咨询与建议

限定检索结果

文献类型

  • 5,670 篇 期刊文献
  • 4,828 篇 会议
  • 46 册 图书

馆藏范围

  • 10,544 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,745 篇 工学
    • 5,031 篇 计算机科学与技术...
    • 4,210 篇 软件工程
    • 1,631 篇 信息与通信工程
    • 1,057 篇 生物工程
    • 867 篇 控制科学与工程
    • 812 篇 电气工程
    • 685 篇 生物医学工程(可授...
    • 610 篇 光学工程
    • 541 篇 电子科学与技术(可...
    • 364 篇 机械工程
    • 327 篇 化学工程与技术
    • 255 篇 交通运输工程
    • 250 篇 动力工程及工程热...
    • 236 篇 网络空间安全
    • 221 篇 安全科学与工程
    • 219 篇 仪器科学与技术
  • 3,951 篇 理学
    • 1,959 篇 数学
    • 1,204 篇 生物学
    • 1,101 篇 物理学
    • 743 篇 统计学(可授理学、...
    • 397 篇 化学
    • 348 篇 系统科学
  • 1,920 篇 管理学
    • 1,107 篇 管理科学与工程(可...
    • 895 篇 图书情报与档案管...
    • 539 篇 工商管理
  • 645 篇 医学
    • 534 篇 临床医学
    • 466 篇 基础医学(可授医学...
    • 284 篇 药学(可授医学、理...
    • 267 篇 公共卫生与预防医...
  • 329 篇 法学
    • 277 篇 社会学
  • 210 篇 经济学
  • 150 篇 农学
  • 108 篇 教育学
  • 38 篇 文学
  • 18 篇 军事学
  • 16 篇 艺术学

主题

  • 361 篇 deep learning
  • 288 篇 feature extracti...
  • 279 篇 accuracy
  • 237 篇 semantics
  • 234 篇 machine learning
  • 233 篇 training
  • 199 篇 computational mo...
  • 170 篇 predictive model...
  • 152 篇 internet of thin...
  • 150 篇 real-time system...
  • 137 篇 data models
  • 131 篇 optimization
  • 122 篇 reinforcement le...
  • 120 篇 data mining
  • 119 篇 convolutional ne...
  • 106 篇 image segmentati...
  • 103 篇 artificial intel...
  • 102 篇 neural networks
  • 100 篇 security
  • 94 篇 support vector m...

机构

  • 426 篇 department of ph...
  • 406 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 390 篇 h.h. wills physi...
  • 363 篇 van swinderen in...
  • 337 篇 yandex school of...
  • 311 篇 school of physic...
  • 310 篇 cavendish labora...
  • 303 篇 university of ch...
  • 291 篇 nikhef national ...
  • 289 篇 imperial college...
  • 289 篇 center for high ...
  • 287 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 244 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 217 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 216 篇 borsato m.
  • 215 篇 betancourt c.
  • 207 篇 brundu d.
  • 204 篇 bediaga i.
  • 199 篇 amato s.
  • 192 篇 baryshnikov f.
  • 186 篇 boettcher t.
  • 165 篇 braun s.
  • 163 篇 borisyak m.
  • 161 篇 baker s.
  • 153 篇 bjørn m.
  • 152 篇 bizzeti a.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery

语言

  • 8,527 篇 英文
  • 1,957 篇 其他
  • 85 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Data Science and Computer Engineering"
10544 条 记 录,以下是4521-4530 订阅
排序:
Saliency Detection From Complex Background with Attention-Based Boundary-Aware Pyramid Pooling Network
SSRN
收藏 引用
SSRN 2022年
作者: Fang, Jinsheng Tao, Yuhao Zhu, Gupei School of Computer Science and Engineering Minnan Normal University Zhangzhou China Key Laboratory of Data Science and Intelligence Application Minnan Normal University Zhangzhou China
Deep convolution network have been widely adopted in saliency detection in recent years and achieved state-of-the-art performance. A central issue for previous methods is the limited capability of detecting objects th... 详细信息
来源: 评论
3DS: An Efficient DPDK-based data Distribution Service for Distributed Real-time Applications
3DS: An Efficient DPDK-based Data Distribution Service for D...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Tianyu Xu Xianzhang Chen Changze Wu Jiapin Wang Rongwei Zheng Duo Liu Yujuan Tan Ao Ren Jian Li College of Computer Science Chongqing University Chongqing China School of Big Data and Software Engineering Chongqing University Chongqing China School of Electrical Engineering Chongqing University Chongqing China
data Distribution Service (DDS) is a widely-used middleware for data transmission in distributed real-time applications, such as autonomous vehicles and robotics. However, the communication of existing DDS middlewares... 详细信息
来源: 评论
Neural Network Panning: Screening the Optimal Sparse Network Before Training
arXiv
收藏 引用
arXiv 2022年
作者: Kang, Xiatao Li, Ping Yao, Jiayi Li, Chengxi School of Computer and Communication Engineering Changsha University of Science and Technology China School of Computer Xidian University China Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transp China
Pruning on neural networks before training not only compresses the original models, but also accelerates the network training phase, which has substantial application value. The current work focuses on fine-grained pr... 详细信息
来源: 评论
Scavenger: Better Space-Time Trade-Offs for Key-Value Separated LSM-trees
Scavenger: Better Space-Time Trade-Offs for Key-Value Separa...
收藏 引用
International Conference on data engineering
作者: Jianshun Zhang Fang Wang Sheng Qiu Yi Wang Jiaxin Ou Junxun Huang Baoquan Li Peng Fang Dan Feng Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of data storage systems and Technology Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology China Shenzhen Huazhong University of Science and Technology Research Institute Bytefrance Inc.
Key- Value Stores (KVS) implemented with log- structured merge-tree (LSM-tree) have gained widespread ac-ceptance in storage systems. Nonetheless, a significant challenge arises in the form of high write amplification... 详细信息
来源: 评论
Quantized Analog Beamforming Enabled Multi-task Federated Learning Over-the-air
arXiv
收藏 引用
arXiv 2025年
作者: Yao, Jiacheng Xu, Wei Zhu, Guangxu Yang, Zhaohui Huang, Kaibin Niyato, Dusit National Mobile Communications Research Laboratory Southeast University Nanjing China Purple Mountain Laboratories Nanjing China Shenzhen Research Institute of Big Data Shenzhen China College of Information Science and Electronic Engineering Zhejiang University Hangzhou China Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong School of Computer Science and Engineering Nanyang Technological University Singapore
Over-the-air computation (AirComp) has recently emerged as a pivotal technique for communication-efficient federated learning (FL) in resource-constrained wireless networks. Though AirComp leverages the superposition ... 详细信息
来源: 评论
Backdoor Attack with Sparse and Invisible Trigger
arXiv
收藏 引用
arXiv 2023年
作者: Gao, Yinghua Li, Yiming Gong, Xueluan Li, Zhifeng Xia, Shu-Tao Wang, Qian The Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen518055 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou311200 China College of Computing and Data Science Nanyang Technological University 639798 Singapore The School of Computer Science Wuhan University China Tencent Data Platform Shenzhen518057 China The Research Center of Artificial Intelligence Peng Cheng Laboratory Shenzhen518000 China The School of Cyber Science and Engineering Wuhan University China
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where the adversary manipulates a small portion of training data such that the victim model predicts normally on the benign samples but classifies the tr... 详细信息
来源: 评论
Shared Incentive System for Clinical Pathway Experience
Shared Incentive System for Clinical Pathway Experience
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weiqi Dai Wenhao Zhao Xia Xie Song Wu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
The phenomenon of unbalanced regional medical resources has led to large differences in the implementation experience of clinical pathways in hospitals with different medical levels. However, due to the fear of privac... 详细信息
来源: 评论
Weak Network Oriented Mobile Distributed Storage: A Hybrid Fault-Tolerance Scheme Based on Potential Replicas
Weak Network Oriented Mobile Distributed Storage: A Hybrid F...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Xinlei Wei Yujuan Tan Duo Liu Daitao Wu Yu Wu Xianzhang Chen Jian Li College of Computer Science Chongqing University Chongqing China School of Big Data & Software Engineering Chongqing University Chongqing China School of Electrical Engineering Chongqing University Chongqing China
Node failure is one of the most typical issues in distributed storage systems. The classic fault-tolerance methods can meet the fault tolerance needs of systems deployed in edge storage, 5G IoT, and other high-perform... 详细信息
来源: 评论
A Zero-shot Learning Method with a Multi-Modal Knowledge Graph
A Zero-shot Learning Method with a Multi-Modal Knowledge Gra...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Yuhong Zhang Haitao Shu Chenyang Bu Xuegang Hu Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Zero-shot learning aims to recognize unseen-classes using some seen-class samples as training set. It is challenging owing to that the feature representations of unseen-class samples are unavailable. Existing methods ... 详细信息
来源: 评论
Graph Sampling based Fairness-aware Recommendation over Sensitive Attribute Removal
Graph Sampling based Fairness-aware Recommendation over Sens...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Shenghao Liu Guoyang Wu Xianjun Deng Hongwei Lu Bang Wang Laurence Yang James J. Park Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Smart Internet Technology School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea
Discrimination against different user groups has received growing attention in the recommendation field. To address this problem, existing works typically remove sensitive attributes that may cause discrimination thro...
来源: 评论