咨询与建议

限定检索结果

文献类型

  • 2,752 篇 会议
  • 2,042 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,804 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,037 篇 工学
    • 1,636 篇 计算机科学与技术...
    • 1,292 篇 软件工程
    • 571 篇 信息与通信工程
    • 542 篇 电气工程
    • 509 篇 控制科学与工程
    • 494 篇 电子科学与技术(可...
    • 322 篇 光学工程
    • 310 篇 机械工程
    • 253 篇 生物工程
    • 240 篇 动力工程及工程热...
    • 223 篇 仪器科学与技术
    • 185 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 139 篇 材料科学与工程(可...
    • 108 篇 交通运输工程
    • 107 篇 土木工程
    • 72 篇 力学(可授工学、理...
    • 68 篇 建筑学
  • 1,595 篇 理学
    • 791 篇 数学
    • 494 篇 物理学
    • 298 篇 生物学
    • 235 篇 统计学(可授理学、...
    • 209 篇 系统科学
    • 154 篇 化学
  • 686 篇 管理学
    • 447 篇 管理科学与工程(可...
    • 249 篇 图书情报与档案管...
    • 164 篇 工商管理
  • 161 篇 医学
    • 136 篇 临床医学
    • 105 篇 基础医学(可授医学...
  • 87 篇 法学
    • 70 篇 社会学
  • 63 篇 经济学
  • 46 篇 农学
  • 14 篇 军事学
  • 13 篇 教育学
  • 12 篇 艺术学
  • 8 篇 文学

主题

  • 142 篇 laboratories
  • 106 篇 feature extracti...
  • 79 篇 computational mo...
  • 75 篇 data mining
  • 73 篇 computer science
  • 72 篇 optimization
  • 64 篇 training
  • 61 篇 deep learning
  • 58 篇 semantics
  • 57 篇 accuracy
  • 52 篇 neural networks
  • 49 篇 computer archite...
  • 49 篇 mathematical mod...
  • 44 篇 machine learning
  • 42 篇 control systems
  • 42 篇 protocols
  • 42 篇 hardware
  • 41 篇 predictive model...
  • 41 篇 costs
  • 41 篇 clustering algor...

机构

  • 114 篇 national enginee...
  • 97 篇 college of compu...
  • 83 篇 school of contro...
  • 75 篇 state key labora...
  • 58 篇 school of comput...
  • 58 篇 college of infor...
  • 46 篇 hubei province k...
  • 43 篇 key laboratory o...
  • 41 篇 the key laborato...
  • 36 篇 school of cyber ...
  • 35 篇 department of co...
  • 34 篇 school of inform...
  • 33 篇 school of comput...
  • 33 篇 university of ch...
  • 32 篇 department of el...
  • 29 篇 school of optica...
  • 29 篇 school of comput...
  • 28 篇 shenzhen city ke...
  • 27 篇 national enginee...
  • 25 篇 hubei key labora...

作者

  • 42 篇 shen linlin
  • 35 篇 hai jin
  • 34 篇 shu-ching chen
  • 33 篇 mei-ling shyu
  • 31 篇 yang yang
  • 29 篇 zongli lin
  • 28 篇 zhou mengchu
  • 28 篇 jin hai
  • 27 篇 ren jiadong
  • 25 篇 chen shu-ching
  • 25 篇 hamid soltanian-...
  • 23 篇 shyu mei-ling
  • 20 篇 wang xingjun
  • 20 篇 ji zhen
  • 19 篇 mengchu zhou
  • 19 篇 hu shengshan
  • 18 篇 chen mingzhe
  • 18 篇 zhang zhigang
  • 18 篇 linlin shen
  • 17 篇 zhen ji

语言

  • 4,422 篇 英文
  • 227 篇 其他
  • 155 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Engineering Laboratory"
4804 条 记 录,以下是211-220 订阅
排序:
TERMS: Task management policies to achieve high performance for mixed workloads using surplus resources
收藏 引用
Journal of Parallel and Distributed Computing 2022年 第0期170卷 74-85页
作者: Yu, Jinyu Tong, Wei Lv, Pengze Feng, Dan Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology School of Computer Science and Technology Huazhong University of Science and Technology Ministry of Education of China Hubei Wuhan China
Resource contentions and performance interferences can lead to workload performance degradation in mixed-workload deployment clusters. Previous work guarantees the resource requirements of latency-sensitive tasks and ... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Discrete Geometric Coded Data Layout for Large-scale Object Storage systems  21
Discrete Geometric Coded Data Layout for Large-scale Object ...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Tian, Yi Xu, Guangping Yang, Hongzhang Ni, Yue Cao, JiaXin Yang, Lei Tianjin University of Technology School of Computer Science and Engineering Tianjin China Novel Software Technology Tianjin Key Laboratory of Intelligence Computing Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Information Technology Co. Ltd. China
Regenerating codes are new network codes proposed to reduce the data required for fault repair, which can improve the recovery efficiency of faulty nodes in data storage systems. However, unlike Reed-Solomon code, whi... 详细信息
来源: 评论
Wavelet method optimised by ant colony algorithm used for extracting stable and unstable signals in intelligent substations
收藏 引用
CAAI Transactions on Intelligence Technology 2022年 第2期7卷 292-300页
作者: Tianyan Jiang Xiao Yang Yuan Yang Xi Chen Maoqiang Bi Jianfei Chen School of Electrical and Electronic Engineering Chongqing University of TechnologyChongqingChina DepartmentState Key Laboratory of Power Transmission Equipment&System and New Technology Chongqing UniversityChongqingChina Department of Electrical and Computer Engineering University of MarylandCollege ParkMarylandUSA
Partial discharge(PD)signals are an important index to evaluate the operation state of intelligent *** correct distinction of PD pulse and interference pulse has become a challenging *** of the noise and the low signa... 详细信息
来源: 评论
Joint Optimization of Latency and Energy Consumption for Mobile Edge Computing Based Proximity Detection in Road Networks
收藏 引用
China Communications 2022年 第4期19卷 274-290页
作者: Tongyu Zhao Yaqiong Liu Guochu Shou Xinwei Yao School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Beijing Laboratory of Advanced Information Networks Beijing Key Laboratory of Network System Architecture and ConvergenceBeijing 100876China School of Computer Science and Technology Zhejiang University of TechnologyChina
In recent years, artificial intelligence and automotive industry have developed rapidly, and autonomous driving has gradually become the focus of the industry. In road networks, the problem of proximity detection refe... 详细信息
来源: 评论
Improved Density Peaking Algorithm for Community Detection Based on Graph Representation Learning
收藏 引用
computer systems Science & engineering 2022年 第12期43卷 997-1008页
作者: Jiaming Wang Xiaolan Xie Xiaochun Cheng Yuhan Wang Guangxi Key Laboratory of Embedded Technology and Intelligent System Guilin541006GuangxiChina School of Information Science and Engineering Guilin University of TechnologyGuilin541006GuangxiChina Department of Computer Science Middlesex UniversityLondon
There is a large amount of information in the network data that we canexploit. It is difficult for classical community detection algorithms to handle network data with sparse topology. Representation learning of netw... 详细信息
来源: 评论
An Elite Archive-Assisted Multi-Objective Evolutionary Algorithm for mRNA Design  13
An Elite Archive-Assisted Multi-Objective Evolutionary Algor...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Hong, Wenjing Chen, Cheng Zhu, Zexuan Tang, Ke Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen China
Messenger RNA (mRNA) vaccines have emerged as highly effective strategies in the prophylaxis and treatment of diseases. mRNA design, a key to the success of mRNA vaccines, in-volves finding optimal codons and increasi... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论
Revisiting the thermal ageing on the metallised polypropylene film capacitor:from device to dielectric film
收藏 引用
High Voltage 2023年 第2期8卷 305-314页
作者: Yushuang He Feipeng Wang Guoqiang Du Lei Pan Kaizheng Wang Reimund Gerhard Ronald Plath Pawel Rozga Pavel Trnka State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing UniversityChongqingChina Faculty of Electrical Engineering Kunming University of Science and TechnologyKunmingChina Soft Transducer Materials and Systems Universität PotsdamPotsdamGermany Faculty IV Electrical Engineering and Computer Science Technische Universität BerlinBerlinGermany Institute of Electrical Power Engineering Lodz University of TechnologyLodzPoland Faculty of Electrical Engineering University of West BohemiaPilsenCzech Republic
Metallised polypropylene film capacitors(MPPFCs)are widely used in power electronics and are generally degraded by elevated *** work aims to determine the relationships between the structural changes of MPPFC and the ... 详细信息
来源: 评论