咨询与建议

限定检索结果

文献类型

  • 432 篇 期刊文献
  • 254 篇 会议

馆藏范围

  • 686 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 498 篇 工学
    • 364 篇 计算机科学与技术...
    • 306 篇 软件工程
    • 110 篇 信息与通信工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 生物工程
    • 73 篇 电气工程
    • 61 篇 控制科学与工程
    • 55 篇 光学工程
    • 51 篇 电子科学与技术(可...
    • 32 篇 机械工程
    • 31 篇 仪器科学与技术
    • 23 篇 化学工程与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 建筑学
    • 17 篇 土木工程
    • 14 篇 交通运输工程
  • 288 篇 理学
    • 121 篇 数学
    • 113 篇 生物学
    • 66 篇 物理学
    • 48 篇 统计学(可授理学、...
    • 27 篇 化学
    • 21 篇 系统科学
  • 144 篇 管理学
    • 83 篇 管理科学与工程(可...
    • 57 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 82 篇 医学
    • 71 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
    • 27 篇 公共卫生与预防医...
  • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
  • 14 篇 教育学
  • 7 篇 经济学
  • 4 篇 艺术学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 26 篇 deep learning
  • 19 篇 machine learning
  • 15 篇 big data
  • 13 篇 graph neural net...
  • 13 篇 artificial intel...
  • 11 篇 accuracy
  • 11 篇 data models
  • 11 篇 training
  • 9 篇 internet of thin...
  • 9 篇 optimization
  • 9 篇 feature extracti...
  • 9 篇 forecasting
  • 8 篇 predictive model...
  • 8 篇 semantics
  • 7 篇 reinforcement le...
  • 7 篇 image segmentati...
  • 7 篇 computational mo...
  • 7 篇 sentiment analys...
  • 7 篇 federated learni...
  • 6 篇 object detection

机构

  • 34 篇 beijing advanced...
  • 18 篇 national enginee...
  • 15 篇 department of co...
  • 15 篇 school of comput...
  • 14 篇 school of comput...
  • 12 篇 innovation cente...
  • 11 篇 innovation cente...
  • 11 篇 school of cyber ...
  • 10 篇 department of el...
  • 9 篇 the department o...
  • 8 篇 department of in...
  • 8 篇 big data researc...
  • 8 篇 university of ch...
  • 8 篇 school of scienc...
  • 8 篇 college of compu...
  • 8 篇 shenzhen researc...
  • 7 篇 the purple mount...
  • 7 篇 computer network...
  • 7 篇 national demonst...
  • 7 篇 department of el...

作者

  • 24 篇 jin hai
  • 21 篇 peng hao
  • 19 篇 hai jin
  • 18 篇 chien ting-ying
  • 15 篇 li jianxin
  • 15 篇 zhou pan
  • 13 篇 zhang rui
  • 13 篇 yu philip s.
  • 11 篇 yu liang-chih
  • 11 篇 wu tsu-yang
  • 11 篇 zeng yong
  • 10 篇 chen chien-ming
  • 10 篇 pan jeng-shyang
  • 10 篇 he lifang
  • 9 篇 ting hsien-wei
  • 9 篇 jin shi
  • 9 篇 qiu robert
  • 8 篇 lai k. robert
  • 8 篇 wang king-hang
  • 8 篇 li kang

语言

  • 627 篇 英文
  • 53 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Experience Center and Department of Computer Engineering"
686 条 记 录,以下是111-120 订阅
排序:
Ethereum smart contract security research:survey and future research opportunities
收藏 引用
Frontiers of computer Science 2021年 第2期15卷 143-160页
作者: Zeli WANG Hai JIN Weiqi DAI Kim-Kwang Raymond CHOO Deqing ZOU National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabClusters and Grid Computing LabHubei Engineering Research Center on Big Data SecurityWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Blockchain has recently emerged as a research trend,with potential applications in a broad range of industries and *** particular successful Blockchain technology is smart contract,which is widely used in commercial s... 详细信息
来源: 评论
Efficient Hardware Redo Logging for Secure Persistent Memory  23
Efficient Hardware Redo Logging for Secure Persistent Memory
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Zhan Yue, Jianhui Liao, Xiaofei Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China Michigan Technological University Computer Science Department HoughtonMI United States
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and data security for persistent memory (PM). The encryption/decryption of both data and log requests increase the memory ... 详细信息
来源: 评论
Expedited Block Transmission in Blockchain Network by using Clusters
Expedited Block Transmission in Blockchain Network by using ...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Hua, Xiaoqi Chen, Jian Zhang, Peiyun Fu, Zhangjie Zhu, Haibin Lu, Kezhong Ren, Jigang School of Software Nanjing University of Information Science and Technology Nanjing210044 China Engineering Research Center of Digital Forensics of Ministry of Education The School of Computer Science Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science Nanjing University of Information Science and Technology Nanjing210044 China Nipissing University Department of Computer Science and Mathematics North BayONP1B 8L7 Canada School of Big Data and Artificial Intelligence Chizhou University Chizhou247000 China
Blockchain technology has garnered increasing attention from researchers. Because blockchain systems may contain malicious or spatially limited nodes that may delay block verification and reduce block transmission rat... 详细信息
来源: 评论
PSMiner: A Pattern-Aware Accelerator for High-Performance Streaming Graph Pattern Mining  23
PSMiner: A Pattern-Aware Accelerator for High-Performance St...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Hao Qi Yu Zhang Ligang He Kang Luo Jun Huang Haoyu Lu Jin Zhao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China and Zhejiang-HUST Joint Research Center for Graph Processing Zhejiang Lab China Department of Computer Science University of Warwick United Kingdom
Streaming Graph Pattern Mining (GPM) has been widely used in many application fields. However, the existing streaming GPM solution suffers from many unnecessary explorations and isomorphism tests, while the existing s...
来源: 评论
An Overview of Calibration Technology of Industrial Robots
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第1期8卷 23-36页
作者: Zhibin Li Shuai Li Xin Luo the School of Computer Science and Technology Dongguan University of TechnologyDongguanGuangdong 523808 the School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing 400065China the Department of Electronics and Electrical Engineering Swansea UniversitySwansea SA18EN the Hengrui(Chongqing)Artificial Intelligence Research Center Department of Big Data Analyses TechniquesCloudwalkChongqing 401331China the Department of Electronics and Electrical Engineering Swansea UniversitySwansea SA18ENUK
With the continuous improvement of automation,industrial robots have become an indispensable part of automated production *** widely used in a number of industrial production activities,such as spraying,welding,handli... 详细信息
来源: 评论
Energy-efficient and Privacy-preserving Edge Intelligence for 6G-Empowered Intelligent Transportation Systems
收藏 引用
IEEE Network 2025年
作者: Zhu, Chenlu Fan, Xiaoxuan Deng, Xianjun Xiao, Ziheng Guo, Tingting Liu, Shenghao Sun, Jiaqi Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Kedao Geographic Information Engineering Co. Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea Republic of
6G-empowered Intelligent Transportation Systems (ITS) generate large amounts of data through millions of devices and sensors at the terminal and network edge. Edge intelligence advances the frontier of data-driven art... 详细信息
来源: 评论
Exploring the Potential of Large Vision-Language Models for Unsupervised Text-Based Person Retrieval  39
Exploring the Potential of Large Vision-Language Models for ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Zongyi Jianbo, Li Shi, Yuxuan Chen, Jiazhong Huang, Shijuan Tu, Linnan Shen, Fei Ling, Hefei Department of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center of Educational Big Data The Faculty of Artificial Intelligence in Education Central China Normal University China Nanjing University of Science and Technology China
The aim of text-based person retrieval is to identify pedestrians using natural language descriptions within a large-scale image gallery. Traditional methods rely heavily on manually annotated image-text pairs, which ... 详细信息
来源: 评论
Self-training through Classifier Disagreement for Cross-Domain Opinion Target Extraction
arXiv
收藏 引用
arXiv 2023年
作者: Sun, Kai Zhang, Richong Mensah, Samuel Aletras, Nikolaos Mao, Yongyi Liu, Xudong Beijing Advanced Innovation Center for Big Data and Brain Computing School of Computer Science and Engineering Beihang University Beijing China Department of Computer Science University of Sheffield Sheffield United Kingdom School of Electrical Engineering and Computer Science University of Ottawa Ottawa Canada
Opinion target extraction (OTE) or aspect extraction (AE) is a fundamental task in opinion mining that aims to extract the targets (or aspects) on which opinions have been expressed. Recent work focus on cross-domain ... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
Container lifecycle-aware scheduling for serverless computing
Container lifecycle-aware scheduling for serverless computin...
收藏 引用
作者: Wu, Song Tao, Zhiheng Fan, Hao Huang, Zhuo Zhang, Xinmin Jin, Hai Yu, Chen Cao, Chun National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Elastic scaling in response to changes on demand is a main benefit of serverless computing. When bursty workloads arrive, a serverless platform launches many new containers and initializes function environments (known... 详细信息
来源: 评论