咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 52 篇 期刊文献

馆藏范围

  • 162 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 105 篇 工学
    • 87 篇 计算机科学与技术...
    • 73 篇 软件工程
    • 27 篇 信息与通信工程
    • 13 篇 光学工程
    • 10 篇 电气工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 7 篇 控制科学与工程
    • 5 篇 机械工程
    • 5 篇 交通运输工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
    • 3 篇 建筑学
    • 3 篇 环境科学与工程(可...
    • 2 篇 仪器科学与技术
  • 62 篇 理学
    • 39 篇 数学
    • 19 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 10 篇 生物学
    • 5 篇 化学
    • 3 篇 系统科学
  • 36 篇 管理学
    • 21 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 11 篇 法学
    • 10 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 农学

主题

  • 10 篇 feature extracti...
  • 6 篇 image segmentati...
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 reinforcement le...
  • 5 篇 data mining
  • 5 篇 computational mo...
  • 4 篇 big data
  • 4 篇 optimization
  • 4 篇 security
  • 4 篇 clustering algor...
  • 4 篇 software
  • 4 篇 data models
  • 3 篇 complex networks
  • 3 篇 conferences
  • 3 篇 long short-term ...
  • 3 篇 vocabulary
  • 3 篇 face recognition
  • 3 篇 learning algorit...
  • 3 篇 servers

机构

  • 37 篇 fujian provincia...
  • 29 篇 college of mathe...
  • 26 篇 college of compu...
  • 18 篇 fujian provincia...
  • 15 篇 key laboratory o...
  • 11 篇 fujian provincia...
  • 10 篇 key laboratory o...
  • 7 篇 fujian provincia...
  • 7 篇 fujian provincia...
  • 6 篇 fujian provincia...
  • 6 篇 key laboratory o...
  • 6 篇 college of mathe...
  • 5 篇 engineering rese...
  • 5 篇 fujian provincia...
  • 4 篇 information engi...
  • 4 篇 fujian key labor...
  • 4 篇 fuzhou universit...
  • 4 篇 school of inform...
  • 4 篇 the key laborato...
  • 3 篇 faculty of mathe...

作者

  • 22 篇 guo wenzhong
  • 11 篇 wang shiping
  • 11 篇 guo kun
  • 9 篇 ke xiao
  • 8 篇 yu zhiyong
  • 7 篇 xiaodong wu
  • 7 篇 guolong chen
  • 6 篇 xing chen
  • 6 篇 chen zhaoliang
  • 6 篇 xiao ke
  • 6 篇 chen yuzhong
  • 5 篇 wenzhong guo
  • 5 篇 huang fangwan
  • 5 篇 wang tao
  • 5 篇 wu zhihao
  • 5 篇 li zuoyong
  • 5 篇 yanhua liu
  • 5 篇 chen xing
  • 4 篇 lin dazhen
  • 4 篇 chen guolong

语言

  • 157 篇 英文
  • 3 篇 其他
  • 2 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information"
162 条 记 录,以下是21-30 订阅
排序:
A Local Regression-Based SLA-Aware Energy-Efficient Virtual Machine Consolidation Algorithm in Data Centers  9
A Local Regression-Based SLA-Aware Energy-Efficient Virtual ...
收藏 引用
9th International Conference on Big Data computing and Communications, BigCom 2023
作者: Wu, Xiaodong Wang, Ronghai Lin, Guoxin Quanzhou Normal University School of Mathmatics and Computer Science China Fujian Province University Fujian Provincial Key Laboratory of Data-Intensive Computing Key Laboratory of Intelligent Computing and Information Processing Fujian China Provincial Big Data Research Institute of Intelligent Manufacturing Quanzhou China
Virtual Machine Consolidation (VMC) is an effective means to improve the resource utilization and reduce energy consumption of data centers. However, the VMC optimization that only considers energy consumption may lea... 详细信息
来源: 评论
Research on the Security Defense Strategy of Smart City's Substitution Computer Network in Big Data  5
Research on the Security Defense Strategy of Smart City's Su...
收藏 引用
5th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2021
作者: Ye, Yuguang Quanzhou Normal University fujian Quanzhou362000 China Fujian Provincial Key Laboratory of Data Intensive Computing fujian Quanzhou362000 China Key Laboratory of Intelligent Computing and Information Processing Fujian Province University fujian Quanzhou362000 China
With the rapid development of the information technology era, the era of big data has also arrived. While computer networks are promoting the prosperity and development of society, their applications have become more ... 详细信息
来源: 评论
Regression-based execution time prediction in hadoop environment
Regression-based execution time prediction in hadoop environ...
收藏 引用
International Conference on information Technology and Computer Application Engineering, ITCAE 2014
作者: Wu, Xiao Dong Zeng, Yu Zhu Zhao, C.T. Faculty of Mathematics and Computer Science Quanzhou Normal University China Fujian Provincial Key Laboratory of Data Intensive Computing China Key Laboratory of Intelligent Computing and Information Processing Fujian Province University China
Hadoop MapReduce has been proven an effective computing model to deal with big data for the last few years. However, one technical challenge facing this framework is how to predict the execution time of an individual ... 详细信息
来源: 评论
Attack intent analysis method based on attack path graph  9
Attack intent analysis method based on attack path graph
收藏 引用
9th International Conference on Communication and Network Security, ICCNS 2019
作者: Chen, Biqiong Liu, Yanhua Li, Shijin Gao, Xiaoling College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论
A comprehensive assessment method of asset importance for key asset protection  9
A comprehensive assessment method of asset importance for ke...
收藏 引用
9th International Conference on Communication and Network Security, ICCNS 2019
作者: Gao, Xiaoling Liu, Yanhua Qiu, Yanbin Liu, Huajun College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论
A Dynamic Community Detection Algorithm Based on Parallel Incremental Related Vertices  2
A Dynamic Community Detection Algorithm Based on Parallel In...
收藏 引用
2017 IEEE 2nd International Conference on Big Data Analysis(ICBDA 2017)
作者: Guohui Li Kun Guo YuZhong Chen Ling Wu Danhong Zhu College of Mathematics and Computer Sciences Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing(Fuzhou University) Key Laboratory of Spatial Data Mining & Information Sharing Ministry of Education
One of the traditional ways for detecting dynamic communities is to find the communities at each interval through the static community detection ***,it usually leads to high computation *** this paper,a novel algorith... 详细信息
来源: 评论
Abnormal network traffic detection based on leaf node density ratio  9
Abnormal network traffic detection based on leaf node densit...
收藏 引用
9th International Conference on Communication and Network Security, ICCNS 2019
作者: Liu, Huajun Liu, Zhanghui Liu, Yanhua Gao, Xiaoling College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
As the network evolves, cyber-attacks become more and more diverse. In the process of detecting network traffic, the most complicated but also the most important task is to find unknown abnormal network traffic data i... 详细信息
来源: 评论
Generalized Self-Adaption Network for Domain Adaptation  2
Generalized Self-Adaption Network for Domain Adaptation
收藏 引用
2nd International Conference on Artificial Intelligence and intelligent information Processing, AIIIP 2023
作者: Bian, Yongheng Ke, Xiao College of Computer and Data Science Fuzhou University Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou350116 China Key Laboratory of Spatial Data Mining & Information Sharing Ministry of Education Fuzhou350003 China
The purpose of domain adaptation is to transfer knowledge learned in the labeled source domain to unlabeled but related target domains without requiring a large number of target domain labels. The latest method of dom... 详细信息
来源: 评论
Parallel Multi-Label Propagation Based on Influence Model and Its Application to Overlapping Community Discovery
Parallel Multi-Label Propagation Based on Influence Model an...
收藏 引用
作者: Qiu, Qirong Guo, Wenzhong Chen, Yuzhong Guo, Kun Li, Rongrong School of Economics and Management Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350116 China College of Mathematics and Computer Science Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fuzhou350116 China
Finding communities in networks is one of the challenging issues in complex network research. We have to deal with very large networks that contain billions of vertices, which makes community discovery a computational... 详细信息
来源: 评论
Few-Shot Object Detection Based on Generalized Features  2
Few-Shot Object Detection Based on Generalized Features
收藏 引用
2nd International Conference on Artificial Intelligence and intelligent information Processing, AIIIP 2023
作者: Chen, Qiuqin Ke, Xiao College of Computer and Data Science Fuzhou University Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou350116 China Key Laboratory of Spatial Data Mining & Information Sharing Ministry of Education Fuzhou Fuzhou350003 China
Few-shot object detection aims to rapidly detect novel classes of objects using a minimal number of annotated instances. Compared to methods such as meta-learning, few-shot object detection based on transfer learning ... 详细信息
来源: 评论