咨询与建议

限定检索结果

文献类型

  • 5,670 篇 期刊文献
  • 4,828 篇 会议
  • 46 册 图书

馆藏范围

  • 10,544 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,745 篇 工学
    • 5,031 篇 计算机科学与技术...
    • 4,210 篇 软件工程
    • 1,631 篇 信息与通信工程
    • 1,057 篇 生物工程
    • 867 篇 控制科学与工程
    • 812 篇 电气工程
    • 685 篇 生物医学工程(可授...
    • 610 篇 光学工程
    • 541 篇 电子科学与技术(可...
    • 364 篇 机械工程
    • 327 篇 化学工程与技术
    • 255 篇 交通运输工程
    • 250 篇 动力工程及工程热...
    • 236 篇 网络空间安全
    • 221 篇 安全科学与工程
    • 219 篇 仪器科学与技术
  • 3,951 篇 理学
    • 1,959 篇 数学
    • 1,204 篇 生物学
    • 1,101 篇 物理学
    • 743 篇 统计学(可授理学、...
    • 397 篇 化学
    • 348 篇 系统科学
  • 1,920 篇 管理学
    • 1,107 篇 管理科学与工程(可...
    • 895 篇 图书情报与档案管...
    • 539 篇 工商管理
  • 645 篇 医学
    • 534 篇 临床医学
    • 466 篇 基础医学(可授医学...
    • 284 篇 药学(可授医学、理...
    • 267 篇 公共卫生与预防医...
  • 329 篇 法学
    • 277 篇 社会学
  • 210 篇 经济学
  • 150 篇 农学
  • 108 篇 教育学
  • 38 篇 文学
  • 18 篇 军事学
  • 16 篇 艺术学

主题

  • 361 篇 deep learning
  • 288 篇 feature extracti...
  • 279 篇 accuracy
  • 237 篇 semantics
  • 234 篇 machine learning
  • 233 篇 training
  • 199 篇 computational mo...
  • 170 篇 predictive model...
  • 152 篇 internet of thin...
  • 150 篇 real-time system...
  • 137 篇 data models
  • 131 篇 optimization
  • 122 篇 reinforcement le...
  • 120 篇 data mining
  • 119 篇 convolutional ne...
  • 106 篇 image segmentati...
  • 103 篇 artificial intel...
  • 102 篇 neural networks
  • 100 篇 security
  • 94 篇 support vector m...

机构

  • 426 篇 department of ph...
  • 406 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 390 篇 h.h. wills physi...
  • 363 篇 van swinderen in...
  • 337 篇 yandex school of...
  • 311 篇 school of physic...
  • 310 篇 cavendish labora...
  • 303 篇 university of ch...
  • 291 篇 nikhef national ...
  • 289 篇 imperial college...
  • 289 篇 center for high ...
  • 287 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 244 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 217 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 216 篇 borsato m.
  • 215 篇 betancourt c.
  • 207 篇 brundu d.
  • 204 篇 bediaga i.
  • 199 篇 amato s.
  • 192 篇 baryshnikov f.
  • 186 篇 boettcher t.
  • 165 篇 braun s.
  • 163 篇 borisyak m.
  • 161 篇 baker s.
  • 153 篇 bjørn m.
  • 152 篇 bizzeti a.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery

语言

  • 8,527 篇 英文
  • 1,957 篇 其他
  • 85 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Data Science and Computer Engineering"
10544 条 记 录,以下是541-550 订阅
排序:
A IoT Edge Advanced VANET Technique for Vehicle Communication and Improve Safety in Hill Station Critical Scenario  8
A IoT Edge Advanced VANET Technique for Vehicle Communicatio...
收藏 引用
8th IEEE International Conference on science, Technology, engineering and Mathematics, ICONSTEM 2023
作者: Murali, N. Beulah David, D. Saveetha School of Engineering Simats Department of Computer Science and Engineering Tamilnadu Chennai India Saveetha School of Engineering Simats Institute of Information Technology Department of Data Analytics Tamilnadu Chennai India
The safety of the vehicles is given great importance by advanced intelligent transportation systems. We are here to make sure that swift transit vehicles and infrastructure communicate with one other quickly. The majo... 详细信息
来源: 评论
TROPICAL: Transformer-Based Hypergraph Learning for Camouflaged Fraudster Detection  24
TROPICAL: Transformer-Based Hypergraph Learning for Camoufla...
收藏 引用
24th IEEE International Conference on data Mining, ICDM 2024
作者: Haghighi, Venus Soltani, Behnaz Shabani, Nasrin Wu, Jia Zhang, Yang Yao, Lina Sheng, Quan Z. Yang, Jian School of Computing Macquarie University SydneyNSW2109 Australia School of Computer Science and Engineering University of New South Wales NSW Australia CSIRO's Data61 Australia
Graph-based fraud detection has attracted increasing attention in recent years, reflecting its growing potential in mitigating sophisticated fraudulent activities. The main objective of graph-based fraud detection is ... 详细信息
来源: 评论
HTCCN: Temporal Causal Convolutional Networks with Hawkes Process for Extrapolation Reasoning in Temporal Knowledge Graphs
HTCCN: Temporal Causal Convolutional Networks with Hawkes Pr...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Chen, Tingxuan Long, Jun Yang, Liu Wang, Zidong Wang, Yongheng Jin, Xiongnan School of Computer Science and Engineering Central South University Hunan China Big Data Institute Central South University Hunan China Zhejiang lab Zhejiang China
Temporal knowledge graphs (TKGs) serve as powerful tools for storing and modeling dynamic facts, holding immense potential in anticipating future facts. Since future facts are inherently unknowable, effectively modeli... 详细信息
来源: 评论
FedMCP: Parameter-Efficient Federated Learning with Model-Contrastive Personalization  30
FedMCP: Parameter-Efficient Federated Learning with Model-Co...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhao, Qianyi Qu, Chen Chen, Cen Fan, Mingyuan Wang, Yanhao East China Normal University School of Data Science and Engineering Shanghai China University of Massachusetts Amherst College of Information & Computer Sciences AmherstMA United States
With increasing concerns and regulations on data privacy, fine-tuning pretrained language models (PLMs) in federated learning (FL) has become a common paradigm for NLP tasks. Despite being extensively studied, the exi... 详细信息
来源: 评论
Dynamic Provision of Workload Allocation on Cloud Resources Using Machine Learning Techniques
Dynamic Provision of Workload Allocation on Cloud Resources ...
收藏 引用
2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2023
作者: Saravanakumar, C. Prakash, M. Govindaraj, V. Government Polytechnic College Department of Computer Engineering Chennai600012 India Vellore Institute of Technology School of Computer Science and Engineering Vellore632 014 India MPHASIS Ltd SME- Data Science Chennai India
Cloud tasks are scheduled to the respective VM for execution. Scheduling process selects the resources and allocates the requesting task to them. The resources are selected in advance and then the request is forwarded... 详细信息
来源: 评论
HOLMES: An Efficient and Lightweight Semantic Based Anomalous Email Detector  19
HOLMES: An Efficient and Lightweight Semantic Based Anomalou...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Wu, Peilun Guo, Hui Data Security & Compliance Cdo Data & Cloud PwC Cn China School of Computer Science and Engineering Australia
Email threat is a serious issue for enterprise security. The threat can be in various malicious forms, such as phishing, fraud, blackmail and malvertisement. The traditional anti-spam gateway often maintains a greylis... 详细信息
来源: 评论
Skin Cancer Prediction by Incorporating Bio-inspired Optimization in Deep Neural Network
收藏 引用
SN computer science 2024年 第8期5卷 1-20页
作者: Mundada, Monica R. Sowmya, B.J. Supreeth, S. Prabhu, Smitha G. Mahesh, K. Vishwanath, Y. Rohith, S. Department of Computer Science and Engineering M S Ramaiah Institute of Technology Bengaluru 560054 India Department of Artificial Intelligence and Data Science Ramaiah Institute of Technology Bengaluru 560054 India School of Computer Science and Engineering REVA University Bengaluru 560064 India Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bengaluru India Department of Electrical and Electronics Engineering Sir M Visvesvaraya Institute of Technology Bengaluru India School of Computer Science & Engineering Presidency University Bengaluru 560064 India Department of Electronics & Communication Engineering Nagarjuna College of Engineering & Technology Bengaluru 562164 India
This study offers a unified surgical conception of skin neoplasms using deep learning and genetic optimization techniques to improve classification values and speed of diagnosis. In this case, the architecture of Conv... 详细信息
来源: 评论
Edge-Driven Industrial Computing Power Networks: Digital Twin-Empowered Service Provisioning by Hybrid Soft Actor-Critic
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8095-8109页
作者: Zhang, Long Song, Deng-Ao Zhang, Hongliang Tian, Ni Zhuang, Zirui Niyato, Dusit Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Nanyang Technological University College of Computing and Data Science 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
With the proliferation of data-intensive industrial applications, the collaboration of computing powers among standalone edge servers is vital to provision such services for smart devices. In this paper, we propose an... 详细信息
来源: 评论
Ancient Character Recognition: A Novel Image dataset of Shui Manuscript Characters and Classification Model
收藏 引用
Chinese Journal of Electronics 2023年 第1期32卷 64-75页
作者: TANG Minli XIE Shaomin LIU Xiangrong Department of Computer Science and Technology School of Informatics Xiamen University School of Big Data Engineering KaiLi University Key Laboratory of Digital Protection and Intelligent Processing of Intangible Cultural Heritage of Fujian and Taiwan Ministry of Culture and Tourism Xiamen University
Shui manuscripts are part of the national intangible cultural heritage of China. Owing to the particularity of text reading, the level of informatization and intelligence in the protection of Shui manuscript culture i... 详细信息
来源: 评论
Multiple occurrence point recognition method for unsafe traffic driving behavior based on YOLOv5 visual perception
Advances in Transportation Studies
收藏 引用
Advances in Transportation Studies 2023年 第Special Issue期1卷 51-62页
作者: Guo, Y.R. Wu, R.N. Patnaik, S. School of Mathematics and Information Engineering Longdong University Qingyang745000 China Lanzhou Big Data Administration Bureau 122 Gannan Middle Road Lanzhou730000 China Department of Computer Science and Engineering SOA University Bhubaneswar751030 India
Reducing the risk behaviors of drivers during driving is of great significance to improve the level of road traffic safety. Using intelligent technology to monitor unsafe behaviors of drivers can effectively reduce an... 详细信息
来源: 评论