咨询与建议

限定检索结果

文献类型

  • 483 篇 期刊文献
  • 411 篇 会议
  • 27 册 图书

馆藏范围

  • 921 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 582 篇 工学
    • 410 篇 计算机科学与技术...
    • 326 篇 软件工程
    • 125 篇 信息与通信工程
    • 84 篇 控制科学与工程
    • 80 篇 电气工程
    • 79 篇 生物工程
    • 52 篇 生物医学工程(可授...
    • 51 篇 电子科学与技术(可...
    • 46 篇 光学工程
    • 39 篇 机械工程
    • 26 篇 动力工程及工程热...
    • 21 篇 化学工程与技术
    • 20 篇 网络空间安全
    • 18 篇 材料科学与工程(可...
    • 16 篇 仪器科学与技术
    • 16 篇 建筑学
    • 16 篇 环境科学与工程(可...
  • 289 篇 理学
    • 140 篇 数学
    • 86 篇 生物学
    • 64 篇 物理学
    • 48 篇 统计学(可授理学、...
    • 39 篇 系统科学
    • 25 篇 化学
  • 149 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 52 篇 工商管理
    • 51 篇 图书情报与档案管...
  • 59 篇 医学
    • 54 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
    • 18 篇 公共卫生与预防医...
  • 23 篇 法学
  • 16 篇 农学
  • 14 篇 经济学
  • 11 篇 教育学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 38 篇 grid computing
  • 32 篇 cloud computing
  • 29 篇 computer science
  • 28 篇 deep learning
  • 28 篇 laboratories
  • 25 篇 distributed comp...
  • 23 篇 computational mo...
  • 23 篇 machine learning
  • 21 篇 resource managem...
  • 20 篇 feature extracti...
  • 19 篇 application soft...
  • 19 篇 software enginee...
  • 19 篇 quality of servi...
  • 19 篇 processor schedu...
  • 19 篇 training
  • 18 篇 artificial intel...
  • 16 篇 computer archite...
  • 12 篇 scalability
  • 12 篇 educational inst...
  • 12 篇 computer network...

机构

  • 39 篇 school of comput...
  • 35 篇 school of cyber ...
  • 27 篇 national enginee...
  • 26 篇 grid computing a...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 hubei engineerin...
  • 23 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 14 篇 school of inform...
  • 12 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 beijing advanced...
  • 10 篇 national frontie...
  • 10 篇 state key labora...
  • 9 篇 huazhong univers...
  • 9 篇 cloud computing ...
  • 9 篇 school of electr...
  • 9 篇 department of co...
  • 9 篇 department of co...

作者

  • 64 篇 rajkumar buyya
  • 34 篇 buyya rajkumar
  • 29 篇 jin hai
  • 20 篇 hai jin
  • 18 篇 ismail leila
  • 17 篇 hu shengshan
  • 13 篇 materwala huned
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 niyato dusit
  • 10 篇 wei li
  • 10 篇 wan wei
  • 9 篇 dustdar schahram
  • 9 篇 liu ya-feng
  • 8 篇 bakas spyridon
  • 8 篇 yang jinzhu
  • 7 篇 kofler florian
  • 7 篇 xu wu
  • 7 篇 gill sukhpal sin...

语言

  • 848 篇 英文
  • 58 篇 其他
  • 15 篇 中文
检索条件"机构=Distributed Computing Systems Laboratory School of Computer Science and Engineering"
921 条 记 录,以下是111-120 订阅
排序:
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Fast Heterogeneous Multi-Problem Surrogates for Transfer Evolutionary Multiobjective Optimization
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Li, Hao Xiong, Pu Gong, Maoguo Qin, A.K. Wu, Yue Xing, Lining Key Laboratory of Collaborative Intelligence Systems Ministry of Education School of Electronic Engineering Xidian University Xi’an China Department of Computing Technologies Swinburne University of Technology Hawthorn Victoria Australia School of Computer Science and Technology Xidian University Xi’an China
Transfer evolutionary multiobjective optimization leverages the relevant knowledge from other source problems (distinct but possibly related) to assist the optimization of the target problem of interest. Multi-problem... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
Assessing the Efficacy of Improved Learning in Hourly Global Irradiance Prediction
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 2579-2594页
作者: Abdennasser Dahmani Yamina Ammi Nadjem Bailek Alban Kuriqi Nadhir Al-Ansari Salah Hanini Ilhami Colak Laith Abualigah El-Sayed M.El-kenawy Department of Mechanical Engineering Faculty of Science and TechnologyGIDD Industrial Engineering and Sustainable Development LaboratoryUniversity of RelizaneBourmadiaRelizane48000Algeria Laboratory of Biomaterials and Transport Phenomena(LBMPT) University of MedeaUrban PoleMedea26000Algeria Energies and Materials Research Laboratory Faculty of Sciences and TechnologyUniversity of TamanghassetTamanrasset10034Algeria Sustainable Development and Computer Science Laboratory Faculty of Sciences and TechnologyAhmed Draia University of AdrarAdrarAlgeria CERIS Instituto Superior TécnicoUniversidade de LisboaLisbon1049-001Portugal Civil Engineering Department University for Business and TechnologyPristina10000Kosovo Department of Civil Environmental and Natural Resources EngineeringLulea University of TechnologyLulea97187Sweden Engineering and Architecture Faculty Nisantasi UniversityIstanbulTurkey Computer Science Department Prince Hussein Bin Abdullah Faculty for Information TechnologyAl al-Bayt UniversityMafraq25113Jordan Hourani Center for Applied Scientific Research Al-Ahliyya Amman UniversityAmman19328Jordan MEU Research Unit Middle East UniversityAmman11831Jordan Applied Science Research Center Applied Science Private UniversityAmman11931Jordan School of Computer Sciences Universiti Sains MalaysiaPulau Pinang11800Malaysia Department of Computing and Information Systems School of Engineering and TechnologySunway University MalaysiaPetaling Jaya27500Malaysia Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt
Increasing global energy consumption has become an urgent problem as natural energy sources such as oil,gas,and uranium are rapidly running *** into renewable energy sources such as solar energy is being pursued to co... 详细信息
来源: 评论
Towards robust neural networks via a global and monotonically decreasing robustness training strategy
收藏 引用
Frontiers of Information Technology & Electronic engineering 2023年 第10期24卷 1375-1389页
作者: Zhen LIANG Taoran WU Wanwei LIU Bai XUE Wenjing YANG Ji WANG Zhengbin PANG Institute for Quantum Information&State Key Laboratory of High Performance Computing National University of Defense TechnologyChangsha 410073China State Key Laboratory of Computer Science Institute of Software Chinese Academy of SciencesBeijing 100190China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 100190China College of Computer Science and Technology National University of Defense TechnologyChangsha 410073China Key Laboratory of Software Engineering for Complex Systems National University of Defense TechnologyChangsha 410073China
Robustness of deep neural networks(DNNs)has caused great concerns in the academic and industrial communities,especially in safety-critical *** of verifying whether the robustness property holds or not in certain neura... 详细信息
来源: 评论
SIGFinger: A Subtle and Interactive GNN Fingerprinting Scheme via Spatial Structure Inference Perturbation
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Jia, Ju Li, Renjie Wu, Cong Ma, Siqi Wang, Lina Deng, Robert H. Southeast University School of Cyber Science and Engineering Nanjing210096 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore University of New South Wales School of Engineering and Information Technology CanberraACT2612 Australia Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Singapore Management University School of Information Systems 188065 Singapore
There have been significant improvements in intellectual property (IP) protection for deep learning models trained on Euclidean data. However, the complex and irregular graph-structured data in non-Euclidean space pos... 详细信息
来源: 评论
UNeLF: Unconstrained Neural Light Field for Self-Supervised Angular Super-Resolution
收藏 引用
IEEE Transactions on Circuits and systems for Video Technology 2025年
作者: Zhao, Mingyuan Sheng, Hao Chen, Rongshan Cong, Ruixuan Cui, Zhenglong Yang, Da Beihang University State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beijing100191 China Beihang University Data Science and Intelligent Computing Laboratory Hangzhou International Innovation Institute Hangzhou311115 China Macao Polytechnic University Faculty of Applied Sciences 999078 China
Compared to supervised learning methods, self-supervised learning methods address the domain gap problem between light field (LF) datasets collected under varying acquisition conditions, which typically leads to decre... 详细信息
来源: 评论
DMNER: Biomedical Named Entity Recognition by Detection and Matching
DMNER: Biomedical Named Entity Recognition by Detection and ...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Bian, Junyi Jiang, Rongze Zhai, Weiqi Huang, Tianyang Huang, Xiaodi Zhou, Hong Zhu, Shanfeng Fudan University School of Computer Science Shanghai China Fudan University Institute of Science and Technology for Brain-Inspired Intelligence Shanghai China Charles Sturt University School of Computing Mathematics and Engineering Nsw Australia Atypon Systems Llc United Kingdom Zhangjiang Fudan International Innovation Center Fudan University Institute of Science and Technology for Brain-Inspired Intelligence Moe Frontiers Center for Brain Science Shanghai Key Lab of Intelligent Information Processing Key Laboratory of Computational Neuroscience and Brain-Inspired Intelligence Shanghai China
Biomedical Named Entity Recognition (NER) is a crucial task in extracting information from biomedical texts. However, the diversity of professional terminology, semantic complexity, and the widespread presence of syno... 详细信息
来源: 评论
Nested Named Entity Recognition: A Survey of Latest Research
收藏 引用
Expert systems 2025年 第7期42卷
作者: Ji, Lixia Dang, Yiping Du, Yunlong Gao, Wenzhao Zhang, Han School of Cyber Science and Engineering Zhengzhou University Zhengzhou China College of Computer Science Sichuan University Chengdu China Intelligent Systems Research Centre School of Computing Engineering & Intelligent Systems Ulster University Belfast United Kingdom Intelligent Policing Key Laboratory of Sichuan Province Sichuan Police College Luzhou China
The research on nested named entity recognition (NER) is conducive to providing richer semantic representations and capturing the nested structure among entities, which is crucial for the execution of downstream tasks... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论