咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 236 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 594 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 373 篇 工学
    • 265 篇 计算机科学与技术...
    • 203 篇 软件工程
    • 85 篇 信息与通信工程
    • 77 篇 控制科学与工程
    • 51 篇 电气工程
    • 37 篇 机械工程
    • 31 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 24 篇 动力工程及工程热...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 仪器科学与技术
    • 8 篇 建筑学
    • 8 篇 环境科学与工程(可...
    • 7 篇 光学工程
  • 192 篇 理学
    • 124 篇 数学
    • 57 篇 系统科学
    • 34 篇 统计学(可授理学、...
    • 29 篇 生物学
    • 20 篇 物理学
    • 11 篇 化学
  • 117 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 50 篇 工商管理
    • 38 篇 图书情报与档案管...
  • 21 篇 法学
    • 17 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 10 篇 教育学
    • 10 篇 教育学
  • 10 篇 农学
  • 8 篇 医学
  • 2 篇 文学
  • 1 篇 军事学

主题

  • 33 篇 distributed comp...
  • 32 篇 computer science
  • 30 篇 laboratories
  • 20 篇 cloud computing
  • 16 篇 computer archite...
  • 13 篇 algorithm design...
  • 13 篇 computer network...
  • 12 篇 application soft...
  • 12 篇 machine learning
  • 12 篇 protocols
  • 11 篇 grid computing
  • 11 篇 resource managem...
  • 11 篇 educational inst...
  • 11 篇 quality of servi...
  • 11 篇 data mining
  • 11 篇 delay
  • 10 篇 routing
  • 10 篇 software enginee...
  • 10 篇 monitoring
  • 10 篇 artificial intel...

机构

  • 10 篇 school of comput...
  • 9 篇 state key labora...
  • 9 篇 shandong provinc...
  • 9 篇 school of cyber ...
  • 9 篇 science and tech...
  • 8 篇 college of compu...
  • 8 篇 national laborat...
  • 7 篇 department of co...
  • 7 篇 state key labora...
  • 6 篇 beijing key labo...
  • 6 篇 intelligent dist...
  • 6 篇 singapore univer...
  • 6 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 division of deci...
  • 6 篇 school of inform...
  • 5 篇 hubei key labora...
  • 5 篇 school of electr...
  • 5 篇 department of co...
  • 5 篇 the state key la...

作者

  • 14 篇 johansson karl h...
  • 13 篇 yi xinlei
  • 13 篇 yang tao
  • 11 篇 rajkumar buyya
  • 11 篇 buyya rajkumar
  • 10 篇 ismail leila
  • 10 篇 materwala huned
  • 9 篇 xiong zehui
  • 8 篇 dustdar schahram
  • 8 篇 zhigang luo
  • 8 篇 xuhui huang
  • 8 篇 junping du
  • 8 篇 duan zhisheng
  • 8 篇 chai tianyou
  • 8 篇 jin hai
  • 7 篇 niyato dusit
  • 7 篇 naiyang guan
  • 7 篇 shi ling
  • 7 篇 yingmin jia
  • 6 篇 hangjun zhou

语言

  • 534 篇 英文
  • 54 篇 其他
  • 6 篇 中文
检索条件"机构=Computer Networh and Distributed Systems Laboratory Department of Computer Science and Technology"
594 条 记 录,以下是71-80 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in...
收藏 引用
IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)
作者: Pengfei Qiu Qiang Gao Dongsheng Wang Yongqiang Lyu Chang Liu Xiaoyong Li Chunlu Wang Gang Qu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Tsinghua University Beijing China Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua University Beijing China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing China Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland Maryland USA
The processor's Performance Monitor Unit (PMU) allows the recording of architectural and microarchitectural events for profiling purposes. In this study, we reveal a security issue caused by the fact that current ... 详细信息
来源: 评论
Confidence Estimation Based on the Explanations of Model’s Predictions
Confidence Estimation Based on the Explanations of Model’s ...
收藏 引用
Neuromorphic Computing (ICNC), International Conference on
作者: Kaiyue Wu Changwu Huang Xin Yao Department of Computer Science and Engineering Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Southern University of Science and Technology Shenzhen China Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China
Estimating the confidence of a machine learning (ML) model plays an important role in minimizing undesirable outcomes and safety risks when using ML models in the real world, especially in high-stake application scena...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Models for Students’ Performance Prediction
Comparative Analysis of Machine Learning Models for Students...
收藏 引用
International Conference on Advances in Digital science, ICADS 2021
作者: Ismail, Leila Materwala, Huned Hennebelle, Alain Distributed Computing and Systems Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Al Ain Abu Dhabi15551 United Arab Emirates Al Ain Abu Dhabi United Arab Emirates
Machine learning for education is an emerging discipline where a model is developed based on training data to make predictions on students’ performance. The main aim is to identify students who would have difficulty ... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
distributed Sparse Signal Detection With Energy-Efficient Censoring-Quantization in Wireless Sensor Networks
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2024年
作者: Chen, Xiangsen Xu, Wenbo Wang, Yue Yau, David K. Y. Li, Yingshu Cai, Zhipeng Beijing University of Posts and Telecommunications Key Laboratory of Universal Wireless Communications Beijing100876 China Georgia State University Department of Computer Science AtlantaGA30303 United States Singapore University of Technology and Design Pillar of Information Systems Technology and Design Singapore487372 Singapore
In wireless sensor networks (WSNs), the energy consumption of sensors and the system performance are inevitably contradictory. For the distributed detection problem in WSN, the censoring technique has been proposed as... 详细信息
来源: 评论
IoT for Sustainable Hospitality: A Systematic Review of Opportunities and Challenges for the Hospitality Industry Revolution
IoT for Sustainable Hospitality: A Systematic Review of Oppo...
收藏 引用
International Conference on distributed Computing in Sensor systems (DCOSS)
作者: Marios S. Poullas Elena Kakoulli Department of Computer Science Intelligent Systems Laboratory Neapolis University Pafos Pafos Cyprus Cell & Developmental Biology University College London London UK Electrical Engineering and Computer Engineering and Informatics Cyprus University of Technology Limassol Cyprus
technology has influenced the hospitality industry, and the Internet of Things (IoT) has become a focus for sustainability, revenue growth, and problem-solving. This systematic review examined the opportunities and ch...
来源: 评论
Implicit Multi-Scale Swin Transformer Network for Image Denoising
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Zhang, Qi Ding, Yuwei Zhang, Weiqi Zhu, Yian Zhang, Bob Lin, Jerry Chun-Wei Harbin Institute of Technology at Weihai School of Economics and Management Weihai China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Northwestern Polytechnical University School of Computer Science Xi’an China Northwestern Polytechnical University Yangtze River Delta Research Institute Taicang China University of Macau PAMI Research Group Department of Computer and Information Science Taipa China Department of Distributed Systems and IT Devices Electrical Engineering and Mathematical Sciences Silesian university of technology Poland
Image denoising has been used in various edge computing scenarios such as consumer electronics to improve the image quality and user experience. Existing image denoising methods based on Convolutional Neural Networks ... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Haozhao Wang Wenchao Xu Yunfeng Fan Ruixuan Li Pan Zhou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing The Hong Kong Polytechnic University Hong Kong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co...
来源: 评论