咨询与建议

限定检索结果

文献类型

  • 2,143 篇 期刊文献
  • 1,786 篇 会议
  • 17 册 图书

馆藏范围

  • 3,946 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,606 篇 工学
    • 1,921 篇 计算机科学与技术...
    • 1,612 篇 软件工程
    • 628 篇 信息与通信工程
    • 391 篇 电气工程
    • 383 篇 生物工程
    • 334 篇 控制科学与工程
    • 245 篇 电子科学与技术(可...
    • 245 篇 生物医学工程(可授...
    • 241 篇 光学工程
    • 150 篇 机械工程
    • 122 篇 化学工程与技术
    • 117 篇 交通运输工程
    • 105 篇 网络空间安全
    • 103 篇 动力工程及工程热...
    • 97 篇 仪器科学与技术
    • 90 篇 安全科学与工程
  • 1,419 篇 理学
    • 726 篇 数学
    • 434 篇 生物学
    • 354 篇 物理学
    • 254 篇 统计学(可授理学、...
    • 136 篇 系统科学
    • 135 篇 化学
  • 747 篇 管理学
    • 467 篇 管理科学与工程(可...
    • 323 篇 图书情报与档案管...
    • 224 篇 工商管理
  • 257 篇 医学
    • 220 篇 临床医学
    • 193 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
    • 106 篇 药学(可授医学、理...
  • 123 篇 法学
    • 100 篇 社会学
  • 75 篇 经济学
  • 50 篇 农学
  • 40 篇 教育学
  • 7 篇 文学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 130 篇 deep learning
  • 122 篇 accuracy
  • 105 篇 machine learning
  • 104 篇 feature extracti...
  • 93 篇 semantics
  • 93 篇 training
  • 91 篇 computational mo...
  • 77 篇 data models
  • 70 篇 real-time system...
  • 69 篇 internet of thin...
  • 68 篇 predictive model...
  • 60 篇 convolutional ne...
  • 57 篇 federated learni...
  • 54 篇 reinforcement le...
  • 50 篇 graph neural net...
  • 47 篇 deep neural netw...
  • 45 篇 data mining
  • 43 篇 optimization
  • 43 篇 artificial intel...
  • 40 篇 convolution

机构

  • 179 篇 college of compu...
  • 102 篇 national enginee...
  • 101 篇 beijing advanced...
  • 76 篇 nanyang technolo...
  • 69 篇 school of comput...
  • 63 篇 national enginee...
  • 50 篇 school of comput...
  • 49 篇 school of big da...
  • 46 篇 school of comput...
  • 44 篇 school of cyber ...
  • 39 篇 national enginee...
  • 35 篇 university of ch...
  • 33 篇 college of intel...
  • 33 篇 school of comput...
  • 32 篇 college of compu...
  • 32 篇 services computi...
  • 32 篇 hubei engineerin...
  • 30 篇 school of data a...
  • 29 篇 school of comput...
  • 28 篇 hubei key labora...

作者

  • 161 篇 niyato dusit
  • 104 篇 hai jin
  • 94 篇 jin hai
  • 32 篇 kang jiawen
  • 31 篇 xiaofei liao
  • 27 篇 tao dacheng
  • 27 篇 shen linlin
  • 25 篇 hu shengshan
  • 25 篇 li jianxin
  • 24 篇 rajeswari d.
  • 23 篇 sun geng
  • 23 篇 xiong zehui
  • 22 篇 peng hao
  • 22 篇 li tianrui
  • 21 篇 wang jiacheng
  • 20 篇 dusit niyato
  • 20 篇 du hongyang
  • 19 篇 haikun liu
  • 19 篇 xiwang dong
  • 18 篇 yang yang

语言

  • 3,425 篇 英文
  • 493 篇 其他
  • 33 篇 中文
检索条件"机构=School of Computing and Data Engineering"
3946 条 记 录,以下是1161-1170 订阅
排序:
Target networks and over-parameterization stabilize off-policy bootstrapping with function approximation  24
Target networks and over-parameterization stabilize off-poli...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Fengdi Che Chenjun Xiao Jincheng Mei Bo Dai Ramki Gummadi Oscar A Ramirez Christopher K Harris A. Rupam Mahmood Dale Schuurmans Department of Computing Science University of Alberta School of Data Science The Chinese University of Hong Kong Shenzhen Google DeepMind Google DeepMind and School of Computational Science and Engineering Georgia Tech Figure and Google Google and Uber Department of Computing Science University of Alberta and CIFAR AI Chair Amii Department of Computing Science University of Alberta and Google DeepMind and CIFAR AI Chair Amii
We prove that the combination of a target network and over-parameterized linear function approximation establishes a weaker convergence condition for bootstrapped value estimation in certain cases, even with off-polic...
来源: 评论
The impact of dwell time on the contextual effect of visual and passive lead-in movements
收藏 引用
Journal of Neurophysiology 2025年 第5期133卷 1520-1537页
作者: Alvarez-Hidalgo, Laura Franklin, David W. Howard, Ian S. School of Computing Engineering and Mathematics University of Plymouth Plymouth United Kingdom Neuromuscular Diagnostics TUM School of Medicine and Health Technical University of Munich Munich Germany Munich Institute of Robotics and Machine Intelligence (MIRMI) Technical University of Munich Munich Germany Munich Data Science Institute (MDSI) Technical University of Munich Munich Germany
Contextual cues arising from distinct movements are crucial in shaping control strategies for human movement. Here, we examine the impact of visual and passive lead-in movement cues on unimanual motor learning, focusi... 详细信息
来源: 评论
Set a Thief to Catch a Thief: Combating Label Noise through Noisy Meta Learning
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Hanxuan Lu, Na Zhao, Xueying Yan, Yuxuan Ma, Kaipeng Keong, Kwoh Chee Carneiro, Gustavo Department of Automation Science and Engineering Xi’an Jiaotong University China School of Electrical Engineering Xi’an Jiaotong University China College of Computing and Data Science Nanyang Technological University Singapore Centre for Vision Speech and Signal Processing University of Surrey United Kingdom
Learning from noisy labels (LNL) aims to train high-performance deep models using noisy datasets. Meta learning based label correction methods have demonstrated remarkable performance in LNL by designing various meta ...
来源: 评论
Differential Privacy-based Avatar Update in Cooperative Intelligent Transportation System Metaverse
Differential Privacy-based Avatar Update in Cooperative Inte...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Salabat Khan Fei Luo Mansoor Khan Insaf Ullah Farhan Amin Shamsher Ullah Mussadiq Abdul Rahim School of Computer and Enformation Engineering Qilu Institute of Technology Jinan China School of Computing and Information Technology Great Bay University Dongguan China School of Intelligent Manufacturing and Control Engineering Qilu Institute of Technology Jinan China Institute for Analytics and Data Science University of Essex Colchester UK School of Computer Science and Engineering Yeungnam University South Korea National Engineering Laboratory for Big Data Shenzhen University Shenzhen China King Fahd University of Petroleum and Minerals (KFUPM) Dhahran Saudi Arabia
Metaverse is the next generation and the successor to the Internet. Various sectors allocated capital to adapt the metaverse due to its inherent importance. Cooperative Intelligent Transportation Systems (C-ITS) is on... 详细信息
来源: 评论
A YANG-aided Unified Strategy for Black Hole Detection for Backbone Networks
arXiv
收藏 引用
arXiv 2024年
作者: Ak, Elif Kaya, Kiymet Ozaltun, Eren Oguducu, Sule Gunduz Canberk, Berk Istanbul Technical University Department of Computer Engineering Istanbul Turkey Istanbul Technical University Department of Artificial Intelligence and Data Engineering Istanbul Turkey BTS Group Istanbul Turkey School of Computing Engineering and Built Environment Edinburgh Napier University Edinburgh United Kingdom
Despite the crucial importance of addressing Black Hole failures in Internet backbone networks, effective detection strategies in backbone networks are lacking. This is largely because previous research has been cente... 详细信息
来源: 评论
A Spectral Bipartite Analogue of the Erdős-Sós Conjecture
SSRN
收藏 引用
SSRN 2024年
作者: Geng, Xianya Wei, Wei Feng, Zhiming Center of Intelligent Computing and Applied Statistics School of Mathematics Physics and Statistics Shanghai University of Engineering Science Shanghai China School of Mathematics and Big Data Anhui University of Science & Technology Huainan China School of Mathematics and Statistics Xinyang Normal University Xinyang China
A well-known conjecture of Erdős and Sós states that each graph on ν vertices with size more than ν(t2−1) contains every tree with order t + 1 as a subgraph. In 2010, Nikiforov presented the spectral Erdős-S&... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
Clear Text Visibility: A CNN-LSTM Approach for Frame of Interest Identification in Book Flipping Videos
Clear Text Visibility: A CNN-LSTM Approach for Frame of Inte...
收藏 引用
Modeling, Simulation & Intelligent computing (MoSICom), International Conference on
作者: Gaurav Buddhawar Dharin Dave Krupa Jariwala Chiranjoy Chattopadhyay Dept. of Computer Science and Engineering Sardar Vallabhbhai National Institute of Technology Surat India Dept. of Computer Science and Engineering (AI & ML) Pimpri Chinchwad College of Engineering Pune India School of Computing and Data Sciences FLAME University Pune India
Book flipping videos present a distinctive challenge for information extraction, requiring the identification of frames with clear text visibility during dynamic page turns. This paper introduces a novel approach to f... 详细信息
来源: 评论
Diabetic Retinopathy Imaging: Network Exudate Detection to Classify Abnormalities
Diabetic Retinopathy Imaging: Network Exudate Detection to C...
收藏 引用
Intelligent computing and Control for engineering and Business Systems (ICCEBS)
作者: A. Chinnasamy P. Selvakumari Department of Data Science and Business Systems school of computing SRMIST kattankulathur campus Chennai Department of Computer Science and Engineering Chennai Institute of Technology Chennai Anna University
The DR becomes increasingly common, there is a need to automatically extract and classify disease severity. Due to diabetes problems, about 2% of people with this disease become completely blind, and DR complications ...
来源: 评论
A multi-objective grey wolf optimizer for energy planning problem in smart home using renewable energy systems
收藏 引用
Sustainable Operations and Computers 2024年 第1期5卷 88-101页
作者: Makhadmeh, Sharif Naser Al-Betar, Mohammed Azmi Al-Obeidat, Feras Alomari, Osama Ahmad Abasi, Ammar Kamal Tubishat, Mohammad Elgamal, Zenab Alomoush, Waleed Department of Data Science and Artificial Intelligence University of Petra Amman11196 Jordan College of Engineering and Information Technology Ajman University Ajman United Arab Emirates Department of Information Technology Al-Huson University College Al-Balqa Applied University P.O. Box 50 Al-Huson Irbid Jordan Department of Computer Science and Information Technology College of Engineering Abu Dhabi University Abu Dhabi United Arab Emirates College of Technological Innovation Zayed University Abu Dhabi United Arab Emirates School of Computing Skyline University College Sharjah United Arab Emirates School of Information Technology Skyline University College Sharjah P.O. Box 1797 United Arab Emirates Abu Dhabi United Arab Emirates
This paper presents the energy planning problem (EPP) as an optimization problem to find the optimal schedules to minimize energy consumption costs and demand and enhance users’ comfort levels. The grey wolf optimize... 详细信息
来源: 评论