咨询与建议

限定检索结果

文献类型

  • 698 篇 期刊文献
  • 520 篇 会议
  • 17 册 图书

馆藏范围

  • 1,235 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 784 篇 工学
    • 559 篇 计算机科学与技术...
    • 465 篇 软件工程
    • 195 篇 信息与通信工程
    • 112 篇 电气工程
    • 108 篇 生物工程
    • 104 篇 控制科学与工程
    • 73 篇 生物医学工程(可授...
    • 69 篇 电子科学与技术(可...
    • 55 篇 光学工程
    • 38 篇 仪器科学与技术
    • 37 篇 安全科学与工程
    • 36 篇 机械工程
    • 35 篇 化学工程与技术
    • 34 篇 网络空间安全
    • 27 篇 交通运输工程
  • 470 篇 理学
    • 228 篇 数学
    • 127 篇 生物学
    • 106 篇 物理学
    • 94 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 47 篇 化学
    • 25 篇 地球物理学
  • 254 篇 管理学
    • 159 篇 管理科学与工程(可...
    • 104 篇 图书情报与档案管...
    • 87 篇 工商管理
  • 99 篇 医学
    • 80 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 41 篇 公共卫生与预防医...
    • 37 篇 药学(可授医学、理...
  • 43 篇 法学
    • 36 篇 社会学
  • 24 篇 经济学
  • 24 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 40 篇 deep learning
  • 38 篇 machine learning
  • 32 篇 predictive model...
  • 31 篇 accuracy
  • 29 篇 training
  • 23 篇 reinforcement le...
  • 23 篇 artificial intel...
  • 21 篇 computational mo...
  • 19 篇 forecasting
  • 19 篇 convolutional ne...
  • 18 篇 feature extracti...
  • 18 篇 data models
  • 17 篇 internet of thin...
  • 17 篇 optimization
  • 17 篇 data mining
  • 17 篇 federated learni...
  • 16 篇 neural networks
  • 16 篇 analytical model...
  • 15 篇 decision making
  • 14 篇 security

机构

  • 23 篇 school of comput...
  • 20 篇 college of compu...
  • 18 篇 university of ch...
  • 16 篇 laboratory for b...
  • 13 篇 school of comput...
  • 13 篇 science and tech...
  • 12 篇 pillar of inform...
  • 12 篇 shenzhen researc...
  • 11 篇 school of comput...
  • 10 篇 school of data s...
  • 10 篇 the pillar of in...
  • 9 篇 department of da...
  • 9 篇 nanyang technolo...
  • 9 篇 department of as...
  • 9 篇 school of scienc...
  • 9 篇 faculty of scien...
  • 9 篇 hiroshima astrop...
  • 9 篇 department of ph...
  • 9 篇 department of ph...
  • 9 篇 national institu...

作者

  • 34 篇 niyato dusit
  • 28 篇 xiong zehui
  • 18 篇 kang jiawen
  • 17 篇 du hongyang
  • 11 篇 dan feng
  • 10 篇 brown donald e.
  • 9 篇 uchida hiroyuki
  • 9 篇 kilbourne caroli...
  • 9 篇 tamura keisuke
  • 9 篇 okajima takashi
  • 9 篇 pottschmidt katj...
  • 9 篇 murakami hiroshi
  • 9 篇 markevitch maxim
  • 9 篇 yamaguchi hiroya
  • 9 篇 watanabe shin
  • 9 篇 loewenstein mich...
  • 9 篇 hornschemeier an...
  • 9 篇 enoto teruaki
  • 9 篇 tanimoto atsushi
  • 9 篇 terashima yuichi

语言

  • 1,079 篇 英文
  • 141 篇 其他
  • 11 篇 中文
  • 3 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Systems and Information Engineering Data Science"
1235 条 记 录,以下是401-410 订阅
排序:
Forecasting Hierarchical Time Series Using Non-Linear Mappings
SSRN
收藏 引用
SSRN 2024年
作者: Wickramasuriya, Shanika L. Bandara, Kasun Hewamalage, Hansika Perera, Maneesha Department of Econometrics and Business Statistics Monash University Melbourne Australia School of Computing and Information Systems Melbourne Centre for Data Science The University of Melbourne Melbourne Australia School of Computer Science & Engineering University of New South Wales Sydney Australia Department of Mechanical Engineering School of Electrical Mechanical and Infrastructure Engineering The University of Melbourne Melbourne Australia
Forecast reconciliation is a procedure for forecasting multivariate time series with linear aggregation constraints to ensure that forecasts satisfy the same set of constraints. Most state-of-the-art reconciliation me... 详细信息
来源: 评论
Interval Type-2 Enhanced Possibilistic Fuzzy C-Means Noisy Image Segmentation Algorithm Amalgamating Weighted Local information
SSRN
收藏 引用
SSRN 2024年
作者: Huang, Chengquan Lei, Huan Chen, Yang Cai, Jianghai Qin, Xiaosu Peng, Jialei Zhou, Lihua Zheng, Lan Engineering Training Center Guizhou Minzu University Guiyang550025 China School of Data Science and Information Engineering Guizhou Minzu University Guiyang550025 China Key Laboratory of Pattern Recognition and Intelligent Systems of Guizhou Province Guizhou Minzu University Guiyang550025 China
The fuzzy clustering algorithms based on interval type-2 are effective methods for data clustering and image segmentation with some potential advantages in dealing with higher-order uncertainty. However, the fuzzy clu... 详细信息
来源: 评论
Attention Is Not the Only Choice: Counterfactual Reasoning for Path-Based Explainable Recommendation
arXiv
收藏 引用
arXiv 2024年
作者: Li, Yicong Sun, Xiangguo Chen, Hongxu Zhang, Sixiao Yang, Yu Xu, Guandong Data Science and Machine Intelligence Lab Faculty of Engineering and Information Technology University of Technology Sydney SydneyNSW2007 Australia Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong Hong Kong999077 Hong Kong School of Information Technology and Electrical Engineering The University of Queensland BrisbaneQLD4072 Australia Department of Systems Engineering and Engineering Management Nanyang Technological University Singapore999077 Singapore Department of Computing The Hong Kong Polytechnic University Hong Kong999077 Hong Kong
Compared with only pursuing recommendation accuracy, the explainability of a recommendation model has drawn more attention in recent years. Many graph-based recommendations resort to informative paths with the attenti... 详细信息
来源: 评论
Deep Reinforcement Learning-based Obstacle Avoidance for Robot Movement in Warehouse Environments  6
Deep Reinforcement Learning-based Obstacle Avoidance for Rob...
收藏 引用
6th IEEE International Conference on Civil Aviation Safety and information Technology, ICCASIT 2024
作者: Li, Keqin Chen, Jiajing Yu, Dezhi Dajun, Tao Qiu, Xinyu Lian, Jieting Ji, Ryan Zhang, Shengyuan Wan, Zhenyu Sun, Baiwei Hong, Bo Ni, Fanghao Han, Jiaqi Ama University Department of Computer Science Quezon Philippines Courant Institute New York University 251 Mercer St New YorkNY10012 United States University of California Berkeley University Avenue and Oxford St School of Information BerkeleyCA94720 United States Carnegie Mellon University Master of Science in Mechanical Engineering School of Engineering 5000 Forbes Avenue PittsburghPA United States Northeastern University College of Engineering Seattle United States School of Professional Studies New York University Master of Science in Database Technology 50 West 4th Street New YorkNY United States Cornell University College of Engineering 616 Thurston Ave IthacaNY14853 United States Cornell University Master of Professional Science in Applied Statistics-Data Science College of Computing and Information Science 616 Thurston Ave IthacaNY United States Independent Researcher Beijing China University of California Irvine Master of Computer Science Donald Bren School of Information and Computer Sciences 510 Aldrich Hall IrvineCA United States Northern Arizona University School of Informatics Computing and Cyber Systems FlagstaffAZ United States Shanghai Institute of Technology Shanghai China
This paper proposes a deep reinforcement learning based on the warehouse environment, the mobile robot obstacle avoidance Algorithm. Firstly, the value function network is improved based on the pedestrian interaction.... 详细信息
来源: 评论
A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning  23
A Deep Learning Approach for Hardware Trojan Detection Based...
收藏 引用
Proceedings of the 2023 13th International Conference on Communication and Network Security
作者: Yinan Yao Chen Dong Zhengye Xie Yuqing Li Xiaodong Guo Yang Yang Xiaoding Wang College of Computer and Data Science Fuzhou University China Maynooth International Engineering College Fuzhou University China School of Computing and Information Systems Singapore Management University Singapore College of Computer and Cyber Security Fujian Normal University China
In recent years, the application of integrated circuits in various fields has become more and more extensive. The attackers utilize the hidden dangers of the industrial chain to design and launch hardware Trojan attac... 详细信息
来源: 评论
Reversible data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Efficient Graph-Based Intrusion Detection for CAN Bus Security with Minimal Training data
Efficient Graph-Based Intrusion Detection for CAN Bus Securi...
收藏 引用
Sustainable Technologies for Industry 4.0 (STI), International Conference on
作者: Md. Abul Ala Walid Maloy Kumar Devnath Bakhtiar Muiz Md Mehedi Hassan Melon Pronob Kumar Barman Pronoy Kumar Barman Department of Data Science and Engineering Bangabandhu Sheikh Mujibur Rahman Digital University Bangladesh Department of Information Systems University of Maryland Baltimore County MD USA Department of Internet of Things and Robotics Engineering Bangabandhu Sheikh Mujibur Rahman Digital University Bangladesh Department of Computer in Data Science Pacific States University Los Angeles CA USA Department of Statistics Jagannath University Dhaka Bangladesh
In this study, we explore the efficacy of using a graph-based intrusion detection system (GBIDS) for Controller Area Network (CAN) bus security with minimal training data. Traditional machine learning models often req... 详细信息
来源: 评论
Learning Eco-Driving Strategies at Signalized Intersections
arXiv
收藏 引用
arXiv 2022年
作者: Jayawardana, Vindula Wu, Cathy MIT Laboratory for Information & Decision Systems Department of Electrical Engineering and Computer Science CambridgeMA02139 United States Laboratory for Information & Decision Systems Department of Civil and Environmental Engineering Institute of Data Systems and Society CambridgeMA02139 United States
Signalized intersections in arterial roads result in persistent vehicle idling and excess accelerations, contributing to fuel consumption and CO2 emissions. There has thus been a line of work studying eco-driving cont... 详细信息
来源: 评论
Successful Integration of IoT and Blockchain Technologies Using Several Machine Learning Algorithms
Successful Integration of IoT and Blockchain Technologies Us...
收藏 引用
Computing, Power and Communication Technologies (IC2PCT), IEEE International Conference on
作者: C. Calarany M Indumathy P. Senthilraja D. Suganya V Gopi Vardhan Yelisetty Shanmukh Rahul Department of Computer Science Tagore Government Arts and Science College Puducherry India Department of Information Technology Rajiv Gandhi College of Engineering & Technology Kirumampakkam India Department of Computer Science K.S.Rangasamy College of Technology Tamil Nadu India Department of Computer Science Rajiv Gandhi College of Engineering & technology Kirumampakkam Data science and business systems SRM Institute of Science and Technology Kattankulathur India
Internet of Things (IoT) produces massive amounts of data that need to be processed and saved securely. The strong features of Blockchain makes it as a best candidate for storing the data received from IoT sensors. Ho...
来源: 评论
Scavenger: Better Space-Time Trade-Offs for Key-Value Separated LSM-trees
Scavenger: Better Space-Time Trade-Offs for Key-Value Separa...
收藏 引用
International Conference on data engineering
作者: Jianshun Zhang Fang Wang Sheng Qiu Yi Wang Jiaxin Ou Junxun Huang Baoquan Li Peng Fang Dan Feng Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of data storage systems and Technology Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology China Shenzhen Huazhong University of Science and Technology Research Institute Bytefrance Inc.
Key- Value Stores (KVS) implemented with log- structured merge-tree (LSM-tree) have gained widespread ac-ceptance in storage systems. Nonetheless, a significant challenge arises in the form of high write amplification... 详细信息
来源: 评论