咨询与建议

限定检索结果

文献类型

  • 14,317 篇 期刊文献
  • 11,794 篇 会议
  • 71 册 图书

馆藏范围

  • 26,182 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,152 篇 工学
    • 10,460 篇 计算机科学与技术...
    • 8,755 篇 软件工程
    • 3,402 篇 信息与通信工程
    • 2,166 篇 生物工程
    • 2,115 篇 控制科学与工程
    • 1,922 篇 电气工程
    • 1,493 篇 电子科学与技术(可...
    • 1,450 篇 生物医学工程(可授...
    • 1,369 篇 光学工程
    • 1,167 篇 化学工程与技术
    • 953 篇 机械工程
    • 796 篇 仪器科学与技术
    • 694 篇 动力工程及工程热...
    • 598 篇 材料科学与工程(可...
    • 597 篇 交通运输工程
  • 10,839 篇 理学
    • 5,285 篇 数学
    • 3,230 篇 物理学
    • 2,598 篇 生物学
    • 2,112 篇 统计学(可授理学、...
    • 1,179 篇 化学
    • 966 篇 系统科学
    • 810 篇 地球物理学
  • 4,180 篇 管理学
    • 2,425 篇 管理科学与工程(可...
    • 1,882 篇 图书情报与档案管...
    • 1,168 篇 工商管理
  • 1,780 篇 医学
    • 1,431 篇 临床医学
    • 1,062 篇 基础医学(可授医学...
    • 636 篇 药学(可授医学、理...
    • 618 篇 公共卫生与预防医...
  • 783 篇 法学
    • 667 篇 社会学
  • 570 篇 经济学
  • 438 篇 农学
  • 293 篇 教育学
  • 63 篇 文学
  • 44 篇 军事学
  • 33 篇 艺术学
  • 5 篇 历史学
  • 1 篇 哲学

主题

  • 640 篇 deep learning
  • 524 篇 accuracy
  • 508 篇 feature extracti...
  • 484 篇 training
  • 368 篇 semantics
  • 351 篇 machine learning
  • 330 篇 computational mo...
  • 284 篇 predictive model...
  • 261 篇 optimization
  • 252 篇 data models
  • 249 篇 neural networks
  • 239 篇 internet of thin...
  • 234 篇 reinforcement le...
  • 216 篇 image segmentati...
  • 215 篇 big data
  • 215 篇 convolution
  • 189 篇 object detection
  • 186 篇 task analysis
  • 185 篇 data mining
  • 178 篇 real-time system...

机构

  • 500 篇 university of ch...
  • 430 篇 department of ph...
  • 394 篇 iccub universita...
  • 304 篇 imperial college...
  • 300 篇 physik-institut ...
  • 298 篇 stfc rutherford ...
  • 294 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 cavendish labora...
  • 287 篇 department of ph...
  • 287 篇 institute of par...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 285 篇 physikalisches i...
  • 283 篇 yandex school of...
  • 282 篇 h.h. wills physi...
  • 280 篇 henryk niewodnic...
  • 279 篇 horia hulubei na...

作者

  • 234 篇 beiter a.
  • 222 篇 barter w.
  • 207 篇 bellee v.
  • 195 篇 bowcock t.j.v.
  • 195 篇 casse g.
  • 174 篇 brundu d.
  • 160 篇 blake t.
  • 154 篇 betancourt c.
  • 150 篇 bencivenni g.
  • 148 篇 back j.j.
  • 148 篇 bay a.
  • 144 篇 niyato dusit
  • 144 篇 borsato m.
  • 144 篇 boettcher t.
  • 144 篇 borisyak m.
  • 144 篇 albrecht j.
  • 142 篇 amato s.
  • 142 篇 cattaneo m.
  • 142 篇 amhis y.
  • 142 篇 akar s.

语言

  • 21,396 篇 英文
  • 4,503 篇 其他
  • 345 篇 中文
  • 8 篇 日文
  • 7 篇 德文
  • 7 篇 法文
  • 5 篇 斯洛文尼亚文
  • 2 篇 葡萄牙文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=School of Data Science and Big Data Technology"
26182 条 记 录,以下是4981-4990 订阅
排序:
Boli: A dataset for understanding stuttering experience and analyzing stuttered speech
arXiv
收藏 引用
arXiv 2025年
作者: Batra, Ashita Narang, Mannas Sharma, Neeraj Kumar Das, Pradip K. Department of Computer Science and Engineering Mehta Family School of Data Science and AI Indian Institute of Technology Guwahati Guwahati781039 India
There is a growing need for diverse, high-quality stuttered speech data, particularly in the context of Indian languages. This paper introduces Project Boli, a multi-lingual stuttered speech dataset designed to advanc... 详细信息
来源: 评论
Dual Graph Inference Network for Weakly Supervised Semantic Segmentation
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Zhang, Jia Peng, Bo Wu, Xi Southwest Jiaotong University School of Computing and Artificial Intelligence Sichuan Chengdu611756 China Southwest Jiaotong University National Engineering Laboratory of Integrated Transportation Big Data Application Technology Chengdu611756 China Chengdu University of Information Technology School of Computer Science Sichuan Chengdu610225 China
Establishing global contextual relationships between objects is crucial for weakly supervised semantic segmentation (WSSS) tasks that lack pixel-level labels. Limited by the efficiency of convolutional operations in c... 详细信息
来源: 评论
Explore In-Context Segmentation via Latent Diffusion Models  39
Explore In-Context Segmentation via Latent Diffusion Models
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Chaoyang Li, Xiangtai Ding, Henghui Qi, Lu Zhang, Jiangning Tong, Yunhai Loy, Chen Change Yan, Shuicheng School of Intelligence Science and Technology Peking University China Skywork AI Singapore Nanyang Technological University Singapore Institute of Big Data Fudan University China Wuhan University China Zhejiang University China
In-context segmentation has drawn increasing attention with the advent of vision foundation models. Its goal is to segment objects using given reference images. Most existing approaches adopt metric learning or masked...
来源: 评论
Explaining Grover's Quantum Algorithm to College Students
Explaining Grover's Quantum Algorithm to College Students
收藏 引用
Computer science, Computer Engineering, & Applied Computing (CSCE), Congress in
作者: Leonidas Deligiannidis School of Computing and Data Science Wentworth Institute of Technology Boston MA USA
Wentworth Institute of technology is a baccalaureate degree granting institution and in recent years we have also developed several Master's programs. Our department offers several degrees leading to a Bachelor of...
来源: 评论
Bilateral Network with Residual U-blocks and Dual-Guided Attention for Real-time Semantic Segmentation
arXiv
收藏 引用
arXiv 2023年
作者: Liao, Liang Wan, Liang Liu, Mingsheng Li, Shusheng State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science and Engineering Northeastern University Shenyang China
When some application scenarios need to use semantic segmentation technology, like automatic driving, the primary concern comes to real-time performance rather than extremely high segmentation accuracy. To achieve a g... 详细信息
来源: 评论
Empowering Consumer Healthcare Through Sensor-Rich Devices using Federated Learning for Secure Resource Recommendation
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 1563-1570页
作者: Fathima, Afifa Salsabil Basha, Syed Muzamil Ahmed, Syed Thouheed Khan, Surbhi Bhatia Asiri, Fatima Basheer, Shakila Shukla, Madhu School of Computer Science and Engineering REVA University Karnataka Bengaluru India School of Computing and Information Technology REVA University Karnataka Bengaluru India Department of Data Science School of Science Engineering and Environment University of Salford Manchester United Kingdom Centre for Research Impact and Outcome Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura140401 India College of computer science Informatics and computer systems department King Khalid University Saudi Arabia Department of Information Systems College of computer and Information science Princess Nourah bint Abdulrahman University P.O. BOX 84428 Riyadh11671 Saudi Arabia the Department of CSE - AI ML & DS Marwadi University Gujarat Rajkot360003 India
When implementing zero-trust edge computing, offloading computational tasks and data access through traditional model training and usage approaches can lead to increased latency. Since the traditional methods often in... 详细信息
来源: 评论
Towards Insider Threat Resilience: A Proposed Mitigation Model  4
Towards Insider Threat Resilience: A Proposed Mitigation Mod...
收藏 引用
4th International Conference on Emerging Systems and Intelligent Computing, ESIC 2024
作者: Kothari, Navyansh Bhardwaj, Chanakya Mishra, Shruti Satapathy, Sandeep Kumar Cho, Sung-Bae Mallick, Pradeep Kumar Chennai India Vellore Institute of Technology Centre for Advanced Data Science Tamil Nadu Chennai India Yonsei University Department of Computer Science 50 Yonsei-ro Sudaemoon-gu Seoul03722 Korea Republic of Kiit University School of Computer Engineeing Odisha India
Businesses are increasingly concerned about insider threats, which highlights the need for effective mitigation strategies. This paper examines the variety of insider threats and provides a thorough plan for lowering ... 详细信息
来源: 评论
Symmetry Classification of Partial Differential Equations Based on Wu's Method
收藏 引用
Journal of Donghua University(English Edition) 2021年 第2期38卷 187-192页
作者: TIAN Yi WAN Jianxiong College of Data Science and Application Inner Mongolia University of TechnologyHohhot 010080China Inner Mongolia Autonomous Region Engineering&Technology Research Center of Big Data Based Software Service Hohhot 010080China
Lie algorithm combined with differential form Wu's method is used to complete the symmetry classification of partial differential equations(PDEs)containing arbitrary *** process can be reduced to solve a large sys... 详细信息
来源: 评论
The asset allocation utility of digital cryptocurrency  9th
The asset allocation utility of digital cryptocurrency
收藏 引用
9th International Conference on Information technology and Quantitative Management, ITQM 2022
作者: Long, Wen Wang, Maohua Guo, Man School of Economics and Management University of Chinese Academy of Sciences Beijing100090 China Research Center on Fictitious Economy and Data Science Chinese Academy of Sciences Beijing100190 China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing100190 China
In recent years, the digital cryptocurrency market has witnessed rapid development, but its asset allocation function has yet to be verified. In this paper, DCC-GARCH model is used to estimate the dynamic correlation ... 详细信息
来源: 评论
Stacked Mosaic Detection based on Line Expansion
Stacked Mosaic Detection based on Line Expansion
收藏 引用
Intelligent Media, big data and Knowledge Mining (IMBDKM), International Conference on
作者: Zhongfei Xu Yan Fu Aixiang Cui Big Data Research Center University of Electronic Science and Technology of China Chengdu P. R. China Chengdu Union Big Data Tech. Inc. Chengdu P. R. China
When uploading multimedia data such as photos or videos on network, they might be covered with mosaic blocks since some private information is not suitable for exposing. In some situation, mosaic images or video frame...
来源: 评论