咨询与建议

限定检索结果

文献类型

  • 2,625 篇 期刊文献
  • 1,344 篇 会议
  • 9 册 图书

馆藏范围

  • 3,978 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,521 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,408 篇 软件工程
    • 493 篇 信息与通信工程
    • 435 篇 生物工程
    • 370 篇 生物医学工程(可授...
    • 342 篇 电气工程
    • 294 篇 光学工程
    • 289 篇 控制科学与工程
    • 246 篇 电子科学与技术(可...
    • 161 篇 化学工程与技术
    • 119 篇 机械工程
    • 86 篇 仪器科学与技术
    • 85 篇 核科学与技术
    • 80 篇 动力工程及工程热...
    • 71 篇 材料科学与工程(可...
    • 63 篇 网络空间安全
  • 1,775 篇 理学
    • 726 篇 物理学
    • 683 篇 数学
    • 539 篇 生物学
    • 297 篇 统计学(可授理学、...
    • 207 篇 化学
    • 113 篇 系统科学
  • 619 篇 管理学
    • 328 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 337 篇 医学
    • 286 篇 临床医学
    • 238 篇 基础医学(可授医学...
    • 157 篇 药学(可授医学、理...
    • 121 篇 公共卫生与预防医...
  • 96 篇 法学
    • 79 篇 社会学
  • 56 篇 农学
  • 43 篇 经济学
  • 41 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 105 篇 deep learning
  • 89 篇 machine learning
  • 82 篇 feature extracti...
  • 80 篇 semantics
  • 78 篇 training
  • 74 篇 hadrons
  • 59 篇 accuracy
  • 57 篇 computational mo...
  • 52 篇 data models
  • 49 篇 hadron colliders
  • 46 篇 hadronic decays
  • 42 篇 image segmentati...
  • 39 篇 magnetic resonan...
  • 39 篇 optimization
  • 38 篇 bottom mesons
  • 38 篇 predictive model...
  • 36 篇 federated learni...
  • 34 篇 branching fracti...
  • 33 篇 data mining
  • 32 篇 task analysis

机构

  • 426 篇 department of ph...
  • 413 篇 horia hulubei na...
  • 407 篇 van swinderen in...
  • 400 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 389 篇 school of physic...
  • 388 篇 cavendish labora...
  • 381 篇 university of ch...
  • 379 篇 yandex school of...
  • 354 篇 department of ph...
  • 347 篇 imperial college...
  • 342 篇 stfc rutherford ...
  • 337 篇 center for high ...
  • 334 篇 institute of par...
  • 308 篇 henryk niewodnic...
  • 298 篇 nikhef national ...
  • 289 篇 physik-institut ...
  • 289 篇 oliver lodge lab...
  • 288 篇 school of physic...
  • 285 篇 physikalisches i...

作者

  • 251 篇 barter w.
  • 247 篇 bellee v.
  • 241 篇 beiter a.
  • 224 篇 casse g.
  • 220 篇 bowcock t.j.v.
  • 218 篇 blake t.
  • 217 篇 borsato m.
  • 217 篇 bediaga i.
  • 216 篇 betancourt c.
  • 216 篇 amato s.
  • 213 篇 boettcher t.
  • 211 篇 baryshnikov f.
  • 209 篇 brundu d.
  • 209 篇 braun s.
  • 208 篇 borisyak m.
  • 201 篇 bizzeti a.
  • 187 篇 bencivenni g.
  • 178 篇 back j.j.
  • 174 篇 bjørn m.
  • 174 篇 bay a.

语言

  • 3,287 篇 英文
  • 666 篇 其他
  • 29 篇 中文
  • 3 篇 德文
  • 1 篇 法文
检索条件"机构=The Center for Data Center and AI and School of Engineering and Computer Science"
3978 条 记 录,以下是931-940 订阅
排序:
In-Flight Demonstration of Enhanced-Low-Dose-Rate-Sensitivity (ELDRS) in Bipolar Junction Transistors
In-Flight Demonstration of Enhanced-Low-Dose-Rate-Sensitivit...
收藏 引用
2022 IEEE Aerospace Conference, AERO 2022
作者: Benedetto, A.R. Barnaby, H.J. Cook, Cheyenne Campola, Michael J. Tender, Anna School of Electrical Computer and Energy Engineering Arizona State University Tempe United States Nasa Goddard Space Flight Center Nasa Silver Spring United States Yale University Department of Statistics and Data Science New Haven United States
data on bipolar junction transistors (BJTs) acquired from an in-flight mission experiment are recorded and downloaded for analysis. These data are analyzed for the purpose of characterizing the effects of low dose rat... 详细信息
来源: 评论
Improving Adversarial Transferability with Neighbourhood Gradient Information
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Haijing Wang, Jiafeng Chen, Zhaoyu Jiang, Kaixun Hong, Lingyi Guo, Pinxue Li, Jinglun Zhang, Wenqiang Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China Shanghai Engineering Research Center of AI & Robotics Academy for Engineering & Technology Fudan University Shanghai200433 China Engineering Research Center of Robotics Ministry of Education Academy for Engineering & Technology Fudan University Shanghai200433 China
Deep neural networks (DNNs) are known to be susceptible to adversarial examples, leading to significant performance degradation. In black-box attack scenarios, a considerable attack performance gap between the surroga...
来源: 评论
Container Anomaly Detection System Based on Rule Mining and Matching
Container Anomaly Detection System Based on Rule Mining and ...
收藏 引用
2022 International Conference on Blockchain Technology and Information Security, ICBCTIS 2022
作者: Yu, Daisong Xie, Yulai Long, Huachao Jin, Minpeng Li, Xuan School of Cyber Science and Engineering Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan China Wuhan National Lab for Optoelectronics F311 Wuhan China School of Computer Science Huazhong University of Science and Technology Wuhan China Nsfocus Inc. A9-3/F Optical Valley Software Park Wuhan China
Compared with virtual machine technology, container technology is more and more popular by virtue of its excellent convenience and reliable security isolation. Containers will encounter various anomalies during operat... 详细信息
来源: 评论
Variable projection algorithms with sparse constraint for separable nonlinear models
收藏 引用
Control Theory and Technology 2024年 第1期22卷 135-146页
作者: Hui-Lang Xu Guang-Yong Chen Si-Qing Cheng Min Gan Jing Chen College of Computer and Data Science Fuzhou UniversityFuzhou350116FujianChina Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350116FujianChina Key Laboratory of Intelligent Metro of Universities in Fujian Fuzhou UniversityFuzhou350116FujianChina Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou UniversityFuzhou350116FujianChina School of Science Jiangnan UniversityWuxi214122JiangsuChina
Separable nonlinear models are widely used in various fields such as time series analysis, system modeling, and machine learning, due to their flexible structures and ability to capture nonlinear behavior of data. How... 详细信息
来源: 评论
Ethical Considerations in Explainable ai: Balancing Transparency and User Privacy in English Language-based Virtual Assistants  5
Ethical Considerations in Explainable AI: Balancing Transpar...
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Alijoyo, Franciskus Antonius Sandya Sneha Sri, S. Alapati, Purnachandra Rao Yuldashev, Dilyorjon Ponni Valavan, M. Center for Risk Management and Sustainability Indonesia School of Business and Information Technology Stmik Likmi Bandung Indonesia Krishna University Andhra Pradesh India Prasad v Potluri Siddhartha Institute of Technology Andhra Pradesh Vijayawada Kanuru India Turin Polytechnic University in Tashkent Automatic Control and Computer Engineering Department Tashkent Uzbekistan K.Ramakrishnan College of Engineering Trichy Department of Artificial Intelligence and Data Science Tamil Nadu India
English Language-Based Virtual Assistants (ELB-VAs) are ai-powered systems designed to comprehend and respond to user queries in the English language, exemplified by virtual assistants like Siri or Alexa. The need for... 详细信息
来源: 评论
WHEN TO TRUST AGGREGATED GRADIENTS: ADDRESSING NEGATIVE CLIENT SAMPLING IN FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Wenkai Lin, Yankai Zhao, Guangxiang Li, Peng Zhou, Jie Sun, Xu Center for Data Science Peking University China Gaoling School of Artificial Intelligence Renmin University of China Beijing China Beijing Key Laboratory of Big Data Management and Analysis Methods Beijing China Shanghai AI Lab China Tsinghua University Beijing China Pattern Recognition Center WeChat AI Tencent Inc. China MOE Key Lab of Computational Linguistics School of Computer Science Peking University China
Federated Learning has become a widely-used framework which allows learning a global model on decentralized local datasets under the condition of protecting local data privacy. However, federated learning faces severe... 详细信息
来源: 评论
NEHand: Enhancing Hand Pose Estimation in the Wild through Synthetic and Motion Capture datasets
NEHand: Enhancing Hand Pose Estimation in the Wild through S...
收藏 引用
WRC Symposium on Advanced Robotics and Automation (WRC SARA)
作者: Xiuzhen Jiao Xiangnan Li Haonan Wen Dianke Data (Beijing) Information Technology Services Co. Ltd China Yantai Science and Technology Innovation Promotion Center Yantai China School of Computer and Control Engineering Yantai University Yantai China
Recovering interacting hand poses in natural environments poses a highly challenging task. Current datasets for interacting hands are relatively simple, lacking complex textures or background interference, allowing mo... 详细信息
来源: 评论
Expedited Block Transmission in Blockchain Network by using Clusters
Expedited Block Transmission in Blockchain Network by using ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Xiaoqi Hua Jian Chen Peiyun Zhang Zhangjie Fu Haibin Zhu Kezhong Lu Jigang Ren School of Software Nanjing University of Information Science and Technology Nanjing China Engineering Research Center of Digital Forensics of Ministry of Education and the School of Computer Science Nanjing University of Information Science and Technology Nanjing China School of Computer Science Nanjing University of Information Science and Technology Nanjing China Department of Computer Science and Mathematics Nipissing University North Bay ON Canada School of Big Data and Artificial Intelligence Chizhou University Chizhou China
Blockchain technology has garnered increasing attention from researchers. Because blockchain systems may contain malicious or spatially limited nodes that may delay block verification and reduce block transmission rat... 详细信息
来源: 评论
Cross-Age Speaker Verification: Learning Age-Invariant Speaker Embeddings
arXiv
收藏 引用
arXiv 2022年
作者: Qin, Xiaoyi Li, Na Weng, Chao Su, Dan Li, Ming School of Computer Science Wuhan University Wuhan China Data Science Research Center Duke Kunshan University Kunshan China Tencent AI Lab Shenzhen China
Automatic speaker verification has achieved remarkable progress in recent years. However, there is little research on cross-age speaker verification (CASV) due to insufficient relevant data. In this paper, we mine cro... 详细信息
来源: 评论
One-Hot Coding Similarity of Vehicle Routing Particle Swarm Optimizer  8th
One-Hot Coding Similarity of Vehicle Routing Particle Swarm ...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICaiS 2022
作者: He, CHao Li, Zhi Su, Shoubao Xu, Liukai Wang, Chishe School of Computer Jiangsu University of Science and Technology Zhenjiang212003 China Jiangsu Key Laboratory of Data Science and Smart Software Jinling Institute of Technology Nanjing211169 China Provincial Engineering Research Center of Digital Technology for Industrial Economic Jinling Institute of Technology Nanjing211169 China School of Computer Nanjing University of Posts and Telecommunications Nanjing210003 China
aiming at the real-time problem of vehicle routing planning, an improved particle swarm optimization method, called AVSPSO, is proposed in this paper. In the method, the path similarity of vehicle routing is calculate... 详细信息
来源: 评论