咨询与建议

限定检索结果

文献类型

  • 13,340 篇 期刊文献
  • 7,464 篇 会议
  • 64 册 图书

馆藏范围

  • 20,868 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,478 篇 工学
    • 7,730 篇 计算机科学与技术...
    • 6,487 篇 软件工程
    • 2,370 篇 信息与通信工程
    • 1,684 篇 生物工程
    • 1,479 篇 电气工程
    • 1,420 篇 控制科学与工程
    • 1,360 篇 生物医学工程(可授...
    • 1,268 篇 光学工程
    • 1,254 篇 电子科学与技术(可...
    • 908 篇 化学工程与技术
    • 687 篇 仪器科学与技术
    • 632 篇 机械工程
    • 488 篇 材料科学与工程(可...
    • 464 篇 动力工程及工程热...
    • 422 篇 安全科学与工程
  • 9,167 篇 理学
    • 4,036 篇 数学
    • 3,001 篇 物理学
    • 2,179 篇 生物学
    • 1,733 篇 统计学(可授理学、...
    • 1,041 篇 地球物理学
    • 968 篇 化学
    • 724 篇 系统科学
  • 3,139 篇 管理学
    • 1,794 篇 管理科学与工程(可...
    • 1,358 篇 图书情报与档案管...
    • 942 篇 工商管理
  • 2,203 篇 医学
    • 1,780 篇 临床医学
    • 1,227 篇 基础医学(可授医学...
    • 744 篇 公共卫生与预防医...
    • 599 篇 药学(可授医学、理...
  • 586 篇 法学
    • 516 篇 社会学
  • 407 篇 经济学
  • 376 篇 农学
  • 241 篇 教育学
  • 56 篇 文学
  • 33 篇 军事学
  • 18 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 493 篇 deep learning
  • 383 篇 machine learning
  • 351 篇 accuracy
  • 303 篇 feature extracti...
  • 260 篇 computational mo...
  • 232 篇 training
  • 227 篇 predictive model...
  • 209 篇 semantics
  • 207 篇 real-time system...
  • 198 篇 optimization
  • 190 篇 reinforcement le...
  • 170 篇 image segmentati...
  • 165 篇 neural networks
  • 162 篇 internet of thin...
  • 155 篇 support vector m...
  • 147 篇 deep neural netw...
  • 145 篇 convolution
  • 137 篇 generative adver...
  • 132 篇 graph neural net...
  • 131 篇 object detection

机构

  • 618 篇 university of ch...
  • 429 篇 department of ph...
  • 394 篇 iccub universita...
  • 306 篇 imperial college...
  • 300 篇 physik-institut ...
  • 298 篇 stfc rutherford ...
  • 294 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 289 篇 department of ph...
  • 288 篇 cavendish labora...
  • 286 篇 physikalisches i...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 284 篇 h.h. wills physi...
  • 284 篇 yandex school of...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 horia hulubei na...
  • 280 篇 henryk niewodnic...

作者

  • 233 篇 beiter a.
  • 223 篇 barter w.
  • 207 篇 bellee v.
  • 194 篇 bowcock t.j.v.
  • 191 篇 casse g.
  • 175 篇 brundu d.
  • 168 篇 niyato dusit
  • 160 篇 blake t.
  • 154 篇 betancourt c.
  • 150 篇 bencivenni g.
  • 148 篇 back j.j.
  • 148 篇 bay a.
  • 145 篇 borsato m.
  • 145 篇 boettcher t.
  • 144 篇 borisyak m.
  • 142 篇 amato s.
  • 142 篇 cattaneo m.
  • 142 篇 albrecht j.
  • 140 篇 bediaga i.
  • 140 篇 braun s.

语言

  • 16,569 篇 英文
  • 4,094 篇 其他
  • 227 篇 中文
  • 5 篇 德文
  • 5 篇 法文
  • 5 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=School of Computing and Data Science & Institute of Data Science"
20868 条 记 录,以下是4331-4340 订阅
排序:
Delay-Driven Layer Assignment Algorithm Based on Integrating Multi-Strategy for Advanced Technology Nodes
收藏 引用
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics 2024年 第4期36卷 625-635页
作者: Liu, Genggeng Jiang, Lieqiu Li, Zepeng Wu, Ruoxin Xu, Ning College of Computer and Data Science Fuzhou University Fuzhou350116 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China College of Maynooth International Engineering Fuzhou University Fuzhou350116 China School of Information Engineering Wuhan University of Technology Wuhan430070 China
By introducing layer assignment algorithm, it can effectively optimize multiple important indicators such as delay and via counts in physical design, and then improve the chip performance. Therefore, a delay optimizat... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Enhanced prairie dog optimization with Levy flight and dynamic opposition-based learning for global optimization and engineering design problems
收藏 引用
Neural computing and Applications 2024年 第19期36卷 11137-11170页
作者: Biswas, Saptadeep Shaikh, Azharuddin Ezugwu, Absalom El-Shamir Greeff, Japie Mirjalili, Seyedali Bera, Uttam Kumar Abualigah, Laith Department of Mathematics National Institute of Technology Agartala Tripura Agartala India Unit for Data Science and Computing North-West University 11 Hoffman Street Potchefstroom2520 South Africa Faculty of Natural and Agricultural Sciences School of Computer Science and Information Systems North-West University Vanderbijlpark South Africa Centre for Artificial Intelligence Research and Optimization Torrens University Australia Fortitude Valley BrisbaneQLD4006 Australia Research Center University of Tabuk Tabuk71491 Saudi Arabia Computer Science Department Al al-Bayt University Mafraq25113 Jordan Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman19328 Jordan Applied Science Research Center Applied Science Private University Amman11931 Jordan Department of Electrical and Computer Engineering Lebanese American University Byblos13-5053 Lebanon School of Engineering and Technology Sunway University Malaysia Petaling Jaya27500 Malaysia College of Engineering Yuan Ze University Taoyuan32003 Taiwan MEU Research Unit Middle East University Amman11831 Jordan
This study proposes a new prairie dog optimization algorithm version called EPDO. This new version aims to address the issues of premature convergence and slow convergence that were observed in the original PDO algori... 详细信息
来源: 评论
Mining Top-k Frequent Patterns over Streaming Graphs  28th
Mining Top-k Frequent Patterns over Streaming Graphs
收藏 引用
28th International Conference on database Systems for Advanced Applications, DASFAA 2023
作者: Wang, Xi Zhang, Qianzhen Guo, Deke Zhao, Xiang Institute for Quantum Information and State Key Laboratory of High Performance Computing National University of Defense Technology Changsha China Science and Technology on Information Systems Engineering Laboratory National University of Defense Technology Changsha China Laboratory for Big Data and Decision National University of Defense Technology Changsha China
Mining top-k frequent patterns is an important operation on graphs, which is defined as finding k interesting subgraphs with the highest frequency. Most existing work assumes a static graph. However, graphs are dynami... 详细信息
来源: 评论
Fourier shape parametrization in covariant density functional theory for nuclear fission
arXiv
收藏 引用
arXiv 2025年
作者: Li, Zeyu Su, Yang Liu, Lile Chen, Yongjing Li, Zhipan China Nuclear Data Center China Institute of Atomic Energy Beijing102413 China School of Physical Science and Technology Southwest University Chongqing400715 China
We implement the Fourier shape parametrization within the point-coupling covariant density functional theory to construct the collective space, potential energy surface (PES), and mass tensor, which serve as inputs fo... 详细信息
来源: 评论
Optimal Bilinear Equalizer for Cell-Free Massive MIMO Systems over Correlated Rician Channels
收藏 引用
IEEE Transactions on Signal Processing 2025年
作者: Wang, Zhe Zhang, Jiayi Bjornson, Emil Niyato, Dusit Ai, Bo Beijing Jiaotong University State Key Laboratory of Advanced Rail Autonomous Operation Beijing100044 China Beijing Jiaotong University School of Electronics and Information Engineering Beijing100044 China KTH Royal Institute of Technology Department of Computer Science Stockholm114 28 Sweden Nanyang Technological University College of Computing & Data Science 639798 Singapore
In this paper, we explore the low-complexity optimal bilinear equalizer (OBE) combining scheme design for cell-free massive multiple-input multiple-output networks with spatially correlated Rician fading *** provide a... 详细信息
来源: 评论
SVM-based Predictive Modeling of Drowsiness in Hospital Staff for Occupational Safety Solution via IoT Infrastructure  2
SVM-based Predictive Modeling of Drowsiness in Hospital Staf...
收藏 引用
2nd International Conference on Computer, Communication and Control, IC4 2024
作者: Ganesh, B. Jai Vijayan, P. Vaidehi, V. Murugan, S. Meenakshi, R. Rajmohan, M. R.M.D. Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India Saveetha Engineering College Department of Artificial Intelligence and Data Science Tamil Nadu Chennai India Vinayaka Mission's Kirupananda Variyar Arts and Science College Department of Computer Science Tamil Nadu Salem India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Biomedical Engineering Tamil Nadu Chennai India Chennai Institute of Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Hindustan Institute of Technology and Science Department of Electronics and Communication Engineering Tamil Nadu Chennai India
This research proposes an efficient approach to improve hospital worker safety on the job by detecting and preventing drowsiness. The system incorporates data from hospital-deployed Internet of Things (IoT) infrastruc... 详细信息
来源: 评论
VULSEYE: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Ruichao Chen, Jing Wu, Cong He, Kun Wu, Yueming Cao, Ruochen Du, Ruiying Liu, Yang Zhao, Ziming Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Cyber Security Lab College of Computing and Data Science Nanyang Technological University Singapore Department of Computer Science and Engineering University at Buffalo New York United States
Smart contracts, the cornerstone of decentralized applications, have become increasingly prominent in revolutionizing the digital landscape. However, vulnerabilities in smart contracts pose great risks to user assets ... 详细信息
来源: 评论
Deep semantic segmentation and skin disease classification fromdermoscopic images based on a modernized deep learning network with multi-feature extraction
收藏 引用
Australian Journal of Electrical and Electronics Engineering 2024年
作者: Prabu, M. MuthuKumar, S. Sudhahar, T.N. Chakaravarthi, S. Shanmugapriya, N. Mahajan, Rashima Department of Computer Science and Engineering SRM Institute of Science and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering St. Joseph’s Institute of Technology Tamil Nadu Chennai India Department of Artificial Intelligence and Data Science Rajalakshmi Institute of Technology Tamil Nadu Chennai India Department of Artificial Intelligence and Data Science Panimalar Engineering College Tamil Nadu Chennai India Department of Computer Science and Engineering School of Engineering and Technology Dhanalakshmi Srinivasan University Tamil Nadu Trichy India Department of Computer Science and Engineering Manav Rachna International Institute of Research and Studies Faridabad India
In this research, an advanced deep learning model is proposed to segment and classify skin diseases. The skin images required for classification purposes are collected from public databases. Skin lesion segmentation i... 详细信息
来源: 评论
A Systematic Review of Machine Learning Approaches for Detecting Deceptive Activities on Social Media: Methods, Challenges, and Biases
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yunchong Shen, Xiaorui Zhang, Yeyubei Wang, Zhongyan Tian, Yexin Dai, Jianglai Cao, Yuchen School of Engineering and Applied Science University of Pennsylvania United States Khoury college of computer science Northeastern University United States Center for Data Science New York University United States Georgia Institute of Technology College of Computing United States Department of EECS University of California Berkeley United States
Social media platforms like Twitter, Facebook, and Instagram have facilitated the spread of misinformation, necessitating automated detection systems. This systematic review evaluates 36 studies that apply machine lea... 详细信息
来源: 评论