咨询与建议

限定检索结果

文献类型

  • 2,648 篇 期刊文献
  • 1,344 篇 会议
  • 9 册 图书

馆藏范围

  • 4,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,519 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,408 篇 软件工程
    • 493 篇 信息与通信工程
    • 435 篇 生物工程
    • 370 篇 生物医学工程(可授...
    • 341 篇 电气工程
    • 294 篇 光学工程
    • 290 篇 控制科学与工程
    • 245 篇 电子科学与技术(可...
    • 162 篇 化学工程与技术
    • 119 篇 机械工程
    • 87 篇 仪器科学与技术
    • 84 篇 核科学与技术
    • 80 篇 动力工程及工程热...
    • 69 篇 材料科学与工程(可...
    • 63 篇 网络空间安全
  • 1,777 篇 理学
    • 727 篇 物理学
    • 681 篇 数学
    • 540 篇 生物学
    • 295 篇 统计学(可授理学、...
    • 207 篇 化学
    • 113 篇 系统科学
  • 619 篇 管理学
    • 328 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 341 篇 医学
    • 289 篇 临床医学
    • 240 篇 基础医学(可授医学...
    • 157 篇 药学(可授医学、理...
    • 121 篇 公共卫生与预防医...
  • 96 篇 法学
    • 79 篇 社会学
  • 56 篇 农学
  • 45 篇 经济学
  • 41 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 106 篇 deep learning
  • 91 篇 machine learning
  • 82 篇 feature extracti...
  • 80 篇 semantics
  • 78 篇 training
  • 74 篇 hadrons
  • 59 篇 accuracy
  • 57 篇 computational mo...
  • 52 篇 data models
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 42 篇 image segmentati...
  • 39 篇 magnetic resonan...
  • 39 篇 optimization
  • 38 篇 bottom mesons
  • 38 篇 predictive model...
  • 37 篇 federated learni...
  • 34 篇 branching fracti...
  • 33 篇 data mining
  • 32 篇 task analysis

机构

  • 426 篇 department of ph...
  • 413 篇 horia hulubei na...
  • 407 篇 van swinderen in...
  • 399 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 387 篇 school of physic...
  • 384 篇 cavendish labora...
  • 379 篇 yandex school of...
  • 377 篇 university of ch...
  • 354 篇 department of ph...
  • 347 篇 imperial college...
  • 334 篇 stfc rutherford ...
  • 331 篇 center for high ...
  • 326 篇 institute of par...
  • 305 篇 henryk niewodnic...
  • 297 篇 nikhef national ...
  • 290 篇 school of physic...
  • 289 篇 physik-institut ...
  • 289 篇 oliver lodge lab...
  • 287 篇 physikalisches i...

作者

  • 251 篇 barter w.
  • 247 篇 bellee v.
  • 241 篇 beiter a.
  • 225 篇 casse g.
  • 220 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 217 篇 bediaga i.
  • 216 篇 amato s.
  • 212 篇 boettcher t.
  • 211 篇 baryshnikov f.
  • 209 篇 brundu d.
  • 209 篇 braun s.
  • 207 篇 borisyak m.
  • 198 篇 bizzeti a.
  • 185 篇 bencivenni g.
  • 176 篇 back j.j.
  • 174 篇 bjørn m.
  • 172 篇 bay a.

语言

  • 3,310 篇 英文
  • 666 篇 其他
  • 29 篇 中文
  • 3 篇 德文
  • 1 篇 法文
检索条件"机构=The Center for Data Center and AI and School of Engineering and Computer Science"
4001 条 记 录,以下是1031-1040 订阅
排序:
Understanding the Robustness of 3D Object Detection with Bird'View Representations in Autonomous Driving
Understanding the Robustness of 3D Object Detection with Bir...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition, CVPR 2023
作者: Zhu, Zijian Zhang, Yichi Chen, Hai Dong, Yinpeng Zhao, Shu Ding, Wenbo Zhong, Jiachen Zheng, Shibao Institute of Image Communication and Network Engineering Shanghai Jiao Tong University China Institute for Ai Tsinghua University BNRist Center Thbi Lab Dept. of Comp. Sci. and Tech. China School of Computer Science and Technology Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Information Materials and Intelligent Sensing Laboratory of Anhui Province China Saic Motor Ai Lab Zhongguancun Laboratory China
3D object detection is an essential perception task in autonomous driving to understand the environments. The Bird's-Eye-View (BEV) representations have significantly improved the performance of 3D detectors with ... 详细信息
来源: 评论
SpreadFGL: Edge-Client Collaborative Federated Graph Learning with Adaptive Neighbor Generation
arXiv
收藏 引用
arXiv 2024年
作者: Zhong, Luying Pi, Yueyang Chen, Zheyi Yu, Zhengxin Miao, Wang Chen, Xing Min, Geyong College of Computer and Data Science Fuzhou University China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University China Engineering Research Center of Big Data Intelligence Ministry of Education China School of Computing and Communications University of Lancaster United Kingdom School of Engineering Computing and Mathematics University of Plymouth United Kingdom Department of Computer Science University of Exeter United Kingdom
Federated Graph Learning (FGL) has garnered widespread attention by enabling collaborative training on multiple clients for semi-supervised classification tasks. However, most existing FGL studies do not well consider... 详细信息
来源: 评论
A Universal Unbiased Method for Classification from Aggregate Observations
arXiv
收藏 引用
arXiv 2023年
作者: Wei, Zixi Feng, Lei Han, Bo Liu, Tongliang Niu, Gang Zhu, Xiaofeng Shen, Heng Tao College of Computer Science Chongqing University China School of Computer Science and Engineering Nanyang Technological University Singapore RIKEN Center for Advanced Intelligence Project Japan Department of Computer Science Hong Kong Baptist University China Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates Sydney AI Centre School of Computer Science The University of Sydney Australia School of Computer Science and Engineering University of Electronic Science and Technology of China China
In conventional supervised classification, true labels are required for individual instances. However, it could be prohibitive to collect the true labels for individual instances, due to privacy concerns or unaffordab... 详细信息
来源: 评论
D2TV: Dual Knowledge Distillation and Target-oriented Vision Modeling for Many-to-Many Multimodal Summarization
arXiv
收藏 引用
arXiv 2023年
作者: Liang, Yunlong Meng, Fandong Wang, Jiaan Xu, Jinan Chen, Yufeng Zhou, Jie Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China Pattern Recognition Center WeChat AI Tencent Inc China School of Computer Science and Technology Soochow University Suzhou China
Many-to-many multimodal summarization (M3S) task aims to generate summaries in any language with document inputs in any language and the corresponding image sequence, which essentially comprises multimodal monolingual... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Equivariant diffusion for crystal structure prediction  24
Equivariant diffusion for crystal structure prediction
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Peijia Lin Pin Chen Rui Jiao Qing Mo Jianhuan Cen Wenbing Huang Yang Liu Dan Huang Yutong Lu School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China and National Supercomputer Center in Guangzhou China Dept. of Comp. Sci. Tech. Institute for AI Tsinghua University Beijing China and Institute for AIR Tsinghua University Beijing China National Supercomputer Center in Guangzhou China Gaoling School of Artificial Intelligence Renmin University of China Beijing China and Beijing Key Laboratory of Big Data Management and Analysis Methods Beijing China
In addressing the challenge of Crystal Structure Prediction (CSP), symmetry-aware deep learning models, particularly diffusion models, have been extensively studied, which treat CSP as a conditional generation task. H...
来源: 评论
An efficient multi-attribute combinatorial auction for 4PL transportation service procurement
An efficient multi-attribute combinatorial auction for 4PL t...
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Na Yuan Haiming Liang Min Huang Yanfeng Zhang College of Information Science and Engineering Northeastern University Shenyang China Center for Network Big Data and Decision-Making Business School Sichuan University Chengdu China College of Computer Science and Engineering Northeastern University Shenyang China
In this paper, we study the mechanism design problem of combinatorial reverse auction for 4PL transportation service procurement (TSP) considering price and multiple non-price attributes. In order to achieve efficient...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Robot and its living space:A roadmap for robot development based on the view of living space
收藏 引用
Digital Communications and Networks 2021年 第4期7卷 505-517页
作者: Xiaofeng Cai Huansheng Ning Sahraoui Dhelim Rongjuan Zhou Tao Zhang Yang Xu Yueliang Wan School of Computer and Communication Engineering University of Science and Technology Beijing Beijing 100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing 100083China School of Foreign Studies University of Science and Technology Beijing Beijing 100083China Key Lab of Information Network Security Ministry of Public SecurityChina Run Technologies Co. LidBeijing China
Robot’s living space Human-robot relationship Robot humanization Hybrid intelligence Human-robot integrated society Robots,as the creation of humans,became an irreplaceable component in human *** the advancement of t... 详细信息
来源: 评论
Topological Correction of Subject-Level Intrinsic Connectivity Networks
Topological Correction of Subject-Level Intrinsic Connectivi...
收藏 引用
IEEE International Symposium on Biomedical Imaging
作者: Noah Lewis Armin Iraji Robyn Miller Vince D. Calhoun School of Computational Science and Engineering Georgia Institute of Technology Tri-Institutional Center for Translational Research in Neuroimaging Data Science (TReNDS) Georgia Institute of Technology Georgia State University Emory University School of Electrical and Computer Engineering Georgia Institute of Technology
Over the last several decades, researchers have sought to capture the underlying functional activity of the human brain from functional magnetic resonance imaging (fMRI). One well-studied and promising avenue of resea...
来源: 评论