咨询与建议

限定检索结果

文献类型

  • 620 篇 期刊文献
  • 569 篇 会议

馆藏范围

  • 1,189 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 798 篇 工学
    • 590 篇 计算机科学与技术...
    • 485 篇 软件工程
    • 163 篇 信息与通信工程
    • 139 篇 生物工程
    • 84 篇 电气工程
    • 81 篇 控制科学与工程
    • 80 篇 生物医学工程(可授...
    • 67 篇 电子科学与技术(可...
    • 66 篇 光学工程
    • 54 篇 化学工程与技术
    • 44 篇 机械工程
    • 31 篇 动力工程及工程热...
    • 26 篇 交通运输工程
    • 23 篇 建筑学
    • 23 篇 土木工程
    • 21 篇 材料科学与工程(可...
    • 16 篇 仪器科学与技术
  • 428 篇 理学
    • 206 篇 数学
    • 151 篇 生物学
    • 102 篇 物理学
    • 59 篇 化学
    • 59 篇 统计学(可授理学、...
    • 32 篇 系统科学
  • 202 篇 管理学
    • 108 篇 图书情报与档案管...
    • 107 篇 管理科学与工程(可...
    • 31 篇 工商管理
  • 62 篇 医学
    • 57 篇 临床医学
    • 44 篇 基础医学(可授医学...
    • 33 篇 药学(可授医学、理...
  • 35 篇 法学
    • 28 篇 社会学
  • 18 篇 农学
  • 14 篇 经济学
  • 5 篇 教育学
  • 4 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 37 篇 semantics
  • 30 篇 deep learning
  • 28 篇 training
  • 26 篇 feature extracti...
  • 23 篇 machine learning
  • 22 篇 computational mo...
  • 20 篇 task analysis
  • 18 篇 data mining
  • 17 篇 conferences
  • 17 篇 graph neural net...
  • 16 篇 memory managemen...
  • 15 篇 deep neural netw...
  • 15 篇 forecasting
  • 14 篇 object detection
  • 14 篇 neural networks
  • 14 篇 data models
  • 13 篇 convolution
  • 13 篇 accuracy
  • 11 篇 recommender syst...
  • 11 篇 contrastive lear...

机构

  • 100 篇 national enginee...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 38 篇 school of comput...
  • 34 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei key labora...
  • 26 篇 zhejiang lab
  • 21 篇 school of comput...
  • 20 篇 school of mathem...
  • 19 篇 school of softwa...
  • 18 篇 national enginee...
  • 17 篇 national univers...
  • 17 篇 smart health big...
  • 16 篇 university of sc...
  • 16 篇 fujian provincia...
  • 16 篇 school of inform...

作者

  • 121 篇 jin hai
  • 118 篇 hai jin
  • 42 篇 xiaofei liao
  • 27 篇 liao xiaofei
  • 26 篇 chen enhong
  • 25 篇 liu jun
  • 23 篇 liu qi
  • 23 篇 hu shengshan
  • 21 篇 haikun liu
  • 19 篇 long zheng
  • 17 篇 zou deqing
  • 16 篇 zhang leo yu
  • 15 篇 deqing zou
  • 15 篇 pan jeng-shyang
  • 15 篇 yu zhang
  • 14 篇 wang meng
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 li chen
  • 13 篇 li minghui

语言

  • 1,122 篇 英文
  • 57 篇 其他
  • 11 篇 中文
检索条件"机构=Anhui Engineering Lab of Big Data Technology"
1189 条 记 录,以下是511-520 订阅
排序:
Research on Multi-AGVs dynamic scheduling based on deep reinforcement learning
Research on Multi-AGVs dynamic scheduling based on deep rein...
收藏 引用
IEEE International Conference on e-Business engineering (ICEBE)
作者: Zhuorui Qin Xiaoqian Wu Yimin Zheng Qingyao Wu School of Software Engineering South China University of Technology Guangzhou China Key Laboratory of Big Data and Intelligent Robot Ministry of Education Shenzhen Bangqi Technology Intelligent Development Co. Ltd Shenzhen China Pazhou Lab Guangzhou China
Driven by the latest advances in industrial artificial intelligence, automatic guided vehicles (AGVs) have been widely used for material handling in flexible workshops. In the pursuit of agile and flexible production ...
来源: 评论
Unifying Large Language Models and Knowledge Graphs: A Roadmap
arXiv
收藏 引用
arXiv 2023年
作者: Pan, Shirui Luo, Linhao Wang, Yufei Chen, Chen Wang, Jiapu Wu, Xindong Griffith University QLD Australia The Department of Data Science and AI Monash University Melbourne Australia The Nanyang Technological University Singapore The Faculty of Information Technology Beijing University of Technology Beijing China The Key Laboratory of Knowledge Engineering with Big Data The Ministry of Education of China Hefei University of Technology Hefei China The Research Center for Knowledge Engineering Zhejiang Lab Hangzhou China
Large language models (LLMs), such as ChatGPT and GPT4, are making new waves in the field of natural language processing and artificial intelligence, due to their emergent ability and generalizability. However, LLMs a... 详细信息
来源: 评论
Reconciling Selective Logging and Hardware Persistent Memory Transaction
Reconciling Selective Logging and Hardware Persistent Memory...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Chencheng Ye Yuanchao Xu Xipeng Shen Yan Sha Xiaofei Liao Hai Jin Yan Solihin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China North Carolina State University Raleigh North Carolina USA University of Central Florida Florida USA
Log creation, maintenance, and its persist ordering are known to be performance bottlenecks for durable transactions on persistent memory. Existing hardware persistent memory transactions overlook an important opportu... 详细信息
来源: 评论
A nearly optimal distributed algorithm for computing the weighted girth
收藏 引用
Science China(Information Sciences) 2021年 第11期64卷 80-94页
作者: Qiang-Sheng HUA Lixiang QIAN Dongxiao YU Xuanhua SHI Hai JIN National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology School of Computer Science and Technology Shandong University
Computing the weighted girth, which is the sum of weights of edges in the minimum weight cycle,is an important problem in network analysis. The problem for distributively computing girth in unweighted graphs has garne... 详细信息
来源: 评论
Hierarchical Graph Transformer with Adaptive Node Sampling
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Zaixi Liu, Qi Hu, Qingyong Lee, Chee-Kong Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China China State Key Laboratory of Cognitive Intelligence Anhui Hefei China Hong Kong University of Science and Technology Hong Kong Tencent America United States
The Transformer architecture has achieved remarkable success in a number of domains including natural language processing and computer vision. However, when it comes to graph-structured data, transformers have not ach... 详细信息
来源: 评论
Rotation-Adaptive Point Cloud Domain Generalization via Intricate Orientation Learning
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Bangzhen Zheng, Chenxi Xu, Xuemiao Xu, Cheng Zhang, Huaidong He, Shengfeng South China University of Technology Guangzhou China Guangdong Engineering Center for Large Model and GenAI Technology The State Key Laboratory of Subtropical Building and Urban Science The Ministry of Education Key Laboratory of Big Data and Intelligent Robot The Guangdong Provincial Key Lab of Computational Intelligence and Cyberspace Information China Singapore Management University Singapore
The vulnerability of 3D point cloud analysis to unpredictable rotations poses an open yet challenging problem: orientation-aware 3D domain generalization. Cross-domain robustness and adaptability of 3D representations... 详细信息
来源: 评论
Estimating Noisy Class Posterior with Part-level labels for Noisy label Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Rui Shi, Bin Ruan, Jianfei Pan, Tianze Dong, Bo School of Computer Science and Technology Xi’an Jiaotong University China Shaanxi Province Key Lab of Big Data Knowledge Engineering Xi’an Jiaotong University China School of Physics Xi’an Jiaotong University China School of Distance Education Xi’an Jiaotong University China
In noisy label learning, estimating noisy class posteriors plays a fundamental role for developing consistent classifiers, as it forms the basis for estimating clean class posteriors and the transition matrix. Existin... 详细信息
来源: 评论
RGCnet: An Efficient Recursive Gated Convolutional Network for EEG-based Auditory Attention Detection
RGCnet: An Efficient Recursive Gated Convolutional Network f...
收藏 引用
Annual International Conference of the IEEE engineering in Medicine and Biology Society (EMBC)
作者: Siqi Cai Jia Li Hongmeng Yang Haizhou Li Department of Electrical and Computer Engineering National University of Singapore Singapore Shien-Ming Wu School of Intelligent Engineering South China University of Technology China Shenzhen Research Institute of Big Data School of Data Science The Chinese University of Hong Kong Shenzhen China Machine Listening Lab University of Bremen Germany
Humans are able to listen to one speaker and disregard others in a speaking crowd, referred to as the "cocktail party effect". EEG-based auditory attention detection (AAD) seeks to identify whom a listener i...
来源: 评论
Securing Sdn/Nfv-Enabled Campus Networks with Software-Defined Perimeter-Based Zero-Trust Architecture
SSRN
收藏 引用
SSRN 2023年
作者: Ruambo, Francis A. Zou, Deqing Lopes, Ivandro O. Yuan, Bin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on Big Data Security Wuhan China National Engineering Research Center for Big Data Technology and System Wuhan China Services Computing Technology and System Lab Wuhan China Cluster and Grid Computing Lab Wuhan China Mbeya university of Science and Technology Mbeya131 Tanzania United Republic of Nucleo Operacional para a Sociedade de Informacao Cape Verde Songshan Laboratory Zhengzhou China
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt... 详细信息
来源: 评论
Sustainable Self-evolution Adversarial Training
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Wenxuan Wang, Chenglei Qi, Huihui Ye, Menghao Qian, Xuelin Wang, Peng Zhang, Yanning School of Computer Science Northwestern Polytechnical University National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Shaanxi Xi’an China School of Automation Northwestern Polytechnical University The BRain and Artificial INtelligence Lab Shaanxi Xi’an China
With the wide application of deep neural network models in various computer vision tasks, there has been a proliferation of adversarial example generation strategies aimed at deeply exploring model security. However, ... 详细信息
来源: 评论