咨询与建议

限定检索结果

文献类型

  • 8,890 篇 期刊文献
  • 8,140 篇 会议
  • 63 册 图书
  • 2 篇 专利

馆藏范围

  • 17,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,967 篇 工学
    • 8,319 篇 计算机科学与技术...
    • 7,018 篇 软件工程
    • 2,512 篇 信息与通信工程
    • 1,673 篇 生物工程
    • 1,366 篇 控制科学与工程
    • 1,143 篇 电气工程
    • 1,060 篇 生物医学工程(可授...
    • 926 篇 光学工程
    • 741 篇 电子科学与技术(可...
    • 591 篇 机械工程
    • 538 篇 化学工程与技术
    • 372 篇 动力工程及工程热...
    • 368 篇 交通运输工程
    • 368 篇 安全科学与工程
    • 356 篇 网络空间安全
    • 324 篇 仪器科学与技术
  • 6,354 篇 理学
    • 3,285 篇 数学
    • 1,889 篇 生物学
    • 1,600 篇 物理学
    • 1,237 篇 统计学(可授理学、...
    • 629 篇 化学
    • 581 篇 系统科学
  • 3,164 篇 管理学
    • 1,689 篇 管理科学与工程(可...
    • 1,602 篇 图书情报与档案管...
    • 811 篇 工商管理
  • 1,024 篇 医学
    • 852 篇 临床医学
    • 749 篇 基础医学(可授医学...
    • 440 篇 药学(可授医学、理...
    • 422 篇 公共卫生与预防医...
  • 545 篇 法学
    • 456 篇 社会学
  • 305 篇 经济学
  • 213 篇 农学
  • 182 篇 教育学
  • 53 篇 文学
  • 25 篇 军事学
  • 23 篇 艺术学
  • 2 篇 历史学

主题

  • 529 篇 deep learning
  • 424 篇 feature extracti...
  • 405 篇 semantics
  • 338 篇 machine learning
  • 321 篇 computational mo...
  • 312 篇 training
  • 305 篇 accuracy
  • 258 篇 predictive model...
  • 201 篇 reinforcement le...
  • 200 篇 data mining
  • 190 篇 optimization
  • 185 篇 task analysis
  • 180 篇 real-time system...
  • 178 篇 internet of thin...
  • 175 篇 neural networks
  • 170 篇 image segmentati...
  • 166 篇 graph neural net...
  • 163 篇 data models
  • 158 篇 convolution
  • 147 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 373 篇 horia hulubei na...
  • 364 篇 h.h. wills physi...
  • 311 篇 university of ch...
  • 304 篇 van swinderen in...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 imperial college...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...

作者

  • 249 篇 barter w.
  • 241 篇 beiter a.
  • 234 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 212 篇 blake t.
  • 204 篇 brundu d.
  • 202 篇 borsato m.
  • 200 篇 betancourt c.
  • 164 篇 bediaga i.
  • 157 篇 baker s.
  • 154 篇 amato s.
  • 148 篇 boettcher t.
  • 147 篇 baryshnikov f.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman

语言

  • 15,356 篇 英文
  • 1,637 篇 其他
  • 125 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Data Science and Computer Science"
17095 条 记 录,以下是621-630 订阅
排序:
Performance analysis of various classification algorithms for providing competency training to workplace risk prevention
收藏 引用
Multimedia Tools and Applications 2025年 第15期84卷 15123-15149页
作者: Garg, Shruti Murugan, Prabhu Manimaran, A. Sundar, Ramesh Dakshinamoorthy, Prabakar Rajaram, Gnanajeyaraman Birla Institute of Technology Ranchi Mesra India Department of ECE Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai602105 India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai602105 India Department of Networking and Communication School of Computing SRM Institute of Science and Technology SRM Nagar Kattankulathur India Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology SRM Nagar Kattankulathur India
In the workplace, risk prevention helps detect the risks and prevent accidents. To achieve this, workers' mental and physical parameters related to their health should be focused on and analyzed. It helps improve ... 详细信息
来源: 评论
Reliability and Robustness analysis of Machine Learning based Phishing URL Detectors
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-18页
作者: Sabir, Bushra Babar, M. Ali Gaire, Raj Abuadbba, Alsharif School of Computer Science The University of Adelaide Adelaide SA Australia CSIROs Data61 Canberra Australia
ML-based Phishing URL (MLPU) detectors serve as the first level of defence to protect users and organisations from being victims of phishing attacks. Lately, few studies have launched successful adversarial attacks ag... 详细信息
来源: 评论
Sample Complexity of Posted Pricing for a Single Item  38
Sample Complexity of Posted Pricing for a Single Item
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Jin, Billy Kesselheim, Thomas Ma, Will Singla, Sahil Cornell University School of Operations Research and Information Engineering United States University of Bonn Institute of Computer Science Lamarr Institute for Machine Learning and Artificial Intelligence Germany Columbia University Graduate School of Business Data Science Institute United States Georgia Tech School of Computer Science United States
Selling a single item to n self-interested buyers is a fundamental problem in economics, where the two objectives typically considered are welfare maximization and revenue maximization. Since the optimal mechanisms ar...
来源: 评论
Artificial Intelligence Strategies for Accurate Segmentation and Categorization of Unveiling Genetic Disorders in Bioinformatics  2
Artificial Intelligence Strategies for Accurate Segmentation...
收藏 引用
2nd International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024
作者: Sarathamani, T. Kavitha, K. Thirumoorthi, C. Vagini, K Jayanthi Manikandaprabhu, P. Sumathi, P. Kolkata India Mohan Babu University School of Computing Department of Ai and Ml Sree Sainath Nagar Tirupati India Psg College of Arts and Science Department of Computer Science Tamilnadu Coimbatore India Kpr College of Arts Science and Research Department of Computer science with Data Analytics Tamilnadu Coimbatore India Amrita Vishwa Vidyapeetham School of Computing Department of Computer Science Karnataka Mysuru India Dr. G R Damodaran College of Science Department of Computer Science Tamilnadu Coimbatore India
Women all across the world are affected by the potentially fatal condition known as breast cancer. According to clinical experts, early cancer detection helps to save lives. Several machine learning algorithms have be... 详细信息
来源: 评论
Trace-based Multi-Dimensional Root Cause Localization of Performance Issues in Microservice Systems  24
Trace-based Multi-Dimensional Root Cause Localization of Per...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Zhang, Chenxi Dong, Zhen Peng, Xin Zhang, Bicheng Chen, Miao Fudan University China Shanghai Collaborative Innovation Center of Intelligent Visual Computing China School of Computer Science and Shanghai Key Laboratory of Data Science Fudan University China
Modern microservice systems have become increasingly complicated due to the dynamic and complex interactions and runtime environment. It leads to the system vulnerable to performance issues caused by a variety of reas... 详细信息
来源: 评论
Mapping the Scientific Landscape of Integrated Scheduling Towards Industry 5.0 with A Bibliometric Analysis  6
Mapping the Scientific Landscape of Integrated Scheduling To...
收藏 引用
6th International Conference on Industry 4.0 and Smart Manufacturing, ISM 2024
作者: Putri Ardyanti, Anak Agung Ayu Xie, Zhiqiang Karnyoto, Andrea Stevens Pardamean, Bens Estiyanti, Ni Made School of Computer Science and Technology Harbin University of Science and Technology Harbin150000 China Faculty of Information Technology and Design Primakara University Bali 80226 Indonesia Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta11480 Indonesia Computer Science Department BINUS Graduate Program Master of Computer Science Bina Nusantara University Jakarta 11480 Indonesia School of Management and Business University of Debrecen Debrecen Hungary
The industry is rapidly transitioning from the 4.0 era to the 5.0 era, prompting renewed interest among scholars in scheduling problems. They allow operations to process and assemble various components simultaneously.... 详细信息
来源: 评论
Few-shot Link Prediction on Hyper-relational Facts  30
Few-shot Link Prediction on Hyper-relational Facts
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Wei, Jiyao Guan, Saiping Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Hyper-relational facts, which consist of a primary triple (head entity, relation, tail entity) and auxiliary attribute-value pairs, are widely present in real-world Knowledge Graphs (KGs). Link Prediction on Hyper-rel... 详细信息
来源: 评论
The Double Contrast for Unsupervised Person Re-Identification  24
The Double Contrast for Unsupervised Person Re-Identificatio...
收藏 引用
2024 International Conference on computer Vision and Deep Learning, CVDL 2024
作者: Liu, Daocheng Fu, Yanyun Shi, Wenxi Zhu, Zhansheng Wang, Deyong School of Computer Science and Technology Urumqi China Beijing Academy of Science and Technology Beijing China Key Laboratory of Big Data of Xinjiang Social Security Risk Urumqi China
At present, the most popular unsupervised person re-identification(Re-ID) research mainly uses some clustering methods to gather samples with similar features and generate a pseudo-label for each cluster, and uses the... 详细信息
来源: 评论
Nested Event Extraction upon Pivot Element Recognition  30
Nested Event Extraction upon Pivot Element Recognition
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Ren, Weicheng Li, Zixuan Jin, Xiaolong Bai, Long Su, Miao Liu, Yantao Guan, Saiping Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Nested Event Extraction (NEE) aims to extract complex event structures where an event contains other events as its arguments recursively. Nested events involve a kind of Pivot Elements (PEs) that simultaneously act as... 详细信息
来源: 评论
Selective Temporal Knowledge Graph Reasoning  30
Selective Temporal Knowledge Graph Reasoning
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Hou, Zhongni Jin, Xiaolong Li, Zixuan Bai, Long Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Temporal Knowledge Graph (TKG), which characterizes temporally evolving facts in the form of (subject, relation, object, timestamp), has attracted much attention recently. TKG reasoning aims to predict future facts ba... 详细信息
来源: 评论