咨询与建议

限定检索结果

文献类型

  • 806 篇 会议
  • 791 篇 期刊文献

馆藏范围

  • 1,597 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 985 篇 工学
    • 708 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 196 篇 信息与通信工程
    • 135 篇 生物工程
    • 115 篇 电气工程
    • 114 篇 控制科学与工程
    • 89 篇 电子科学与技术(可...
    • 85 篇 光学工程
    • 79 篇 生物医学工程(可授...
    • 62 篇 机械工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 38 篇 交通运输工程
    • 33 篇 建筑学
    • 33 篇 土木工程
  • 605 篇 理学
    • 310 篇 数学
    • 170 篇 物理学
    • 151 篇 生物学
    • 98 篇 统计学(可授理学、...
    • 49 篇 化学
    • 49 篇 系统科学
    • 41 篇 地球物理学
  • 246 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 49 篇 工商管理
  • 63 篇 医学
    • 53 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
  • 49 篇 法学
    • 39 篇 社会学
  • 21 篇 经济学
  • 15 篇 农学
  • 7 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 63 篇 feature extracti...
  • 58 篇 semantics
  • 47 篇 training
  • 45 篇 computational mo...
  • 37 篇 deep learning
  • 37 篇 machine learning
  • 35 篇 graph neural net...
  • 35 篇 accuracy
  • 34 篇 predictive model...
  • 34 篇 data models
  • 25 篇 convolution
  • 24 篇 task analysis
  • 23 篇 image segmentati...
  • 22 篇 federated learni...
  • 19 篇 deep neural netw...
  • 19 篇 neural networks
  • 18 篇 memory managemen...
  • 18 篇 cloud computing
  • 17 篇 data mining
  • 16 篇 topology

机构

  • 214 篇 beijing advanced...
  • 102 篇 national enginee...
  • 66 篇 school of comput...
  • 63 篇 beijing advanced...
  • 58 篇 shandong provinc...
  • 53 篇 school of cyber ...
  • 50 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 40 篇 national enginee...
  • 39 篇 school of comput...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 27 篇 huazhong univers...
  • 23 篇 university of ch...
  • 23 篇 school of econom...
  • 22 篇 school of softwa...
  • 21 篇 engineering rese...
  • 21 篇 guangxi cooperat...

作者

  • 127 篇 hai jin
  • 122 篇 jin hai
  • 43 篇 xiaofei liao
  • 42 篇 li jianxin
  • 41 篇 peng hao
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 corianò claudio
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 21 篇 yu philip s.
  • 20 篇 xiwang dong
  • 20 篇 zhang ren
  • 20 篇 zhao weisheng
  • 19 篇 qingdong li
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 16 篇 lionetti stefano
  • 15 篇 li qian

语言

  • 1,462 篇 英文
  • 120 篇 其他
  • 35 篇 中文
检索条件"机构=Big Data Computing Center"
1597 条 记 录,以下是111-120 订阅
排序:
Cooperative differential games guidance laws for multiple attackers against an active defense target
收藏 引用
Chinese Journal of Aeronautics 2022年 第5期35卷 374-389页
作者: Fei LIU Xiwang DONG Qingdong LI Zhang REN School of Automation Science and Electrical Engineering Science and Technology on Aircraft Control LaboratoryBeihang UniversityBeijing 100083China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang UniversityBeijing 100083China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education of ChinaChongqing UniversityChongqing 400044China
This paper is concerned with a scenario of multiple attackers trying to intercept a target with active *** types of agents are considered in the guidance:The multiple attackers,the target and the defender,where the at... 详细信息
来源: 评论
Multi-scale cyclical similarity prototype refinement for few-shot breast ultrasound image segmentation  17
Multi-scale cyclical similarity prototype refinement for few...
收藏 引用
17th IEEE International Conference on Signal Processing, ICSP 2024
作者: Ou, Yingfeng Yang, Xing Zhang, Jian Jian, Caiqing Wang, Lihui College of Computer Science and Technology Guizhou University Key Laboratory of Intelligent Medical Image Analysis and Precise Diagnosis of Guizhou Province State Key Laboratory of Public Big Data Engineering Research Center of Text Computing Ministry of Education Guiyang China
Few-shot learning based methods can address the reliance on large-scale labeled samples in current breast tumor segmentation. However, previous methods typically rely on a few support samples to extract abstract, coar... 详细信息
来源: 评论
CLDG: Contrastive Learning on Dynamic Graphs  39
CLDG: Contrastive Learning on Dynamic Graphs
收藏 引用
39th IEEE International Conference on data Engineering, ICDE 2023
作者: Xu, Yiming Shi, Bin Ma, Teng Dong, Bo Zhou, Haoyi Zheng, Qinghua Xi'an Jiaotong University Department of Computer Science and Technology China Xi'an Jiaotong University Shaanxi Provincial Key Laboratory of Big Data Knowledge Engineering China Xi'an Jiaotong University Department of Distance Education China Beihang University School of Software China Beihang University Advanced Innovation Center for Big Data and Brain Computing China
The graph with complex annotations is the most potent data type, whose constantly evolving motivates further exploration of the unsupervised dynamic graph representation. One of the representative paradigms is graph c... 详细信息
来源: 评论
An Efficient Graph Accelerator with Distributed On-Chip Memory Hierarchy  22nd
An Efficient Graph Accelerator with Distributed On-Chip Mem...
收藏 引用
22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022
作者: Zheng, Ran Jiang, Yingxin Wang, Yibo Su, Yongbo Zheng, Long Yao, Pengcheng Liao, Xiaofei Jin, Hai National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
Graph processing has evolved and expanded swiftly with artificial intelligence and big data technology. High-Bandwidth Memory (HBM), which delivers terabyte-level memory bandwidth, has opened up new development possib... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Clause-level Relationship-aware Math Word Problems Solver
收藏 引用
Machine Intelligence Research 2022年 第5期19卷 425-438页
作者: Chang-Yang Wu Xin Lin Zhen-Ya Huang Yu Yin Jia-Yu Liu Qi Liu Gang Zhou Anhui Province Key Laboratory of Big Data Analysis and Application School of Data ScienceUniversity of Science and Technology of ChinaHefei 230026China Institute of Artificial Intelligence Hefei Comprehensive National Science CenterHefei 230088China Laboratory of Mathematical Engineering and Advanced Computing Information Engineering UniversityZhengzhou 450001China
Automatically solving math word problems,which involves comprehension,cognition,and reasoning,is a crucial issue in artificial intelligence *** math word problem solvers mainly work on word-level relationship extracti... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
A Fine-Grained Anomaly Detection Method Fusing Isolation Forest and Knowledge Graph Reasoning  19th
A Fine-Grained Anomaly Detection Method Fusing Isolation For...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Xu, Jie Zhou, Jiantao College of Computer Science Engineering Research Center of Ecological Big Data Ministry of Education National and Local Joint Engineering Research Center of Mongolian Intelligent Information Processing Technology Inner Mongolia Cloud Computing and Service Software Engineering Laboratory Inner Mongolia Social Computing and Data Processing Key Laboratory Inner Mongolia Discipline Inspection and Supervision Big Data Key Laboratory Inner Mongolia Big Data Analysis Technology Engineering Laboratory Inner Mongolia University Hohhot China
Anomaly detection aims to find outliers data that do not conform to expected behaviors in a specific scenario, which is indispensable and critical in current safety environments related studies. However, when performi... 详细信息
来源: 评论
RAGRAPH: A General Retrieval-Augmented Graph Learning Framework  38
RAGRAPH: A General Retrieval-Augmented Graph Learning Framew...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Jiang, Xinke Qiu, Rihong Xu, Yongxin Zhang, Wentao Zhu, Yichen Zhang, Ruizhe Fang, Yuchen Chu, Xu Zhao, Junfeng Wang, Yasha School of Computer Science Peking University China University of Electronic Science and Technology of China China Center on Frontiers of Computing Studies Peking University Beijing China Big Data Technology Research Center Nanhu Laboratory Jiaxing China Peking University Information Technology Institute Binhai Tianjin China
Graph Neural Networks (GNNs) have become essential in interpreting relational data across various domains, yet, they often struggle to generalize to unseen graph data that differs markedly from training instances. In ...
来源: 评论
Discovering All-chain Set with Direction and Graduality Characteristics over Streaming Time Series  19
Discovering All-chain Set with Direction and Graduality Char...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Wang, Shaopeng Feng, Chunkai Inner Mongolia University Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Inner Mongolia Discipline Inspection and Supervision Big Data Laboratory Department of Software Engineering Hohhot China
Since its introduction over five years ago, time series chain has become a fundamental tool for time series analytics, finding diverse uses in dozens of domains. Recent work has generalized the definition of time seri... 详细信息
来源: 评论