咨询与建议

限定检索结果

文献类型

  • 75 篇 会议
  • 26 篇 期刊文献

馆藏范围

  • 101 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 53 篇 计算机科学与技术...
    • 41 篇 软件工程
    • 27 篇 信息与通信工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 控制科学与工程
    • 4 篇 机械工程
    • 4 篇 电气工程
    • 3 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 冶金工程
    • 2 篇 动力工程及工程热...
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
  • 21 篇 理学
    • 12 篇 数学
    • 5 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 3 篇 生物学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 天文学
  • 20 篇 管理学
    • 11 篇 图书情报与档案管...
    • 9 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 军事学

主题

  • 10 篇 network coding
  • 7 篇 bandwidth
  • 5 篇 educational inst...
  • 4 篇 real-time system...
  • 4 篇 clustering algor...
  • 3 篇 load modeling
  • 3 篇 data mining
  • 3 篇 servers
  • 3 篇 computational li...
  • 3 篇 media
  • 3 篇 multicast
  • 3 篇 semantics
  • 3 篇 entropy
  • 3 篇 virtualization
  • 3 篇 cloud computing
  • 3 篇 data models
  • 2 篇 maintenance engi...
  • 2 篇 routing
  • 2 篇 delays
  • 2 篇 throughput

机构

  • 5 篇 shenzhen key lab...
  • 5 篇 university of ch...
  • 4 篇 school of mathem...
  • 4 篇 shenzhen key lab...
  • 3 篇 school of inform...
  • 3 篇 key lab. of clou...
  • 3 篇 institute of big...
  • 3 篇 institute of big...
  • 3 篇 shenzhen enginee...
  • 2 篇 national digital...
  • 2 篇 the shenzhen key...
  • 2 篇 huawei cloud com...
  • 2 篇 dept. of electro...
  • 2 篇 cloud computing ...
  • 2 篇 shenzhen key lab...
  • 2 篇 高可信软件技术教...
  • 2 篇 huawei technolog...
  • 2 篇 huawei noah's ar...
  • 2 篇 guangdong poya i...
  • 2 篇 guangxi cooperat...

作者

  • 19 篇 kai lei
  • 17 篇 li hui
  • 7 篇 huang lian'en
  • 7 篇 hui li
  • 7 篇 chen fuxing
  • 6 篇 yang yan
  • 6 篇 lei kai
  • 5 篇 wang hongjun
  • 4 篇 wang wei
  • 4 篇 kuai xu
  • 4 篇 liu weiyang
  • 3 篇 pei yulong
  • 3 篇 ying shen
  • 3 篇 jie yuan
  • 3 篇 jincheng wu
  • 3 篇 kai zhang
  • 3 篇 mahmood amjad
  • 3 篇 pan kai
  • 3 篇 qian yu
  • 3 篇 zhang jinyuan

语言

  • 91 篇 英文
  • 10 篇 中文
检索条件"机构=Key Lab of Cloud Computing Technology"
101 条 记 录,以下是51-60 订阅
排序:
Design of People Flow Monitoring System in Public Place based on MD-MCNN
Design of People Flow Monitoring System in Public Place base...
收藏 引用
2020 International Conference on 5G Mobile Communication and Information Science, MCIS-5G 2020
作者: Tianmin, Xiong Xiaochun, Lei Xingwen, Zheng Junyan, Chen Yizhou, Feng School of Computer and Information Security Guilin University of Electronic Technology Guilin541004 China Guangxi Colleges and Universities Key Lab. of Intelligent Processing of Computer Images and Graphics Guilin541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin541004 China
Due to the limitation of hardware resources, the traditional people flow monitoring system based on computer vision in public places can't meet different crowd-scale scenarios. Therefore, a people flow monitoring ... 详细信息
来源: 评论
Design of Intelligent Robot Platform based on Multi-sensor Fusion
Design of Intelligent Robot Platform based on Multi-sensor F...
收藏 引用
2020 International Conference on 5G Mobile Communication and Information Science, MCIS-5G 2020
作者: Dajin, Ya Xiaochun, Lei Yue, Li Junyan, Chen Rongcun, Huang Lin, Lan School of Computer and Information Security Guilin University of Electronic Technology Guilin541004 China Guangxi Colleges and Universities Key Lab. of Intelligent Processing of Computer Images and Graphics Guilin541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin541004 China
The mobile robot adapts to the more complicated indoor and outdoor environments, and can expand its scope of application. In order to reduce the influence of the cumulative error caused by navigation in complex enviro... 详细信息
来源: 评论
An Entropy-based Probabilistic Forwarding Strategy in Named Data Networking
An Entropy-based Probabilistic Forwarding Strategy in Named ...
收藏 引用
IEEE International Conference on Communications
作者: Kai Lei Jiawei Wang Jie Yuan Institute of Big Data Technologies Shenzhen Key Lab for Cloud Computing Technology & Applications School of Electronics and Computer Engineering (SECE) Peking University
The forwarding strategy is the key to the resiliency and efficiency of Named Data Networking (NDN), which is a new and fundamental research area. For forwarding strategy, dynamically selecting an optimal interface fro... 详细信息
来源: 评论
HoPP: Hardware-Software Co-Designed Page Prefetching for Disaggregated Memory
HoPP: Hardware-Software Co-Designed Page Prefetching for Dis...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Haifeng Li Ke Liu Ting Liang Zuojun Li Tianyue Lu Hui Yuan Yinben Xia Yungang Bao Mingyu Chen Yizhou Shan Chinese Academy of Sciences State Key Lab of Processors Institute of Computing Technology University of Chinese Academy of Sciences Huawei Technologies Huawei Cloud
Memory disaggregation is a promising direction to mitigate memory contention in datacenters. To make memory disaggregation practical, prior efforts expose remote memory to applications transparently via virtual memory... 详细信息
来源: 评论
A computer-supported collaborative learning platform based on clouds
收藏 引用
Journal of Computational Information Systems 2011年 第11期7卷 3811-3818页
作者: Li, Jiandun Peng, Junjie Zhang, Wu Han, Fangfang Yuan, Qin Joint Lab of Cloud Computing School of Computer Engineering and Science Shanghai University Shanghai 200072 China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Computer-supported collaborative learning (CSCL) is an emerging branch of learning science concerned with studying how people can learn together with the help of computers. As an indispensable ingredient, computer med... 详细信息
来源: 评论
Uncertainty-aware complementary label queries for active learning
收藏 引用
Frontiers of Information technology & Electronic Engineering 2023年 第10期24卷 1497-1503页
作者: Shengyuan LIU Ke CHEN Tianlei HU Yunqing MAO Key Lab of Intelligent Computing Based Big Data of Zhejiang Province Zhejiang UniversityHangzhou 310027China State Key Laboratory of Blockchain and Data Security Zhejiang UniversityHangzhou 310027China City Cloud Technology(China)Co. Ltd.Hangzhou 310000China
Many active learning methods assume that a learner can simply ask for the full annotations of some training data from *** methods mainly try to cut the annotation costs by minimizing the number of annotation ***,annot... 详细信息
来源: 评论
IFS-RL: An intelligent forwarding strategy based on reinforcement learning in named-data networking
IFS-RL: An intelligent forwarding strategy based on reinforc...
收藏 引用
2018 ACM SIGCOMM Workshop on Network Meets AI and ML, NetAI 2018
作者: Zhang, Yi Xu, Kuai Bai, Bo Lei, Kai Shenzhen Key Lab for Cloud Computing Technology and Applications School of Electronic and Computer Engineering Peking University Shenzhen China School of Mathematical and Natural Sciences Arizona State University Arizona United States Future Network Theory Lab 2012 Labs Huawei Technologies Co. Ltd. Shatin N.T. Hong Kong
Named-Data Networking (NDN) is a new communication paradigm where network primitives are based on named-data rather than host identifiers. Compared with IP, NDN has a unique feature that forwarding plane enables each ... 详细信息
来源: 评论
Impact of HTTP Pipelining Mechanism for Web Browsing Optimization
Impact of HTTP Pipelining Mechanism for Web Browsing Optimiz...
收藏 引用
IEEE International Conference on Mobile Services (MS)
作者: Kai Shuang Tong Zhang Zhenjiang Dong Peng Xu State Key Lab of Networking & Switching Technology Beijing University of Posts & Telecommunications Beijing China ZTE cloud computing & IT Research Institute Nanjing China
With the rapid development and popularization of Web technology, how Web applications can be accessed quickly by users has become a concern in all Web application developers. At present, the optimization of the HTTP p... 详细信息
来源: 评论
Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs
Threshold-Based Secure and Privacy-Preserving Message Verifi...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Wei Gao Mingzhong Wang Liehuang Zhu Xiaoping Zhang Language Information Processing and Cloud Computing Application Beijing Institute of Technology National Key Lab of Vehicular Transmission China North Vehicle Research Institute
Messages spreading inside vehicular ad hoc networks (VANETs) generally need to achieve the property of verifiability and content integrity, while preserving user privacy. Otherwise, VANETs will either fall into chaos,... 详细信息
来源: 评论
A Practical Approach for Automatically Constructing Concept Map in E-learning Environments
A Practical Approach for Automatically Constructing Concept ...
收藏 引用
2014 IEEE International Conference on Progress in Informatics and computing
作者: Na Yi Hui Li Shenzhen Eng. Lab. of Converged Networks Technology Shenzhen Key Lab. of Cloud Computing Tech. and App Peking University Shenzhen Graduate School
With the prevalence of web-based learning, the application of concept mapping, as a powerful diagnostic and instructional tool, has been widely exploited in both education and computer science. In recent years, severa... 详细信息
来源: 评论