咨询与建议

限定检索结果

文献类型

  • 68 篇 会议
  • 35 篇 期刊文献

馆藏范围

  • 103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 69 篇 工学
    • 53 篇 计算机科学与技术...
    • 42 篇 软件工程
    • 12 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 6 篇 机械工程
    • 6 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 动力工程及工程热...
    • 2 篇 农业工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
    • 2 篇 网络空间安全
  • 36 篇 理学
    • 17 篇 数学
    • 8 篇 物理学
    • 6 篇 生物学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
    • 3 篇 天文学
    • 3 篇 地球物理学
    • 2 篇 地质学
  • 21 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 5 篇 法学
    • 3 篇 法学
    • 2 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 1 篇 教育学

主题

  • 8 篇 feature extracti...
  • 5 篇 training
  • 3 篇 anomaly detectio...
  • 3 篇 quality of servi...
  • 3 篇 smart contract
  • 3 篇 semantics
  • 2 篇 knowledge engine...
  • 2 篇 reinforcement le...
  • 2 篇 deep learning
  • 2 篇 deep neural netw...
  • 2 篇 decision tables
  • 2 篇 neural networks
  • 2 篇 trajectories
  • 2 篇 convolution
  • 2 篇 data mining
  • 2 篇 graph neural net...
  • 2 篇 acceleration
  • 2 篇 security
  • 2 篇 blockchain
  • 2 篇 low pass filters

机构

  • 16 篇 trusted cloud co...
  • 15 篇 guangxi cooperat...
  • 9 篇 school of comput...
  • 6 篇 school of inform...
  • 6 篇 guangxi key labo...
  • 6 篇 key laboratory o...
  • 6 篇 college of compu...
  • 5 篇 university of el...
  • 5 篇 school of inform...
  • 5 篇 key laboratory o...
  • 5 篇 cloud computing ...
  • 4 篇 inner mongolia e...
  • 4 篇 guangxi colleges...
  • 4 篇 inner mongolia e...
  • 4 篇 school of comput...
  • 4 篇 inner mongolia k...
  • 4 篇 laboratory of in...
  • 4 篇 guangxi cooperat...
  • 4 篇 inner mongolia k...
  • 3 篇 key laboratory o...

作者

  • 9 篇 jian-tao zhou
  • 6 篇 hao zheng
  • 5 篇 wen bin
  • 4 篇 zhou jian-tao
  • 4 篇 kang zhao
  • 3 篇 gao shangbing
  • 3 篇 zhou jiantao
  • 3 篇 lei xiaochun
  • 3 篇 wan-li song
  • 3 篇 yang qing
  • 3 篇 wang zexu
  • 3 篇 tianxi huang
  • 3 篇 guiduo duan
  • 3 篇 zhang jingwei
  • 3 篇 tao xiaoling
  • 3 篇 chen junyan
  • 3 篇 feiyu wang
  • 3 篇 xu guo
  • 3 篇 yuejia wu
  • 2 篇 yu yong

语言

  • 100 篇 英文
  • 4 篇 中文
  • 1 篇 其他
检索条件"机构=Ganzhou Key Laboratory of Cloud Computing and Big Data"
103 条 记 录,以下是81-90 订阅
排序:
Blockchain-Based Multi-cloud data Storage System Disaster Recovery
Blockchain-Based Multi-Cloud Data Storage System Disaster Re...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Feiyu Wang Jian-tao Zhou College of Computer Science Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian China
cloud storage services have been used by most businesses and individual users. However, data loss, service interruptions and cyber attacks often lead to cloud storage services not being provided properly, and these in...
来源: 评论
BMDP:Blockchain-Based Multi-cloud Storage data Provenance
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Feiyu Wang Jian-Tao Zhou Xu Guo College of Computer Science Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challe...
来源: 评论
Visitors Vis: Interactive Mining of Suspected Medical Insurance Fraud Groups  18th
Visitors Vis: Interactive Mining of Suspected Medical Insura...
收藏 引用
18th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2023
作者: Dong, Rixin Liu, Hanlin Guo, Xu Zhou, Jiantao College of Computer Science Inner Mongolia University Hohhot China National and Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolia Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
As medical insurance continues to grow in size, the losses caused by medical insurance fraud cannot be underestimated. Current data mining and predictive techniques have been applied to analyze and explore the health ... 详细信息
来源: 评论
An Uncovered Neurons Information-Based Fuzzing Method for DNN
An Uncovered Neurons Information-Based Fuzzing Method for DN...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Kecheng Tang Jian-Tao Zhou Xu Guo College of Computer Science Inner Mongolia University Hohhot China National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Fuzzing is increasingly being utilized as a method to test the reliability of Deep Learning (DL) systems. In order to detect more errors in DL systems, exploring the internal logic of more DNNs has become the main obj... 详细信息
来源: 评论
GK: A Graphormer Architecture Based Knowledge Graph Reasoning Model for Link Prediction
GK: A Graphormer Architecture Based Knowledge Graph Reasonin...
收藏 引用
IEEE International Conference on big data and cloud computing (Bdcloud)
作者: Yueiia Wu Jian-tao Zhou Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing College of Computer Science Inner Mongolia University National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Hohhot China
Knowledge Graph has become a dominant research field in graph theory, but its incompleteness and sparsity hinder its application in various fields. Knowledge Graph Reasoning aims to alleviate these problems by deducin... 详细信息
来源: 评论
Automatic salient object segmentation via shape prior based active contour model
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第11期7卷 2491-2496页
作者: Gao, Shangbing Zhang, Youdong Zhou, Jun Zheng, Hao The Key Laboratory for Traffic and Transportation Security of Jiangsu Province Faculty of Computer and Software Engineering No. 1 Meicheng Rd. Huai’an223003 China Jiangsu Provincial Key Laboratory for Advanced Manufacturing Technology Huaiyin Institute of Technology No. 1 Meicheng Rd. Huai’an223003 China Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiaozhuang University No. 3601 Hongjing Ave. Jiangning Dist. Nanjing211171 China
In this paper, we propose a novel model for unsupervised segmentation of viewer's attention object from natural images based on localizing region-based active con-tour (LRAC). Firstly, we proposed the saliency det... 详细信息
来源: 评论
Budgeted Persuasion on User Opinions via Varying Susceptibility
Budgeted Persuasion on User Opinions via Varying Susceptibil...
收藏 引用
IEEE International Conference on Performance, computing and Communications (IPCCC)
作者: Wenyi Tang Xinrui Xu Guangchun Luo Zaobo He Kaiming Zhan School of Computer Science and Engineering University of Electronic Science and Technology of China School of Information and Software Engineering University of Electronic Science and Technology of China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Miami University Sichuan Jiuyuan Yinhai Software Co. Ltd
Nowadays, the social network becomes an indispensable part of people's daily life, meanwhile offers an unprecedentedly convenient access for purposive individuals to influence the opinions of network users. Curren... 详细信息
来源: 评论
Pre-classification Supporting Reasoning for Document-level Relation Extraction  21
Pre-classification Supporting Reasoning for Document-level R...
收藏 引用
Proceedings of the 10th International Joint Conference on Knowledge Graphs
作者: Jiehao Zhao Guiduo Duan Tianxi Huang School of Computer Science and Engineering University of Electronic Science and Technology of China China School of Computer Science and Engineering Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province University of Electronic Science and Technology of China China Department of Fundamental Courses Chengdu Textile College China
The document-level relation extraction task aims to extract relational triples from a document consisting of multiple sentences. Most previous models focus on modeling the dependency between the entities and neglect t... 详细信息
来源: 评论
Relation-Guided Representation Learning
arXiv
收藏 引用
arXiv 2020年
作者: Kang, Zhao Lu, Xiao Liang, Jian Bai, Kun Xu, Zenglin School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Cloud and Smart Industries Group Tencent Beijing China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Center for Artificial Intelligence Peng Cheng Lab Shenzhen China
Deep auto-encoders (DAEs) have achieved great success in learning data representations via the powerful representability of neural networks. But most DAEs only focus on the most dominant structures which are able to r... 详细信息
来源: 评论
A New Construction Method of Regeneration Tree for Single Node Fault Repair Mechanism in Distributed Storage System
A New Construction Method of Regeneration Tree for Single No...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Wei Guo Yong Wang Miao Ye School of Computer Science and Information Security Guilin University of Electronic Technoloay Guilin Guangxi China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi China
Comparing with the classic redundancy policy of multi-replica technology, Erasure code is preferred due to its higher utilization rate of storage space in distributed storage system. As one kind of the important Erasu... 详细信息
来源: 评论