咨询与建议

限定检索结果

文献类型

  • 606 篇 期刊文献
  • 585 篇 会议
  • 20 册 图书

馆藏范围

  • 1,211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 778 篇 工学
    • 549 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 140 篇 信息与通信工程
    • 95 篇 控制科学与工程
    • 86 篇 电气工程
    • 83 篇 生物工程
    • 60 篇 机械工程
    • 57 篇 电子科学与技术(可...
    • 54 篇 光学工程
    • 54 篇 生物医学工程(可授...
    • 41 篇 动力工程及工程热...
    • 29 篇 化学工程与技术
    • 25 篇 环境科学与工程(可...
    • 24 篇 安全科学与工程
    • 22 篇 仪器科学与技术
  • 418 篇 理学
    • 188 篇 数学
    • 120 篇 物理学
    • 95 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 29 篇 化学
    • 25 篇 大气科学
  • 212 篇 管理学
    • 134 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 58 篇 医学
    • 51 篇 临床医学
    • 44 篇 基础医学(可授医学...
    • 23 篇 公共卫生与预防医...
    • 23 篇 药学(可授医学、理...
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 25 篇 法学
  • 17 篇 教育学
  • 15 篇 农学
  • 6 篇 军事学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 40 篇 cloud computing
  • 38 篇 computational mo...
  • 25 篇 machine learning
  • 23 篇 deep learning
  • 22 篇 feature extracti...
  • 20 篇 artificial intel...
  • 20 篇 training
  • 19 篇 reinforcement le...
  • 19 篇 computer archite...
  • 19 篇 semantics
  • 18 篇 distributed comp...
  • 17 篇 laboratories
  • 16 篇 grid computing
  • 16 篇 resource managem...
  • 16 篇 accuracy
  • 15 篇 internet of thin...
  • 14 篇 quality of servi...
  • 14 篇 trajectory
  • 13 篇 learning systems
  • 13 篇 edge computing

机构

  • 51 篇 school of comput...
  • 38 篇 yunnan key labor...
  • 32 篇 laboratory schoo...
  • 28 篇 school of inform...
  • 24 篇 laboratory schoo...
  • 20 篇 institute for pl...
  • 19 篇 university of so...
  • 17 篇 department of as...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 17 篇 infn trento inst...
  • 16 篇 advanced technol...
  • 16 篇 king’s college l...
  • 16 篇 kamioka branch n...
  • 16 篇 the university o...
  • 16 篇 ligo laboratory ...
  • 16 篇 university of ma...
  • 16 篇 stony brook univ...

作者

  • 93 篇 buyya rajkumar
  • 56 篇 rajkumar buyya
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 ismail leila
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon
  • 17 篇 t. mcrae
  • 17 篇 a. parisi
  • 17 篇 s. rowan
  • 17 篇 s. m. aronson
  • 17 篇 v. p. mitrofanov
  • 17 篇 g. moreno
  • 17 篇 g. hemming
  • 17 篇 f. muciaccia
  • 17 篇 b. garaventa

语言

  • 1,150 篇 英文
  • 48 篇 其他
  • 13 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Cloud Computing and Distributed Systems Laboratory School of Computing and Information Systems"
1211 条 记 录,以下是161-170 订阅
排序:
Structural Entropy Based Graph Node Classification  12
Structural Entropy Based Graph Node Classification
收藏 引用
12th IEEE Global Conference on Consumer Electronics, GCCE 2023
作者: Zhang, Jun Yue, Kun School of Information Science and Engineering Yunnan University Kunming China Yunnan Key Laboratory of Intelligent Systems and Computing Yunnan University Kunming China
Node classification is to predict the labels of the unlabeled nodes in a graph, which is useful for various applications of social network and biological information analysis. To measure the uncertainty of structural ... 详细信息
来源: 评论
A Method for Measuring Node Similarity in Heterogeneous information Networks  9
A Method for Measuring Node Similarity in Heterogeneous Info...
收藏 引用
9th International Conference on Fuzzy systems and Data Mining, FSDM 2023
作者: Zhan, Liudi Chen, Hongmei Zhou, Lihua Xiao, Qing School of Information Science and Engineering Yunnan University Kunming China Yunnan Key Laboratory of Intelligent Systems and Computing Yunnan University Kunming China
Meta-path-based methods for measuring the similarities between nodes in Heterogeneous information Networks (HINs) have attracted attention from researchers due to excellent performance. However, these methods suffer f... 详细信息
来源: 评论
Graph Neural Network with Heterogeneous Attributes for Node Classification  4
Graph Neural Network with Heterogeneous Attributes for Node ...
收藏 引用
4th International Conference on Neural Networks, information and Communication Engineering, NNICE 2024
作者: Jiang, Bohou Wang, Jiahui Yue, Kun Yunnan University School of Information Science and Engineering Kunming China Yunnan University Yunnan Key Laboratory of Intelligent Systems and Computing Kunming China
Node classification on heterogeneous graphs with multiple node types and relationships has been widely used in commodity classification, friend recommendation, and so on. Most of the existing models need to define the... 详细信息
来源: 评论
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks  1
收藏 引用
16th European Conference on Computer Vision, ECCV 2020
作者: Liu, Yunfei Ma, Xingjun Bailey, James Lu, Feng State Key Laboratory of Virtual Reality Technology and Systems School of CSE Beihang University Beijing China Peng Cheng Laboratory Shenzhen China School of Information Technology Deakin University Geelong Australia School of Computing and Information Systems University of Melbourne Parkville Australia
Recent studies have shown that DNNs can be compromised by backdoor attacks crafted at training time. A backdoor attack installs a backdoor into the victim model by injecting a backdoor pattern into a small proportion ... 详细信息
来源: 评论
Unequal-interval based loosely coupled control method for auto-scaling heterogeneous cloud resources for web applications
Unequal-interval based loosely coupled control method for au...
收藏 引用
作者: Cai, Zhicheng Liu, Duan Lu, Yifei Buyya, Rajkumar School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China Laboratory School of Computing and Information Systems The University of Melbourne ParkvilleVIC Australia
Most existing quality of service (QoS) control algorithms of Web applications take into account Web Server or database connections which can be released immediately. However, many applications are deployed on virtual ... 详细信息
来源: 评论
Bridging the Gap using Contrastive Learning and Semantic Consistency for Unsupervised Neural Machine Translation  5
Bridging the Gap using Contrastive Learning and Semantic Con...
收藏 引用
5th International Conference on Artificial Intelligence and Computer Engineering, ICAICE 2024
作者: Zhang, Chuancai Qu, Dan Du, Liming Yang, Kaiyuan School of Information Systems Engineering University of Information Engineering Zhengzhou China Laboratory for Advanced Computing and Intelligence Engineering Zhengzhou China School of Cyberspace Security Zhengzhou University Zhengzhou China
In Unsupervised Neural Machine Translation (UNMT) tasks, the lack of extensive parallel corpora makes it challenging for the model to directly optimize the correspondence between the source and target languages. UNMT ... 详细信息
来源: 评论
Analysis Model of Terrorist Attacks Based on Big Data  32
Analysis Model of Terrorist Attacks Based on Big Data
收藏 引用
第32届中国控制与决策会议
作者: LIN Zhenkai DOU Yimin LI Jinping School of Information Science and Engineering University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing(University of Jinan) Shandong College and University Key Laboratory of Information Processing and Cognitive Computing in 13th Five-year Institute of Pattern Recognition and Intelligent Systems University of Jinan
With the continuous deepening of international anti-terrorism movement,the anti-terrorism has entered a new stage,and it is facing new *** of the new challenges is to extract useful and valuable information from massi... 详细信息
来源: 评论
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
收藏 引用
Frontiers of Computer Science 2020年 第3期14卷 203-215页
作者: Yudi ZHANG Debiao HE Mingwu ZHANG Kim-Kwang Raymond CHOO Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China School of Computer Sciences Hubei University of TechnologyWuhan 430068China Department of Information Systems and Cyber Security and Department of Electrical and Computer Engineering University of Texas at San AntonioSan AntonioTX 78249USA
Mobile devices are widely used for data access,communications and ***,storing a private key for signature and other cryptographic usage on a single mobile device can be challenging,due to its computational ***,a numbe... 详细信息
来源: 评论
Deep support vector machines for speech emotion recognition  19th
Deep support vector machines for speech emotion recognition
收藏 引用
19th International Conference on Intelligent systems Design and Applications, ISDA 2019
作者: Aouani, Hadhami Ben Ayed, Yassine National School of Engineers ENIS University of Sfax Sfax Tunisia Multimedia InfoRmation Systems and Advanced Computing Laboratory MIRACL University of Sfax Sfax Tunisia
Speech Emotions recognition has become the active research theme in speech processing and in applications based on human-machine interaction. In this work, our system is a two-stage approach, namely feature extraction... 详细信息
来源: 评论
The future of cloud computing: Opportunities, challenges and research trends  2
The future of cloud computing: Opportunities, challenges and...
收藏 引用
2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and cloud), I-SMAC 2018
作者: Kaur, Amanpreet Singh, V.P. Singh Gill, Sukhpal Computer Science and Engineering Department Thapar Institute of Engineering and Technology Patiala Punjab India Laboratory School of Computing and Information Systems University of Melbourne Australia
In a cloud computing environment, datacenter consists of number of servers, cooling and power delivery equipment's that require enormous measure of computational energy to drive complex frameworks. Due to the risi... 详细信息
来源: 评论