咨询与建议

限定检索结果

文献类型

  • 2,344 篇 会议
  • 2,001 篇 期刊文献
  • 96 册 图书

馆藏范围

  • 4,441 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,745 篇 工学
    • 1,983 篇 计算机科学与技术...
    • 1,590 篇 软件工程
    • 518 篇 信息与通信工程
    • 435 篇 生物工程
    • 414 篇 控制科学与工程
    • 348 篇 生物医学工程(可授...
    • 269 篇 电气工程
    • 243 篇 光学工程
    • 210 篇 电子科学与技术(可...
    • 196 篇 机械工程
    • 115 篇 化学工程与技术
    • 115 篇 安全科学与工程
    • 110 篇 交通运输工程
    • 107 篇 动力工程及工程热...
    • 99 篇 仪器科学与技术
  • 1,599 篇 理学
    • 822 篇 数学
    • 489 篇 生物学
    • 440 篇 物理学
    • 297 篇 统计学(可授理学、...
    • 179 篇 系统科学
    • 115 篇 化学
  • 757 篇 管理学
    • 440 篇 管理科学与工程(可...
    • 344 篇 图书情报与档案管...
    • 249 篇 工商管理
  • 335 篇 医学
    • 290 篇 临床医学
    • 276 篇 基础医学(可授医学...
    • 166 篇 药学(可授医学、理...
    • 126 篇 公共卫生与预防医...
  • 158 篇 法学
    • 140 篇 社会学
  • 94 篇 经济学
    • 93 篇 应用经济学
  • 76 篇 教育学
  • 64 篇 农学
  • 12 篇 军事学
  • 5 篇 艺术学
  • 3 篇 文学

主题

  • 105 篇 machine learning
  • 92 篇 computational mo...
  • 83 篇 semantics
  • 77 篇 deep learning
  • 69 篇 feature extracti...
  • 67 篇 artificial intel...
  • 66 篇 training
  • 63 篇 accuracy
  • 59 篇 data models
  • 58 篇 visualization
  • 57 篇 computer archite...
  • 55 篇 cloud computing
  • 48 篇 predictive model...
  • 48 篇 forecasting
  • 47 篇 informatics
  • 46 篇 internet of thin...
  • 46 篇 software
  • 45 篇 real-time system...
  • 43 篇 educational inst...
  • 42 篇 optimization

机构

  • 104 篇 school of comput...
  • 94 篇 school of comput...
  • 51 篇 school of comput...
  • 49 篇 school of comput...
  • 43 篇 school of comput...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 luddy school of ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 40 篇 institute of phy...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 35 篇 liu lantao
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 3,995 篇 英文
  • 404 篇 其他
  • 43 篇 中文
  • 4 篇 德文
  • 2 篇 日文
  • 1 篇 罗马尼亚文
检索条件"机构=School of Engineering in Computing and Informatics"
4441 条 记 录,以下是181-190 订阅
Ensuring Zero Trust IoT Data Privacy: Differential Privacy in Blockchain Using Federated Learning
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 1167-1179页
作者: Hussain, Altaf Akbar, Wajahat Hussain, Tariq Kashif Bashir, Ali Al Dabel, Maryam M. Ali, Farman Yang, Bailin Khushal Khan Khattak University Department of Computer Science and BI Karak27200 Pakistan Chang’an University School of Electronic and Control Engineering Xi’an710064 China Zhejiang Gongshang University School of Computer Science and Technology School of Mathematics and Statistics Hangzhou310018 China Manchester Metropolitan University Department of Computing and Mathematics ManchesterM15 6BH United Kingdom Chitkara University Institute of Engineering and Technology Chitkara University Centre for Research Impact and Outcome Rajpura140401 India University of Hafr Al Batin College of Computer Science and Engineering Department of Computer Science and Engineering Hafar Al Batin39524 Saudi Arabia Sungkyunkwan University School of Convergence College of Computing and Informatics Department of Applied AI Seoul03063 Korea Republic of
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and l-diversity are becoming outdated due t... 详细信息
来源: 评论
Learning to Reconnect Interrupted Trajectories for Weakly Supervised Multi-Object Tracking  48
Learning to Reconnect Interrupted Trajectories for Weakly Su...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Li, Yu-Lei Lu, Yang Li, Jie Wang, Hanzi Xiamen University Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics China Xidian University Video and Image Processing System Laboratory School of Electronic Engineering China
Recently, some weakly supervised multi-object tracking (MOT) methods learn identity embedding features with pseudo identity labels rather than the high-cost manual ones. However, these pseudo identity labels may conta... 详细信息
来源: 评论
Reconstruction of multiplex networks via graph embeddings
收藏 引用
Physical Review E 2024年 第2期109卷 024313-024313页
作者: Daniel Kaiser Siddharth Patwardhan Minsuk Kim Filippo Radicchi Center for Complex Networks and Systems Research Luddy School of Informatics Computing and Engineering Indiana University Bloomington Indiana 47408 USA
Multiplex networks are collections of networks with identical nodes but distinct layers of edges. They are genuine representations of a large variety of real systems whose elements interact in multiple fashions or fla... 详细信息
来源: 评论
Carrying Out CNN Channel Pruning in a White Box
收藏 引用
IEEE Transactions on Neural Networks and Learning Systems 2023年 第10期34卷 7946-7955页
作者: Zhang, Yuxin Lin, Mingbao Lin, Chia-Wen Chen, Jie Wu, Yongjian Tian, Yonghong Ji, Rongrong Xiamen University Media Analytics and Computing Laboratory Department of Artificial Intelligence School of Informatics Xiamen361005 China Youtu Laboratory Tencent Shanghai200233 China National Tsing Hua University Department of Electrical Engineering The Institute of Communications Engineering Hsinchu30013 Taiwan Peng Cheng Laboratory Shenzhen518000 China Peking University Department of Computer Science and Technology Beijing100871 China School of Informatics and the Institute of Artificial Intelligence Xiamen University Media Analytics and Computing Laboratory Department of Artificial Intelligence Xiamen361005 China
Channel pruning has been long studied to compress convolutional neural networks (CNNs), which significantly reduces the overall computation. Prior works implement channel pruning in an unexplainable manner, which tend... 详细信息
来源: 评论
Neural Fidelity Calibration for Informative Sim-to-Real Adaptation
arXiv
收藏 引用
arXiv 2025年
作者: Yu, Youwei Liu, Lantao Luddy School of Informatics Computing and Engineering Indiana University BloomingtonIN47408 United States
Deep reinforcement learning can seamlessly transfer agile locomotion and navigation skills from the simulator to real world. However, bridging the sim-to-real gap with domain randomization or adversarial methods often... 详细信息
来源: 评论
System Support for Environmentally Sustainable computing in Data Centers
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Fan Luddy School of Informatics Computing and Engineering Indiana University BloomingtonIN United States
Modern data centers suffer from a growing carbon footprint due to insufficient support for environmental sustainability. While hardware accelerators and renewable energy have been utilized to enhance sustainability, a... 详细信息
来源: 评论
Blockchain in Circular Economy: A Short Survey  4
Blockchain in Circular Economy: A Short Survey
收藏 引用
4th International Conference on Distributed Sensing and Intelligent Systems, ICDSIS 2023
作者: Alnajdawi, Ruwaida Elhoseny, Mohamed Clark, Andrew Gaber, Tarek School of Science Engineering & Environment The University of Salford United Kingdom The College of Computing and Informatics The University of Sharjah United Arab Emirates The University of Salford United Kingdom
Resource consumption is increasing globally. Global resource consumption has surged by over 65%, contributing to 70% of greenhouse gases (GHGs), raising concerns for future generations. Circular economy offers a strat...
来源: 评论
LSTM-QGAN: SCALABLE NISQ GENERATIVE ADVERSARIAL NETWORK
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Cheng Hastak, Aishwarya Chen, Fan Luddy School of Informatics Computing and Engineering Indiana University Bloomington United States
Current quantum generative adversarial networks (QGANs) still struggle with practical-sized data. First, many QGANs use principal component analysis (PCA) for dimension reduction, which, as our studies reveal, can dim... 详细信息
来源: 评论
Prediction of Myocardial Infarction Using Convolutional Neural Network Method on Electrocardiogram Signal
Prediction of Myocardial Infarction Using Convolutional Neur...
收藏 引用
Data Science and Its Applications (ICoDSA), International Conference on
作者: Prinintya Nuri Alifa Satria Mandala Informatics School of Computing Telkom University Bandung Indonesia Human Centric Engineering School of Computing Telkom University Bandung Indonesia
Myocardial infarction or MI is a medical condition that occurs when the supply of oxygen-rich blood to the heart muscle is interrupted or stops suddenly. As a result, the part of the heart muscle that does not get eno... 详细信息
来源: 评论
GCAT: graph calibration attention transformer for robust object tracking
收藏 引用
Neural computing and Applications 2024年 第23期36卷 14151-14172页
作者: Chen, Si Hu, Xinxin Wang, Da-Han Yan, Yan Zhu, Shunzhi Fujian Key Laboratory of Pattern Recognition and Image Understanding School of Computer and Information Engineering Xiamen University of Technology Xiamen361024 China State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University Xiamen361005 China
Recent Siamese trackers have taken advantage of transformers to achieve impressive advancements. However, existing transformer trackers ignore considering the positional and structural information between tokens, and ... 详细信息
来源: 评论