咨询与建议

限定检索结果

文献类型

  • 2,647 篇 期刊文献
  • 1,304 篇 会议
  • 9 册 图书

馆藏范围

  • 3,960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,477 篇 工学
    • 1,707 篇 计算机科学与技术...
    • 1,415 篇 软件工程
    • 494 篇 信息与通信工程
    • 435 篇 生物工程
    • 366 篇 生物医学工程(可授...
    • 352 篇 电气工程
    • 294 篇 光学工程
    • 276 篇 控制科学与工程
    • 248 篇 电子科学与技术(可...
    • 161 篇 化学工程与技术
    • 118 篇 机械工程
    • 85 篇 仪器科学与技术
    • 83 篇 动力工程及工程热...
    • 65 篇 材料科学与工程(可...
    • 64 篇 核科学与技术
    • 63 篇 网络空间安全
  • 1,772 篇 理学
    • 729 篇 物理学
    • 673 篇 数学
    • 539 篇 生物学
    • 287 篇 统计学(可授理学、...
    • 208 篇 化学
    • 115 篇 系统科学
  • 614 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 279 篇 图书情报与档案管...
    • 145 篇 工商管理
  • 351 篇 医学
    • 292 篇 临床医学
    • 244 篇 基础医学(可授医学...
    • 156 篇 药学(可授医学、理...
    • 120 篇 公共卫生与预防医...
  • 95 篇 法学
    • 78 篇 社会学
  • 54 篇 农学
  • 45 篇 经济学
  • 38 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 105 篇 deep learning
  • 89 篇 machine learning
  • 80 篇 feature extracti...
  • 79 篇 semantics
  • 76 篇 training
  • 74 篇 hadrons
  • 57 篇 computational mo...
  • 57 篇 accuracy
  • 52 篇 data models
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 43 篇 image segmentati...
  • 40 篇 optimization
  • 39 篇 magnetic resonan...
  • 38 篇 bottom mesons
  • 38 篇 predictive model...
  • 34 篇 graph neural net...
  • 34 篇 branching fracti...
  • 33 篇 artificial intel...
  • 32 篇 reinforcement le...

机构

  • 426 篇 department of ph...
  • 413 篇 horia hulubei na...
  • 404 篇 van swinderen in...
  • 398 篇 iccub universita...
  • 397 篇 h.h. wills physi...
  • 389 篇 school of physic...
  • 384 篇 cavendish labora...
  • 376 篇 yandex school of...
  • 375 篇 university of ch...
  • 352 篇 department of ph...
  • 345 篇 imperial college...
  • 334 篇 stfc rutherford ...
  • 331 篇 center for high ...
  • 325 篇 institute of par...
  • 307 篇 henryk niewodnic...
  • 300 篇 nikhef national ...
  • 289 篇 school of physic...
  • 289 篇 physik-institut ...
  • 289 篇 oliver lodge lab...
  • 287 篇 physikalisches i...

作者

  • 251 篇 barter w.
  • 247 篇 bellee v.
  • 241 篇 beiter a.
  • 225 篇 casse g.
  • 218 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 214 篇 amato s.
  • 210 篇 baryshnikov f.
  • 210 篇 boettcher t.
  • 209 篇 brundu d.
  • 207 篇 braun s.
  • 205 篇 borisyak m.
  • 196 篇 bizzeti a.
  • 183 篇 bencivenni g.
  • 176 篇 back j.j.
  • 173 篇 bjørn m.
  • 173 篇 bay a.

语言

  • 3,697 篇 英文
  • 235 篇 其他
  • 31 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=The Center for Data Center and AI and School of Engineering and Computer Science"
3960 条 记 录,以下是91-100 订阅
排序:
Fast Parallel Recovery for Transactional Stream Processing on Multicores  40
Fast Parallel Recovery for Transactional Stream Processing o...
收藏 引用
40th IEEE International Conference on data engineering, ICDE 2024
作者: Zhao, Jianjun Liu, Haikun Zhang, Shuhao Duan, Zhuohui Liao, Xiaofei Jin, Hai Zhang, Yu School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Engineering Nanyang Technological University Singapore
Transactional stream processing engines (TSPEs) have gained increasing attention due to their capability of processing real-time stream applications with transactional semantics. However, TSPEs remain susceptible to s... 详细信息
来源: 评论
How Language Model Hallucinations Can Snowball  41
How Language Model Hallucinations Can Snowball
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Zhang, Muru Press, Ofir Merrill, William Liu, Alisa Smith, Noah A. Paul G.Allen School of Computer Science and Engineering University of Washington United States Princeton University United States Princeton Language and Intelligence United States Center for Data Science New York University United States Allen Institude for AI United States
A major risk of using language models in practical applications is their tendency to hallucinate incorrect *** are often attributed to knowledge gaps in LMs, but we show that LMs sometimes produce hallucinations that ... 详细信息
来源: 评论
Aggregating Structural Features for Computational Analysis of Mutations in BRCT Domains of BRCA1 Protein
Aggregating Structural Features for Computational Analysis o...
收藏 引用
2023 International Conference on Informatics, Multimedia, Cyber and Information Systems, ICIMCIS 2023
作者: Hidayat, Alam Ahmad Nirwantono, Rudi Isnan, Mahmud Trinugroho, Joko Pebrianto Pardamean, Bens Bina Nusantara University School of Computer Science Bioinformatics and Data Science Research Center Mathematics Department Jakarta11480 Indonesia Bina Nusantara University Faculty of Engineering Bioinformatics and Data Science Research Center Biotechnology Department Jakarta11480 Indonesia Bina Nusantara University Bioinformatics and Data Science Research Center Jakarta11480 Indonesia Binus Graduate Program Bioinformatics and Data Science Research Center Computer Science Department Jakarta11480 Indonesia
Understanding the mechanistic interpretability of mutation effects in a protein can help predict the clinical implications of the genetic variants. Hence, computational variant effect predictions that involve protein ... 详细信息
来源: 评论
MLPFormer: MLP-integrated transformer for colorectal histopathology whole slide image segmentation
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4651-4661页
作者: Wang, Yuxuan Li, Dan Li, Xuechen Guo, Yan Zuo, Yanfei Shen, Linlin Department of Computer Science Wenzhou-Kean University Wenzhou China School of Electronics and Information Engineering Wuyi University Jiangmen China Department of Histo Pathology Shanghai Histo Pathology Diagnostic Center Shanghai China College of Computer Sicence and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Colorectal intraepithelial neoplasia is a precancerous lesion of colorectal cancer, which is mainly diagnosed using pathological images. According to the characteristics of lesions, precancerous lesions can be classif... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
A High-capacity Information Hiding Scheme Based on Blakley Secret Sharing  4
A High-capacity Information Hiding Scheme Based on Blakley S...
收藏 引用
4th International Symposium on Artificial Intelligence and Intelligent Manufacturing, aiIM 2024
作者: Zhou, Jincheng Li, Yue Shen, Yujie Tang, Dan Cai, Hongliang Gong, Jing Bai, Ningchao School of Software Engineering Chengdu University of Information Technology Chengdu China Sichuan Province Engineering Technology Research Center of Support Software of lnformatization Application Chengdu China School of Computer Science and Engineering Sichuan University of Science & Engineering Yibin China Sichuan Provincial Big Data Technical Service Center Chengdu China
A high-capacity reversible information hiding scheme based on Blakley secret sharing is proposed to address the issues of low embedding rate and weak disaster recovery performance of images when using reversible infor... 详细信息
来源: 评论
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12528-12537页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Tariq, Tayyaba Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
Vehicular network technology has made substantial advancements in recent years in the field of Intelligent Transportation Systems. Vehicular Cloud Computing (VCC) has emerged as a novel paradigm with a substantial inc... 详细信息
来源: 评论
Classification of Adversarial Attacks Using Ensemble Clustering Approach
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2479-2498页
作者: Pongsakorn Tatongjai Tossapon Boongoen Natthakan Iam-On Nitin Naik Longzhi Yang Center of Excellence in AI&Emerging Technologies School of ITMae Fah Luang UniversityChiang RaiThailand Department of Computer Science Aberystwyth UniversityAberystwythUnited Kingdom School of Informatics and Digital Engineering Aston UniversityBirminghamUnited Kingdom Department of Computer and Information Sciences Northumbria UniversityNewcastleUnited Kingdom
As more business transactions and information services have been implemented via communication networks,both personal and organization assets encounter a higher risk of *** safeguard these,a perimeter defence likeNIDS... 详细信息
来源: 评论
ANIMC: A Soft Approach for Autoweighted Noisy and Incomplete Multiview Clustering
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第2期3卷 192-206页
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering The School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of Information Storage System Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Electrical and Computer Engineering University of Florida GainesvilleFL32611 United States
Multiview clustering has wide real-world applications because it can process data from multiple sources. However, these data often contain missing instances and noises, which are ignored by most multiview clustering m... 详细信息
来源: 评论
AegonKV: A High Bandwidth, Low Tail Latency, and Low Storage Cost KV-Separated LSM Store with SmartSSD-based GC Offloading  23
AegonKV: A High Bandwidth, Low Tail Latency, and Low Storage...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Duan, Zhuohui Feng, Hao Liu, Haikun Liao, Xiaofei Jin, Hai Li, Bangyu National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
The key-value separation is renowned for its significant mitigation of the write amplification inherent in traditional LSM trees. However, KV separation potentially increases performance overhead in the management of ... 详细信息
来源: 评论