咨询与建议

限定检索结果

文献类型

  • 8,821 篇 期刊文献
  • 8,177 篇 会议
  • 63 册 图书
  • 2 篇 专利

馆藏范围

  • 17,063 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,947 篇 工学
    • 8,282 篇 计算机科学与技术...
    • 6,968 篇 软件工程
    • 2,502 篇 信息与通信工程
    • 1,668 篇 生物工程
    • 1,356 篇 控制科学与工程
    • 1,108 篇 电气工程
    • 1,052 篇 生物医学工程(可授...
    • 917 篇 光学工程
    • 735 篇 电子科学与技术(可...
    • 588 篇 机械工程
    • 535 篇 化学工程与技术
    • 369 篇 动力工程及工程热...
    • 364 篇 安全科学与工程
    • 363 篇 交通运输工程
    • 355 篇 网络空间安全
    • 322 篇 仪器科学与技术
  • 6,311 篇 理学
    • 3,287 篇 数学
    • 1,881 篇 生物学
    • 1,593 篇 物理学
    • 1,253 篇 统计学(可授理学、...
    • 624 篇 化学
    • 578 篇 系统科学
  • 3,153 篇 管理学
    • 1,679 篇 管理科学与工程(可...
    • 1,600 篇 图书情报与档案管...
    • 810 篇 工商管理
  • 1,018 篇 医学
    • 847 篇 临床医学
    • 743 篇 基础医学(可授医学...
    • 442 篇 药学(可授医学、理...
    • 418 篇 公共卫生与预防医...
  • 542 篇 法学
    • 455 篇 社会学
  • 306 篇 经济学
  • 212 篇 农学
  • 182 篇 教育学
  • 52 篇 文学
  • 24 篇 军事学
  • 23 篇 艺术学
  • 2 篇 历史学

主题

  • 534 篇 deep learning
  • 424 篇 feature extracti...
  • 400 篇 semantics
  • 341 篇 machine learning
  • 329 篇 training
  • 319 篇 computational mo...
  • 317 篇 accuracy
  • 264 篇 predictive model...
  • 205 篇 data mining
  • 200 篇 reinforcement le...
  • 189 篇 optimization
  • 184 篇 task analysis
  • 183 篇 internet of thin...
  • 183 篇 real-time system...
  • 173 篇 neural networks
  • 170 篇 image segmentati...
  • 162 篇 convolution
  • 162 篇 data models
  • 155 篇 graph neural net...
  • 144 篇 deep neural netw...

机构

  • 828 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 374 篇 horia hulubei na...
  • 366 篇 h.h. wills physi...
  • 312 篇 university of ch...
  • 305 篇 van swinderen in...
  • 293 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 imperial college...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 237 篇 bellee v.
  • 222 篇 casse g.
  • 215 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 206 篇 borsato m.
  • 204 篇 brundu d.
  • 202 篇 betancourt c.
  • 163 篇 bediaga i.
  • 158 篇 baker s.
  • 149 篇 amato s.
  • 149 篇 boettcher t.
  • 146 篇 albrecht j.
  • 145 篇 baryshnikov f.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman

语言

  • 13,886 篇 英文
  • 3,083 篇 其他
  • 138 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Data Science and Computer Science"
17063 条 记 录,以下是711-720 订阅
排序:
PREVALENCE OF TRESILLO RHYTHM IN CONTEMPORARY POPULAR MUSIC  21
PREVALENCE OF TRESILLO RHYTHM IN CONTEMPORARY POPULAR MUSIC
收藏 引用
21st Sound and Music Computing Conference, SMC 2024
作者: Jajoria, Pushkar Mäder, Aurel Ruben Krenn, Florian McDermott, James Data Science Institute School of Computer Science University of Galway Galway Ireland Digital and Cognitive Musicology Lab École Polytechnique Fédérale de Lausanne Lausanne Switzerland
This paper presents an investigation into the prevalence and significance of the Tresillo rhythm in contemporary popular music. Initially, the Tresillo rhythm is defined and formalized within a computational framework... 详细信息
来源: 评论
DiffLight: A Partial Rewards Conditioned Diffusion Model for Traffic Signal Control with Missing data  38
DiffLight: A Partial Rewards Conditioned Diffusion Model for...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Chen, Hanyang Jiang, Yang Guo, Shengnan Mao, Xiaowei Lin, Youfang Wan, Huaiyu School of Computer Science and Technology Beijing Jiaotong University China Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing China
The application of reinforcement learning in traffic signal control (TSC) has been extensively researched and yielded notable achievements. However, most existing works for TSC assume that traffic data from all surrou...
来源: 评论
A DL Intrusion Detection Method for Low-Rate Denial of Service Attacks
A DL Intrusion Detection Method for Low-Rate Denial of Servi...
收藏 引用
2023 Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2023
作者: Wu, Yuhong Lv, Yunshan Hu, Xiangdong School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Key Laboratory of Public Big Data Security Technology Chongqing Chongqing China School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Automation Chongqing University of Posts and Telecommunications Chongqing China
Denial of service (DoS) attacks is among the most harmful network threats. Low-rate DoS (LDoS) attacks feature good concealment and are likely to evade detection by conventional signal analysis-based methods. A LDoS a... 详细信息
来源: 评论
Implementation of Face Patterns and Smile Recognition for Intelligent Class Attendance Systems  6
Implementation of Face Patterns and Smile Recognition for In...
收藏 引用
6th International Conference on computer and Informatics Engineering, IC2IE 2023
作者: Miftakhurrokhmat Suparyanto, Teddy Elwirehardja, Gregorius Natanael Karimah, Shofiyati Nur Pardamean, Bens Bina Nusantara University Bioinformatics and Data Science Research Center Jakarta Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta Indonesia Universitas Amikom Yogyakarta Faculty of Computer Science Department of Informatics Yogyakarta Indonesia Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta Indonesia
Students 'attendance in class is one important success parameter in face-to-face learning processes. Conventional attendance systems, such as paper-based attendance sheets or identity card systems, require a long ... 详细信息
来源: 评论
ANIMC: A Soft Approach for Autoweighted Noisy and Incomplete Multiview Clustering
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第2期3卷 192-206页
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering The School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of Information Storage System Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Electrical and Computer Engineering University of Florida GainesvilleFL32611 United States
Multiview clustering has wide real-world applications because it can process data from multiple sources. However, these data often contain missing instances and noises, which are ignored by most multiview clustering m... 详细信息
来源: 评论
Space/Air Covert Communications:Potentials,Scenarios,and Key Technologies
收藏 引用
China Communications 2024年 第3期21卷 1-18页
作者: Mao Haobin Liu Yanming Zhu Lipeng Mao Tianqi Xiao Zhenyu Zhang Rui Han Zhu Xia Xianggen School of Electronic and Information Engineering Beihang UniversityBeijing 100191China Department of Electrical and Computer Engineering National University of SingaporeSingapore 117583Singapore School of Science and Engineering Shenzhen Research Institute of Big Datathe Chinese University of Hong KongShenzhenGuangdong 518172China Department of Electrical and Computer Engineering University of HoustonHoustonTX 77004USA Department of Computer Science and Engineering Kyung Hee UniversitySeoulSouth Korea446-701 Department of Electrical and Computer Engineering University of DelawareNewarkDE 19716USA
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel... 详细信息
来源: 评论
RoCEL: Advancing Table Entity Linking through Distinctive Row and Column Contexts
RoCEL: Advancing Table Entity Linking through Distinctive Ro...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Wang, Yuanzheng Fan, Yixing Guo, Jiafeng Zhang, Ruqing Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Table entity linking (TEL) aims to map entity mentions in the table to their corresponding entities in a knowledge base (KB). The core of this task is to leverage structured contexts, specifically row and column conte... 详细信息
来源: 评论
Detection of Plant Disease Using Machine Learning and Deep Learning Algorithms  8
Detection of Plant Disease Using Machine Learning and Deep L...
收藏 引用
8th IEEE International Conference on science, Technology, Engineering and Mathematics, ICONSTEM 2023
作者: Gollapudi, Kalyani Varigonda, Preethi Jancy, S. Pushpalatha, S. Marya, Viji Amutha Helen, Suji Sathyabama Institute of Science and Technology Computer Science and Engineering Chennai India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai India Saveetha School of Engineering Simats Department of Data Analytics Chennai602105 India
Agriculture performs an critical position in India's economic system. Early detection of plant illnesses is critical to save you crop damage and similarly spread of diseases. Most plants, along with apple, tomato,... 详细信息
来源: 评论
Confidentiality. Integrity, and Availability (CIA) Approach for Private dataset Management System Design  9
Confidentiality. Integrity, and Availability (CIA) Approach ...
收藏 引用
9th International Conference on Information Technology and Digital Applications, ICITDA 2024
作者: Isnan, Mahmud Elwirehardja, Gregorius Natanael Ariansyah, Dedy Rahutomo, Reza Pardamean, Bens School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta11480 Indonesia School of Information Systems Bina Nusantara University Information Systems Department Jakarta11480 Indonesia Binus Graduate Program Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
dataset management systems are essential for assisting research and development (R&D) organizations in applying data governance protocols, especially in managing the utilization of datasets. In R&D, datasets a... 详细信息
来源: 评论
Text2NKG: Fine-Grained N-ary Relation Extraction for N-ary relational Knowledge Graph Construction  38
Text2NKG: Fine-Grained N-ary Relation Extraction for N-ary r...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Luo, Haoran Haihong, E. Yang, Yuhao Yao, Tianyu Guo, Yikai Tang, Zichen Zhang, Wentai Peng, Shiyao Wan, Kaiyang Song, Meina Lin, Wei Zhu, Yifan Tuan, Luu Anh School of Computer Science Beijing University of Posts and Telecommunications China School of Automation Science and Electrical Engineering Beihang University China Beijing Institute of Computer Technology and Application China Inspur Group Co. Ltd. China College of Computing and Data Science Nanyang Technological University Singapore
Beyond traditional binary relational facts, n-ary relational knowledge graphs (NKGs) are comprised of n-ary relational facts containing more than two entities, which are closer to real-world facts with broader applica...
来源: 评论