咨询与建议

限定检索结果

文献类型

  • 627 篇 期刊文献
  • 594 篇 会议

馆藏范围

  • 1,221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 834 篇 工学
    • 628 篇 计算机科学与技术...
    • 512 篇 软件工程
    • 184 篇 信息与通信工程
    • 119 篇 电气工程
    • 101 篇 控制科学与工程
    • 99 篇 生物工程
    • 68 篇 生物医学工程(可授...
    • 54 篇 光学工程
    • 49 篇 电子科学与技术(可...
    • 44 篇 化学工程与技术
    • 39 篇 机械工程
    • 38 篇 网络空间安全
    • 31 篇 动力工程及工程热...
    • 26 篇 安全科学与工程
    • 24 篇 建筑学
  • 398 篇 理学
    • 208 篇 数学
    • 125 篇 生物学
    • 75 篇 物理学
    • 74 篇 统计学(可授理学、...
    • 45 篇 化学
    • 31 篇 系统科学
  • 223 篇 管理学
    • 136 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 77 篇 医学
    • 66 篇 临床医学
    • 50 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
    • 28 篇 公共卫生与预防医...
  • 54 篇 法学
    • 35 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 23 篇 农学
  • 7 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 46 篇 feature extracti...
  • 44 篇 deep learning
  • 37 篇 semantics
  • 33 篇 computational mo...
  • 30 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 21 篇 machine learning
  • 21 篇 cloud computing
  • 20 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 convolution
  • 19 篇 privacy
  • 17 篇 big data
  • 17 篇 neural networks
  • 16 篇 image segmentati...
  • 16 篇 predictive model...
  • 16 篇 security
  • 16 篇 accuracy
  • 16 篇 data models

机构

  • 126 篇 state key labora...
  • 76 篇 state key labora...
  • 36 篇 college of compu...
  • 33 篇 key laboratory o...
  • 32 篇 college of compu...
  • 32 篇 fujian provincia...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 20 篇 guizhou universi...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 state key labora...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 guizhou provinci...
  • 14 篇 college of compu...

作者

  • 36 篇 tian youliang
  • 32 篇 chen yuling
  • 29 篇 yuling chen
  • 28 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 peng changgen
  • 16 篇 qin yongbin
  • 16 篇 li shaobo
  • 14 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 chen yanping
  • 13 篇 xiong jinbo
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 changgen peng
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 11 篇 tan weijie
  • 11 篇 huang ruizhang
  • 11 篇 tao li

语言

  • 1,093 篇 英文
  • 115 篇 其他
  • 16 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1221 条 记 录,以下是1031-1040 订阅
排序:
The Spatiotemporal Traffic Accident Risk Analysis in Urban Traffic Network  9th
The Spatiotemporal Traffic Accident Risk Analysis in Urban T...
收藏 引用
9th International Conference on Mobile Wireless Middleware, Operating Systems and Applications, MOBILWARE 2020
作者: Zhang, Chijun jin, Jing Huang, Qiuyang Du, Zhanwei Yuan, Zhilu Tang, Shengjun Liu, Yang School of Management Science and Information Engineering Jilin University of Finance and Economics Changchun130117 China Jilin Province Key Laboratory of Fintech Jilin University of Finance and Economics Changchun130117 China College of Computer Science and Technology Jilin University Changchun130012 China Research Institute for Smart Cities and Shenzhen Key Laboratory of Spatial Information Smart Sensing and Services School of Architecture and Urban Planning Shenzhen University Shenzhen China Jilin Big Data Research Center for Business Jilin University of Finance and Economics Changchun130117 China
Traffic accidents seriously threaten people’s lives and property all over the world. Therefore, it is of great significance to human society to have a long-term traffic accidents data with detail temporal and geograp... 详细信息
来源: 评论
Rational Delegation Learning Outsourcing Scheme Based on Game Theory
Rational Delegation Learning Outsourcing Scheme Based on Gam...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Kang Xiang Youliang Tian Sheng Gao Changgen Peng Weijie Tan Institute of Cryptography and Data Security Guizhou University Guiyang P. R. China School of Information Central University of Finance and Economics Beijing P. R. China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang P. R. China
At present, many enterprises or individuals with a lot of data are limited by their own computing power, so can't mine useful information from the data. To address this problem, this paper proposes a rational dele... 详细信息
来源: 评论
Unsupervised vehicle re-identification with progressive adaptation
arXiv
收藏 引用
arXiv 2020年
作者: Peng, Jinjia Wang, Yang Wang, Huibing Zhang, Zhao Fu, Xianping Wang, Meng College of Information and Science Technology Dalian Maritime University LiaoningDalian China Pengcheng Laboratory ShenzhenGuangdong China Key Laboratory of Knowledge Engineering with Big Data Ministry of education Hefei University of Technology China School of Computer Science and Information Engineering Hefei University of Technology China
Vehicle re-identification (reID) aims at identifying vehicles across different non-overlapping cameras views. The existing methods heavily relied on well-labeled datasets for ideal performance, which inevitably causes... 详细信息
来源: 评论
Adaptive layer-wise personalized federated learning via dual delay update in future communication networks
收藏 引用
computer Communications 2025年 239卷
作者: Xu, Haowen Mao, Yingchi Chen, Si Rong, Yi Muazu, Tasiu He, Xiaoming College of Computer Science And Software Engineering Hohai University No. 8 Focheng West Road Jiangning District Nanjing211100 China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing210098 China China Huaneng Group Co. Ltd Beijing100000 China College of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210003 China
The future communication networks refers to large-scale mass-connected networks consisting of billions of cloud, edge, and end devices, which are expected to support the ever-growing communication demands. In the futu... 详细信息
来源: 评论
An Enterprise Competitiveness Assessment Method Based on Ensemble Learning  16th
An Enterprise Competitiveness Assessment Method Based on Ens...
收藏 引用
16th Web Information Systems and Applications Conference, WISA 2019
作者: Chang, Yaomin Li, Yuzheng Chen, Chuan Cao, Bin Li, Zhenxing School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory for Big Data Analysis and Simulation of Public Opinion Sun Yat-sen University Guangzhou China Information Technology Co. Ltd. Beijing China
It is of great significance to assess the competitiveness of enterprises based on big data. The current methods cannot help corporate strategists to judge the status quo and prospects of enterprises’ development at a... 详细信息
来源: 评论
Rely-Guarantee Reasoning about Messaging System for Autonomous Vehicles
Rely-Guarantee Reasoning about Messaging System for Autonomo...
收藏 引用
Theoretical Aspects of Software Engineering (TASE)
作者: Wenjing Xu Yongwang Zhao Dianfu Ma YuXin Zhang Qian Xiao State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang Univerisity Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China State Key Laboratory of Automotive Simulation and Control College of Automotive Engineering Jilin University Jilin China School of Computer Science and Technology Guizhou University Guiyang China
Messaging system as a communicating infrastructure is a safety-critical component of autonomous vehicles. For the purpose of safety certification of Level 4 autonomous driving systems, its necessary to provide a forma... 详细信息
来源: 评论
Comparing Recommendation Algorithms in Session-based E-commerce Sites
Comparing Recommendation Algorithms in Session-based E-comme...
收藏 引用
International Conference on Intelligent Computing, Automation and Systems (ICICAS)
作者: Mingtian Peng Jiahe Zhang Shilin Wen Chi Harold Liu TravelSky Technology Limited Beijing Engineering Research Center of Civil Aviation Big Data and Key Laboratory of Intelligent Passenger Service of Civil Aviation-CAAC Beijing China College of Computer Science Beijing Institute of Technology Beijing China
Recommender systems have become widely used in various website applications. With the integration of deep learning and recommender systems, the classic Session-based Recommender System (SRS) appears, which can obtain ... 详细信息
来源: 评论
Fine-grained attribute-aware analysis for person re-identification
收藏 引用
Procedia computer science 2022年 199卷 276-283页
作者: Kunlong Bai Saiji Fu Linrui Yang Dalian Liu School of Computer Science & Technology University of Chinese Academy of Sciences Beijing 100049 China Research Center on Fictitious Economy and Data Science Chinese Academy of Sciences No. 80 of Zhongguancun East Street Haidian District Beijing 100190 China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences No. 80 of Zhongguancun East Street Haidian District Beijing 100190 China School of Economics and Management University of Chinese Academy of Sciences No. 80 of Zhongguancun East Street Haidian District Beijing 100190 China Sino-Danish College University of Chinese Academy of Sciences Beijing 100049 China Institute of Mathematics and Physics Beijing Union University Beijing 100101 China Institute of Fundamental and Interdisciplinary Sciences Beijing Union University Beijing 100101 China
How and where to learn the discriminative feature has always been a critical issue of person re-identification (re-ID). Most of the previous methods focus on extracting global representation from overall identity imag... 详细信息
来源: 评论
A symmetric uniform formula and sole index method for sieving (twin) primes
TechRxiv
收藏 引用
TechRxiv 2020年
作者: Ren, Wei School of Computer Science China University of Geosciences Wuhan430074 China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Guizhou Provincial Key Laboratory of Public Big Data GuiZhou University Guizhou China
All primes can be indexed by k, as primes must be in the form of 6k+1 or 6k-1. In this paper, we explore for the set of k such that either 6k+1 or 6k-1 is not a prime. Our method provides a uniform formula for k that ... 详细信息
来源: 评论
Supervised hashing with recurrent scaling  3rd
Supervised hashing with recurrent scaling
收藏 引用
3rd APWeb and WAIM Joint Conference on Web and big data, APWeb-WAIM 2019
作者: Fu, Xiyao Bin, Yi Wang, Zheng Wei, Qin Chen, Si Guizhou Provincial Key Laboratory of Public Big Data Guizhou University GuiyangGuizhou550025 China School of Computer Science and Engineering University of Electronic Science and Technology of China ChengduSichuan611731 China Information Science Academy China Electronics Technology Group Corporation Beijing China
Learning to hash is a method that can deal with content-based information retrieval efficiently. Traditional learning to hash methods, however, lack the ability to map the generated hash codes to the high-level semant... 详细信息
来源: 评论