咨询与建议

限定检索结果

文献类型

  • 25 篇 会议
  • 9 篇 期刊文献

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 15 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 4 篇 控制科学与工程
    • 3 篇 信息与通信工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 电气工程
    • 2 篇 生物工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
  • 11 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
    • 3 篇 系统科学
    • 2 篇 生物学
    • 1 篇 天文学
    • 1 篇 统计学(可授理学、...
  • 7 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 3 篇 neural networks
  • 3 篇 computational mo...
  • 2 篇 deep learning
  • 2 篇 predictive model...
  • 2 篇 data models
  • 2 篇 training
  • 2 篇 recurrent neural...
  • 1 篇 random errors
  • 1 篇 table lookup
  • 1 篇 computer science
  • 1 篇 surveys
  • 1 篇 tools
  • 1 篇 consumer behavio...
  • 1 篇 metals
  • 1 篇 reliability
  • 1 篇 learning systems
  • 1 篇 grasping
  • 1 篇 reinforcement le...
  • 1 篇 mobile ad hoc ne...
  • 1 篇 current measurem...

机构

  • 2 篇 college of compu...
  • 2 篇 college of compu...
  • 2 篇 school of comput...
  • 2 篇 shool of compute...
  • 2 篇 shool of informa...
  • 2 篇 haihe lab of ita...
  • 2 篇 state key labora...
  • 2 篇 electronic engin...
  • 2 篇 shool of informa...
  • 2 篇 college of elect...
  • 2 篇 school of comput...
  • 1 篇 key laboratory o...
  • 1 篇 suoao technology...
  • 1 篇 shool of compute...
  • 1 篇 school of comput...
  • 1 篇 the department o...
  • 1 篇 cloud computing ...
  • 1 篇 shool of compute...
  • 1 篇 shool of opto-el...
  • 1 篇 school of comput...

作者

  • 2 篇 zhang shuo
  • 2 篇 yu fei richard
  • 2 篇 zeng peigen
  • 2 篇 ma fei
  • 2 篇 hou haowen
  • 1 篇 jiang chuanqun
  • 1 篇 niyato dusit
  • 1 篇 shrikarti bn
  • 1 篇 dong xiang
  • 1 篇 yuan wei
  • 1 篇 tashi nyima
  • 1 篇 cao zehong
  • 1 篇 vu-le the-anh
  • 1 篇 yu zhiyong
  • 1 篇 yang yifan
  • 1 篇 henggui zhang
  • 1 篇 bn shrikarti
  • 1 篇 takamatsu tomono...
  • 1 篇 zhai hao
  • 1 篇 jie lian

语言

  • 30 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=Shool of Computer Science and Technology"
34 条 记 录,以下是1-10 订阅
排序:
VisualRWKV: Exploring Recurrent Neural Networks for Visual Language Models  31
VisualRWKV: Exploring Recurrent Neural Networks for Visual L...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Hou, Haowen Zeng, Peigen Ma, Fei Yu, Fei Richard Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shool of Information Technology Carleton University Canada
Visual Language Models (VLMs) have rapidly progressed with the recent success of large language models. However, there have been few attempts to incorporate efficient linear Recurrent Neural Networks (RNNs) architectu... 详细信息
来源: 评论
Fruits Classification and Analysis in Hyperspectral Imaging Using Deep Convolutional Neural Networks  6th
Fruits Classification and Analysis in Hyperspectral Imaging ...
收藏 引用
6th International Conference on Advanced Informatics for Computing Research, ICAICR 2023
作者: Verma, Divyanshu Vijayarajan, V. Rajkumar, S. Ramesh Pathy, M. Shool of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India School of Bio Sciences and Technology Vellore Institute of Technology Tamil Nadu Vellore632014 India
Hyperspectral imaging (HSI) emerges as a highly efficient means of information retention, particularly when leveraging the power of deep learning. The intricate task of non-destructively identifying rotten fruits is a... 详细信息
来源: 评论
Deep Fake Detection using Transfer Learning: A Comparative study of Multiple Neural Networks
Deep Fake Detection using Transfer Learning: A Comparative s...
收藏 引用
2024 International Conference on Signal Processing, Computation, Electronics, Power and Telecommunication, IConSCEPT 2024
作者: Abhineswari, M. Charan, Kurupati Sai Bn, Shrikarti Kanmani R, Sujithra Shool of Computer Science and Engineering Vellore Institute of Technology Chennai India
With the proliferation of sophisticated AI techniques, the creation and dissemination of deep fake images and videos have emerged as a pressing concern in today's digital landscape. Deep fake technology employs ad... 详细信息
来源: 评论
Efficient-Learning Grasping and Pushing in Dense Stacking via Mask Function and Pixel Overlap Rate  7
Efficient-Learning Grasping and Pushing in Dense Stacking vi...
收藏 引用
7th International Symposium on Autonomous Systems, ISAS 2024
作者: Lian, Jie Jiang, Juncheng Qiu, Chaochao Pan, Qinghui Dong, Yongxiang Wang, Zhao Wang, Dong Dalian University of Technology School of Control Science and Engineering Dalian China University of Science and Technology Liaoning Shool of Computer Science and Software Engineering China
In the field of robotic grasping, grasping tightly stacked objects is a formidable challenge. The presence of non-target objects significantly increases the risk of grasping failure. To solve this problem, the aim is ... 详细信息
来源: 评论
Decoupling of Direction and Length for Cumulative Step Size Adaptation  17
Decoupling of Direction and Length for Cumulative Step Size ...
收藏 引用
17th International Conference on Computational Intelligence and Security, CIS 2021
作者: Zhang, Shuo Li, Zhenhua Yang, Detian Wang, Shuo Cai, Xinye School of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Shool of Information Technology and Engineering Tianjin University of Technology and Education Tianjin China
Covariance matrix adaptation evolution strategy (CMA-ES) is a successful evolutionary algorithm for continuous optimization. The cumulative step size adaptation (CSA) is the default method for adapting the step size i... 详细信息
来源: 评论
Capture, recognition, and visualization of human semantic interactions in meetings
Capture, recognition, and visualization of human semantic in...
收藏 引用
8th IEEE International Conference on Pervasive Computing and Communications, PerCom 2010
作者: Yu, Zhiwen Yu, Zhiyong Aoyama, Hideki Ozeki, Motoyuki Nakamura, Yuichi Shool of Computer Science Northwestern Polytechnical University China Academic Center for Computing and Media Studies Kyoto University Japan Graduate School of Science and Technology Kyoto Institute of Technology Japan
Human interaction is one of the most important characteristics of group social dynamics in meetings. In this paper, we propose an approach for capture, recognition, and visualization of human interactions. Unlike phys... 详细信息
来源: 评论
Analysis of image stitching error based on scale invariant feature transform and random sample consensus  12
Analysis of image stitching error based on scale invariant f...
收藏 引用
12th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2015
作者: Shuang, Dou Cai, Hua Yang, Yong Tailin, Han Xue, Menghan School of Computer Engineering Changchun University of Science and Technology Changchun China College of Electronic and Information Engineer Changchun University of Science and Technology Changchun China Electronic Engineering Shool Beijing University of Posts and Telecommunications Changchun China
This article introduced the process of image stitching based on SIFT and RANSAC. It was pointed out that the reliability calculation of the RANSAC algorithm is based on an idealized assumption which does not hold. The... 详细信息
来源: 评论
ON THE EXPECTED DISTORTION BOUND OF DIRECT RANDOM PROJECTION AND ITS APPLICATIONS
ON THE EXPECTED DISTORTION BOUND OF DIRECT RANDOM PROJECTION...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: YUE-XIAN HOU PENG ZHANG Shool of Computer Science and Technology Tianjin University Tianjin 300072 China
By Johnson and Lindcnstrauss lemma, n points in d-dimensional Euclidean space can be projected down to k=O(ε-2 logn) dimensions while incurring at most 1+ε bi-Lipschitz distortion in pairwise distance. However, most... 详细信息
来源: 评论
Deep Fake Detection using Transfer Learning: A Comparative study of Multiple Neural Networks
Deep Fake Detection using Transfer Learning: A Comparative s...
收藏 引用
Signal Processing, Computation, Electronics, Power and Telecommunication (IConSCEPT), International Conference on
作者: Abhineswari M Kurupati Sai Charan Shrikarti BN Sujithra Kanmani R Shool of Computer Science and Engineering Vellore Institute of Technology Chennai India
With the proliferation of sophisticated AI techniques, the creation and dissemination of deep fake images and videos have emerged as a pressing concern in today's digital landscape. Deep fake technology employs ad... 详细信息
来源: 评论
PoW and PoS and Related Applications
PoW and PoS and Related Applications
收藏 引用
2021 International Conference on Electronic Information Engineering and computer science, EIECS 2021
作者: Ouyang, Zhiqiang Shao, Jie Zeng, Yifeng School of Computer Science and Engineering Sun Yat-sen University Guangzhou China University of Washington Department of Mathematics WA United States Shool of Software Dalian University of Technology Dalian China
Consensus protocols can help guarantee security and sustainability to maintain the decentralized Blockchain system used in different scenarios and applications due to their different features. There are two main preva... 详细信息
来源: 评论