咨询与建议

限定检索结果

文献类型

  • 2,320 篇 会议
  • 1,972 篇 期刊文献
  • 96 册 图书

馆藏范围

  • 4,388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,714 篇 工学
    • 1,967 篇 计算机科学与技术...
    • 1,579 篇 软件工程
    • 521 篇 信息与通信工程
    • 434 篇 生物工程
    • 427 篇 控制科学与工程
    • 343 篇 生物医学工程(可授...
    • 261 篇 电气工程
    • 244 篇 光学工程
    • 210 篇 电子科学与技术(可...
    • 187 篇 机械工程
    • 112 篇 化学工程与技术
    • 111 篇 安全科学与工程
    • 108 篇 交通运输工程
    • 106 篇 动力工程及工程热...
    • 98 篇 仪器科学与技术
  • 1,585 篇 理学
    • 817 篇 数学
    • 484 篇 生物学
    • 438 篇 物理学
    • 294 篇 统计学(可授理学、...
    • 178 篇 系统科学
    • 113 篇 化学
  • 744 篇 管理学
    • 432 篇 管理科学与工程(可...
    • 337 篇 图书情报与档案管...
    • 243 篇 工商管理
  • 331 篇 医学
    • 288 篇 临床医学
    • 275 篇 基础医学(可授医学...
    • 166 篇 药学(可授医学、理...
    • 122 篇 公共卫生与预防医...
  • 156 篇 法学
    • 140 篇 社会学
  • 93 篇 经济学
    • 93 篇 应用经济学
  • 74 篇 教育学
  • 64 篇 农学
  • 12 篇 军事学
  • 6 篇 文学
  • 5 篇 艺术学

主题

  • 104 篇 machine learning
  • 91 篇 computational mo...
  • 82 篇 semantics
  • 74 篇 deep learning
  • 66 篇 feature extracti...
  • 66 篇 training
  • 65 篇 artificial intel...
  • 59 篇 accuracy
  • 59 篇 data models
  • 58 篇 visualization
  • 57 篇 computer archite...
  • 53 篇 cloud computing
  • 47 篇 informatics
  • 47 篇 predictive model...
  • 47 篇 forecasting
  • 45 篇 internet of thin...
  • 44 篇 software
  • 43 篇 educational inst...
  • 42 篇 real-time system...
  • 41 篇 optimization

机构

  • 104 篇 school of comput...
  • 93 篇 school of comput...
  • 51 篇 school of comput...
  • 47 篇 school of comput...
  • 44 篇 school of comput...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 40 篇 institute of phy...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 institute of phy...
  • 39 篇 luddy school of ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 34 篇 liu lantao
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 4,135 篇 英文
  • 211 篇 其他
  • 40 篇 中文
  • 4 篇 德文
  • 2 篇 日文
检索条件"机构=School of Engineering in Computing and Informatics"
4388 条 记 录,以下是41-50 订阅
排序:
Generating Descriptive Explanations of Machine Learning Models Using LLM
Generating Descriptive Explanations of Machine Learning Mode...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Pang, Andrew Jang, Hyeju Fang, Shiaofen Horace Greeley High School ChappaquaNY United States Indiana University Indianapolis Luddy School of Informatics Computing and Engineering United States
Machine learning algorithms play a pivotal role in a wide range of Artificial Intelligence (AI) applications. Explaining the results and behavior of a machine learning model, however, remains a challenge. In this pape... 详细信息
来源: 评论
Understanding Power Transformer Current-Voltage (I-V) Lissajous Pattern Under Different Faults  10
Understanding Power Transformer Current-Voltage (I-V) Lissaj...
收藏 引用
10th International Conference on Condition Monitoring and Diagnosis, CMD 2024
作者: Arsya, Nanda Redha Suwarno Abu-Siada, A. Bandung Indonesia School of Electrical Engineering and Informatics Institut Teknologi Bandung Bandung Indonesia School of Electrical Engineering Computing and Mathematical Science Curtin University Perth Australia
Condition-based maintenance (CBM) is a robust maintenance strategy suitable for high-criticality assets, including Power Transformers. Various measurements and tests are conducted by current industry practice to asses... 详细信息
来源: 评论
Empirical Study on Data Attributes Insufficiency of Evaluation Benchmarks for LLMs  31
Empirical Study on Data Attributes Insufficiency of Evaluati...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Liu, Chuang Jin, Renren Yao, Zheng Li, Tianyi Cheng, Liang Steedman, Mark Xiong, Deyi College of Intelligence and Computing Tianjin University China School of Electrical Engineering and Computer Science University of Queensland Australia School of Informatics University of Edinburgh United Kingdom
Previous benchmarks for evaluating large language models (LLMs) have primarily emphasized quantitative metrics, such as data volume. However, this focus may neglect key qualitative data attributes that can significant... 详细信息
来源: 评论
A Real-Time Global Inference Network for One-Stage Referring Expression Comprehension
收藏 引用
IEEE Transactions on Neural Networks and Learning Systems 2023年 第1期34卷 134-143页
作者: Zhou, Yiyi Ji, Rongrong Luo, Gen Sun, Xiaoshuai Su, Jinsong Ding, Xinghao Lin, Chia-Wen Tian, Qi Xiamen University Media Analytics and Computing Laboratory Xiamen361005 China Xiamen University School of Informatics Informatics and Communication Engineering Department Xiamen361005 China School of Informatics Xiamen University Media Analytics and Computing Laboratory Department of Artificial Intelligence Xiamen361005 China Xiamen University School of Informatics Xiamen361005 China National Tsing Hua University Department of Electrical Engineering Hsinchu30013 Taiwan Institute of Communications Engineering National Tsing Hua University Hsinchu30013 Taiwan Huawei Technologies Company Ltd. Cloud BU Shenzhen518129 China
Referring expression comprehension (REC) is an emerging research topic in computer vision, which refers to the detection of a target region in an image given a test description. Most existing REC methods follow a mult... 详细信息
来源: 评论
User-Centered Phishing Detection through Personalized Edge computing  24
User-Centered Phishing Detection through Personalized Edge C...
收藏 引用
27th ACM Conference on Computer-Supported Cooperative Work and Social computing, CSCW Companion 2024
作者: Das, Sanchari Kim, DongInn Abbott, Jacob Jean Camp, L. Ritchie School of Engineering and Computer Science University of Denver DenverCO United States Luddy School of Informatics Computing and Engineering Indiana University Bloomington BloomingtonIN United States
Ensuring user-centered phishing detection is a significant challenge due to the difficulty in distinguishing threats. To address this, we propose a personalized tool - Holistic User-Centered Identification of Threats ... 详细信息
来源: 评论
Reinforcement Learning Approach for Commodity Market Trading Strategy  1
收藏 引用
13th National Technical Symposium on Unmanned System Technology, NUSYS 2023
作者: Wong, Pei Yuin Moung, Ervin Gubin Farzamnia, Ali Yahya, Farashazillah Obit, Joe Henry Sani, Zaidatol Haslinda Abdullah Faculty of Computing and Informatics Universiti Malaysia Sabah Kota Kinabalu Malaysia Faculty of Engineering Universiti Malaysia Sabah Kota Kinabalu Malaysia School of Computing and Engineering University of Huddersfield Huddersfield United Kingdom
The apparent phenomena of commodity price fluctuations significantly affect the cost of living. Most current studies utilize datasets collected before the Russo-Ukrainian War and Covid-19. Moreover, many people are fo... 详细信息
来源: 评论
What Makes a Technology Privacy Enhancing? Laypersons’ and Experts’ Descriptions, Uses, and Perceptions of Privacy Enhancing Technologies  18th
What Makes a Technology Privacy Enhancing? Laypersons’ and...
收藏 引用
18th International Conference on Information for a Better World: Normality, Virtuality, Physicality, Inclusivity, iConference 2023
作者: Elmimouni, Houda Shusas, Erica Skeba, Patrick Baumer, Eric P. S. Forte, Andrea Luddy School of Informatics Computing and Engineering BloomingtonIN United States College of Computing and Informatics Drexel University PhiladelphiaPA United States Computer Science and Engineering Lehigh University BethlehemPA United States
What makes a technology privacy-enhancing? In this study, we construct an explanation grounded in the technologies and practices that people report using to enhance their privacy. We conducted an online survey of priv... 详细信息
来源: 评论
Online Conversation-Based Social engineering Detection Using Machine Learning  1
收藏 引用
13th National Technical Symposium on Unmanned System Technology, NUSYS 2023
作者: Ulaganathan, Thurairaj A/L R. Moung, Ervin Gubin Farzamnia, Ali Yahya, Farashazillah Sze, Florence Sia Fui Hung, Lai Po Faculty of Computing and Informatics Universiti Malaysia Sabah Kota Kinabalu Malaysia Faculty of Engineering Universiti Malaysia Sabah Kota Kinabalu Malaysia School of Computing and Engineering University of Huddersfield Huddersfield United Kingdom
Social engineering through online conversations can occur via phone calls, Skype, or Google Meet, among others. This paper presents a machine learning-based classifier for detecting scam conversations in various onlin... 详细信息
来源: 评论
Automated Sleep Staging Classification System Based on Convolutional Neural Network Using Polysomnography Signals  1
收藏 引用
13th National Technical Symposium on Unmanned System Technology, NUSYS 2023
作者: Azrin, Muhd Luqman Bin Farzamnia, Ali Fan, Liau Chung Moung, Ervin Gubin Faculty of Engineering Universiti Malaysia Sabah Kota Kinabalu Malaysia Faculty of Computing and Informatics Universiti Malaysia Sabah Kota Kinabalu Malaysia School of Computing and Engineering University of Huddersfield Huddersfield United Kingdom
Sleep is a crucial bodily process that plays a vital role in maintaining overall health and well-being. When diagnosing and treating sleep disorders, the initial step is sleep staging. However, manual sleep staging by... 详细信息
来源: 评论
A Cocoa Ripeness Detection and Classification Model Based on Improved YOLOv5s  10
A Cocoa Ripeness Detection and Classification Model Based on...
收藏 引用
10th International Conference on Advanced informatics: Concept, Theory and Application, ICAICTA 2023
作者: Ayubi, Aula Faiz, Muhammad Situmorang, George B. Ramadhani, Kurniawan Nur Utama, Nugraha P. School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung Indonesia Telkom University of School of Computing Bandung Indonesia
The present study introduces a novel approach to identifying the maturity of cacao fruits, utilizing YOLOv5s in tandem with the Convolutional Block Attention Module (CBAM). The efficacy of this method was evaluated on... 详细信息
来源: 评论