咨询与建议

限定检索结果

文献类型

  • 358 篇 期刊文献
  • 328 篇 会议

馆藏范围

  • 686 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 416 篇 工学
    • 295 篇 计算机科学与技术...
    • 247 篇 软件工程
    • 95 篇 信息与通信工程
    • 56 篇 生物工程
    • 50 篇 电气工程
    • 49 篇 控制科学与工程
    • 33 篇 机械工程
    • 31 篇 光学工程
    • 27 篇 交通运输工程
    • 26 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 22 篇 化学工程与技术
    • 13 篇 网络空间安全
    • 12 篇 材料科学与工程(可...
    • 12 篇 土木工程
  • 242 篇 理学
    • 119 篇 数学
    • 74 篇 生物学
    • 48 篇 物理学
    • 36 篇 统计学(可授理学、...
    • 21 篇 化学
    • 16 篇 系统科学
  • 108 篇 管理学
    • 58 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 25 篇 医学
    • 19 篇 基础医学(可授医学...
    • 18 篇 临床医学
    • 12 篇 公共卫生与预防医...
    • 12 篇 药学(可授医学、理...
  • 21 篇 法学
    • 17 篇 社会学
  • 12 篇 农学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 25 篇 feature extracti...
  • 22 篇 training
  • 16 篇 semantics
  • 16 篇 accuracy
  • 14 篇 deep learning
  • 14 篇 computational mo...
  • 12 篇 machine learning
  • 11 篇 object detection
  • 11 篇 signal processin...
  • 11 篇 contrastive lear...
  • 11 篇 predictive model...
  • 11 篇 robustness
  • 10 篇 speech processin...
  • 10 篇 adaptation model...
  • 9 篇 deep neural netw...
  • 9 篇 task analysis
  • 9 篇 visualization
  • 8 篇 face recognition
  • 8 篇 convolution
  • 8 篇 codes

机构

  • 133 篇 national enginee...
  • 73 篇 college of compu...
  • 57 篇 hubei key labora...
  • 47 篇 school of cyber ...
  • 44 篇 school of comput...
  • 30 篇 national enginee...
  • 27 篇 hubei key labora...
  • 27 篇 hubei engineerin...
  • 27 篇 shenzhen univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 20 篇 school of softwa...
  • 18 篇 shenzhen institu...
  • 17 篇 school of inform...
  • 16 篇 huazhong univers...
  • 15 篇 guangdong provin...
  • 14 篇 huazhong univers...
  • 14 篇 college of big d...
  • 14 篇 hubei province k...
  • 14 篇 big data science...

作者

  • 40 篇 jin hai
  • 37 篇 shen linlin
  • 36 篇 hai jin
  • 23 篇 li jianqiang
  • 19 篇 hu shengshan
  • 16 篇 zhou pan
  • 16 篇 linlin shen
  • 15 篇 zhang leo yu
  • 15 篇 jianqiang li
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang jinbao
  • 10 篇 gao can
  • 10 篇 wang haoyu
  • 9 篇 long zheng
  • 9 篇 zhang zhe
  • 9 篇 jie chen
  • 9 篇 deng xianjun
  • 8 篇 ji junkai
  • 8 篇 lu songfeng

语言

  • 634 篇 英文
  • 46 篇 其他
  • 6 篇 中文
检索条件"机构=Big Data Technology and System Laboratory"
686 条 记 录,以下是61-70 订阅
排序:
Hyperspectral Remote Sensing Images Salient Object Detection: The First Benchmark dataset and Baseline
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Peifu Bai, Huiyan Xu, Tingfa Wang, Jihui Chen, Huan Li, Jianan Beijing Institute of Technology Beijing100081 China Key Laboratory of Photoelectronic Imaging Technology and System Ministry of Education of China Beijing100081 China Big Data and Artificial Intelligence Laboratory Beijing Institute of Technology Chongqing Innovation Center Chongqing401151 China
The objective of hyperspectral remote sensing image salient object detection (HRSI-SOD) is to identify objects or regions that exhibit distinct spectrum contrasts with the background. This area holds significant promi... 详细信息
来源: 评论
P3DC:Reducing DRAM Cache Hit Latency by Hybrid Mappings
收藏 引用
Journal of Computer Science & technology 2024年 第6期39卷 1341-1360页
作者: Ye Chi Ren-Tong Guo Xiao-Fei Liao Hai-Kun Liu Jianhui Yue National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Laboratory Wuhan 430074China Cluster and Grid Computing Laboratory Wuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China School of Big Data and Internet Shenzhen Technology UniversityShenzhen 518118China Department of Computer Science Michigan Technological UniversityHoughton 49931-1295U.S.A.
Die-stacked dynamic random access memory(DRAM)caches are increasingly advocated to bridge the performance gap between the on-chip cache and the main *** fully realize their potential,it is essential to improve DRAM ca... 详细信息
来源: 评论
UiLog: Improving Log-Based Fault Diagnosis by Log Analysis
收藏 引用
Journal of Computer Science & technology 2016年 第5期31卷 1038-1052页
作者: De-Qing Zou Services Computing Technology and System Laboratory Huazhong University of Science and Technology Wuhan ~3007~ China Big Data Technology and System Laboratory Huazhong University of Science and Technology Wuhan 430074 China Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan 430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
In modern computer systems, system event logs have always been the primary source for checking system status. As computer systems become more and more complex, the interaction between software and hardware increases f... 详细信息
来源: 评论
BGNN: Behavior-aware graph neural network for heterogeneous session-based recommendation
收藏 引用
Frontiers of Computer Science 2023年 第5期17卷 103-118页
作者: Jinwei LUO Mingkai HE Weike PAN Zhong MING College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060China National Engineering Laboratory for Big Data System Computing Technology Shenzhen UniversityShenzhen 518060China
Session-based recommendation(SBR)and multibehavior recommendation(MBR)are both important problems and have attracted the attention of many researchers and *** from SBR that solely uses one single type of behavior sequ... 详细信息
来源: 评论
A Survey of data Partitioning and Sampling Methods to Support big data Analysis
收藏 引用
big data Mining and Analytics 2020年 第2期3卷 85-101页
作者: Mohammad Sultan Mahmud Joshua Zhexue Huang Salman Salloum Tamer Z.Emara Kuanishbay Sadatdiynov National Engineering Laboratory for Big Data System Computing Technology Shenzhen UniversityUniversityShenzhen 518060China Big Data Institute College of Computer Science and Software EngineeringShenzhen UniversityShenzhen 518060China.
Computer clusters with the shared-nothing architecture are the major computing platforms for big data processing and *** cluster computing,data partitioning and sampling are two fundamental strategies to speed up the ... 详细信息
来源: 评论
Evaluating RISC-V Vector Instruction Set Architecture Extension with Computer Vision Workloads
收藏 引用
Journal of Computer Science & technology 2023年 第4期38卷 807-820页
作者: 李若时 彭平 邵志远 金海 郑然 National Engineering Research Center for Big Data Technology and System Huazhong University of Science and Technology Wuhan 430074China Services Computing Technology and System Laboratory Huazhong University of Science and TechnologyWuhan 430074 China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Computer vision(CV)algorithms have been extensively used for a myriad of applications *** the multimedia data are generally well-formatted and regular,it is beneficial to leverage the massive parallel processing power... 详细信息
来源: 评论
Attribute-Based Access Control Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第03期22卷 2227-2242页
作者: Wang, Xiuhua Yu, Mengyang Wang, Yaohui Pi, Yinjia Xu, Peng Wang, Shuai Jin, Hai Han, Min Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan430074 China State Key Laboratory of Cryptology Beijing100878 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Cluster and Grid Computing Lab Services Computing Technology and System Lab Wuhan430074 China
The burgeoning complexity of communication necessitates a high demand for security. Access control encryption is a promising primitive to meet the security demand but the bulk of its constructions rely on formulating ... 详细信息
来源: 评论
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论
Efficient Hybrid Multi-Population Genetic Algorithm for Multi-UAV Task Assignment in Consumer Electronics Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Bai, Xiaoshan Jiang, Haoyu Li, Chao Ullah, Inam Dabel, Maryam M. Al Bashir, Ali Kashif Wu, Zongze Sam, Shuzhi Shenzhen University College of Mechatronics and Control Engineering National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University College of Mechatronics and Control Engineering Shenzhen518060 China Shenzhen University Shenzhen City Joint Laboratory of Autonomous Unmanned Systems and Intelligent Manipulation Shenzhen518060 China Tashkent State University of Economics Department of Artificial Intelligence Tashkent100066 Uzbekistan University of Hafr Al Batin Department of Computer Science and Engineering College of Computer Science and Engineering Saudi Arabia Manchester Metropolitan University Manchester United Kingdom Shenzhen518060 China National University of Singapore Department of Electrical and Computer Engineering Singapore117576 Singapore
In recent years, as people’s living standards have improved and consumption concepts have been transformed, the demand for purchasing consumer electronics online has continued to grow, further stimulating the develop... 详细信息
来源: 评论
Toward High-Performance Delta-Based Iterative Processing with a Group-Based Approach
收藏 引用
Journal of Computer Science & technology 2022年 第4期37卷 797-813页
作者: Hui Yu Xin-Yu Jiang Jin Zhao Hao Qi Yu Zhang Xiao-Fei Liao Hai-Kun Liu Fu-Bing Mao Hai Jin National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Service Computing Technology and System Laboratory Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China
Many systems have been built to employ the delta-based iterative execution model to support iterative algorithms on distributed platforms by exploiting the sparse computational dependencies between data items of these... 详细信息
来源: 评论