咨询与建议

限定检索结果

文献类型

  • 68 篇 会议
  • 35 篇 期刊文献

馆藏范围

  • 103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 69 篇 工学
    • 53 篇 计算机科学与技术...
    • 42 篇 软件工程
    • 12 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 6 篇 机械工程
    • 6 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 动力工程及工程热...
    • 2 篇 农业工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
    • 2 篇 网络空间安全
  • 36 篇 理学
    • 17 篇 数学
    • 8 篇 物理学
    • 6 篇 生物学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
    • 3 篇 天文学
    • 3 篇 地球物理学
    • 2 篇 地质学
  • 21 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 5 篇 法学
    • 3 篇 法学
    • 2 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 1 篇 教育学

主题

  • 8 篇 feature extracti...
  • 5 篇 training
  • 3 篇 anomaly detectio...
  • 3 篇 quality of servi...
  • 3 篇 smart contract
  • 3 篇 semantics
  • 2 篇 knowledge engine...
  • 2 篇 reinforcement le...
  • 2 篇 deep learning
  • 2 篇 deep neural netw...
  • 2 篇 decision tables
  • 2 篇 neural networks
  • 2 篇 trajectories
  • 2 篇 convolution
  • 2 篇 data mining
  • 2 篇 graph neural net...
  • 2 篇 acceleration
  • 2 篇 security
  • 2 篇 blockchain
  • 2 篇 low pass filters

机构

  • 16 篇 trusted cloud co...
  • 15 篇 guangxi cooperat...
  • 9 篇 school of comput...
  • 6 篇 school of inform...
  • 6 篇 guangxi key labo...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...
  • 5 篇 university of el...
  • 5 篇 school of inform...
  • 5 篇 key laboratory o...
  • 5 篇 cloud computing ...
  • 4 篇 inner mongolia e...
  • 4 篇 guangxi colleges...
  • 4 篇 inner mongolia e...
  • 4 篇 school of comput...
  • 4 篇 inner mongolia k...
  • 4 篇 laboratory of in...
  • 4 篇 guangxi cooperat...
  • 4 篇 inner mongolia k...
  • 3 篇 key laboratory o...

作者

  • 9 篇 jian-tao zhou
  • 6 篇 hao zheng
  • 5 篇 wen bin
  • 4 篇 zhou jian-tao
  • 4 篇 kang zhao
  • 3 篇 gao shangbing
  • 3 篇 zhou jiantao
  • 3 篇 lei xiaochun
  • 3 篇 wan-li song
  • 3 篇 yang qing
  • 3 篇 wang zexu
  • 3 篇 tianxi huang
  • 3 篇 guiduo duan
  • 3 篇 zhang jingwei
  • 3 篇 tao xiaoling
  • 3 篇 chen junyan
  • 3 篇 feiyu wang
  • 3 篇 xu guo
  • 3 篇 yuejia wu
  • 2 篇 yu yong

语言

  • 100 篇 英文
  • 4 篇 中文
  • 1 篇 其他
检索条件"机构=Ganzhou Key Laboratory of Cloud Computing and Big Data"
103 条 记 录,以下是91-100 订阅
排序:
Sledge: Towards Efficient Live Migration of Docker Containers
Sledge: Towards Efficient Live Migration of Docker Container...
收藏 引用
IEEE International Conference on cloud computing, cloud
作者: Bo Xu Song Wu Jiang Xiao Hai Jin Yingxi Zhang Guoqiang Shi Tingyu Lin Jia Rao Li Yi Jizhong Jiang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory of Intelligent Manufacturing System Technology Beijing China The University of Texas at Arlington Arlington TX USA Alibaba Cloud Computing Co. Ltd. Hangzhou China
Modern large-scale cloud platforms require live migration technique on Docker containers with stateful workload to support load balancing, host maintenance, and Quality of Service (QoS) improvement. Efficient and scal... 详细信息
来源: 评论
On-edge multi-task transfer learning: Model and practice with data-driven task allocation
arXiv
收藏 引用
arXiv 2021年
作者: Zheng, Zimu Chen, Qiong Hu, Chuang Wang, Dan Liu, Fangming The National Engineering Research Center for Big Data Technology and System Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China The Edge Cloud Innovation Lab. Technical Innovation Department Cloud BU Huawei Technologies Co. Ltd. Shenzhen China The Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong Hong Kong
On edge devices, data scarcity occurs as a common problem where transfer learning serves as a widely-suggested remedy. Nevertheless, transfer learning imposes heavy computation burden to the resource-constrained edge ... 详细信息
来源: 评论
Malicious Family Identify Combining Multi-channel Mapping Feature Image and Fine-Tuned CNN
Malicious Family Identify Combining Multi-channel Mapping Fe...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Chenghua Tang Chen Zhou Min Hu Mengmeng Yang Baohua Qiang Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Strategic Centre for Research in Privacy-Preserving Technologies & Systems Nanyang Technological University Singapore Guangxi Cloud Computing and Big Data Collaborative Innovation Center Guilin University of Electronic Technology Guilin China
Using the features of malicious family to detect malicious code can improve the analysis efficiency and reduce the workload. Aiming at the problems of low efficiency and low accuracy of classifiers in analyzing and de... 详细信息
来源: 评论
Robust unsupervised feature selection by nonnegative sparse subspace learning
收藏 引用
Neurocomputing 2019年 334卷 156-171页
作者: Wei Zheng Hui Yan Jian Yang School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China School of Computer Engineering Jinling Institute of Technology Nanjing PR China PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiaozhuang University Nanjing PR China
Sparse subspace learning has been demonstrated to be effective in data mining and machine learning. In this paper, we cast the unsupervised feature selection scenario as a matrix factorization problem from the viewpoi... 详细信息
来源: 评论
Weighted Discriminative Dictionary Learning based on Low-rank Representation
收藏 引用
Journal of Physics: Conference Series 2017年 第1期787卷
作者: Heyou Chang Hao Zheng Key Laboratory of Trusted Cloud Computing and Big Data Analysis School of Information Engineering Nanjing XiaoZhuang University Nanjing China
Low-rank representation has been widely used in the field of pattern classification, especially when both training and testing images are corrupted with large noise. Dictionary plays an important role in low-rank repr...
来源: 评论
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey
Deep Learning for Password Guessing and Password Strength Ev...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Tao Zhang Zelei Cheng Yi Qin Qiang Li Lin Shi Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Guangxi University for Nationalities Nanning China Department of Computer and Information Technology Purdue University West Lafayette USA PLA Information Engineering University Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
Text passwords are the most widely used authentication methods and will also be used in the future. Text passwords can be regarded as meaningful strings, and deep learning methods have an advantage of text processing.... 详细信息
来源: 评论
A Blockchain-based Revocable Certificateless Signature Scheme for IoT Device
收藏 引用
International Journal of Network Security 2021年 第6期23卷 1012-1027页
作者: Chen, Yushuang Zheng, Dong Guo, Rui Zhang, Yinghui Tao, Xiaoling School of Cyberspace Security Xi’an University of Posts and Telecommunications Xi’an710121 China State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China National Engineering Laboratory for Wireless Security Xi’an University of Posts and Telecommunications Guilin University of Electronic Technology Guilin541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin541004 China
With the rapid development of Internet of Things (IoT) technology, completing a transaction with intelligent devices has been an essential communication mode in our daily life. Generally, lightweight smart devices con... 详细信息
来源: 评论
Micro-Expression Recognition based on 2D Gabor Filter and Sparse Representation
收藏 引用
Journal of Physics: Conference Series 2017年 第1期787卷
作者: Hao Zheng Key Laboratory of Trusted Cloud Computing and Big Data Analysis School of Information Engineering Nanjing XiaoZhuang University Nanjing China MOE Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering Southeast University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Micro-expression recognition is always a challenging problem for its quick facial expression. This paper proposed a novel method named 2D Gabor filter and Sparse Representation (2DGSR) to deal with the recognition of ...
来源: 评论
Research on SDN Multi Controller Deployment based on K-means++
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1606卷
作者: Li Yue Chen Junyan Liang Chuxin Lei Xiaochun School of computer and information security Guilin University of Electronic Technology Guilin 541004 China Guangxi cloud computing and big data collaborative innovation center Guilin 541001 China Guangxi key laboratory of image and graphic intelligent processing Guilin 541004 China
In large-scale SDN network, a single centralized controller can not meet the demand, and multiple controllers are needed to deal with the problem, which leads to the problem of multi control balanced deployment. In th...
来源: 评论
Design of Intelligent Robot Platform based on Multi-sensor Fusion
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1606卷
作者: Ya Dajin Lei Xiaochun Li Yue Chen Junyan Huang Rongcun Lan Lin School of computer and information security Guilin University of Electronic Technology Guilin 541004 China Guangxi Colleges and Universities Key Laboratory of Intelligent Processing of Computer Images and Graphics Guilin 541004 China Guangxi Cooperative Innovation Center of cloud computing and Big Data Guilin University of Electronic Technology Guilin 541004 China
The mobile robot adapts to the more complicated indoor and outdoor environments, and can expand its scope of application. In order to reduce the influence of the cumulative error caused by navigation in complex enviro...
来源: 评论