咨询与建议

限定检索结果

文献类型

  • 806 篇 会议
  • 791 篇 期刊文献

馆藏范围

  • 1,597 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 985 篇 工学
    • 708 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 196 篇 信息与通信工程
    • 135 篇 生物工程
    • 115 篇 电气工程
    • 114 篇 控制科学与工程
    • 89 篇 电子科学与技术(可...
    • 85 篇 光学工程
    • 79 篇 生物医学工程(可授...
    • 62 篇 机械工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
    • 39 篇 仪器科学与技术
    • 38 篇 交通运输工程
    • 33 篇 建筑学
    • 33 篇 土木工程
  • 605 篇 理学
    • 310 篇 数学
    • 170 篇 物理学
    • 151 篇 生物学
    • 98 篇 统计学(可授理学、...
    • 49 篇 化学
    • 49 篇 系统科学
    • 41 篇 地球物理学
  • 246 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 49 篇 工商管理
  • 63 篇 医学
    • 53 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
  • 49 篇 法学
    • 39 篇 社会学
  • 21 篇 经济学
  • 15 篇 农学
  • 7 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 63 篇 feature extracti...
  • 58 篇 semantics
  • 47 篇 training
  • 45 篇 computational mo...
  • 37 篇 deep learning
  • 37 篇 machine learning
  • 35 篇 graph neural net...
  • 35 篇 accuracy
  • 34 篇 predictive model...
  • 34 篇 data models
  • 25 篇 convolution
  • 24 篇 task analysis
  • 23 篇 image segmentati...
  • 22 篇 federated learni...
  • 19 篇 deep neural netw...
  • 19 篇 neural networks
  • 18 篇 memory managemen...
  • 18 篇 cloud computing
  • 17 篇 data mining
  • 16 篇 topology

机构

  • 214 篇 beijing advanced...
  • 102 篇 national enginee...
  • 66 篇 school of comput...
  • 63 篇 beijing advanced...
  • 58 篇 shandong provinc...
  • 53 篇 school of cyber ...
  • 50 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 40 篇 national enginee...
  • 39 篇 school of comput...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 27 篇 huazhong univers...
  • 23 篇 university of ch...
  • 23 篇 school of econom...
  • 22 篇 school of softwa...
  • 21 篇 engineering rese...
  • 21 篇 guangxi cooperat...

作者

  • 127 篇 hai jin
  • 122 篇 jin hai
  • 43 篇 xiaofei liao
  • 42 篇 li jianxin
  • 41 篇 peng hao
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 corianò claudio
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 21 篇 yu philip s.
  • 20 篇 xiwang dong
  • 20 篇 zhang ren
  • 20 篇 zhao weisheng
  • 19 篇 qingdong li
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 16 篇 lionetti stefano
  • 15 篇 li qian

语言

  • 1,462 篇 英文
  • 120 篇 其他
  • 35 篇 中文
检索条件"机构=Big Data Computing Center"
1597 条 记 录,以下是81-90 订阅
排序:
POINE2: Improving Poincaré Embeddings for Hierarchy-Aware Complex Query Reasoning over Knowledge Graphs  26
POINE2: Improving Poincaré Embeddings for Hierarchy-Aware C...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Liu, Junnan Mao, Qianren Li, Jianxin Fu, Xingcheng Wang, Zheng School of Computer Science and Engineering Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing Beijing China Zhongguancun Laboratory Beijing China The School of Computing University of Leeds United Kingdom
Reasoning complex logical queries on incomplete and massive knowledge graphs (KGs) remains a significant challenge. The prevailing method for this problem is query embedding, which embeds KG units (i.e., entities and ... 详细信息
来源: 评论
Large Language Model Based on Full-Text Retrieval for Temporal Knowledge Q&A Approach
Large Language Model Based on Full-Text Retrieval for Tempor...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Zhidong Li Licai Wang Qibin Luo Silong Qiao Big data research and development center North China Institute of Computing Technology Beijing China
Knowledge Q&A is one of the hot research topics in the field of natural language processing, and temporal knowledge Q&A is a difficult area of Q&A reasoning because it also needs to consider the temporal r... 详细信息
来源: 评论
Legal Event Detection Model Based on ERNIE 3.0-CRF and Ensemble Learning
Legal Event Detection Model Based on ERNIE 3.0-CRF and Ensem...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Siyu Wang Licai Wang Ke Zhang Big data research and development center North China Institute of Computing Technology Beijing China
Recognizing events is a prerequisite for making judgments, so discovering events in legal documents is important for the analysis of legal case. Legal Event Detection aims to extract legal event trigger words from leg... 详细信息
来源: 评论
Blockchain-Based Multi-Cloud data Storage System Disaster Recovery
Blockchain-Based Multi-Cloud Data Storage System Disaster Re...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Wang, Feiyu Zhou, Jian-Tao College of Computer Science Inner Mongolia University Inner Mongolia Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
Cloud storage services have been used by most businesses and individual users. However, data loss, service interruptions and cyber attacks often lead to cloud storage services not being provided properly, and these in...
来源: 评论
RIF-Proto: A Few-Shot Relation Extraction for Prototype Networks Based on Relational Information Features
RIF-Proto: A Few-Shot Relation Extraction for Prototype Netw...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Shuai Zhang Licai Wang Yangchen Huang Big data research and development center North China Institute of Computing Technology Beijing China
Relation extraction stands as a core task within the realm of information extraction, focusing on identifying the target relations between entities in text. While traditional relation extraction has been extensively r... 详细信息
来源: 评论
BMDP:Blockchain-Based Multi-Cloud Storage data Provenance  26
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Wang, Feiyu Zhou, Jian-Tao Guo, Xu Inner Mongolia University College of Computer Science Inner Mongolia Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software China
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challe... 详细信息
来源: 评论
Fast Parallel Recovery for Transactional Stream Processing on Multicores  40
Fast Parallel Recovery for Transactional Stream Processing o...
收藏 引用
40th IEEE International Conference on data Engineering, ICDE 2024
作者: Zhao, Jianjun Liu, Haikun Zhang, Shuhao Duan, Zhuohui Liao, Xiaofei Jin, Hai Zhang, Yu School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Engineering Nanyang Technological University Singapore
Transactional stream processing engines (TSPEs) have gained increasing attention due to their capability of processing real-time stream applications with transactional semantics. However, TSPEs remain susceptible to s... 详细信息
来源: 评论
Analysis on n-level quantum systems by means of a coordinate transformation  63
Analysis on n-level quantum systems by means of a coordinate...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Xu, Huilong Miao, Zibo Gao, Qing Harbin Institute of Technology School of Mechanical Engineering and Automation Shenzhen518055 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University School of Automation Science and Electrical Engineering Beijing100191 China
The structural decomposition of two-level quantum systems has recently been established, related to various applications in quantum information science. As an extension to previous work on two-level quantum systems, t... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论