咨询与建议

限定检索结果

文献类型

  • 16,693 篇 会议
  • 8,829 篇 期刊文献
  • 292 册 图书

馆藏范围

  • 25,814 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,833 篇 工学
    • 12,078 篇 计算机科学与技术...
    • 9,945 篇 软件工程
    • 4,095 篇 信息与通信工程
    • 2,647 篇 控制科学与工程
    • 2,174 篇 生物工程
    • 1,967 篇 电气工程
    • 1,605 篇 生物医学工程(可授...
    • 1,470 篇 电子科学与技术(可...
    • 1,359 篇 光学工程
    • 980 篇 机械工程
    • 954 篇 网络空间安全
    • 799 篇 安全科学与工程
    • 773 篇 动力工程及工程热...
    • 742 篇 仪器科学与技术
    • 692 篇 交通运输工程
    • 646 篇 化学工程与技术
  • 8,058 篇 理学
    • 4,082 篇 数学
    • 2,392 篇 生物学
    • 2,192 篇 物理学
    • 1,412 篇 统计学(可授理学、...
    • 875 篇 系统科学
    • 761 篇 化学
  • 4,670 篇 管理学
    • 2,854 篇 管理科学与工程(可...
    • 2,049 篇 图书情报与档案管...
    • 1,250 篇 工商管理
  • 1,782 篇 医学
    • 1,390 篇 临床医学
    • 1,268 篇 基础医学(可授医学...
    • 904 篇 公共卫生与预防医...
    • 744 篇 药学(可授医学、理...
  • 990 篇 法学
    • 816 篇 社会学
  • 445 篇 经济学
  • 372 篇 农学
  • 293 篇 教育学
  • 201 篇 文学
  • 38 篇 军事学
  • 38 篇 艺术学
  • 6 篇 哲学
  • 3 篇 历史学

主题

  • 1,013 篇 deep learning
  • 958 篇 accuracy
  • 666 篇 computational mo...
  • 582 篇 machine learning
  • 578 篇 feature extracti...
  • 549 篇 training
  • 413 篇 internet of thin...
  • 400 篇 real-time system...
  • 397 篇 predictive model...
  • 360 篇 support vector m...
  • 343 篇 convolutional ne...
  • 334 篇 data models
  • 309 篇 semantics
  • 288 篇 computer science
  • 286 篇 computer archite...
  • 259 篇 optimization
  • 243 篇 reliability
  • 243 篇 scalability
  • 236 篇 image segmentati...
  • 230 篇 neural networks

机构

  • 262 篇 school of comput...
  • 246 篇 department of co...
  • 163 篇 school of comput...
  • 150 篇 school of comput...
  • 136 篇 school of comput...
  • 124 篇 department of co...
  • 118 篇 school of comput...
  • 115 篇 institute of com...
  • 114 篇 school of comput...
  • 112 篇 department of co...
  • 104 篇 department of co...
  • 103 篇 college of compu...
  • 103 篇 school of comput...
  • 101 篇 school of comput...
  • 100 篇 national enginee...
  • 96 篇 north-west unive...
  • 96 篇 department of co...
  • 93 篇 institut univers...
  • 90 篇 infn sezione di ...
  • 90 篇 department of co...

作者

  • 125 篇 niyato dusit
  • 99 篇 ferrara g.
  • 99 篇 ardid m.
  • 98 篇 calvo d.
  • 95 篇 chen a.
  • 91 篇 gal t.
  • 91 篇 bozza c.
  • 91 篇 díaz a.f.
  • 90 篇 boumaaza j.
  • 84 篇 zheng wei-shi
  • 84 篇 coleiro a.
  • 84 篇 gozzini s.r.
  • 83 篇 anjali t.
  • 78 篇 dallier r.
  • 71 篇 kalekin o.
  • 59 篇 kulikovskiy v.
  • 59 篇 huang f.
  • 58 篇 anguita m.
  • 55 篇 benoit d.m.
  • 55 篇 eddymaoui a.

语言

  • 19,182 篇 英文
  • 6,489 篇 其他
  • 221 篇 中文
  • 6 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=School of Computing and Computer Engineering"
25814 条 记 录,以下是4861-4870 订阅
排序:
Comparative Analysis of Autonomous Vehicle in computer Vision  2
Comparative Analysis of Autonomous Vehicle in Computer Visio...
收藏 引用
2nd IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2022
作者: Ranjitha, P. Banu, Saira Manohar, N. Presidency University Department of Computer Science and Engineering Bangalore India Amrita School of Computing Mysuru CampusAmrita Vishwa Department of Computer Science Vidyapeetham India
The Autonomous driving is the area of interest to many researchers and much has been accomplished in this area, a detailed chronology of which is provided in this paper. Autonomous cars are vehicles that are powered w... 详细信息
来源: 评论
Reinforcement Learning-Based Optimal Control for Continuous-Time Quantized Systems via Adaptive Dynamic Programming  22
Reinforcement Learning-Based Optimal Control for Continuous-...
收藏 引用
22nd IEEE International Multi-Conference on Systems, Signals and Devices, SSD 2025
作者: Qasem, Omar Gao, Weinan Daoud, Omar R. School of Engineering and Computing American International University Electrical and Computer Engineering Department Al-Jahra Kuwait Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Lianning Shenyang 110819 China
Ahstract- This paper presents a comprehensive investigation into the stability analysis and design conditions for quantizers to ensure the closed-loop stability of continuous-time linear quantized systems, under the c... 详细信息
来源: 评论
Research into Curriculum Construction Platform of computer Major Based on Intelligent Algorithm  12th
Research into Curriculum Construction Platform of Computer M...
收藏 引用
12th International Conference on Frontier computing, FC 2022
作者: Xie, Hui Wei, Li School of Computer and Artificial Intelligence Xiangnan University Hunan Chenzhou China Hunan Engineering Research Center of Advanced Embedded Computing and Intelligent Medical Systems Xiangnan University Chenzhou China
Under the development background of educational curriculum reform, personalized curriculum design has become the key content of current reform of the computer major. In this context, this research carries out a design... 详细信息
来源: 评论
Prediction of Fetal Brain Anomalies Using Deep Learning Models
Prediction of Fetal Brain Anomalies Using Deep Learning Mode...
收藏 引用
IoT Based Control Networks and Intelligent Systems (ICICNIS), International Conference on
作者: Venkateshwari Subburaj Pandiselvam Pandiyarajan Department of Computer Application School of Computing Kalasalingam Academy of Research and Education Krishnankoil TamilNadu India Department of Computer Science and Engineering School of Computing Kalasalingam Academy of Research and Education Krishnankoil TamilNadu India
Fetal brain anomaly prediction is important for fetal medicine, as well as for prenatal health care. Fetal anomalies are classified into two types, anomalies in the fetus' body parts including heart, lung, and kid... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Surveying neuro-symbolic approaches for reliable artificial intelligence of things
收藏 引用
Journal of Reliable Intelligent Environments 2024年 第3期10卷 257-279页
作者: Lu, Zhen Afridi, Imran Kang, Hong Jin Ruchkin, Ivan Zheng, Xi Faculty of Data Science City University of Macau Estrada de Coelho do Amaral 999078 China School of Computing Macquarie University Balaclava Rd SydneyNSW2109 Australia Computer Science University of California Los Angeles 404 Westwood Plaza Los AngelesCA90095 United States Electrical and Computer Engineering University of Florida 1889 Museum Rd GainesvilleFL32611 United States
The integration of Artificial Intelligence (AI) with the Internet of Things (IoT), known as the Artificial Intelligence of Things (AIoT), enhances the devices’ processing and analysis capabilities and disrupts such s... 详细信息
来源: 评论
Collaborative Intelligent Resource Trading for RAN Slicing: A Federated Policy Distillation Approach
Collaborative Intelligent Resource Trading for RAN Slicing: ...
收藏 引用
2023 International Conference on Networks, Communications and Intelligent computing, NCIC 2023
作者: Ayepah-Mensah, Daniel Sun, Guolin School of Computer Science and Engineering UESTC Chengdu China National Key Laboratory for Intelligent Collaborative Computing Chengdu China Intelligent Terminal Key Laboratory of Sichuan Province Yibin China
In Radio Access Network (RAN), the sharing of resources can be modeled as a trading process in which multiple Mobile Virtual Network Operators (MVNOs) buy and sell resources according to their needs. This process can ... 详细信息
来源: 评论
Strengthening Authentication: The Role of Multi-Level Hashing in OSPA Protocol  5
Strengthening Authentication: The Role of Multi-Level Hashin...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Hariharasudhan, S. Varghese, Vineetha Malarvizhi, K. Santhoshkumar, S.P. Nalini, T. Vikram, D. Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Chennai Avadi India Rathinam Technical Campus Department of Computer Science and Engineering Coimbatore India Jct College of Engineering and Technology Department of Computer Science Al Business Systems Coimbatore India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology School of Computing Department of Computer Science and Engineering Chennai Avadi India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Saveetha University Department of Computer Science and Engineering Chennai India Rathinam Technical Campus Department of Artificial Intelligence Data Science Coimbatore India
Authentication is a crucial step in the cyber security process that confirms user identities. Even though they are widely used, traditional password based techniques are frequently vulnerable to attacks like guessing ... 详细信息
来源: 评论
Interactive Web API Recommendation for Mashup Development based on Light Neural Graph Collaborative Filtering  26
Interactive Web API Recommendation for Mashup Development ba...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xiang, Jiayan Chen, Wanjun Wang, Yang Liang, Bowen Liu, Zihao Kang, Guosheng Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan China Hnust Hunan Provincial Key Lab. for Services Computing and Novel Software Technology Xiangtan China
With the development of Mashup technique, the number of Web APIs released on the Web continues to grow year by year. However, it is a challenging issue to find and select the desirable Web APIs among the large amount ... 详细信息
来源: 评论
Global-Semantic Alignment Distillation for Partial Multi-view Classification  39
Global-Semantic Alignment Distillation for Partial Multi-vie...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Xiaoli Huang, Anqi Wang, Yongli Ke, Guanzhou Hong, Xiaobin Liu, Jun School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210000 China School of Economics and Management Beijing Jiaotong University Beijing100080 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China School of Computing and Communications Lancaster University Lancaster United Kingdom
Partial multi-view classification (PMvC) poses a significant challenge due to the incomplete nature of multi-view data, which complicates effective information fusion and accurate classification. Existing PMvC methods... 详细信息
来源: 评论