咨询与建议

限定检索结果

文献类型

  • 70 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 90 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 54 篇 工学
    • 47 篇 计算机科学与技术...
    • 42 篇 软件工程
    • 15 篇 信息与通信工程
    • 11 篇 电气工程
    • 9 篇 动力工程及工程热...
    • 8 篇 生物工程
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 5 篇 生物医学工程(可授...
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 安全科学与工程
    • 3 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
  • 26 篇 理学
    • 11 篇 数学
    • 9 篇 生物学
    • 4 篇 化学
    • 4 篇 系统科学
    • 3 篇 物理学
    • 3 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 training
  • 4 篇 deep learning
  • 4 篇 blockchain
  • 4 篇 data models
  • 4 篇 web services
  • 3 篇 smart cities
  • 3 篇 computational mo...
  • 3 篇 feature extracti...
  • 3 篇 edge computing
  • 2 篇 surveys
  • 2 篇 reliability
  • 2 篇 object detection
  • 2 篇 task analysis
  • 2 篇 throughput
  • 2 篇 time factors
  • 2 篇 transformers
  • 2 篇 wireless communi...
  • 2 篇 medical services
  • 2 篇 quality of servi...
  • 2 篇 smart contract

机构

  • 24 篇 school of comput...
  • 24 篇 hunan key labora...
  • 8 篇 hunan university...
  • 7 篇 hunan university...
  • 7 篇 school of comput...
  • 6 篇 hunan key labora...
  • 6 篇 state key labora...
  • 5 篇 school of inform...
  • 4 篇 changsha univers...
  • 4 篇 guangdong financ...
  • 4 篇 school of softwa...
  • 4 篇 school of comput...
  • 4 篇 college of compu...
  • 4 篇 hunan key labora...
  • 4 篇 hunan key labora...
  • 3 篇 hunan university...
  • 3 篇 school of comput...
  • 3 篇 hunan university...
  • 3 篇 nanjing universi...
  • 2 篇 school of physic...

作者

  • 9 篇 liang wei
  • 9 篇 cao buqing
  • 9 篇 liu jianxun
  • 6 篇 huang weihong
  • 6 篇 wei liang
  • 5 篇 tang bing
  • 5 篇 cai jiahong
  • 5 篇 qing yang
  • 5 篇 bing tang
  • 5 篇 zhu hangyu
  • 4 篇 li kuanching
  • 4 篇 xiao yufeng
  • 4 篇 kang guosheng
  • 4 篇 wen yiping
  • 4 篇 li kuan-ching
  • 4 篇 yufeng xiao
  • 4 篇 gong yinyan
  • 4 篇 jiahong cai
  • 3 篇 yuzhen liu
  • 3 篇 li xiong

语言

  • 88 篇 英文
  • 2 篇 其他
检索条件"机构=Hunan Key Laboratory for Service computing and Novel Software Technology"
90 条 记 录,以下是51-60 订阅
排序:
ESR: Optimizing Gene Feature Selection for scRNA-seq Data
ESR: Optimizing Gene Feature Selection for scRNA-seq Data
收藏 引用
IEEE International Conference on Cyber Security and Cloud computing (CSCloud)
作者: Tao Huang Xiang Chen Li Peng School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan Hunan China Hunan Key Laboratory for Service computing and Novel Software Technology
The rapid development of single-cell RNA sequencing (scRNA-seq) technology has enabled researchers to explore gene expression differences at the level of individual cells, revealing more refined cell types and states....
来源: 评论
scIAMC:Single-Cell Imputation via adaptive matrix completion
scIAMC:Single-Cell Imputation via adaptive matrix completion
收藏 引用
IEEE International Conference on Cyber Security and Cloud computing (CSCloud)
作者: Shuai Zhang Xiang Chen Li Peng School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan Hunan China Hunan Key Laboratory for Service computing and Novel Software Technology
Single-cell sequencing techniques are often impacted by technical noise, leading to the generation of very sparse expression matrices. This technical noise is referred to as dropouts and poses as a major challenge for...
来源: 评论
SyNet:Medical image anomaly detection with noise synthesis network
SyNet:Medical image anomaly detection with noise synthesis n...
收藏 引用
IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart computing (HPSC) and Intelligent Data and Security (IDS)
作者: Jingnian Liu Wei Liang Yuxiang Chen Kai Jin School of Computer Science and Engineering Hunan Key Laboratory for Service Computing and Novel Software Technology Hunan University of Science and Technology Xiangtang China
Medical image anomaly detection refers to machine learning techniques to analyze and identify lesions and abnormalities in them. However, in medical images, anomaly samples are usually sparse, which can lead to superv... 详细信息
来源: 评论
A Short Review of Truck and Drone Collaborative Delivery Problem
A Short Review of Truck and Drone Collaborative Delivery Pro...
收藏 引用
IEEE International Conference on Cyber Security and Cloud computing (CSCloud)
作者: Yena Zhu Min Liu Dongyao Jin School of Computer Science and Engineering Hunan University of Science and Technology Hunan Key Laboratory for Service computing and Novel Software Technology Xiangtan China
With the emergence of efficient logistics models and the development of drone technology, the last-mile delivery problem has become a focus of attention for scholars in various fields. The advantages of drones, such a...
来源: 评论
Energy-saving Processors Two-phases Frequency Reduction Algorithm on Heterogeneous Embedded Systems
Energy-saving Processors Two-phases Frequency Reduction Algo...
收藏 引用
IEEE International Conference on Cyber Security and Cloud computing (CSCloud)
作者: Weihong Huang Kuan Jiang Jing Huang Li Lisi Yufeng Xiao Zihao Deng School of Computer Science and Engineering Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China
Energy saving has become a key issue for heterogeneous embedded systems. Previous energy-saving methods attempt to minimize the energy consumption of applications in heterogeneous embedded systems subject to deadline ...
来源: 评论
A Comprehensive Overview of Object Detection Based on Deep Learning
A Comprehensive Overview of Object Detection Based on Deep L...
收藏 引用
Intelligent Data and Security (IDS), IEEE International Conference on
作者: Gaojing Yuan Linshu Chen Jiahong Cai Chaoyi Yang Jinnian Liu Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
Target detection is an important task in the field of computer vision and its application has been extended to the medical field. In the medical field, target detection techniques can be used for diagnosis, treatment ... 详细信息
来源: 评论
Evolution of Web API Cooperation Network via Exploring Community Structure and Popularity
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6659-6671页
作者: Kang, Guosheng Wang, Yang Liu, Jianxun Cao, Buqing Xiao, Yong Xu, Yu Hunan University of Science and Technology Hunan Provincial Key Laboratory for Services Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China University of Cambridge Cambridge Baker Systems Genomics Initiative British Heart Foundation Cardiovascular Epidemiology Unit Department of Public Health and Primary Care CambridgeCB1 8RN United Kingdom
With the growing popularity of the Internet, Web applications have become increasingly essential in our daily lives. Web application programming interfaces (Web APIs) play a crucial role in facilitating interaction be... 详细信息
来源: 评论
Towards Planning Package Delivery Paths by Exploiting the Crowd of Private Cars
Towards Planning Package Delivery Paths by Exploiting the Cr...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Hejing Nie Yiping Wen Tiancai Li Sipeng OuYang Muyang Tian School of Computer Science and Engineering Hunan University of Science and Technology China Hunan Key Laboratory for Service computing and Novel Software Technology Hunan University of Science & Technology
Crowdsourced delivery can provide cost-effective deliveries and it is becoming increasingly important in practice. This paper considers a package delivery problem which exploits relays of private cars to transport pac... 详细信息
来源: 评论
Explainable AI: A Way to Achieve Trustworthy AI
Explainable AI: A Way to Achieve Trustworthy AI
收藏 引用
IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart computing (HPSC) and Intelligent Data and Security (IDS)
作者: Yanlu Li Yufeng Xiao Yinyan Gong Ronglin Zhang Yingzi Huo Yanbing Wu Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
AI is black-box and non-explainable, in other words, due to the complexity of the decision-making process of AI, people are unable to know why and how AI makes the decision. For these reasons, people will question and... 详细信息
来源: 评论
PRIVACY-PRESERVING ONLINE SHARING CHARGING PILE SCHEME WITH DIFFERENT NEEDS MATCHING
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Zhiyu School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China
With the development of electric vehicles, more and more electric vehicles have difficulties in parking and charging. One of the reasons is that the number of charging piles is difficult to support the energy supply o... 详细信息
来源: 评论