咨询与建议

限定检索结果

文献类型

  • 2,216 篇 期刊文献
  • 1,763 篇 会议
  • 88 册 图书

馆藏范围

  • 4,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,658 篇 工学
    • 2,084 篇 计算机科学与技术...
    • 1,695 篇 软件工程
    • 590 篇 信息与通信工程
    • 375 篇 控制科学与工程
    • 351 篇 电气工程
    • 351 篇 生物工程
    • 240 篇 生物医学工程(可授...
    • 202 篇 光学工程
    • 175 篇 机械工程
    • 169 篇 电子科学与技术(可...
    • 106 篇 网络空间安全
    • 101 篇 交通运输工程
    • 98 篇 动力工程及工程热...
    • 94 篇 安全科学与工程
    • 93 篇 化学工程与技术
    • 91 篇 仪器科学与技术
  • 1,343 篇 理学
    • 721 篇 数学
    • 386 篇 生物学
    • 293 篇 物理学
    • 245 篇 统计学(可授理学、...
    • 148 篇 系统科学
    • 113 篇 化学
  • 818 篇 管理学
    • 477 篇 管理科学与工程(可...
    • 369 篇 图书情报与档案管...
    • 265 篇 工商管理
  • 304 篇 医学
    • 256 篇 临床医学
    • 207 篇 基础医学(可授医学...
    • 143 篇 公共卫生与预防医...
    • 99 篇 药学(可授医学、理...
  • 155 篇 法学
    • 119 篇 社会学
  • 81 篇 经济学
  • 63 篇 教育学
  • 59 篇 农学
  • 9 篇 艺术学
  • 8 篇 文学
  • 4 篇 军事学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 137 篇 deep learning
  • 125 篇 machine learning
  • 93 篇 feature extracti...
  • 86 篇 artificial intel...
  • 84 篇 accuracy
  • 77 篇 semantics
  • 75 篇 computational mo...
  • 74 篇 training
  • 64 篇 predictive model...
  • 57 篇 internet of thin...
  • 56 篇 data models
  • 53 篇 data mining
  • 49 篇 federated learni...
  • 48 篇 optimization
  • 47 篇 cloud computing
  • 46 篇 reinforcement le...
  • 44 篇 computer science
  • 43 篇 convolutional ne...
  • 38 篇 security
  • 35 篇 visualization

机构

  • 175 篇 school of comput...
  • 77 篇 college of compu...
  • 72 篇 school of comput...
  • 46 篇 school of data a...
  • 45 篇 school of comput...
  • 43 篇 school of comput...
  • 38 篇 school of comput...
  • 33 篇 school of comput...
  • 32 篇 college of compu...
  • 32 篇 college of compu...
  • 31 篇 nanyang technolo...
  • 30 篇 beijing advanced...
  • 30 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 school of inform...
  • 26 篇 school of comput...
  • 26 篇 school of comput...
  • 25 篇 national enginee...
  • 23 篇 school of comput...
  • 23 篇 school of comput...

作者

  • 98 篇 niyato dusit
  • 46 篇 buyya rajkumar
  • 28 篇 rajkumar buyya
  • 27 篇 xiong zehui
  • 24 篇 jin hai
  • 22 篇 huang qingming
  • 21 篇 pardamean bens
  • 20 篇 yang yang
  • 20 篇 lo david
  • 18 篇 bens pardamean
  • 18 篇 wu jia
  • 17 篇 kang jiawen
  • 16 篇 zheng baihua
  • 16 篇 han zhu
  • 16 篇 shen linlin
  • 16 篇 chen mingzhe
  • 15 篇 wirth anthony
  • 15 篇 tao dacheng
  • 14 篇 zheng wei-shi
  • 14 篇 ezugwu absalom e...

语言

  • 2,996 篇 英文
  • 1,044 篇 其他
  • 31 篇 中文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information Systems"
4067 条 记 录,以下是71-80 订阅
A survey for light field super-resolution
收藏 引用
High-Confidence computing 2024年 第1期4卷 118-129页
作者: Mingyuan Zhao Hao Sheng Da Yang Sizhe Wang Ruixuan Cong Zhenglong Cui Rongshan Chen Tun Wang Shuai Wang Yang Huang Jiahao Shen State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Key Laboratory of Data Science and Intelligent Computing International Innovation InstituteBeihang UniversityHangzhou 311115China State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191China
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentati... 详细信息
来源: 评论
PVDM-YOLOv8l: a solution for reliable pedestrian and vehicle detection in autonomous vehicles under adverse weather conditions
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Tahir, Noor Ul Ain Zhang, Zuping Asim, Muhammad Iftikhar, Sundas A. Abd El-Latif, Ahmed School of Computer Science and Engineering Central South University Changsha410083 China EIAS Data Science Lab College of Computer and Information Sciences and Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh11586 Saudi Arabia Gianforte School of Computing Montana State University Bozeman59717 United States Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom32511 Egypt
Ensuring the safe navigation of autonomous vehicles in intelligent transportation system depends on their ability to detect pedestrians and vehicles. While transformer-based models for object detection have shown rema... 详细信息
来源: 评论
data-Filtered Prediction With Decomposition and Amplitude-Aware Permutation Entropy for Workload and Resource Utilization in Cloud data Centers
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 19189-19201页
作者: Yuan, Haitao Hu, Qinglong Wang, Meijia Wang, Shen Bi, Jing Buyya, Rajkumar Shi, Shuyuan Yang, Jinhong Zhang, Jia Zhou, Mengchu Beihang University School of Automation Science and Electrical Engineering Beijing100191 China City University of Hong Kong Department of Computer Science Kowloon Hong Kong Beijing University of Technology School of Software Engineering Faculty of Information Technology Beijing100124 China University of Melbourne Cloud Computing and Distributed Systems Lab School of Computing and Information Systems MelbourneVIC3010 Australia Beihang University School of Integrated Circuit Science and Engineering Beijing100191 China CSSC Systems Engineering Research Institute Beijing100036 China Southern Methodist University Department of Computer Science Lyle School of Engineering DallasTX75205 United States New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ07102 United States
In recent years, cloud computing has witnessed widespread applications across numerous organizations. Predicting workload and computing resource data can facilitate proactive service operation management, leading to s... 详细信息
来源: 评论
Reversible data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Discovering Personalized Characteristic Communities in Attributed Graphs  40
Discovering Personalized Characteristic Communities in Attri...
收藏 引用
40th IEEE International Conference on data Engineering, ICDE 2024
作者: Niu, Yudong Li, Yuchen Karras, Panagiotis Wang, Yanhao Li, Zhao School of Computing and Information Systems Singapore Management University Singapore University of Copenhagen Department of Computer Science Copenhagen Denmark School of Data Science and Engineering East China Normal University Shanghai China Zhejiang Lab Hangzhou China
What is the widest community in which a person exercises a strong impact? Although extensive attention has been devoted to searching communities containing given individuals, the problem of finding their unique commun... 详细信息
来源: 评论
Cas-FNE:Cascaded Face Normal Estimation
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第12期11卷 2423-2434页
作者: Meng Wang Jiawan Zhang Jiayi Ma Xiaojie Guo the Tianjin Key Laboratory of Autonomous Intelligence Technology and Systems Tianjin 300350 the School of Computer Science and Technology Tiangong UniversityTianjin 300387China IEEE the College of Intelligence and Computing Tianjin UniversityTianjin 300365China the Electronic Information School Wuhan UniversityWuhan 430072China
Capturing high-fidelity normals from single face images plays a core role in numerous computer vision and graphics *** significant progress has been made in recent years,how to effectively and efficiently explore norm... 详细信息
来源: 评论
Revolutionizing Brain Stroke Classification with Neuro-Xception and ELM Integration in Deep Learning  2
Revolutionizing Brain Stroke Classification with Neuro-Xcept...
收藏 引用
2nd International Conference on computing and data Analytics, ICCDA 2024
作者: Jagadeesan, S. Ramalingam, Venkadeshan Abinash, P. Ilayaraja, V. Masood, Jafar Ali Ibrahim Syed Tamil Priya, D. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India UTAS-Shinas branch Department of Computing and Information Sciences Oman School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Stroke and related neurological disorders are difficult to classify accurately, hence new computational approaches are needed to enhance diagnosis. In order to transform the categorization of brain strokes, this study... 详细信息
来源: 评论
PALCT: vehicle-to-vehicle communication based on pseudonym assignment and encryption scheme using delay minimisation cover tree algorithm
收藏 引用
International Journal of Vehicle information and Communication systems 2025年 第2期10卷 132-147页
作者: Tandon, Righa Gupta, P.K. Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science and Engineering Jaypee University of Information Technology HP Solan173 234 India Department of Data Science School of Computing Mohan Babu University AP Tirupati517 102 India
Vehicle-to-vehicle communication is one of the new paradigms of networking, which should be secure, fast, and efficient. In this paper, we propose a framework that implements the pseudonym-based authentication scheme ... 详细信息
来源: 评论
3DMambaIPF: A State Space Model for Iterative Point Cloud Filtering via Differentiable Rendering  39
3DMambaIPF: A State Space Model for Iterative Point Cloud Fi...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhou, Qingyuan Yang, Weidong Fei, Ben Xu, Jingyi Zhang, Rui Liu, Keyi Luo, Yeqi He, Ying School of Computer Science Fudan University China Department of Information Engineering The Chinese University of Hong Kong Hong Kong College of Computing and Data Science Nanyang Technological University Singapore
Noise is an inevitable aspect of point cloud acquisition, necessitating filtering as a fundamental task within the realm of 3D vision. Existing learning-based filtering methods have shown promising capabilities on com... 详细信息
来源: 评论
LDREG: LOCAL DIMENSIONALITY REGULARIZED SELF-SUPERVISED LEARNING  12
LDREG: LOCAL DIMENSIONALITY REGULARIZED SELF-SUPERVISED LEAR...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Huang, Hanxun Campello, Ricardo J.G.B. Erfani, Sarah Ma, Xingjun Houle, Michael E. Bailey, James School of Computing and Information Systems The University of Melbourne Australia Department of Mathematics and Computer Science University of Southern Denmark Denmark School of Computer Science Fudan University China Department of Computer Science New Jersey Institute of Technology United States
Representations learned via self-supervised learning (SSL) can be susceptible to dimensional collapse, where the learned representation subspace is of extremely low dimensionality and thus fails to represent the full ...
来源: 评论