咨询与建议

限定检索结果

文献类型

  • 42 篇 会议
  • 31 篇 期刊文献

馆藏范围

  • 73 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 34 篇 计算机科学与技术...
    • 25 篇 软件工程
    • 10 篇 信息与通信工程
    • 6 篇 动力工程及工程热...
    • 6 篇 电气工程
    • 6 篇 控制科学与工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 航空宇航科学与技...
    • 3 篇 安全科学与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
  • 20 篇 理学
    • 13 篇 数学
    • 5 篇 生物学
    • 5 篇 统计学(可授理学、...
    • 2 篇 化学
    • 2 篇 系统科学
  • 12 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 法学
    • 2 篇 社会学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 2 篇 药学(可授医学、理...
  • 1 篇 教育学

主题

  • 7 篇 feature extracti...
  • 5 篇 deep learning
  • 4 篇 neural networks
  • 4 篇 machine learning
  • 4 篇 accuracy
  • 4 篇 cloud computing
  • 3 篇 quality of servi...
  • 3 篇 computational mo...
  • 3 篇 edge computing
  • 3 篇 data models
  • 3 篇 energy efficienc...
  • 2 篇 access control
  • 2 篇 base stations
  • 2 篇 deep neural netw...
  • 2 篇 telecommunicatio...
  • 2 篇 training data
  • 2 篇 anomaly detectio...
  • 2 篇 electroencephalo...
  • 2 篇 educational inst...
  • 2 篇 vectors

机构

  • 6 篇 intelligent and ...
  • 6 篇 intelligent dist...
  • 6 篇 school of comput...
  • 5 篇 guangxi intellig...
  • 4 篇 school of automa...
  • 4 篇 sino-german coll...
  • 4 篇 national water a...
  • 4 篇 nuclear power in...
  • 3 篇 key laboratory o...
  • 3 篇 intelligent game...
  • 3 篇 school of comput...
  • 3 篇 school of inform...
  • 2 篇 university of ai...
  • 2 篇 school of comput...
  • 2 篇 key laboratory o...
  • 2 篇 intelligent and ...
  • 2 篇 national water a...
  • 2 篇 network interfac...
  • 2 篇 national univers...
  • 2 篇 key laboratory o...

作者

  • 7 篇 ismail leila
  • 7 篇 materwala huned
  • 6 篇 ningjiang chen
  • 6 篇 leila ismail
  • 4 篇 chen ningjiang
  • 4 篇 li ruixuan
  • 4 篇 ruixuan li
  • 4 篇 yuanjie zheng
  • 3 篇 huned materwala
  • 3 篇 tianjiang wang
  • 2 篇 ping an
  • 2 篇 liyu gong
  • 2 篇 wu guohua
  • 2 篇 yang bo
  • 2 篇 xie yufei
  • 2 篇 yingxiong nong
  • 2 篇 liming fang
  • 2 篇 juan chen
  • 2 篇 zhengding lu
  • 2 篇 sun zibin

语言

  • 68 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Intelligent and Distributed Computing Laboratory"
73 条 记 录,以下是1-10 订阅
排序:
Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles  18th
Recommendation-Aware Collaborative Edge Caching Strategy in...
收藏 引用
18th International Conference on Wireless Artificial intelligent computing Systems and Applications, WASA 2024
作者: Ou, Pingjie Chen, Ningjiang Huang, Zizhan School of Computer and Electronic Information Guangxi University Guangxi Nanning530004 China Key Laboratory of Parallel Distributed and Intelligent Computing Education Department of Guangxi Zhuang Autonomous Region Guangxi University Guangxi Nanning530004 China
Due to the limited resources of edge networks, the heterogeneity of user content requests, high-cost caching from direct resource hits, and redundancy in resource retention time hinder system performance. Traditional ... 详细信息
来源: 评论
Deep anomaly detection with partition contrastive learning for tabular data
收藏 引用
Data Mining and Knowledge Discovery 2025年 第4期39卷 1-38页
作者: Li, Yizhou Wang, Yijie Xu, Hongzuo Li, Bin Zhou, Xiaohui National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China Intelligent Game and Decision Lab (IGDL) Beijing China
Self-supervised anomaly detection (AD) methods define transformations and surrogate tasks to deeply learn data “normality”, presenting superior performance. Different from most existing work designed for images, thi... 详细信息
来源: 评论
HyperGAC: Information Entropy-Driven Resource Allocation for Cloud-Edge-End computing
收藏 引用
Journal of Grid computing 2025年 第2期23卷 1-23页
作者: Chen, Juan Bai, Lin Chen, Ningjiang Yang, Yubin School of Computer and Electronic Information Guangxi University Nanning China Key Laboratory of Parallel Distributed and Intelligent Computing (Guangxi University) Education Department of Guangxi Zhuang Autonomous Region Nanning China Guangxi Center of Technology Innovation for Intelligent Digital Services Nanning China
Cloud-Edge-End computing provides favorable support for emerging applications by virtue of its low-latency and high reliability. Resource allocation strategies significantly impact the quality of service and response ... 详细信息
来源: 评论
Deep Time Series Anomaly Detection with Local Temporal Pattern Learning
Deep Time Series Anomaly Detection with Local Temporal Patte...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yizhou Li Yijie Wang Hongzuo Xu Xiaohui Zhou National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China Intelligent Game and Decision Lab (IGDL) Beijing China
Self-supervised time series anomaly detection (TSAD) demonstrates remarkable performance improvement by extracting high-level data semantics through proxy tasks. Nonetheless, most existing self-supervised TSAD techniq... 详细信息
来源: 评论
An End-to-End Classification Network Model Based on Hybrid Supervision for Industrial Surface Defect Detection
收藏 引用
International Journal of Pattern Recognition and Artificial Intelligence 2025年 第5期39卷
作者: Qin, Runbing Chen, Ningjiang Gan, Shukun Guangxi University School of Computer Electronics and Information Nanning530004 China Education Department of Guangxi Zhuang Autonomous Region Key Laboratory of Parallel Distributed and Intelligent Computing Guangxi University Nanning530004 China Guangxi Intelligent Digital Services Research Center of Engineering Technology Nanning530004 China
Industrial part surface defect detection aims to precisely locate defects in images, which is crucial for quality control in manufacturing. The traditional method needs to be designed in advance, but it has shortcomin... 详细信息
来源: 评论
A Multi-holder Role and Strange Attractor-Based Data Possession Proof in Medical Clouds  24th
A Multi-holder Role and Strange Attractor-Based Data Possess...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Guo, Jinyuan Sun, Lijuan Wu, Jingchen Chu, Chiawei Gao, Yutong Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cybersecurity Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Ethnic Language Intelligent Analysis and Security Governance Ministry of Education Minzu University Beijing China Intellectual Property Information Service Center BHU Beihang University Beijing China City University of Macau Taipa China Li’an International Education Innovation Pilot Zone Hainan International College of Minzu University of China Hainan Beijing China
Proof of Data Possession is a technique for ensuring the integrity of data stored in cloud storage. However, most audit schemes assume only one role for data owners, which is not suitable for complex Smart Healthcare ... 详细信息
来源: 评论
Towards intelligent Transportation with Pedestrians and Vehicles In-the-Loop: A Surveillance Video-Assisted Federated Digital Twin Framework
arXiv
收藏 引用
arXiv 2025年
作者: Li, Xiaolong Wei, Jianhao Wang, Haidong Dong, Li Chen, Ruoyang Yi, Changyan Cai, Jun Niyato, Dusit Shen, Xuemin The Xiangjiang Laboratory Hunan Provincial General University Key Laboratory of IoT Intelligent Sensing and Distributed Collaborative Optimization Hunan University of Technology and Business Changsha410205 China The College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China The Department of Electrical and Computer Engineering University of Concordia Montreal Canada The College of Computing and Data Science Nanyang Technological University Singapore The Department of Electrical and Computer Engineering University of Waterloo Canada
In intelligent transportation systems (ITSs), incorporating pedestrians and vehicles in-the-loop is crucial for developing realistic and safe traffic management solutions. However, there is falls short of simulating c... 详细信息
来源: 评论
Type-2 fuzzy description logic
收藏 引用
Frontiers of Computer Science 2011年 第2期5卷 205-215页
作者: Ruixuan LI Kunmei WEN Xiwu GU Yuhua LI Xiaolin SUN Bing LI Intelligent and Distributed Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China
Description logics (DLs) are widely employed in recent semantic web application systems. However, classical description logics are limited when dealing with imprecise concepts and roles, thus providing the motivatio... 详细信息
来源: 评论
Optimizing ranking method using social annotations based on language model
收藏 引用
Artificial Intelligence Review 2014年 第1期41卷 81-96页
作者: Wen, Kunmei Li, Ruixuan Xia, Jing Gu, Xiwu Intelligent and Distributed Computing laboratory of theHuaZhong University of Science and Technology WuHan China 709th Research Institute China Shipbuilding Industry Corporation WuHan China
Recent research has shown that more and more web users utilize social annotations to manage and organize their interested resources. Therefore, with the growing popularity of social annotations, it is becoming more an... 详细信息
来源: 评论
ESFMTO: A reliable task offloading strategy based on edge server failure model in IIoT
收藏 引用
Ad Hoc Networks 2025年 176卷
作者: Yubin Yang Yan Chen Ningjiang Chen Juan Chen School of Computer and Electronic Information Guangxi University Nanning 530004 China Key Laboratory of Parallel Distributed and Intelligent Computing (Guangxi University) Education Department of Guangxi Zhuang Autonomous Region Nanning 530004 China Guangxi Center of Technology Innovation for Intelligent Digital Services Nanning 530004 China
The extensive use of automation equipment and sensors in the Industrial Internet of Things (IIoT) has led to a significant increase in data volume, which has placed higher demands on the real-time processing capabilit... 详细信息
来源: 评论