咨询与建议

限定检索结果

文献类型

  • 374 篇 期刊文献
  • 331 篇 会议

馆藏范围

  • 705 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 429 篇 工学
    • 303 篇 计算机科学与技术...
    • 250 篇 软件工程
    • 103 篇 信息与通信工程
    • 61 篇 电气工程
    • 56 篇 生物工程
    • 53 篇 控制科学与工程
    • 33 篇 机械工程
    • 33 篇 电子科学与技术(可...
    • 31 篇 光学工程
    • 28 篇 交通运输工程
    • 23 篇 生物医学工程(可授...
    • 22 篇 化学工程与技术
    • 14 篇 网络空间安全
    • 12 篇 材料科学与工程(可...
    • 12 篇 土木工程
  • 249 篇 理学
    • 121 篇 数学
    • 76 篇 生物学
    • 48 篇 物理学
    • 37 篇 统计学(可授理学、...
    • 21 篇 化学
    • 16 篇 系统科学
    • 12 篇 大气科学
  • 110 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 24 篇 医学
    • 18 篇 基础医学(可授医学...
    • 17 篇 临床医学
    • 12 篇 药学(可授医学、理...
  • 22 篇 法学
    • 17 篇 社会学
  • 13 篇 农学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 25 篇 feature extracti...
  • 22 篇 training
  • 16 篇 semantics
  • 16 篇 accuracy
  • 15 篇 deep learning
  • 14 篇 computational mo...
  • 13 篇 machine learning
  • 12 篇 predictive model...
  • 11 篇 object detection
  • 11 篇 signal processin...
  • 11 篇 robustness
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 adaptation model...
  • 9 篇 deep neural netw...
  • 9 篇 task analysis
  • 9 篇 visualization
  • 9 篇 biological syste...
  • 8 篇 face recognition
  • 8 篇 convolution

机构

  • 135 篇 national enginee...
  • 74 篇 college of compu...
  • 58 篇 hubei key labora...
  • 47 篇 school of cyber ...
  • 44 篇 school of comput...
  • 30 篇 national enginee...
  • 28 篇 shenzhen univers...
  • 27 篇 hubei key labora...
  • 27 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 20 篇 school of softwa...
  • 18 篇 shenzhen institu...
  • 17 篇 school of inform...
  • 16 篇 huazhong univers...
  • 15 篇 huazhong univers...
  • 15 篇 guangdong provin...
  • 14 篇 hubei province k...
  • 14 篇 big data science...
  • 13 篇 college of big d...

作者

  • 40 篇 jin hai
  • 38 篇 shen linlin
  • 36 篇 hai jin
  • 24 篇 li jianqiang
  • 19 篇 hu shengshan
  • 17 篇 linlin shen
  • 16 篇 zhou pan
  • 15 篇 zhang leo yu
  • 15 篇 jianqiang li
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang jinbao
  • 10 篇 gao can
  • 10 篇 wang haoyu
  • 10 篇 deng xianjun
  • 9 篇 long zheng
  • 9 篇 zou deqing
  • 9 篇 zhang zhe
  • 9 篇 jie chen
  • 8 篇 ji junkai

语言

  • 648 篇 英文
  • 50 篇 其他
  • 6 篇 中文
检索条件"机构=Big Data Technology and System Laboratory"
705 条 记 录,以下是401-410 订阅
排序:
Estimating the value of a statistical life in China: A contingent valuation study in six representative cities
收藏 引用
Chinese Journal of Population,Resources and Environment 2023年 第4期21卷 269-278页
作者: Chaoji Cao Xinke Song Wenjia Cai Yichao Li Jianhui Cong Xueying Yu Mengzhao Gao Can Wang Ministry of Education Key Laboratory for Earth System Modeling Department of Earth System ScienceTsinghua UniversityBeijing100084China Center for Healthy Cities Institute for China Sustainable UrbanizationTsinghua UniversityBeijing100084China Tsinghua Urban Institute Tsinghua UniversityBeijing100084China State Key Joint Laboratory of Environment Simulation and Pollution Control School of EnvironmentTsinghua UniversityBeijing100084China Center for Statistical Science Tsinghua UniversityBeijing100084China Department of Industrial Engineering Tsinghua UniversityBeijing100084China School of Economics and Management Shanxi UniversityTaiyuan030000China School of Economics and Management Beihang UniversityBeijing100191China Beijing Advanced Innovation Center for Big Data-based Precision Medicine Beihang UniversityBeijing100191China Key Laboratory of Big Data-Based Precision Medicine(Beihang University) Ministry of Industry and Information TechnologyBeijing100191China
The value of a statistical life(VSL)is a crucial tool for monetizing health *** explore the VSL in China,this study examines people’s willingness to pay(WTP)to reduce death risk from air pollution in six representati... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Query-Centered Temporal Community Search via Time-Constrained Personalized PageRank
arXiv
收藏 引用
arXiv 2023年
作者: Lin, Longlong Yuan, Pingpeng Li, Rong-Hua Zhu, Chunxue Qin, Hongchao Jin, Hai Jia, Tao College of Computer and Information Science Southwest University Chongqing400715 China National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technololgy Beijing Institute of Technology Beijing100081 China
Existing temporal community search suffers from two defects: (i) they ignore the temporal proximity between the query vertex q and other vertices but simply require the result to include q. Thus, they find many tempor... 详细信息
来源: 评论
IBATree: A Novel Method for Interpretable Cancer Cell Diagnosis Using Information Bottleneck Attribution
IBATree: A Novel Method for Interpretable Cancer Cell Diagno...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Muhammad Umair Raza Jie Chen Adil Nawaz Faisal Saeed Victor C.M. Leung Jianqiang Li Zhaoxia Wang College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Gastroenterology Shenzhen Children’s Hospital China
Deep Neural Networks (DNNs) have demonstrated remarkable performance in classification and regression tasks on RGB-based pathological inputs. The network’s prediction mechanism must be interpretable to establish trus... 详细信息
来源: 评论
Improving QoS of Workloads with CPU Pinning: A Deep Reinforcement Learning Approach
Improving QoS of Workloads with CPU Pinning: A Deep Reinforc...
收藏 引用
International Workshop on Quality of Service
作者: Xi Tao Weipeng Cao Yinghui Pan Ye Liu Zhong Ming Guangdong Laboratory of Artificial Intelligence and Digital Economy (Shenzhen) Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
In cloud computing, tenants tend to select predefined flavors with substantial resources that go beyond their needs, in order to avoid resource starvation. As a result, cloud service providers experience a high alloca... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Last-X-Generation Archiving Strategy for Multi-Objective Evolutionary Algorithms
Last-X-Generation Archiving Strategy for Multi-Objective Evo...
收藏 引用
Congress on Evolutionary Computation
作者: Tianye Shu Yang Nan Ke Shang Hisao Ishibuchi Department of Computer Science and Engineering Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Southern University of Science and Technology Shenzhen China Southern University of Science and Technology Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
For evolutionary multi-objective optimization algorithms (EMOAs), an external archive can be utilized for saving good solutions found throughout the evolutionary process. Recent studies showed that a solution set sele... 详细信息
来源: 评论
QoS Perception for Cloud databases: Necessity, Trends, and Challenges
QoS Perception for Cloud Databases: Necessity, Trends, and C...
收藏 引用
International Workshop on Quality of Service
作者: Weipeng Cao Xi Tao Yinghui Pan Ye Liu Zhong Ming Guangdong Laboratory of Artificial Intelligence and Digital Economy (Shenzhen) Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
The advantages of resource elasticity and proactive data backup in cloud databases have attracted a large number of users to consider deploying their IT systems in the cloud. Factors such as performance, reliability, ... 详细信息
来源: 评论
Quantitative monitoring of sugarcane typhoon disaster based on multi-source remote sensing data  3
Quantitative monitoring of sugarcane typhoon disaster based ...
收藏 引用
3rd International Conference on Geology, Mapping and Remote Sensing, ICGMRS 2022
作者: Qian, Lisha Chen, Shuisen Jiang, Hao Dai, Xuemei Jia, Kai Guangzhou Institute of Geography Guangdong Academy of Sciences Key Lab of Guangdong for Utilization of Remote Sensing and Geographical Information System Guangdong Open Laboratory of Geospatial Information Technology and Application Res. Center of Guangdong Province for Engineering Technology Application of Remote Sensing Big Data Guangzhou China Shaoguan ShenBay Low Carbon Digital Technology Co. Ltd. Guangdong Shaoguan China Guangzhou Institute of Geochemistry Chinese Academy of Sciences Guangzhou China University of Chinese Academy of Sciences Beijing China
With a foreseen increase in the number of agrometeorological disasters due to climate change, especially in the field of crop lodging. This paper presented an innovative monitoring technique to explore the application... 详细信息
来源: 评论
You Can Ground Earlier than See: An Effective and Efficient Pipeline for Temporal Sentence Grounding in Compressed Videos
You Can Ground Earlier than See: An Effective and Efficient ...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiang Fang Daizong Liu Pan Zhou Guoshun Nan Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Peking University Beijing University of Posts and Telecommunications
Given an untrimmed video, temporal sentence grounding (TSG) aims to locate a target moment semantically according to a sentence query. Although previous respectable works have made decent success, they only focus on h...
来源: 评论