咨询与建议

限定检索结果

文献类型

  • 420 篇 会议
  • 120 篇 期刊文献

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 412 篇 工学
    • 317 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 107 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 37 篇 生物工程
    • 28 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 20 篇 光学工程
    • 20 篇 电气工程
    • 14 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 11 篇 农业工程
    • 11 篇 生物医学工程(可授...
    • 8 篇 建筑学
    • 8 篇 安全科学与工程
  • 196 篇 理学
    • 137 篇 数学
    • 43 篇 统计学(可授理学、...
    • 38 篇 生物学
    • 37 篇 物理学
    • 12 篇 系统科学
    • 11 篇 化学
  • 141 篇 管理学
    • 95 篇 图书情报与档案管...
    • 60 篇 管理科学与工程(可...
    • 29 篇 工商管理
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 11 篇 农学
    • 11 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 network coding
  • 10 篇 bandwidth
  • 10 篇 data mining
  • 9 篇 feature extracti...
  • 9 篇 training
  • 8 篇 clustering algor...
  • 8 篇 cloud computing
  • 7 篇 collaborative fi...
  • 7 篇 computational mo...
  • 7 篇 data models
  • 6 篇 object detection
  • 6 篇 educational inst...
  • 6 篇 servers
  • 6 篇 mapreduce
  • 6 篇 computational li...
  • 6 篇 real-time system...
  • 6 篇 entropy
  • 6 篇 web services
  • 5 篇 scalability

机构

  • 30 篇 key lab. of inte...
  • 29 篇 university of ch...
  • 20 篇 tianjin key lab....
  • 19 篇 key lab. of inte...
  • 13 篇 key lab. of inte...
  • 13 篇 school of comput...
  • 11 篇 graduate univers...
  • 11 篇 key laboratory o...
  • 11 篇 state key lab. f...
  • 10 篇 shenyang institu...
  • 10 篇 peng cheng labor...
  • 10 篇 hunan provincial...
  • 9 篇 school of comput...
  • 9 篇 graduate univers...
  • 9 篇 liaoning key lab...
  • 8 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 key lab. of inte...
  • 7 篇 school of cyber ...
  • 7 篇 institute of com...

作者

  • 25 篇 liu qun
  • 19 篇 yin zhenyu
  • 19 篇 kai lei
  • 19 篇 li hui
  • 18 篇 huang qingming
  • 12 篇 guosheng kang
  • 10 篇 liu jianxun
  • 10 篇 gao wen
  • 9 篇 kang guosheng
  • 9 篇 zhang degan
  • 9 篇 xu qianqian
  • 9 篇 zhuge hai
  • 8 篇 zhang feiqing
  • 8 篇 cao jiannong
  • 8 篇 jianxun liu
  • 7 篇 fan chao
  • 7 篇 jiang shuqiang
  • 7 篇 mi haitao
  • 7 篇 wang tao
  • 7 篇 yang yan

语言

  • 513 篇 英文
  • 21 篇 中文
  • 6 篇 其他
检索条件"机构=Key Lab. of Cloud Computing Technology"
540 条 记 录,以下是61-70 订阅
排序:
A Fully Pipelined High-Performance Elliptic Curve Cryptography Processor for NIST P-256
A Fully Pipelined High-Performance Elliptic Curve Cryptograp...
收藏 引用
IEEE European Test Symposium (ETS)
作者: Han Yan Shuai Chen Junying Huang Jing Ye Huawei Li Xiaowei Li State Key Lab of Processors Institute of Computing Technology CAS University of Chinese Academy of Sciences Rock-Solid Security Lab. Binary Semiconductor Co. Ltd. CASTEST Co. Ltd.
Elliptic curve cryptography (ECC) is widely used in public key encryption, but its high-speed deployment faces challenges due to algorithmic and arithmetic complexity. In this paper, we present a high-performance ECC ... 详细信息
来源: 评论
Interactive Web API Recommendation for Mashup Development based on Light Neural Graph Collab.rative Filtering
Interactive Web API Recommendation for Mashup Development ba...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Jiayan Xiang Wanjun Chen Yang Wang Bowen Liang Zihao Liu Guosheng Kang School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Hunan Provincial Key Lab. for Services Computing and Novel Software Technology HNUST Xiangtan China
With the development of Mashup technique, the number of Web APIs released on the Web continues to grow year by year. However, it is a challenging issue to find and select the desirable Web APIs among the large amount ...
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques  38
Suppress Content Shift: Better Diffusion Features via Off-th...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features  38
Not All Diffusion Model Activations Have Been Evaluated as D...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论
Data Privacy Protection for Maritime Mobile Terminals  13
Data Privacy Protection for Maritime Mobile Terminals
收藏 引用
13th International Conference on Wireless Communications and Signal Processing, WCSP 2021
作者: Jiang, Su Su, Xin Zhou, Yiqing College of IOT Engineering Hohai University Jiangsu Changzhou213022 China Beijing Key Lab. of Mobile Computing and Pervasive Devices Institute of Computing Technology University of Chinese Academy of Sciences Beijing100190 China
Mobile edge computing (MEC) can effectively support various high reliability and low delay maritime applications, but security risks in computing tasks offloading exist. We describe a maritime network (MN) model based... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
A Multi-Layer Regression based Predicable Function Fitting Network
arXiv
收藏 引用
arXiv 2022年
作者: Wan, Changlin Shi, Zhongzhi Huizhou University Guangdong516007 China CAS Key Lab. of IIP Institute of Computing Technology Beijing100190 China
Function plays an important role in mathematics and many science branches. As the fast development of computer technology, more and more study on computational function analysis, e.g., Fast Fourier Transform, Wavelet ... 详细信息
来源: 评论
REASSIGNER: A Plug-and-Play Virtual Machine Scheduling Intensifier for Heterogeneous Requests
arXiv
收藏 引用
arXiv 2022年
作者: Cui, Haochuan Sheng, Junjie Jin, Bo Hu, Yiqiu Su, Li Zhu, Lei Zhou, Wenli Wang, Xiangfeng School of Computer Science and Technology East China Normal University Shanghai200062 China Algorithm Innovation Lab. Huawei Cloud Computing Technologies Co. Shaanxi Xi’an710049 China Computing Service Product Dept. Huawei Cloud Computing Technologies Co. Shaanxi Xi’an710049 China
With the rapid development of cloud computing, virtual machine scheduling has become one of the most important but challenging issues for the cloud computing community, especially for practical heterogeneous request s... 详细信息
来源: 评论
Online Midgress-Sensitive Traffic Allocation for Percentile Charging in Pracitcal CDNs
Online Midgress-Sensitive Traffic Allocation for Percentile ...
收藏 引用
International Workshop on Quality of Service
作者: Huiyou Zhan Haisheng Tan Huang Xu Chi Zhang Hongqiu Ni Pengfei Zhang Weihua Shan Xiang-Yang Li CAS Key Lab of Wireless-Optical Communications University of Science and Technology of China China USTC-Deqing Alpha Innovation Research Institute Zhejiang China Algorithm Innovation Lab Huawei Cloud Computing Technologies Co. Ltd. Xi'an China
The traffic bandwidth costs comprise a significant amount of operating expenditure in CDNs, induced by the traffic from the end-users to edge servers (edge cost) and from the edge to the center servers (midgress cost)...
来源: 评论
AUCSeg: AUC-oriented Pixel-level Long-tail Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Han, Boyu Xu, Qianqian Yang, Zhiyong Bao, Shilong Wen, Peisong Jiang, Yangbangyan Huang, Qingming Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Peng Cheng Laboratory China Key Laboratory of Big Data Mining and Knowledge Management CAS China
The Area Under the ROC Curve (AUC) is a well-known metric for evaluating instance-level long-tail learning problems. In the past two decades, many AUC optimization methods have been proposed to improve model performan... 详细信息
来源: 评论