咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 23 篇 期刊文献

馆藏范围

  • 1,760 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,206 篇 工学
    • 1,097 篇 计算机科学与技术...
    • 694 篇 软件工程
    • 221 篇 信息与通信工程
    • 163 篇 电气工程
    • 122 篇 电子科学与技术(可...
    • 97 篇 控制科学与工程
    • 82 篇 生物工程
    • 61 篇 动力工程及工程热...
    • 49 篇 机械工程
    • 46 篇 生物医学工程(可授...
    • 31 篇 交通运输工程
    • 30 篇 光学工程
    • 29 篇 仪器科学与技术
    • 25 篇 环境科学与工程(可...
    • 24 篇 化学工程与技术
    • 20 篇 网络空间安全
    • 17 篇 力学(可授工学、理...
    • 17 篇 材料科学与工程(可...
  • 497 篇 理学
    • 320 篇 数学
    • 96 篇 生物学
    • 83 篇 系统科学
    • 78 篇 物理学
    • 72 篇 统计学(可授理学、...
    • 34 篇 化学
  • 269 篇 管理学
    • 182 篇 管理科学与工程(可...
    • 121 篇 图书情报与档案管...
    • 116 篇 工商管理
  • 62 篇 医学
    • 55 篇 临床医学
  • 36 篇 法学
    • 35 篇 社会学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 8 篇 教育学
  • 6 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 198 篇 computer archite...
  • 80 篇 hardware
  • 79 篇 computational mo...
  • 66 篇 high performance...
  • 57 篇 cloud computing
  • 50 篇 grid computing
  • 41 篇 distributed comp...
  • 41 篇 field programmab...
  • 40 篇 bandwidth
  • 37 篇 kernel
  • 37 篇 graphics process...
  • 34 篇 resource managem...
  • 34 篇 computer network...
  • 33 篇 performance eval...
  • 32 篇 throughput
  • 31 篇 computer science
  • 31 篇 application soft...
  • 31 篇 analytical model...
  • 30 篇 program processo...
  • 29 篇 supercomputers

机构

  • 26 篇 college of compu...
  • 19 篇 university of ch...
  • 14 篇 school of comput...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 college of compu...
  • 8 篇 school of comput...
  • 7 篇 school of data a...
  • 7 篇 school of comput...
  • 7 篇 institute of com...
  • 6 篇 computer network...
  • 6 篇 tsinghua univers...
  • 6 篇 school of cyber ...
  • 6 篇 changsha univers...
  • 5 篇 university of sc...
  • 5 篇 skl of computer ...
  • 5 篇 computer science...
  • 5 篇 school of comput...
  • 5 篇 hubei province k...
  • 5 篇 zhongguancun lab...

作者

  • 11 篇 duan yucong
  • 7 篇 zhang tao
  • 7 篇 li kenli
  • 7 篇 xu xiaolong
  • 6 篇 wang wei
  • 6 篇 gao guang r.
  • 5 篇 li peng
  • 5 篇 yunquan zhang
  • 5 篇 liu qin
  • 5 篇 wang dong
  • 5 篇 bader david a.
  • 5 篇 liu ruicheng
  • 5 篇 zhang rui
  • 5 篇 wan shouhong
  • 5 篇 wu jigang
  • 5 篇 panda dhabaleswa...
  • 5 篇 zhang jie
  • 5 篇 wang xiaoliang
  • 5 篇 chen long
  • 5 篇 li wei

语言

  • 1,710 篇 英文
  • 46 篇 其他
  • 3 篇 中文
  • 1 篇 波兰文
检索条件"任意字段=21st International Symposium on Computer Architecture and High Performance Computing"
1760 条 记 录,以下是221-230 订阅
排序:
Face Anti-Spoofing in Face Recognition: Using Color Texture and Corner Features with Mtcnn and Facenet on Raspberry PI  21
Face Anti-Spoofing in Face Recognition: Using Color Texture ...
收藏 引用
21st international computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Lamsis, Almer A. Osmena, John Daniel M. Linsangan, Noel B. School of Electrical Electronics and Computer Engineering Mapúa University Manila Philippines
Face recognition, a dependable biometric technology, utilizes facial information to verify an individual's identity. In the field of research, the emphasis of face recognition has been on enhancing the recognition... 详细信息
来源: 评论
A Semantic-Driven Generative Information Extraction Framework Oriented to Patent Text  21
A Semantic-Driven Generative Information Extraction Framewor...
收藏 引用
21st IEEE international symposium on Parallel and Distributed Processing with Applications, 13th IEEE international Conference on Big Data and Cloud computing, 16th IEEE international Conference on Social computing and Networking and 13th international Conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Zhao, Yushan Wang, Tengke Zhang, Shunxiang Anhui University of Science and Technology School of Mathematics and Big Data Huainan China Anhui University of Science and Technology School of Computer Science and Engineering Huainan China
Generative information extraction for patent text relies on a text-to-structure encoder-decoder framework, facilitating the automatic construction of patent knowledge bases. Existing models challenge to capture the lo... 详细信息
来源: 评论
Research on the Application of Blockchain Digital Forensics architecture Based on the DIKW Graph Model in the Police Forensic Process  25
Research on the Application of Blockchain Digital Forensics ...
收藏 引用
25th IEEE international Conferences on high performance computing and Communications, 9th international Conference on Data Science and Systems, 21st IEEE international Conference on Smart City and 9th IEEE international Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Liu, Tingwei Cheng, Hexiang Liu, Yanfei Duan, Yucong Wang, Zhenhua Chongqing Police College Department of Public Security ChongQing China Administrative Law School Southwest University of Political Science and Law Chong Qing China Tianjin University Chongqing Police College Department of Intelligence and Computing Department of Information Security ChongQing China School of Computer Science and Technology Hainan University Haikou China Chongqing Police College Department of Tactics ChongQing China
This study explores the application of a blockch-ain-based digital forensics architecture using the DIKW (Data, Information, Knowledge, Wisdom) graph in police investigations. Current digital intelligence systems usua... 详细信息
来源: 评论
Interference-Aware Workload Placement for Improving Latency Distribution of Converged HPC/Big Data Cloud Infrastructures  21st
Interference-Aware Workload Placement for Improving Latency ...
收藏 引用
21st international Conference on Embedded computer Systems - architectures, Modeling, and Simulation (SAMOS)
作者: Tzenetopoulos, Achilleas Masouros, Dimosthenis Xydis, Sotirios Soudris, Dimitrios Natl Tech Univ Athens Athens Greece Harokopio Univ Athens Athens Greece
Recently, high performance, Big Data, and Cloud computing worlds tend to converge in terms of workload deployment with containerization technology acting as an enabler towards this direction. In such cases of applicat... 详细信息
来源: 评论
Analysis of Chinese traditional opera based on the Western music genre classification methods  25
Analysis of Chinese traditional opera based on the Western m...
收藏 引用
25th IEEE international Conferences on high performance computing and Communications, 9th international Conference on Data Science and Systems, 21st IEEE international Conference on Smart City and 9th IEEE international Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Li, Yue Peng, Zhengwei Liufu, Ying Li, Guanghao Zhu, Huanyan School of Computer Science and Engineering South China University of Technology Guangzhou China Shenzhen Futu Network Technology Co. Ltd. Shenzhen China
At a time of rapid development of Internet technology, AI capabilities are gradually penetrating into the audio field. Although the study of traditional music has a long history, the mainstream music research is curre... 详细信息
来源: 评论
Cell Manipulation Attack Against Onion Services  25
Cell Manipulation Attack Against Onion Services
收藏 引用
25th IEEE international Conferences on high performance computing and Communications, 9th international Conference on Data Science and Systems, 21st IEEE international Conference on Smart City and 9th IEEE international Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Lin, Jianjun Yue, Yinliang Zhang, Yijing Liu, Xiaoyu Yang, XiaoDu Gai, Weilin Sun, Bo Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Zhongguancun Laboratory Beijing China Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Beijing China
In this study, we proposed OREA-OS, a cell manipulation attack devised to compromise Onion Services. Through the manipulation of cells, two collaborating nodes within a circuit exchange information to unveil the anony... 详细信息
来源: 评论
TPMARL-MSS Thought-Perception Multi-Agent Reinforcement Learning Meeting Scheduling System  25
TPMARL-MSS Thought-Perception Multi-Agent Reinforcement Lear...
收藏 引用
25th IEEE international Conferences on high performance computing and Communications, 9th international Conference on Data Science and Systems, 21st IEEE international Conference on Smart City and 9th IEEE international Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Zhang, Jinsong Mao, Xiaoxuan Li, Lu Wu, Hanqian Joint Graduate School Southeast University Nanjing China College of Software Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration of Ministry of Education Nanjing China
In today's evolving society, the increasing complexity and frequency of meetings necessitate advanced scheduling systems. Traditional methods are constrained by rigid prede-fined strategies, lack intelligent negot... 详细信息
来源: 评论
Investigating Layer-2 Scalability Solutions for Blockchain Applications  25
Investigating Layer-2 Scalability Solutions for Blockchain A...
收藏 引用
25th IEEE international Conferences on high performance computing and Communications, 9th international Conference on Data Science and Systems, 21st IEEE international Conference on Smart City and 9th IEEE international Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Mandal, Mahen Chishti, Mohd Sameen Banerjee, Amit South Asian University Department of Computer Science New Delhi India Bennett University Scset Greater Noida India
Scalability is one of the trilemma of blockchain technology that hinders its adoption for large-scale decentralized applications (dApps). Researchers have proposed several layer-1 and layer-2 solutions to address the ... 详细信息
来源: 评论
False Positive Detection for Text-Based Person Retrieval  21st
False Positive Detection for Text-Based Person Retrieval
收藏 引用
21st Pacific Rim international Conference on Artificial Intelligence, PRICAI 2024
作者: Cao, Yan Lu, Jun College of Computer Science and Technology Heilongjiang University Harbin150080 China Jiaxiang Industrial Technology Research Institute of Heilongjiang University Shandong Jining272400 China Key Laboratory of Database and Parallel Computing of Heilongjiang Province Heilongjiang University Harbin150080 China
Text-based person retrieval (TBPR) is a challenging topic in cross-modal retrieval tasks, aiming to query corresponding person images based on textual descriptions. This task is complicated by noisy correspondences be... 详细信息
来源: 评论
The Simplex 3-partite Hypergraph-based Resource Allocation (S3H-RA) Method for Platooning Communications  25
The Simplex 3-partite Hypergraph-based Resource Allocation (...
收藏 引用
25th IEEE international Conferences on high performance computing and Communications, 9th international Conference on Data Science and Systems, 21st IEEE international Conference on Smart City and 9th IEEE international Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Huang, Chung-Ming Lam, Dan-Nguyen Dao, Duy-Tuan National Cheng Kung University Dept of Computer Science and Information Engineering Tainan Taiwan The University of Danang-University of Science and Technology Faculty of Electronics and Telecommunications Engineering Viet Nam
This work proposed the Simplex 3-partite Hypergraph-based Resource Allocation (S3H-RA) method for multi-platoon. Using S3H-RA, the subchannels that Platoon Leader Vehicles (PLV) can use are assigned at first, for whic... 详细信息
来源: 评论