咨询与建议

限定检索结果

文献类型

  • 87 篇 会议
  • 32 篇 期刊文献

馆藏范围

  • 119 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 66 篇 工学
    • 52 篇 计算机科学与技术...
    • 39 篇 软件工程
    • 10 篇 信息与通信工程
    • 7 篇 电气工程
    • 6 篇 动力工程及工程热...
    • 5 篇 机械工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 4 篇 环境科学与工程(可...
    • 3 篇 生物工程
    • 3 篇 网络空间安全
    • 2 篇 土木工程
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 农业工程
  • 32 篇 理学
    • 17 篇 数学
    • 8 篇 物理学
    • 3 篇 天文学
    • 3 篇 地球物理学
    • 3 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 地质学
    • 2 篇 系统科学
  • 20 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 医学
  • 1 篇 军事学

主题

  • 8 篇 cloud computing
  • 7 篇 feature extracti...
  • 4 篇 convolution
  • 4 篇 servers
  • 4 篇 computational mo...
  • 3 篇 anomaly detectio...
  • 3 篇 resource managem...
  • 3 篇 quality of servi...
  • 3 篇 smart contract
  • 3 篇 semantics
  • 3 篇 machine learning
  • 3 篇 blockchain
  • 3 篇 clustering algor...
  • 3 篇 technological in...
  • 3 篇 training
  • 2 篇 knowledge engine...
  • 2 篇 object detection
  • 2 篇 neurons
  • 2 篇 electric vehicle...
  • 2 篇 software algorit...

机构

  • 21 篇 guangxi cooperat...
  • 8 篇 college of compu...
  • 6 篇 inner mongolia e...
  • 6 篇 center for cloud...
  • 6 篇 school of comput...
  • 5 篇 engineering rese...
  • 5 篇 guangxi key labo...
  • 5 篇 school of inform...
  • 5 篇 cloud computing ...
  • 4 篇 guangxi colleges...
  • 4 篇 inner mongolia e...
  • 4 篇 inner mongolia k...
  • 4 篇 guangxi cooperat...
  • 4 篇 inner mongolia k...
  • 3 篇 school of inform...
  • 3 篇 department of in...
  • 3 篇 cloud computing ...
  • 3 篇 guangxi key labo...
  • 3 篇 china mobile inf...
  • 3 篇 school of comput...

作者

  • 11 篇 dinkar sitaram
  • 9 篇 jian-tao zhou
  • 5 篇 zhou jian-tao
  • 5 篇 sitaram dinkar
  • 5 篇 wen bin
  • 4 篇 sudheendra harwa...
  • 4 篇 phalachandra h.l...
  • 3 篇 zhou jiantao
  • 3 篇 shi aiwu
  • 3 篇 lei xiaochun
  • 3 篇 yang qing
  • 3 篇 xiaochun lei
  • 3 篇 wang zexu
  • 3 篇 wang jianfeng
  • 3 篇 zhang jingwei
  • 3 篇 tao xiaoling
  • 3 篇 miao ye
  • 3 篇 chen junyan
  • 3 篇 feiyu wang
  • 3 篇 junyan chen

语言

  • 119 篇 英文
  • 2 篇 中文
检索条件"机构=Cloud Computing and Big Data Center"
119 条 记 录,以下是61-70 订阅
排序:
An efficient traceable data sharing scheme in cloud computing for mobile devices
收藏 引用
International Journal of High Performance computing and Networking 2018年 第2期12卷 156-165页
作者: Wang, Zhiying Ye, Jun Wang, Jianfeng Xidian University Xian710071 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin541004 China
Owing to the convenience of mobile devices and the advantages of cloud computing, it is a fashion to efficiently share data by mobile devices in cloud computing. However, it might be insecure to upload the plaintext d... 详细信息
来源: 评论
Image retrieval based on ResNet and ITQ
Image retrieval based on ResNet and ITQ
收藏 引用
2nd International Conference on Mechanical, Electronic, Control and Automation Engineering (MECAE 2018)
作者: Guijun Wang Baohua Qiang Xianchun Zou Jinyun Lu Southwest University Guangxi Cooperative Innovation Center of cloud computing and Big Data University of Electronic Technology Chongqing Educational Evaluation Institute
In recent years, more and more hash learning methods have been applied to solve largescale vision problems. It has been shown that learning hash function by using supervised information can boost hashing quality. The ... 详细信息
来源: 评论
Malicious Website Detection Based on URLs Static Features
Malicious Website Detection Based on URLs Static Features
收藏 引用
2018 International Conference on Modeling, Simulation and Optimization(MSO 2018)
作者: Chun-ming WU Min LI Li YE Xian-chun ZOU Bao-hua QIANG School of Computer and Information Science Southwest University Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology
Real-time and effectiveness are two basic requirements in URL-based malicious website detection. Based on the analysis of malicious URLs construction pattern, this paper puts forward a method to detect malicious websi... 详细信息
来源: 评论
Real-time network traffic classification based on CDH pattern matching  14
Real-time network traffic classification based on CDH patter...
收藏 引用
14th International Conference on Computational Intelligence and Security, CIS 2018
作者: Li, Xunzhang Wang, Yong Ke, Wenlong Feng, Hao School of Computer Science and Information Security Guilin University of Electronic Technology Guilin Guangxi541004 China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi541004 China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi541004 China
In recent years, with the rapid development of the Internet, the data scale of application behavior and application traffic have exploded. How to classify the real-time traffic of network becomes a big challenge. How ... 详细信息
来源: 评论
Secure searchable encryption: a survey
收藏 引用
Journal of Communications and Information Networks 2017年 第4期1卷 52-65页
作者: Wang, Yunling Wang, Jianfeng Chen, Xiaofeng State Key Laboratory of Integrated Service Networks (ISN) Xidian University Xian China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin China
cloud computing facilitates convenient and on-demand network access to a centralized pool of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate the burden of local storage. How...
来源: 评论
Proving Linearizability of Concurrent Queues
收藏 引用
Journal of Computers (Taiwan) 2024年 第5期35卷 91-103页
作者: Peng, Jie Wen, Tangliu Jiang, Dongming Department of Information Engineering Gannan University of Science and Technology Ganzhou China Ganzhou Cloud Computing and Big Data Research Center Ganzhou China School of Big Data Jiangxi Science & Technology Normal University Nanchang China
Linearizability is a commonly accepted correctness criterion for concurrent data structures. Concurrent queues are among the most fundamental concurrent data structures. In this paper, we present necessary and suffici... 详细信息
来源: 评论
Improving the microenvironment of tracking photovoltaic systems promotes soil organic carbon accumulation by mediating plant carbon inputs and microbial necromass retention
收藏 引用
Journal of Environmental Management 2025年 388卷
作者: Siqi Zhang Jirui Gong Rui Wang Kai Zheng Weiyuan Zhang Xuede Dong Yuxia Hu Guisen Yang Chenyi Yan Shangpeng Zhang Ruijing Wang Tong Wang State Key Laboratory of Earth Surface Processes and Resource Ecology MOE Engineering Research Center of Desertification and Blown-sand Control Faculty of Geographical Science Beijing Normal University No. 19 Xinjiekouwai Street Haidian District Beijing 100875 China CGN New Energy Holdings Co. Ltd. Hanwei International Plaza Fengtai District Beijing 100071 China Inner Mongolia Ganze Desert Technology Co. Ltd. High-tech industrial park cloud computing big data enterprise headquarters Kangbashi District Ordos 017004 China
Photovoltaic systems greatly reduce greenhouse gas emissions. However, the microenvironmental changes of photovoltaic modules affect soil organic carbon (SOC) and improve carbon sequestration in terrestrial ecosystems...
来源: 评论
Research on virtual machine placement in the cloud based on improved simulated annealing algorithm
Research on virtual machine placement in the cloud based on ...
收藏 引用
Proceedings of the Biannual World Automation Congress
作者: Nan Su Aiwu Shi Changnian Chen E Chen Yuxuan Wang Cloud Computing & Big Data Research Center Wuhan Textile University Wuhan China School of Computer Science and Technology Wuhan University of Technology Wuhan China
How to efficiently place virtual machines is an important issue in the cloud data center. Virtual machine placement method based on traditional heuristic algorithm costs long time to reach an optimal allocation so tha... 详细信息
来源: 评论
Research on Technologies in data Fabric
Research on Technologies in Data Fabric
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Qingyuan Hu Zheng Yin Tao Tao Jibin Wang Zhuo Chen Bohuan Ai Yu Liu Chongzhou Liu China Mobile Information Technology Center Beijing China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
With the continuous advancement of technologies like big data, artificial intelligence, and cloud computing, enterprises are increasingly encountering challenges related to the heterogeneity of data from various sourc... 详细信息
来源: 评论
data Catalogs with Artificial Intelligence and Active Metadata: A Case Study of China Mobile
Data Catalogs with Artificial Intelligence and Active Metada...
收藏 引用
Next Generation data-driven Networks (NGDN), International Conference on
作者: Jibin Wang Yanmei Guo Yong Jiang Jing Shang Zhuo Chen Yu Liu Qingyuan Hu Zheng Yin China Mobile Information Technology Center Beijing China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
In the context of the rapid development of artificial intelligence, telecommunications operators have accumulated an increasing amount of data. China Mobile has developed a set of practical methods of enhanced data ca... 详细信息
来源: 评论