咨询与建议

限定检索结果

文献类型

  • 2,488 篇 期刊文献
  • 1,920 篇 会议
  • 1 册 图书

馆藏范围

  • 4,409 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,803 篇 工学
    • 1,893 篇 计算机科学与技术...
    • 1,540 篇 软件工程
    • 605 篇 信息与通信工程
    • 358 篇 电气工程
    • 338 篇 控制科学与工程
    • 326 篇 生物工程
    • 236 篇 化学工程与技术
    • 216 篇 电子科学与技术(可...
    • 184 篇 生物医学工程(可授...
    • 171 篇 光学工程
    • 162 篇 机械工程
    • 120 篇 动力工程及工程热...
    • 111 篇 材料科学与工程(可...
    • 95 篇 仪器科学与技术
    • 94 篇 交通运输工程
    • 93 篇 土木工程
    • 86 篇 建筑学
    • 86 篇 网络空间安全
  • 1,676 篇 理学
    • 773 篇 数学
    • 507 篇 物理学
    • 412 篇 生物学
    • 265 篇 统计学(可授理学、...
    • 262 篇 化学
    • 104 篇 系统科学
  • 728 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 257 篇 医学
    • 202 篇 临床医学
    • 125 篇 基础医学(可授医学...
  • 130 篇 法学
    • 101 篇 社会学
  • 92 篇 农学
  • 81 篇 经济学
  • 43 篇 教育学
  • 14 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 148 篇 semantics
  • 125 篇 feature extracti...
  • 118 篇 deep learning
  • 109 篇 training
  • 85 篇 computational mo...
  • 69 篇 machine learning
  • 67 篇 accuracy
  • 62 篇 data mining
  • 62 篇 federated learni...
  • 60 篇 convolution
  • 57 篇 data models
  • 55 篇 predictive model...
  • 53 篇 graph neural net...
  • 48 篇 hadrons
  • 46 篇 adaptation model...
  • 45 篇 neural networks
  • 45 篇 contrastive lear...
  • 44 篇 object detection
  • 42 篇 visualization
  • 41 篇 image segmentati...

机构

  • 228 篇 university of ch...
  • 171 篇 iccub universita...
  • 170 篇 department of ph...
  • 170 篇 infn sezione di ...
  • 168 篇 infn sezione di ...
  • 168 篇 yandex school of...
  • 165 篇 cavendish labora...
  • 165 篇 school of physic...
  • 163 篇 infn sezione di ...
  • 162 篇 infn sezione di ...
  • 161 篇 van swinderen in...
  • 159 篇 horia hulubei na...
  • 157 篇 h.h. wills physi...
  • 157 篇 department of ph...
  • 147 篇 imperial college...
  • 137 篇 stfc rutherford ...
  • 136 篇 universiteit maa...
  • 134 篇 institute of par...
  • 126 篇 center for high ...
  • 125 篇 state key labora...

作者

  • 116 篇 beiter a.
  • 116 篇 arzymatov k.
  • 116 篇 barter w.
  • 116 篇 brundu d.
  • 115 篇 bellee v.
  • 102 篇 bowcock t.j.v.
  • 102 篇 casse g.
  • 102 篇 blake t.
  • 102 篇 borsato m.
  • 102 篇 betancourt c.
  • 102 篇 belin s.
  • 102 篇 amato s.
  • 102 篇 boettcher t.
  • 101 篇 bobulska d.
  • 101 篇 afsharnia h.
  • 100 篇 belavin v.
  • 100 篇 bediaga i.
  • 100 篇 cali s.
  • 100 篇 baryshnikov f.
  • 100 篇 bjørn m.

语言

  • 3,536 篇 英文
  • 805 篇 其他
  • 89 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 3 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Hubei Key Laboratory of Big Data in Science and Technology"
4409 条 记 录,以下是151-160 订阅
排序:
Optimization of cloud computing task scheduling based on whale optimization algorithm with quasi-opposition-based and nonlinear factor  6
Optimization of cloud computing task scheduling based on wha...
收藏 引用
6th International Conference on Internet of Things, Automation and Artificial Intelligence, IoTAAI 2024
作者: Xuan, Xiong Li, Shaobo Yu, Liya Wu, Fengbin Zhang, Xingxing An, Xue College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China Guizhou University College of Mechanical Engineering Guiyang550025 China
Task scheduling has a significant impact on the resource availability and operation cost of the system in cloud computing. In order to improve the efficiency of task execution in the cloud for a given computational re...
来源: 评论
An enhanced exponential distribution optimizer for solving task scheduling in cloud computing systems  4
An enhanced exponential distribution optimizer for solving t...
收藏 引用
4th International Conference on Advanced Algorithms and Neural Networks, AANN 2024
作者: Wu, Fengbin Li, Shaobo Wu, Libang Xiong, Xuan Xie, Rongxiang State Key Laboratory of Public Big Data Guizhou University China Guizhou Institute of Technology China College of Computer Science and Technology Guizhou University China
Cloud computing has become integral to information technology, offering a flexible and scalable way to access and utilize computing resources. In cloud computing, task scheduling policies can affect the resource usage... 详细信息
来源: 评论
Resolution-Adaptive Representation Learning via Eliminating Abnormal Features for Cross-Resolution Person Re-Identification  14
Resolution-Adaptive Representation Learning via Eliminating ...
收藏 引用
14th International Conference on Information technology in Medicine and Education, ITME 2024
作者: Lu, Xing Lai, Fengshan Cao, Zhixiang Xia, Daoxun Guizhou Normal University School of Big Data and Computer Science Guiyang China Guizhou Normal University Key Laboratory of Information and Computing Science Guizhou Province Guiyang China Guizhou Normal University Engineering Laboratory for Applied Technology of Big Data in Education Guiyang China
Cross-resolution person re-identification(CR-ReID) seeks to overcome the challenge of retrieving and matching specific person images across cameras with varying resolutions. Numerous existing studies utilize establish... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Fine-Grained Access Control Proxy Re-encryption with HRA Security from Lattice  18th
Fine-Grained Access Control Proxy Re-encryption with HRA Se...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Hou, Jinqiu Peng, Changgen Tan, Weijie Zhong, Chongyi Niu, Kun Li, Hu State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Key Laboratory of Advanced Manufacturing Technology Ministry of Education Guizhou University Guiyang550025 China School of Mathematics and Big data Guizhou Education University Guiyang550025 China
With the gradual formation of the cloud computing ecosystem, the value of cloud computing is becoming increasingly evident, and the accompanying information security issues have become core elements. The challenge lie... 详细信息
来源: 评论
Knowledge Graph for China's Genealogy1
收藏 引用
IEEE Transactions on Knowledge and data Engineering 2023年 第1期35卷 634-646页
作者: Wu, Xindong Jiang, Tingting Zhu, Yi Bu, Chenyang Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Ministry of Education Anhui Hefei230009 China Hefei University of Technology Research Institute of Big Knowledge Anhui Hefei230009 China Mininglamp Technology Mininglamp Academy of Sciences Beijing100102 China Hefei University of Technology School of Computer Science and Information Engineering Anhui Hefei230009 China Hefei University of Technology Ministry of Education Key Laboratory of Knowledge Engineering with Big Data Anhui Hefei230009 China
Genealogical knowledge graphs depict the relationships of family networks and the development of family histories. They can help researchers to analyze and understand genealogical data, search for genealogical descend... 详细信息
来源: 评论
Spatiotemporal deformation analysis of glaciers and surrounding landscapes in the Shishapangma region using InSAR techniques
收藏 引用
Journal of Mountain science 2025年 第1期22卷 210-229页
作者: LIANG Wenli LIU Rui JI Qin KOU Pinglang Chongqing Key Laboratory of GIS Application School of Geography and TourismChongqing Normal UniversityChongqing 401331China National Earth System Science Data Center Beijing 100000China Chongqing Engineering Research Center of Spatial Big Data Intelligent Technology Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Tourism Multisource Data Perception and Decision Ministry of Culture and Tourism(TMDPDMCT)Chongqing University of Posts and TelecommunicationsChongqing 400065China
Glacier dynamics in the Himalayan midlatitudes,particularly in regions like the Shishapangma,are not yet fully understood,especially the localized topographic and climatic impacts on glacier *** study analyzes the spa... 详细信息
来源: 评论
Evaluation of the quality of grassroots statistics based on a combined empowerment cloud model  4
Evaluation of the quality of grassroots statistics based on ...
收藏 引用
4rth International Conference on Applied Mathematics, Modelling, and Intelligent Computing, CAMMIC 2024
作者: Wang, Kexin Huang, Xing Lu, Qinghua Mao, Jiayuan Key Laboratory of Public Big Data Security Technology Chongqing College of Mobile Communication Chongqing401420 China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420 China Chongqing College of Mobile Communication Chongqing401420 China College of Science Chongqing University of Technology Chongqing400054 China
High-quality grass-roots statistics are an important guarantee to objectively reflect the development of grass-roots social and economic operations and provide strong data support for government decision-making. A com... 详细信息
来源: 评论
Inductive Relation Prediction by Disentangled Subgraph Structure
收藏 引用
Tsinghua science and technology 2024年 第5期29卷 1566-1579页
作者: Guiduo Duan Rui Guo Wenlong Luo Guangchun Luo Tianxi Huang Laboratory of Intelligent Collaborative Computing University of Electronic Science and Technology of ChinaChengdu 611731Chinaand also with Trusted Cloud Computing and Big Data Key Laboratory of Sichuan ProvinceChengdu 611731China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China Hangzhou NetEase Cloud Music Technology Co. Ltd.Hangzhou 310052China Department of Fundamental Courses Chengdu Textile CollegeChengdu 611700China
Currently,most existing inductive relation prediction approaches are based on subgraph structures,with subgraph features extracted using graph neural networks to predict ***,subgraphs may contain disconnected regions,... 详细信息
来源: 评论
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on Adaptive Perturbation on Federated Graph Learning  25
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on ...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Li, Ken Shi, Bin Wei, Jiazhe Dong, Bo School of Computer Science and Technology Xi’an Jiaotong University Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an China School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China School of Distance Education Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China
Federated Graph Learning (FedGL) is an emerging Federated Learning (FL) framework that learns the graph data from various clients to train better Graph Neural Networks(GNNs) model. Owing to concerns regarding the secu... 详细信息
来源: 评论