咨询与建议

限定检索结果

文献类型

  • 483 篇 期刊文献
  • 411 篇 会议
  • 27 册 图书

馆藏范围

  • 921 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 582 篇 工学
    • 410 篇 计算机科学与技术...
    • 326 篇 软件工程
    • 125 篇 信息与通信工程
    • 84 篇 控制科学与工程
    • 80 篇 电气工程
    • 79 篇 生物工程
    • 52 篇 生物医学工程(可授...
    • 51 篇 电子科学与技术(可...
    • 46 篇 光学工程
    • 39 篇 机械工程
    • 26 篇 动力工程及工程热...
    • 21 篇 化学工程与技术
    • 20 篇 网络空间安全
    • 18 篇 材料科学与工程(可...
    • 16 篇 仪器科学与技术
    • 16 篇 建筑学
    • 16 篇 环境科学与工程(可...
  • 289 篇 理学
    • 140 篇 数学
    • 86 篇 生物学
    • 64 篇 物理学
    • 48 篇 统计学(可授理学、...
    • 39 篇 系统科学
    • 25 篇 化学
  • 149 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 52 篇 工商管理
    • 51 篇 图书情报与档案管...
  • 59 篇 医学
    • 54 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
    • 18 篇 公共卫生与预防医...
  • 23 篇 法学
  • 16 篇 农学
  • 14 篇 经济学
  • 11 篇 教育学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 38 篇 grid computing
  • 32 篇 cloud computing
  • 29 篇 computer science
  • 28 篇 deep learning
  • 28 篇 laboratories
  • 25 篇 distributed comp...
  • 23 篇 computational mo...
  • 23 篇 machine learning
  • 21 篇 resource managem...
  • 20 篇 feature extracti...
  • 19 篇 application soft...
  • 19 篇 software enginee...
  • 19 篇 quality of servi...
  • 19 篇 processor schedu...
  • 19 篇 training
  • 18 篇 artificial intel...
  • 16 篇 computer archite...
  • 12 篇 scalability
  • 12 篇 educational inst...
  • 12 篇 computer network...

机构

  • 39 篇 school of comput...
  • 35 篇 school of cyber ...
  • 27 篇 national enginee...
  • 26 篇 grid computing a...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 hubei engineerin...
  • 23 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 14 篇 school of inform...
  • 12 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 beijing advanced...
  • 10 篇 national frontie...
  • 10 篇 state key labora...
  • 9 篇 huazhong univers...
  • 9 篇 cloud computing ...
  • 9 篇 school of electr...
  • 9 篇 department of co...
  • 9 篇 department of co...

作者

  • 64 篇 rajkumar buyya
  • 34 篇 buyya rajkumar
  • 29 篇 jin hai
  • 20 篇 hai jin
  • 18 篇 ismail leila
  • 17 篇 hu shengshan
  • 13 篇 materwala huned
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 niyato dusit
  • 10 篇 wei li
  • 10 篇 wan wei
  • 9 篇 dustdar schahram
  • 9 篇 liu ya-feng
  • 8 篇 bakas spyridon
  • 8 篇 yang jinzhu
  • 7 篇 kofler florian
  • 7 篇 xu wu
  • 7 篇 gill sukhpal sin...

语言

  • 848 篇 英文
  • 58 篇 其他
  • 15 篇 中文
检索条件"机构=Distributed Computing Systems Laboratory School of Computer Science and Engineering"
921 条 记 录,以下是21-30 订阅
排序:
Learning discriminative foreground-and-background features for few-shot segmentation
收藏 引用
Multimedia Tools and Applications 2024年 第18期83卷 55999-56019页
作者: Jiang, Cong Zhou, Yange Liu, Zhaoshuo Feng, Chaolu Li, Wei Yang, Jinzhu School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China College of Science Northeastern University Liaoning Shenyang110819 China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Liaoning Shenyang110819 China National Frontiers Science Center for Industrial Intelligence and Systems Optimization Liaoning Shenyang110819 China
Few-shot Semantic Segmentation (FSS) endeavors to segment novel categories in a query image by referring to a support set comprising only a few annotated examples. Presently, many existing FSS methodologies primarily ... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
When Does Sora Show:The Beginning of TAO to Imaginative Intelligence and Scenarios engineering
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第4期11卷 809-815页
作者: Fei-Yue Wang Qinghai Miao Lingxi Li Qinghua Ni Xuan Li Juanjuan Li Lili Fan Yonglin Tian Qing-Long Han School of Artificial Intelligence University of Chinese Academy of SciencesBeijing 100049China State Key Laboratory for Management and Control of Complex Systems Chinese Academy of SciencesBeijing 100190China Faculty of Innovation Engineering Macao University of Science and TechnologyMacao 999078China Department of Electrical and Computer Engineering Indiana University-Purdue University IndianapolisIndianapolisIN 46202USA Faculty of Innovation Engineering Macao University of Science and TechnologyMacao 999078China Virtual Reality Fundamental Research Laboratory Department of Mathematics and TheoriesPeng Cheng LaboratoryShenzhen 518000China State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of AutomationChinese Academy of SciencesBeijing 100190China School of Information and Electronics Beijing Institute of TechnologyBeijing 100081China School of Science Computing and Engineering TechnologiesSwinburne University of TechnologyMelbourneVIC 3122Australia
DURING our discussion at workshops for writing“What Does ChatGPT Say:The DAO from Algorithmic Intelligence to Linguistic Intelligence”[1],we had expected the next milestone for Artificial Intelligence(AI)would be in... 详细信息
来源: 评论
Online Demand Peak Shaving with Machine-Learned Advice in Cyber-Physical Energy systems
Online Demand Peak Shaving with Machine-Learned Advice in Cy...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure computing, 2023 International Conference on Pervasive Intelligence and computing, 2023 International Conference on Cloud and Big Data computing, 2023 International Conference on Cyber science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Fengl, Minxi Li, Wei Qin, Boyu Zomaya, Albert Y. Centre for Distributed and High Performance Computing School of Computer Science The University of Sydney Australia Xi'an Jiaotong University State Key Laboratory of Electrical Insulation and Power Equipment Department of Electrical Engineering China
With the deep integration of cyber tools, control algorithms are increasingly employed in cyber-physical energy systems to enhance management, cost efficiency, and robustness. Effective demand load management is cruci... 详细信息
来源: 评论
Tumor type classification and candidate cancer-specific biomarkers discovery via semi-supervised learning
收藏 引用
Biophysics Reports 2023年 第2期9卷 57-66页
作者: Peng Chen Zhenlei Li Zhaolin Hong Haoran Zheng Rong Zeng School of Computer Science and Technology University of Science and Technology of China Anhui Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Department of Systems Biology University of Science and Technology of China CAS Key Laboratory of Systems Biology Shanghai Institute of Biochemistry and Cell Biology Center for Excellence in Molecular Cell Science Chinese Academy of Sciences School of Life Science and Technology ShanghaiTech University
Identifying cancer-related differentially expressed genes provides significant information for diagnosing tumors, predicting prognoses, and effective treatments. Recently, deep learning methods have been used to perfo... 详细信息
来源: 评论
Federated Graph Learning for Cross-Domain Recommendation  38
Federated Graph Learning for Cross-Domain Recommendation
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Yang, Ziqi Peng, Zhaopeng Wang, Zihui Qi, Jianzhong Chen, Chaochao Pan, Weike Wen, Chenglu Wang, Cheng Fan, Xiaoliang Fujian Key Laboratory of Sensing and Computing for Smart Cities Xiamen University China Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University China School of Computing and Information Systems The University of Melbourne Australia College of Computer Science and Technology Zhejiang University Hangzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
Cross-domain recommendation (CDR) offers a promising solution to the data sparsity problem by enabling knowledge transfer between source and target domains. However, many recent CDR models overlook crucial issues such...
来源: 评论
On the Security of Smart Home systems:A Survey
收藏 引用
Journal of computer science & Technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Quorum sensing-based interactions among drugs,microbes,and diseases
收藏 引用
science China(Life sciences) 2023年 第1期66卷 137-151页
作者: Shengbo Wu Shujuan Yang Manman Wang Nan Song Jie Feng Hao Wu Aidong Yang Chunjiang Liu Yanni Li Fei Guo Jianjun Qiao School of Chemical Engineering and Technology Tianjin UniversityTianjin 300072China School of Computer Science and Engineering Central South UniversityChangsha 410083China State Key Laboratory of Chemical Engineering Tianjin UniversityTianjin 300072China Collaborative Innovation Center of Chemical Science and Engineering(Tianjin) Tianjin 300072China Key Laboratory of Systems Bioengineering Ministry of Education(Tianjin University)Tianjin 300072China School of Computer Science and Technology College of Intelligence and ComputingTianjin UniversityTianjin 300350China Department of Engineering Science University of OxfordOxford OX13PJUK Institute of Shaoxing Tianjin UniversityShaoxing 312300China
Many diseases and health conditions are closely related to various microbes,which participate in complex interactions with diverse drugs;nonetheless,the detailed targets of such drugs remain to be *** existing studies... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Modeling and Clustering of Parabolic Granular Data
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第7期5卷 3728-3742页
作者: Tang, Yiming Gao, Jianwei Pedrycz, Witold Hu, Xianghui Xi, Lei Ren, Fuji Hu, Min Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine School of Computer and Information Hefei230601 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6R 2V4 Canada Hefei University of Technology School of Computer and Information Hefei230601 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada Polish Academy of Sciences Systems Research Institute Warsaw00-901 Poland Istinye University Research Center of Performance and Productivity Analysis Istanbul34010 Turkey Southeast University School of Computer Science and Engineering Nanjing211189 China University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China
At present, there exist some problems in granular clustering methods, such as lack of nonlinear membership description and global optimization of granular data boundaries. To address these issues, in this study, revol... 详细信息
来源: 评论