法学
  • 491 篇 经济学
  • 388 篇 农学
  • 287 篇 教育学
  • 69 篇 文学
  • 50 篇 军事学
  • 50 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 649 篇 deep learning
  • 606 篇 accuracy
  • 430 篇 feature extracti...
  • 430 篇 training
  • 424 篇 machine learning
  • 405 篇 computational mo...
  • 370 篇 internet of thin...
  • 287 篇 predictive model...
  • 275 篇 real-time system...
  • 273 篇 support vector m...
  • 231 篇 optimization
  • 229 篇 data models
  • 206 篇 neural networks
  • 199 篇 convolutional ne...
  • 196 篇 image segmentati...
  • 190 篇 reliability
  • 178 篇 semantics
  • 171 篇 artificial intel...
  • 170 篇 computer archite...
  • 168 篇 computer science

机构

  • 242 篇 institute of com...
  • 184 篇 university of ch...
  • 125 篇 university of sc...
  • 113 篇 school of comput...
  • 97 篇 department of co...
  • 93 篇 national enginee...
  • 93 篇 school of comput...
  • 91 篇 tianfu cosmic ra...
  • 87 篇 department of ph...
  • 85 篇 north-west unive...
  • 80 篇 department of co...
  • 79 篇 infn sezione di ...
  • 79 篇 hebei normal uni...
  • 78 篇 infn sezione di ...
  • 77 篇 institut univers...
  • 74 篇 state key labora...
  • 72 篇 yunnan observato...
  • 71 篇 national centre ...
  • 69 篇 faculty of compu...
  • 66 篇 università di ca...

作者

  • 134 篇 niyato dusit
  • 105 篇 bastieri d.
  • 87 篇 ferrara g.
  • 87 篇 ardid m.
  • 86 篇 calvo d.
  • 85 篇 chen a.
  • 76 篇 li xin
  • 76 篇 gal t.
  • 76 篇 bozza c.
  • 75 篇 fang j.
  • 75 篇 feng c.f.
  • 71 篇 díaz a.f.
  • 69 篇 jiang k.
  • 69 篇 li cheng
  • 68 篇 kuleshov d.
  • 67 篇 kalekin o.
  • 66 篇 liu d.
  • 65 篇 chen m.j.
  • 62 篇 boumaaza j.
  • 61 篇 min z.

语言

  • 22,851 篇 英文
  • 2,024 篇 其他
  • 242 篇 中文
  • 7 篇 日文
  • 3 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=School of Computing Engineering and Technology"
25104 条 记 录,以下是4781-4790 订阅
排序:
EVALUATION OF JACKING FORCES IN WEATHERED PHYLLITE: GEOMATERIAL CHARACTERIZATION AND DEEP LEARNING TECHNIQUES  38
EVALUATION OF JACKING FORCES IN WEATHERED PHYLLITE: GEOMATER...
收藏 引用
38th Annual International No-Dig Conference and Exhibition 2022, ISTT 2022
作者: Choo, Chung Siung Ong, Dominic Ek Leong Phangkawira, Fredrik Yeo, Lit Yen Lee, Sue Han Faculty of Engineering Computing and Science Swinburne University of Technology Sarawak Campus Sarawak Malaysia School of Engineering and Built Environment Griffith University Nathan Campus QLD Australia WSP Golder Jakarta Indonesia
The estimation of frictional jacking forces is not well understood for pipe jacking drives traversing weathered lithological units, such as those found in the Tuang Formation underlying the central business district (... 详细信息
来源: 评论
Multi-Granular Multimodal Clue Fusion for Meme Understanding
arXiv
收藏 引用
arXiv 2025年
作者: Zheng, Li Fei, Hao Dai, Ting Peng, Zuquan Li, Fei Ma, Huisheng Teng, Chong Ji, Donghong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China National University of Singapore Singapore Singapore Laboratory for Advanced Computing and Intelligence Engineering Wuxi China North China Institute of Computing Technology Beijing China
With the continuous emergence of various social media platforms frequently used in daily life, the multimodal meme understanding (MMU) task has been garnering increasing attention. MMU aims to explore and comprehend t... 详细信息
来源: 评论
Brain Depletion Recognition Through Iot Sensors Empowered with Computational Intelligence  4th
Brain Depletion Recognition Through Iot Sensors Empowered wi...
收藏 引用
4th International Conference on Futuristic Trends in Networks and computing Technologies, FTNCT 2021
作者: Theodore, Shaji. K. A. Selvakumar, K. Revathy, G. Faculty of IT–Networking Department of IT University of Technology and Applied Sciences Al-Masnaah Oman Department of IT Faculty of Engineering and Technology Annamalai University Chidmabaram India School of Computing SASTRA Deemed to Be University Thanjavur India
The world has been inspired by the development of Internet of Things enabling applications in recent years, which have brought outstanding solutions to a number of problems. This fast-growing industry is led by wirele... 详细信息
来源: 评论
A Mutual Intrusion Detection System for MANET to Address DDoS attacks using Data Mining Techniques  2
A Mutual Intrusion Detection System for MANET to Address DDo...
收藏 引用
2nd International Conference on Sustainable computing and Data Communication Systems, ICSCDS 2023
作者: Bala, K. Renjith, P.N. Latha, M. Santhanalakshmi, S.T. School of Computing Bharath Institute of Higher Education and Research Department of Computer Science and Engineering Tamilnadu Chennai600073 India Department of Computer Science and Engineering VIT Chennai Campus Tamilnadu Chennai600127 India Srm Institute of Science and Technology Department of Information Technology Ramapuram Campus Tamilnadu Chennai600089 India Panimalar Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai600123 India
A type of wireless communication network called a mobile ad hoc network (MANET) is composed of numerous flexible components that can move in any of the network's many directions. The Intrusion Detection System (ID... 详细信息
来源: 评论
Hierarchical Tracking Control for a Composite Mobile Robot Considering System Uncertainties
Hierarchical Tracking Control for a Composite Mobile Robot C...
收藏 引用
International Conference on Computer and Automation engineering, ICCAE
作者: Yiming Yan Fusen Guo Huadong Mo Xueting Huang School of Mechanical Engineering Southeast University Nanjing China School of Science Computing and Engineering Technologies Swinburne University of Technology Melbourne Australia School of Engineering and Information Technology University of New South Wales Canberra Australia Faculty of Art design Guangzhou College of Commerce Guangzhou China
Composite mobile robots (CMRs) have gained extensive application in the industrial sector due to their integrated loading and operational capabilities. The trajectory tracking control module, being a vital constituent... 详细信息
来源: 评论
Expediting Distributed GNN Training with Feature-only Partition and Optimized Communication Planning
Expediting Distributed GNN Training with Feature-only Partit...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Bingqian Du Jun Liu Ziyue Luo Chuan Wu Qiankun Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Electrical and Computer Engineering The Ohio State University USA Department of Computer Science The University of Hong Kong Hong Kong School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Feature-only partition of large graph data in distributed Graph Neural Network (GNN) training offers advantages over commonly adopted graph structure partition, such as minimal graph preprocessing cost and elimination... 详细信息
来源: 评论
Molecular Data Programming: Towards Molecule Pseudo-labeling with Systematic Weak Supervision
Molecular Data Programming: Towards Molecule Pseudo-labeling...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xin Juan Kaixiong Zhou Ninghao Liu Tianlong Chen Xin Wang School of Artificial Intelligence Jilin University China Institute for Medical Engineering & Science Massachusetts Institute of Technology USA School of Computing University of Georgia USA CSAIL Massachusetts Institute of Technology USA
The premise for the great advancement of molecular machine learning is dependent on a considerable amount of labeled data. In many real-world scenarios, the labeled molecules are limited in quantity or laborious to de... 详细信息
来源: 评论
A Powerful Algorithm for e-Commerce Credit Risk Analysis
A Powerful Algorithm for e-Commerce Credit Risk Analysis
收藏 引用
2023 International Conference on Data Science and Network Security, ICDSNS 2023
作者: Dayanand Lal, N. Guruswamy, Sandhya Lalitha, Vuyyuru Awasthy, Mohan Pareek, Piyush Kumar Gitam University Bengaluru Campus Dept. of Cse Gst Bengaluru India School of Computing and Information Technology Reva University India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Vaadeswaram India Bharati Vidyapeeth Peeth Deemed to Be University Department of Engineering and Technology Navi Mumbai India Nitte Meenakshi Institute of Technology Department of Ai and Ml Bengaluru India
It is critical to build a system and model for analysing the credit risk associated with e-commerce to decrease the chance of credit defaults occurring during online transactions. This approach examines a client's... 详细信息
来源: 评论
Automatic Adaptation Rule Optimization via Large Language Models
arXiv
收藏 引用
arXiv 2024年
作者: Ishimizu, Yusei Li, Jialong Xu, Jinglue Cai, Jinyu Iba, Hitoshi Tei, Kenji School of Computing Tokyo Institute of Technology Tokyo Japan Department of Computer Science and Engineering Waseda University Tokyo Japan Graduate School of Information Science and Technology University of Tokyo Tokyo Japan
Rule-based adaptation is a foundational approach to self-adaptation, characterized by its human readability and rapid response. However, building high-performance and robust adaptation rules is often a challenge becau... 详细信息
来源: 评论
Integrating Large Language Models for Automated Vulnerability Scanning and Reporting in Network Hosts
Integrating Large Language Models for Automated Vulnerabilit...
收藏 引用
International Research Conference on Smart computing and Systems engineering (SCSE)
作者: M. Tharuka Sandaruwan Janaka Wijayanayake Janaka Senanayake Department of Industrial Management University of Kelaniya Kelaniya Sri Lanka School of Computing Engineering & Technology Robert Gordon University Aberdeen United Kingdom
This research explores integrating Large Language Models (LLMs) like GPT-4 and Claude 3.5 into cybersecurity vulnerability scanning to enhance automation and effectiveness. Current tools’ reliance on manual updates a... 详细信息
来源: 评论