咨询与建议

限定检索结果

文献类型

  • 806 篇 会议
  • 791 篇 期刊文献

馆藏范围

  • 1,597 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 985 篇 工学
    • 708 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 196 篇 信息与通信工程
    • 135 篇 生物工程
    • 115 篇 电气工程
    • 114 篇 控制科学与工程
    • 89 篇 电子科学与技术(可...
    • 85 篇 光学工程
    • 79 篇 生物医学工程(可授...
    • 62 篇 机械工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 38 篇 交通运输工程
    • 33 篇 建筑学
    • 33 篇 土木工程
  • 605 篇 理学
    • 310 篇 数学
    • 170 篇 物理学
    • 151 篇 生物学
    • 98 篇 统计学(可授理学、...
    • 49 篇 化学
    • 49 篇 系统科学
    • 41 篇 地球物理学
  • 246 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 49 篇 工商管理
  • 63 篇 医学
    • 53 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
  • 49 篇 法学
    • 39 篇 社会学
  • 21 篇 经济学
  • 15 篇 农学
  • 7 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 63 篇 feature extracti...
  • 58 篇 semantics
  • 47 篇 training
  • 45 篇 computational mo...
  • 37 篇 deep learning
  • 37 篇 machine learning
  • 35 篇 graph neural net...
  • 35 篇 accuracy
  • 34 篇 predictive model...
  • 34 篇 data models
  • 25 篇 convolution
  • 24 篇 task analysis
  • 23 篇 image segmentati...
  • 22 篇 federated learni...
  • 19 篇 deep neural netw...
  • 19 篇 neural networks
  • 18 篇 memory managemen...
  • 18 篇 cloud computing
  • 17 篇 data mining
  • 16 篇 topology

机构

  • 214 篇 beijing advanced...
  • 102 篇 national enginee...
  • 66 篇 school of comput...
  • 63 篇 beijing advanced...
  • 58 篇 shandong provinc...
  • 53 篇 school of cyber ...
  • 50 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 40 篇 national enginee...
  • 39 篇 school of comput...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 27 篇 huazhong univers...
  • 23 篇 university of ch...
  • 23 篇 school of econom...
  • 22 篇 school of softwa...
  • 21 篇 engineering rese...
  • 21 篇 guangxi cooperat...

作者

  • 127 篇 hai jin
  • 122 篇 jin hai
  • 43 篇 xiaofei liao
  • 42 篇 li jianxin
  • 41 篇 peng hao
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 corianò claudio
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 21 篇 yu philip s.
  • 20 篇 xiwang dong
  • 20 篇 zhang ren
  • 20 篇 zhao weisheng
  • 19 篇 qingdong li
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 16 篇 lionetti stefano
  • 15 篇 li qian

语言

  • 1,462 篇 英文
  • 120 篇 其他
  • 35 篇 中文
检索条件"机构=Big Data Computing Center"
1597 条 记 录,以下是151-160 订阅
排序:
RGraph: Asynchronous graph processing based on asymmetry of remote direct memory access
RGraph: Asynchronous graph processing based on asymmetry of ...
收藏 引用
作者: Chen, Hanhua Yuan, Jie Jin, Hai Wang, Yonghui Wu, Sijie Jiang, Zhihao National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
The scale of real-world graphs is constantly growing. To deal with large-scale graphs, distributed graph processing has attracted much research efforts. Existing distributed graph processing systems are commonly built... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
MedX-Net: Hierarchical Transformer with Large Kernel Convolutions for 3D Medical Image Segmentation
MedX-Net: Hierarchical Transformer with Large Kernel Convolu...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Lin Zou, Qingzhi Key Laboratory of Computing Power Network and Information Se-curity Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Due to the exceptional performance of Transform-ers in 2D medical image segmentation, recent work has also introduced them into 3D medical segmentation tasks. For instance, Swin UNETR and other hierarchical Transforme... 详细信息
来源: 评论
Semantic Reasoning Technology on Temporal Knowledge Graph  19th
Semantic Reasoning Technology on Temporal Knowledge Graph
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Li, Jianuo Zhao, Feng Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Semantic reasoning techniques based on knowledge graphs have been widely studied since they were proposed. Previous studies are mostly based on closed-world assumptions, which cannot reason about unknown facts. To thi... 详细信息
来源: 评论
Commonsense Knowledge Construction with Concept and Pretrained Model  19th
Commonsense Knowledge Construction with Concept and Pretrain...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Cai, Hanjun Zhao, Feng Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Commonsense knowledge (CSK) is the information that people use in daily life but do not often mention. It summarizes the practical knowledge about how the world works. Existing machines have knowledge but lack commons... 详细信息
来源: 评论
Multi-Stage Bidirectional Cross-Attention Model for Predicting Prognosis in Multiple Peritoneum Lesions with Clinical Information  22
Multi-Stage Bidirectional Cross-Attention Model for Predicti...
收藏 引用
22nd IEEE International Symposium on Biomedical Imaging, ISBI 2025
作者: Li, Haoshen Cai, Jieyuan Wei, Yiyuan Chen, Zifan Chen, Heyun Zhao, Jie Shi, Yanjie Dong, Bin Tang, Lei Zhang, Xiaotian Zhang, Li Center for Data Science Peking University China Peking University Cancer Hospital & Institute China Peking University National Engineering Laboratory for Big Data Analysis and Applications China Beijing International Center for Mathematical Research Peking University China Center for Machine Learning Research Peking University China Peking University Changsha Institute for Computing and Digital Economy China
Peritoneal metastasis occurs when cancer cells spread from the primary tumor to the peritoneum, leading to morphological alterations that significantly impact patient survival. The specific changes across multiple per... 详细信息
来源: 评论
Meta-CQG: A Meta-Learning Framework for Complex Question Generation over Knowledge Bases  29
Meta-CQG: A Meta-Learning Framework for Complex Question Gen...
收藏 引用
29th International Conference on Computational Linguistics, COLING 2022
作者: Zhang, Kun Qiu, Yunqi Wang, Yuanzhuo Bai, Long Li, Wei Jiang, Xuhui Shen, Huawei Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China Big Data Academy Zhongke Baidu Inc
Complex question generation over knowledge bases (KB) aims to generate natural language questions involving multiple KB relations or functional constraints. Existing methods train one encoder-decoder-based model to fi... 详细信息
来源: 评论
Maverick: Personalized Edge-Assisted Federated Learning with Contrastive Training  25
Maverick: Personalized Edge-Assisted Federated Learning with...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Wang, Kaibin He, Qiang Dong, Zeqian Chen, Rui He, Chuan Chua, Caslon Chen, Feifei Yang, Yun Swinburne University of Technology Melbourne Australia Huazhong University of Science and Technology Wuhan China Deakin University Melbourne Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
In an edge-assisted federated learning (FL) system, edge servers aggregate the local models from the clients within their coverage areas to produce intermediate models for the production of the global model. This sign... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
SaGraph: A Similarity-Aware Hardware Accelerator for Temporal Graph Processing  23
SaGraph: A Similarity-Aware Hardware Accelerator for Tempora...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Jin Zhao Yu Zhang Jian Cheng Yiyang Wu Chuyue Ye Hui Yu Zhiying Huang Hai Jin Xiaofei Liao Lin Gu Haikun Liu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China and Zhejiang-HUST Joint Research Center for Graph Processing Zhejiang Lab Hangzhou China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China
Temporal graph processing is used to handle the snapshots of the temporal graph, which concerns changes in graph over time. Although several software/hardware solutions have been designed for efficient temporal graph ...
来源: 评论