咨询与建议

限定检索结果

文献类型

  • 419 篇 会议
  • 121 篇 期刊文献

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 414 篇 工学
    • 316 篇 计算机科学与技术...
    • 267 篇 软件工程
    • 108 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 37 篇 生物工程
    • 28 篇 电子科学与技术(可...
    • 22 篇 电气工程
    • 20 篇 机械工程
    • 20 篇 光学工程
    • 14 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 11 篇 农业工程
    • 11 篇 生物医学工程(可授...
    • 8 篇 安全科学与工程
    • 7 篇 建筑学
  • 197 篇 理学
    • 138 篇 数学
    • 43 篇 统计学(可授理学、...
    • 38 篇 生物学
    • 37 篇 物理学
    • 12 篇 系统科学
    • 11 篇 化学
  • 142 篇 管理学
    • 95 篇 图书情报与档案管...
    • 61 篇 管理科学与工程(可...
    • 29 篇 工商管理
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 11 篇 农学
    • 11 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 network coding
  • 10 篇 bandwidth
  • 10 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 computational mo...
  • 8 篇 clustering algor...
  • 8 篇 cloud computing
  • 7 篇 collaborative fi...
  • 7 篇 data models
  • 6 篇 object detection
  • 6 篇 educational inst...
  • 6 篇 servers
  • 6 篇 mapreduce
  • 6 篇 computational li...
  • 6 篇 real-time system...
  • 6 篇 entropy
  • 6 篇 web services
  • 5 篇 scalability

机构

  • 30 篇 key lab. of inte...
  • 29 篇 university of ch...
  • 20 篇 tianjin key lab....
  • 19 篇 key lab. of inte...
  • 13 篇 key lab. of inte...
  • 13 篇 school of comput...
  • 11 篇 graduate univers...
  • 11 篇 key laboratory o...
  • 11 篇 state key lab. f...
  • 10 篇 shenyang institu...
  • 10 篇 peng cheng labor...
  • 10 篇 hunan provincial...
  • 9 篇 school of comput...
  • 9 篇 graduate univers...
  • 9 篇 liaoning key lab...
  • 8 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 key lab. of inte...
  • 7 篇 school of cyber ...
  • 7 篇 institute of com...

作者

  • 25 篇 liu qun
  • 19 篇 yin zhenyu
  • 19 篇 kai lei
  • 19 篇 li hui
  • 18 篇 huang qingming
  • 12 篇 guosheng kang
  • 10 篇 liu jianxun
  • 10 篇 gao wen
  • 9 篇 kang guosheng
  • 9 篇 zhang degan
  • 9 篇 xu qianqian
  • 9 篇 zhuge hai
  • 8 篇 zhang feiqing
  • 8 篇 cao jiannong
  • 8 篇 jianxun liu
  • 7 篇 fan chao
  • 7 篇 jiang shuqiang
  • 7 篇 mi haitao
  • 7 篇 wang tao
  • 7 篇 yang yan

语言

  • 514 篇 英文
  • 21 篇 中文
  • 5 篇 其他
检索条件"机构=Key Lab. of Cloud Computing Technology"
540 条 记 录,以下是461-470 订阅
排序:
Addressing the energy hole problem based on heterogeneous clustering size for wireless sensor networks
收藏 引用
Journal of Computational Information Systems 2014年 第9期10卷 3973-3980页
作者: Song, Xiaoying Wen, Tao Guo, Quan Ma, Fengming Zhang, Dongqing Software Center Northeastern University Shenyang 110819 China Liaoning Key Lab. of Network Security and Computing Technology Dalian Neusoft Information Institute Dalian 116023 China School of Management Science Qufu Normal University Rizhao Shandong 276800 China
Clustering is one of the effective ways to solve energy hole problem for Wireless Sensor Network. So far, the approaches of heterogeneous cluster size mainly have concentrated on the design of unequal cluster protocol... 详细信息
来源: 评论
Joint Configuration Adaptation and Bandwidth Allocation for Edge-based Real-time Video Analytics
Joint Configuration Adaptation and Bandwidth Allocation for ...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Can Wang Sheng Zhang Yu Chen Zhuzhong Qian Jie Wu Mingjun Xiao State Key Lab. for Novel Software Technology Nanjing University P.R. China Center for Networked Computing Temple University School of Computer Science and Technology / Suzhou Institute for Advanced Study University of Science and Technology of China P.R. China
Real-time analytics on video data demands intensive computation resources and high energy consumption. Traditional cloud-based video analytics relies on large centralized clusters to ingest video streams. With edge co... 详细信息
来源: 评论
Multi-user Edge-assisted Video Analytics Task Offloading Game based on Deep Reinforcement Learning
Multi-user Edge-assisted Video Analytics Task Offloading Gam...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yu Chen Sheng Zhang Mingjun Xiao Zhuzhong Qian Jie Wu Sanglu Lu State Key Lab. for Novel Software Technology Nanjing University P.R. China School of Computer Science and Technology / Suzhou Institute for Advanced Study University of Science and Technology of China P.R. China Center for Networked Computing Temple University
With the development of deep learning, artificial intelligence applications and services have boomed in the recent years, including recommendation systems, personal assistant and video analytics. Similar to other serv... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
Asymmetric group key agreement
Asymmetric group key agreement
收藏 引用
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009
作者: Qianhong, Wu Yi, Mu Susilo, Willy Bo, Qin Domingo-Ferrer, Josep Universitat Rovira i Virgili Dept. of Comp. Eng. and Maths UNESCO Department of Data Privacy Tarragona Catalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing School of Computer Wuhan University China Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Australia Dept. of Maths School of Science Xi'an University of Technology China
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish a confiDential channel among group m... 详细信息
来源: 评论
The minority matters: a diversity-promoting collab.rative metric learning algorithm  22
The minority matters: a diversity-promoting collaborative me...
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Shilong Bao Qianqian Xu Zhiyong Yang Yuan He Xiaochun Cao Qingming Huang State Key Laboratory of Information Security Institute of Information Engineering CAS and School of Cyber Security University of Chinese Academy of Sciences Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS School of Computer Science and Tech. University of Chinese Academy of Sciences Alibaba Group School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and School of Computer Science and Tech. University of Chinese Academy of Sciences and Key Laboratory of Big Data Mining and Knowledge Management CAS and Peng Cheng Laboratory
Collab.rative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collab.rative Filtering. Following the convention of RS, existin...
来源: 评论
Federated Linear Bandit Learning via Over-the-air Computation
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Jiali Jiang, Yuning Liu, Xin Wang, Ting Shi, Yuanming MoE Engineering Research Center of Software/Hardware Co-design Technology and Application Shanghai Key Lab. of Trustworthy Computing East China Normal University China Automatic Control Laboratory EPFL Switzerland ShanghaiTech University China
In this paper, we investigate federated contextual linear bandit learning within a wireless system that comprises a server and multiple devices. Each device interacts with the environment, selects an action based on t... 详细信息
来源: 评论
AUCSeg: AUC-oriented Pixel-level Long-tail Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Han, Boyu Xu, Qianqian Yang, Zhiyong Bao, Shilong Wen, Peisong Jiang, Yangbangyan Huang, Qingming Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Peng Cheng Laboratory China Key Laboratory of Big Data Mining and Knowledge Management CAS China
The Area Under the ROC Curve (AUC) is a well-known metric for evaluating instance-level long-tail learning problems. In the past two decades, many AUC optimization methods have been proposed to improve model performan... 详细信息
来源: 评论
Towards Efficient Workflow Scheduling Over Yarn Cluster Using Deep Reinforcement Learning
Towards Efficient Workflow Scheduling Over Yarn Cluster Usin...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Jianguo Xue Ting Wang Puyu Cai MoE Engineering Research Center of Software/Hardware Co-design Technology and Application Shanghai Key Lab. of Trustworthy Computing East China Normal University China Department of Computer Science and Engineering Michigan State University USA
Hadoop Yarn is an open-source cluster manager responsible for resource management and job scheduling. However, data-driven applications are typically organized into workflows that consist of a series of jobs with depe...
来源: 评论