咨询与建议

限定检索结果

文献类型

  • 8,856 篇 期刊文献
  • 7,960 篇 会议
  • 63 册 图书
  • 2 篇 专利

馆藏范围

  • 16,881 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,774 篇 工学
    • 8,180 篇 计算机科学与技术...
    • 6,931 篇 软件工程
    • 2,479 篇 信息与通信工程
    • 1,666 篇 生物工程
    • 1,290 篇 控制科学与工程
    • 1,125 篇 电气工程
    • 1,048 篇 生物医学工程(可授...
    • 907 篇 光学工程
    • 739 篇 电子科学与技术(可...
    • 582 篇 机械工程
    • 532 篇 化学工程与技术
    • 375 篇 动力工程及工程热...
    • 366 篇 交通运输工程
    • 366 篇 安全科学与工程
    • 351 篇 网络空间安全
    • 322 篇 仪器科学与技术
  • 6,309 篇 理学
    • 3,256 篇 数学
    • 1,888 篇 生物学
    • 1,588 篇 物理学
    • 1,228 篇 统计学(可授理学、...
    • 623 篇 化学
    • 579 篇 系统科学
  • 3,150 篇 管理学
    • 1,684 篇 管理科学与工程(可...
    • 1,595 篇 图书情报与档案管...
    • 811 篇 工商管理
  • 1,027 篇 医学
    • 847 篇 临床医学
    • 748 篇 基础医学(可授医学...
    • 440 篇 药学(可授医学、理...
    • 417 篇 公共卫生与预防医...
  • 537 篇 法学
    • 452 篇 社会学
  • 306 篇 经济学
  • 214 篇 农学
  • 173 篇 教育学
  • 57 篇 文学
  • 24 篇 军事学
  • 24 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 521 篇 deep learning
  • 420 篇 feature extracti...
  • 408 篇 semantics
  • 340 篇 machine learning
  • 319 篇 computational mo...
  • 316 篇 training
  • 309 篇 accuracy
  • 255 篇 predictive model...
  • 197 篇 data mining
  • 194 篇 reinforcement le...
  • 189 篇 optimization
  • 185 篇 task analysis
  • 179 篇 real-time system...
  • 178 篇 internet of thin...
  • 176 篇 neural networks
  • 166 篇 image segmentati...
  • 163 篇 graph neural net...
  • 161 篇 data models
  • 156 篇 convolution
  • 142 篇 visualization

机构

  • 819 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 372 篇 horia hulubei na...
  • 364 篇 h.h. wills physi...
  • 309 篇 university of ch...
  • 306 篇 van swinderen in...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 imperial college...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 yandex school of...

作者

  • 249 篇 barter w.
  • 241 篇 beiter a.
  • 234 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 213 篇 blake t.
  • 204 篇 brundu d.
  • 203 篇 borsato m.
  • 199 篇 betancourt c.
  • 163 篇 bediaga i.
  • 157 篇 baker s.
  • 155 篇 amato s.
  • 151 篇 boettcher t.
  • 150 篇 baryshnikov f.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman

语言

  • 15,716 篇 英文
  • 1,063 篇 其他
  • 114 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Data and Computer Science"
16881 条 记 录,以下是61-70 订阅
排序:
Influence of different form of multimedia on motivation and topic perception in augmented reality learning experiences
收藏 引用
Multimedia Tools and Applications 2025年 1-28页
作者: Yap, Shook Chin Rahmat, Rahmita Wirza Ali, Siti Khadijah School of Computing and Data Science Xiamen University Malaysia Selangor Sepang Malaysia Faculty of Computer Science and Information Technology Universiti Putra Malaysia Selangor Serdang Malaysia
It has been widely proven that Augmented Reality (AR) brings numerous benefits in learning experiences, including enhancing learning outcomes and motivation. However, not many studies investigate how different forms o... 详细信息
来源: 评论
Enhancing Field Tracking and Interprocedural Analysis to Find More Null Pointer Exceptions  31
Enhancing Field Tracking and Interprocedural Analysis to Fin...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Xie, Dongfang Chen, Bihuan Huang, Kaifeng Wang, Yu Pan, Linghao Chen, Zhicheng Peng, Xin Fudan University School of Computer Science Shanghai Key Laboratory of Data Science China
Null pointer dereference raises Null Pointer Exceptions (NPEs). There are two groups of approaches to detect NPEs. Type-based approaches carry out strict type-based null safety checking. They heavily rely on annotatio... 详细信息
来源: 评论
Proximal Policy Optimization-Based Intrusion Detection Model for Satellite Networks  5
Proximal Policy Optimization-Based Intrusion Detection Model...
收藏 引用
5th International Symposium on computer Engineering and Intelligent Communications, ISCEIC 2024
作者: Liang, Shuaishuai Feng, Huibin Wu, Jiawei He, Canfei College of Computer and Data Science Fuzhou University Fuzhou China School of Computer and Big Data Minjiang University Fuzhou China
As satellite network communication systems become an increasingly pivotal role in modern life, The routine maintenance of satellite networks is challenging due to limited resources and their susceptibility to interfer... 详细信息
来源: 评论
Fast and scalable off-target assessment for CRISPR guide RNAs using partial matches
Fast and scalable off-target assessment for CRISPR guide RNA...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Schmitz, Carl Bradford, Jacob Salomone, Robert Perrin, Dimitri Queensland University of Technology School of Computer Science Centre for Data Science Brisbane Australia
The design of CRISPR-Cas9 guide RNAs requires the analysis of all potential target sites to determine the risk of unintentional edits for any given guide. A number of methods have been developed to evaluate this risk ... 详细信息
来源: 评论
A Study of data Leakage Prevention Techniques in Remote Collaborative Work Application  24
A Study of Data Leakage Prevention Techniques in Remote Coll...
收藏 引用
9th International Conference on Cyber Security and Information Engineering, ICCSIE 2024
作者: Xu, Wenfang Zhao, Shusheng School of Data Science and Computer Engineering Xiamen Institute of Technology China
Under the wave of digital transformation, remote collaboration has become the new normal in the daily operation of enterprises. But at the same time, the risk of sensitive data leakage and the insufficiency of protect... 详细信息
来源: 评论
Gen-SQL: Efficient Text-to-SQL By Bridging Natural Language Question And database Schema With Pseudo-Schema  31
Gen-SQL: Efficient Text-to-SQL By Bridging Natural Language ...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Shi, Jie Xu, Bo Liang, Jiaqing Xiao, Yanghua Chen, Jia Xie, Chenhao Wang, Peng Wang, Wei Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China School of Computer Science and Technology Donghua University China School of Data Science Fudan University China SenseDeal Intelligent Technology Co. Ltd. China
With the prevalence of Large Language Models (LLMs), recent studies have shifted paradigms and leveraged LLMs to tackle the challenging task of Text-to-SQL. Because of the complexity of real world databases, previous ... 详细信息
来源: 评论
Spatio-Temporal Location Recommendation for Urban Facility Placement via Graph Convolutional and Recurrent Networks
收藏 引用
Journal of computer science & Technology 2024年 第6期39卷 1419-1440页
作者: Pu Wang Jian-Jiang Lu Wei Chen Peng-Peng Zhao Lei Zhao Institute of Artificial Intelligence School of Computer Science and TechnologySoochow UniversitySuzhou 215006China Department of Data Resource and Information Development Soochow UniversitySuzhou 215006China
The ability to recommend candidate locations for service facility placement is crucial for the success of urban planning. Whether a location is suitable for establishing new facilities is largely determined by its pot... 详细信息
来源: 评论
Interpretable Machine Learning in Leveraging Customer Information for Success Direct Marketing Campaigns  10
Interpretable Machine Learning in Leveraging Customer Inform...
收藏 引用
10th International Conference on Smart Computing and Communication, ICSCC 2024
作者: Octavia Tjandra, Clarissa Shirley Cam, Grace Agung Santoso Gunawan, Alexander Eka Setiawan, Karli School of Computer Science Bina Nusantara University Data Science Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
A bank's marketing campaign execution is very important. Undoubtedly, a well-crafted marketing plan will contribute to the bank's increased revenue. Marketing is crucial because it can be used to connect with ... 详细信息
来源: 评论
Image-Based Natural Disaster Classification with Deep Learning: A Comparative Analysis
Image-Based Natural Disaster Classification with Deep Learni...
收藏 引用
2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology, IAICT 2024
作者: Alamsyah, Samuel Eka Djamhari, Simen Ferdinand Sudjono, Salomo Hendrian Gunawan, Alexander A.S. Setiawan, Karli Eka Data Science Program Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia
Natural disasters, including earthquakes, cyclones, floods, and wildfires, cause significant environmental damage and have emerged as a major global issue. These events can result in loss of life and disrupt communiti... 详细信息
来源: 评论
Regression-Based Exploration of Factors Influencing Movie Profits
Regression-Based Exploration of Factors Influencing Movie Pr...
收藏 引用
2024 International of Seminar on Application for Technology of Information and Communication, iSemantic 2024
作者: Veronica, Lindawaty Wibowo, Tifara Beata Gunawan, Alexander Agung Santoso Setiawan, Karli Eka School of Computer Science Bina Nusantara University Data Science Program Computer Science Department Jakarta11480 Indonesia Bina Nusantara University School of Computer Science Computer Science Department Jakarta11480 Indonesia
Accurate box office prediction is crucial for managing financial risks in film production. The internet has transformed consumer behavior, affecting marketing strategies. Critical online reviews, more than early reven... 详细信息
来源: 评论