咨询与建议

限定检索结果

文献类型

  • 423 篇 会议
  • 121 篇 期刊文献

馆藏范围

  • 544 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 412 篇 工学
    • 317 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 107 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 37 篇 生物工程
    • 28 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 20 篇 光学工程
    • 20 篇 电气工程
    • 14 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 11 篇 农业工程
    • 11 篇 生物医学工程(可授...
    • 8 篇 建筑学
    • 8 篇 安全科学与工程
  • 197 篇 理学
    • 137 篇 数学
    • 43 篇 统计学(可授理学、...
    • 39 篇 生物学
    • 37 篇 物理学
    • 12 篇 系统科学
    • 11 篇 化学
  • 141 篇 管理学
    • 95 篇 图书情报与档案管...
    • 60 篇 管理科学与工程(可...
    • 29 篇 工商管理
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 11 篇 农学
    • 11 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 network coding
  • 10 篇 bandwidth
  • 10 篇 data mining
  • 9 篇 feature extracti...
  • 9 篇 training
  • 8 篇 clustering algor...
  • 8 篇 cloud computing
  • 7 篇 collaborative fi...
  • 7 篇 computational mo...
  • 7 篇 data models
  • 6 篇 object detection
  • 6 篇 educational inst...
  • 6 篇 servers
  • 6 篇 mapreduce
  • 6 篇 computational li...
  • 6 篇 real-time system...
  • 6 篇 entropy
  • 6 篇 web services
  • 5 篇 scalability

机构

  • 30 篇 key lab. of inte...
  • 29 篇 university of ch...
  • 20 篇 tianjin key lab....
  • 19 篇 key lab. of inte...
  • 15 篇 key lab. of inte...
  • 13 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graduate univers...
  • 11 篇 key laboratory o...
  • 11 篇 state key lab. f...
  • 10 篇 shenyang institu...
  • 10 篇 peng cheng labor...
  • 10 篇 hunan provincial...
  • 9 篇 graduate univers...
  • 9 篇 liaoning key lab...
  • 8 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 key lab. of inte...
  • 7 篇 school of cyber ...
  • 7 篇 institute of com...

作者

  • 25 篇 liu qun
  • 19 篇 yin zhenyu
  • 19 篇 kai lei
  • 19 篇 li hui
  • 18 篇 huang qingming
  • 12 篇 guosheng kang
  • 10 篇 liu jianxun
  • 10 篇 gao wen
  • 9 篇 kang guosheng
  • 9 篇 zhang degan
  • 9 篇 xu qianqian
  • 9 篇 zhuge hai
  • 8 篇 zhang feiqing
  • 8 篇 cao jiannong
  • 8 篇 jianxun liu
  • 7 篇 fan chao
  • 7 篇 jiang shuqiang
  • 7 篇 mi haitao
  • 7 篇 wang tao
  • 7 篇 yang yan

语言

  • 517 篇 英文
  • 21 篇 中文
  • 6 篇 其他
检索条件"机构=Key Lab. of Cloud Computing Technology"
544 条 记 录,以下是91-100 订阅
排序:
Big Data Reference Architectures, a systematic literature review  31
Big Data Reference Architectures, a systematic literature re...
收藏 引用
31st Australasian Conference on Information Systems, ACIS 2019
作者: Ataei, Pouya Litchfield, Alan School of Engineering Computer and Mathematical Sciences Auckland University of Technology Auckland New Zealand Service and Cloud Computing Research Lab. Auckland University of Technology Auckland New Zealand
Today, we live in a world that produces data at an unprecedented rate. The significant amount of data has raised lots of attention and many strive to harness the power of this new material. In the same direction, acad... 详细信息
来源: 评论
Combining Bilstm and Self-Attention Mechanism for Code Search
SSRN
收藏 引用
SSRN 2022年
作者: Cao, Ben Liu, Jianxun School of Computer Science and Technology Hunan University of Science and Technology Hunan411100 China Hunan Provincial Key Lab. for Services Computing and Novel Software Technology Hunan University of Science and Technology Hunan411100 China
With the wide application of deep learning in code search, especially the proposed code search model based on attention mechanism, the accuracy of code search has been greatly improved. However, the attention mechanis... 详细信息
来源: 评论
Multi-Layer Self-Attention Residual Network for Code Search
SSRN
收藏 引用
SSRN 2022年
作者: Hu, Haize Professor, Jianxun Liu School of Computer Science and Technology Hunan University of Science and Technology Hunan411100 China Hunan Provincial Key Lab. for Services Computing and Novel Software Technology Hunan University of Science and Technology Hunan411100 China
To improve the efficiency of programming, software developers usually search existing code snippets in open source code repositories to modify and reuse them. Therefore, how to get the right code snippet from the open... 详细信息
来源: 评论
Secrecy Analysis of UAV Control Information Transmission via NOMA
Secrecy Analysis of UAV Control Information Transmission via...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Zhaoxin Feng Huabing Lu Nan Zhao Zhaoyuan Shi Yunfei Chen Xianbin Wang School of Information and Communication Engineering Dalian University of Technology Dalian China Key Lab. of Intelligent Perception and Computing of Anhui Province Anqing Normal University Anqing China Department of Engineering University of Durham Durham UK Department of Electrical and Computer Engineering Western University London ON Canada
Unmanned aerial vehicle (UAV) assisted wireless communication is essential for the next-generation mobile networks. In coping with the increased dynamics in UAV networks, the design of control information transmission... 详细信息
来源: 评论
Grrln: Gated Recurrent Residual Learning Networks for Code Clone Detection
SSRN
收藏 引用
SSRN 2022年
作者: Zhang, Xiangping Xiao, Qiaoxiang Hu, Haize Liu, Jianxun Hunan Provincial Key Lab. for Services Computing and Novel Software Technology Hunan University of Science and Technology Hunan Xiangtan411100 China School of Computer Science and Technology Hunan University of Science and Technology Hunan Xiangtan411100 China
Code clone detection is a critical problem in software development and maintenance domains. It aims to identify functionally identical or similar code fragments within an application. Existing works formulate the code... 详细信息
来源: 评论
G-MAP: General Memory-Augmented Pre-trained Language Model for Domain Tasks
arXiv
收藏 引用
arXiv 2022年
作者: Wan, Zhongwei Yin, Yichun Zhang, Wei Shi, Jiaxin Shang, Lifeng Chen, Guangyong Jiang, Xin Liu, Qun Guangdong Provincial Key Laboratory of Computer Vision and Virtual Reality Technology Shenzhen Institute of Advanced Technology Chinese Academy of Science China University of Chinese Academy of Sciences China Huawei Noah's Ark Lab Hong Kong Huawei Cloud Computing Zhejiang Lab China
Recently, domain-specific PLMs have been proposed to boost the task performance of specific domains (e.g., biomedical and computer science) by continuing to pre-train general PLMs with domain-specific corpora. However... 详细信息
来源: 评论
Satellite Federated Fine-Tuning for Foundation Models in Space computing Power Networks
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, Yan Zhu, Jingyang Wang, Ting Shi, Yuanming Jiang, Chunxiao Letaief, Khaled Ben MoE Engineering Research-Center of Software/Hardware Co-design Technology and Application The Shanghai Key Lab. of Trustworthy Computing East China Normal University Shanghai200062 China School of Information Science and Technology ShanghaiTech University Shanghai201210 China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology Hong Kong
Advancements in artificial intelligence (AI) and low-earth orbit (LEO) satellites have promoted the application of large remote sensing foundation models for various downstream tasks. However, direct downloading of th... 详细信息
来源: 评论
A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of Computer Science  20
A Multi-Dimensional Assessment Model and Its Application in ...
收藏 引用
21st Annual Conference of the Special Interest Group in Information technology Education, SIGITE 2020
作者: Luo, Jiwen Lu, Feng Wang, Tao Key Lab. of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Computer science is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su... 详细信息
来源: 评论
Disentangled Hypergraph Collab.rative Filtering for Social Recommendation
Disentangled Hypergraph Collaborative Filtering for Social R...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Xiao Liu Shunmei Meng Qianmu Li Xiaolong Xu Lianyong Qi Wanchun Dou Jing Zhang Xuyun Zhang Nanjing University of Science and Technology China State Key Lab. for Novel Software Technology Nanjing University China School of Computer and Software Nanjing University of Information Science and Technology China College of Computer Science and Technology China University of Petroleum (East China) China School of Cyber Science and Engineering Southeast University China School of Computing Macquarie University Australia
In the current era of information overload, service recommendations have emerged as a valuable tool for enhancing the user experience. Among them, social recommendation models have shown promising results by incorpora...
来源: 评论
Federated Linear Bandit Learning via Over-the-air Computation
Federated Linear Bandit Learning via Over-the-air Computatio...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Jiali Wang Yuning Jiang Xin Liu Ting Wang Yuanming Shi MoE Engineering Research Center of Software/Hardware Co-design Technology and Application Shanghai Key Lab. of Trustworthy Computing East China Normal University China School of Information Science and Technology (SIST) ShanghaiTech University China Automatic Control Laboratory Ecole Polytechnique Fédérale de Lausanne (EPFL) Switzerland
In this paper, we investigate federated contextual linear bandit learning within a wireless system that comprises a server and multiple devices. Each device interacts with the environment, selects an action based on t...
来源: 评论