咨询与建议

限定检索结果

文献类型

  • 465 篇 期刊文献
  • 320 篇 会议

馆藏范围

  • 785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 498 篇 工学
    • 364 篇 计算机科学与技术...
    • 308 篇 软件工程
    • 97 篇 生物工程
    • 77 篇 信息与通信工程
    • 69 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 52 篇 电气工程
    • 48 篇 控制科学与工程
    • 35 篇 电子科学与技术(可...
    • 24 篇 化学工程与技术
    • 18 篇 机械工程
    • 17 篇 安全科学与工程
    • 16 篇 仪器科学与技术
    • 14 篇 土木工程
    • 13 篇 建筑学
    • 13 篇 网络空间安全
  • 303 篇 理学
    • 120 篇 生物学
    • 116 篇 数学
    • 92 篇 物理学
    • 41 篇 统计学(可授理学、...
    • 29 篇 化学
    • 18 篇 地球物理学
    • 18 篇 系统科学
  • 116 篇 管理学
    • 61 篇 图书情报与档案管...
    • 60 篇 管理科学与工程(可...
    • 20 篇 工商管理
  • 63 篇 医学
    • 55 篇 临床医学
    • 52 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
    • 18 篇 公共卫生与预防医...
  • 15 篇 法学
  • 11 篇 农学
  • 9 篇 经济学
  • 7 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 28 篇 machine learning
  • 26 篇 deep neural netw...
  • 25 篇 semantics
  • 22 篇 deep learning
  • 18 篇 training
  • 16 篇 computational mo...
  • 12 篇 memory managemen...
  • 12 篇 feature extracti...
  • 11 篇 task analysis
  • 10 篇 data models
  • 8 篇 scalability
  • 8 篇 generative adver...
  • 8 篇 graph neural net...
  • 8 篇 predictive model...
  • 7 篇 parallel process...
  • 7 篇 magnetic resonan...
  • 7 篇 computer archite...
  • 7 篇 throughput
  • 7 篇 containers
  • 7 篇 efficiency

机构

  • 102 篇 national enginee...
  • 56 篇 school of comput...
  • 50 篇 school of cyber ...
  • 36 篇 national enginee...
  • 31 篇 services computi...
  • 31 篇 hubei engineerin...
  • 28 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 20 篇 hiroshima astrop...
  • 20 篇 department of ph...
  • 19 篇 school of softwa...
  • 18 篇 university of ch...
  • 17 篇 department of ph...
  • 16 篇 berkeley institu...
  • 16 篇 secure computing...
  • 16 篇 zhejiang lab
  • 15 篇 department of ph...
  • 15 篇 physics division...
  • 15 篇 national energy ...

作者

  • 112 篇 hai jin
  • 112 篇 jin hai
  • 42 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 21 篇 haikun liu
  • 20 篇 liao xiaofei
  • 19 篇 long zheng
  • 18 篇 zou deqing
  • 17 篇 zhang leo yu
  • 17 篇 nachman benjamin
  • 16 篇 wu baoyuan
  • 15 篇 bastieri d.
  • 15 篇 green d.
  • 15 篇 orlando e.
  • 15 篇 lubrano p.
  • 15 篇 gargano f.
  • 15 篇 spinelli p.
  • 15 篇 kuss m.
  • 15 篇 mikuni vinicius
  • 15 篇 yu zhang

语言

  • 591 篇 英文
  • 189 篇 其他
  • 10 篇 中文
检索条件"机构=Cognitive Computing and Data Science Research Lab"
785 条 记 录,以下是541-550 订阅
排序:
Fine-grained Scheduling in FPGA-Based Convolutional Neural Networks
Fine-grained Scheduling in FPGA-Based Convolutional Neural N...
收藏 引用
IEEE International Conference on Cloud computing and Big data Analysis (ICCCBDA)
作者: Wei Zhang Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
FPGA has been considered as a promising solution to accelerate Convolutional Neural Networks (CNNs) for its excellent performance in energy efficiency and programmability. However, prior designs are usually designed f... 详细信息
来源: 评论
µVulDeePecker: A deep learning-based system for multiclass vulnerability detection
arXiv
收藏 引用
arXiv 2020年
作者: Zou, Deqing Wang, Sujuan Xu, Shouhuai Li, Zhen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Texas at San Antonio San AntonioTX78249 United States
Fine-grained software vulnerability detection is an important and challenging problem. Ideally, a detection system (or detector) not only should be able to detect whether or not a program contains vulnerabilities, but... 详细信息
来源: 评论
Context modeling in 3D human pose estimation: A unified perspective
arXiv
收藏 引用
arXiv 2021年
作者: Ma, Xiaoxuan Su, Jiajun Wang, Chunyu Ci, Hai Wang, Yizhou Dept. of Computer Science Center on Frontiers of Computing Studies Peking University China Center for Data Science Adv. Inst. of Info. Tech. Peking University China Beijing Film Academy China Microsoft Research Asia Deepwise AI Lab
Estimating 3D human pose from a single image suffers from severe ambiguity since multiple 3D joint configurations may have the same 2D projection. The state-of-the-art methods often rely on context modeling methods su... 详细信息
来源: 评论
Optimal Margin Distribution Machine with Sparsity Inducing Penalty
Optimal Margin Distribution Machine with Sparsity Inducing P...
收藏 引用
International Conference on Big data and Smart computing (BIGCOMP)
作者: Teng Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Recently a promising research direction of statistical learning has been advocated, i.e., the optimal margin distribution learning, with the central idea of optimizing the margin distribution. As the most representati... 详细信息
来源: 评论
High Performance DDoS Attack Detection System Based on Distribution Statistics  16th
High Performance DDoS Attack Detection System Based on Distr...
收藏 引用
16th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2019
作者: Xie, Xia Li, Jinpeng Hu, Xiaoyang Jin, Hai Chen, Hanhua Ma, Xiaojing Huang, Hong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Nowadays, web servers often face the threat of distributed denial of service attacks and their intrusion prevention systems cannot detect those attacks effectively. Many existing intrusion prevention systems detect at... 详细信息
来源: 评论
DeepKAF: A Heterogeneous CBR Deep Learning Approach for NLP Prototyping
DeepKAF: A Heterogeneous CBR Deep Learning Approach for NLP ...
收藏 引用
2020 International Conference on INnovations in Intelligent SysTems and Applications, INISTA 2020
作者: Amin, Kareem Kapetanakis, Stelios Polatidis, Nikolaos Althoff, Klaus-Dieter Dengel, Andreas Smart Data and Knowledge Services German Research Center for Artificial Intelligence Technische Universität Kaiserslautern Kaiserslautern Germany School of Computing Engineering and Mathematics University of Brighton Brighton United Kingdom Intelligent Information Systems Lab Institute of Computer Science University of Hildesheim Hildesheim Germany
With widespread modernization, digitization and transformations of most of industries, Artificial Intelligence (AI) has become the key enabler in that modernization journey. AI offers substantial capabilities to solve... 详细信息
来源: 评论
Failure order: A missing piece in disk failure processing of data centers  21
Failure order: A missing piece in disk failure processing of...
收藏 引用
21st IEEE International Conference on High Performance computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data science and Systems, HPCC/SmartCity/DSS 2019
作者: Yi, Yusheng Xiao, Jiang Wu, Song Li, Huichuwu Jin, Hai National Engineering Research Center for Big Data Technology System Services Computing Technology System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
To avoid data loss, data centers adopt disk failure prediction (DFP) technology to raise warnings ahead of actual disk failures, and process the warnings in the order they are raised, i.e., a first-in-first-out (FIFO)... 详细信息
来源: 评论
Efficient Hardware-Assisted Crash Consistency in Encrypted Persistent Memory
Efficient Hardware-Assisted Crash Consistency in Encrypted P...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Zhan Zhang Jianhui Yue Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computing Science and Technology Huazhong University of Science and Technology Wuhan China Computer Science Department Michigan Technological University Houghton Michigan
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure data recoverability and data confidentiality. The enforcement of these two goals does not only put more burden on pr... 详细信息
来源: 评论
Predicting Friendship Using a Unified Probability Model  7th
Predicting Friendship Using a Unified Probability Model
收藏 引用
7th CCF Academic Conference on Bigdata, CCF Bigdata 2019
作者: Kou, Zhijuan Wang, Hua Yuan, Pingpeng Jin, Hai Xie, Xia National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Now, it is popular for people to share their feelings, activities tagged with geography and temporal information in Online Social Networks (OSNs). The spatial and temporal interactions occurred in OSNs contain a wealt... 详细信息
来源: 评论
data Anonymization for Big Crowdsourcing data
Data Anonymization for Big Crowdsourcing Data
收藏 引用
2019 INFOCOM IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019
作者: Deng, Xiaofeng Zhang, Fan Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
In traditional database systems, data anonymization has been extensively studied, it provides an effective solution for data privacy preservation, and multidimensional anonymization scheme among them is widely used. H... 详细信息
来源: 评论