咨询与建议

限定检索结果

文献类型

  • 2,719 篇 会议
  • 2,057 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 4,777 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,218 篇 工学
    • 2,019 篇 计算机科学与技术...
    • 1,611 篇 软件工程
    • 569 篇 信息与通信工程
    • 439 篇 控制科学与工程
    • 391 篇 电子科学与技术(可...
    • 368 篇 机械工程
    • 347 篇 电气工程
    • 322 篇 生物工程
    • 294 篇 光学工程
    • 197 篇 仪器科学与技术
    • 193 篇 生物医学工程(可授...
    • 169 篇 化学工程与技术
    • 126 篇 动力工程及工程热...
    • 113 篇 材料科学与工程(可...
    • 103 篇 交通运输工程
    • 91 篇 土木工程
    • 90 篇 建筑学
  • 1,667 篇 理学
    • 889 篇 数学
    • 436 篇 物理学
    • 352 篇 生物学
    • 246 篇 统计学(可授理学、...
    • 175 篇 系统科学
    • 164 篇 化学
  • 833 篇 管理学
    • 524 篇 管理科学与工程(可...
    • 336 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 163 篇 医学
    • 143 篇 临床医学
    • 115 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
  • 96 篇 法学
    • 77 篇 社会学
  • 56 篇 经济学
  • 51 篇 农学
  • 29 篇 教育学
  • 16 篇 艺术学
  • 13 篇 军事学
  • 6 篇 文学

主题

  • 129 篇 laboratories
  • 123 篇 feature extracti...
  • 103 篇 computer archite...
  • 99 篇 semantics
  • 93 篇 training
  • 89 篇 computational mo...
  • 71 篇 optimization
  • 70 篇 computer science
  • 67 篇 deep learning
  • 60 篇 virtual reality
  • 58 篇 object detection
  • 54 篇 computer vision
  • 51 篇 image segmentati...
  • 49 篇 data mining
  • 48 篇 educational tech...
  • 48 篇 clustering algor...
  • 46 篇 neural networks
  • 46 篇 visualization
  • 45 篇 accuracy
  • 45 篇 delay

机构

  • 184 篇 state key labora...
  • 184 篇 hubei province k...
  • 175 篇 state key labora...
  • 125 篇 school of comput...
  • 122 篇 department of co...
  • 116 篇 key laboratory o...
  • 107 篇 college of compu...
  • 94 篇 tianjin key labo...
  • 93 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 74 篇 department of co...
  • 70 篇 university of ch...
  • 69 篇 state key labora...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 hubei province k...
  • 54 篇 school of comput...
  • 53 篇 school of softwa...
  • 48 篇 school of comput...
  • 47 篇 peng cheng labor...

作者

  • 50 篇 xiaowei li
  • 35 篇 heng pheng-ann
  • 32 篇 dan feng
  • 32 篇 jianwei niu
  • 31 篇 li jia
  • 30 篇 huawei li
  • 29 篇 zhang hua
  • 28 篇 zhou mengchu
  • 28 篇 ren jiadong
  • 27 篇 niu jianwei
  • 25 篇 li bo
  • 25 篇 aimin hao
  • 25 篇 jin hai
  • 23 篇 chen xiaowu
  • 23 篇 hai jin
  • 23 篇 wang chundong
  • 22 篇 yu hu
  • 22 篇 shuai li
  • 21 篇 li peng
  • 21 篇 liu jun

语言

  • 4,432 篇 英文
  • 214 篇 中文
  • 139 篇 其他
检索条件"机构=Key Laboratory for Computer Virtual Technology and System"
4777 条 记 录,以下是281-290 订阅
排序:
Scheduling Algorithm for Low Energy Consumable Parallel Task Application Based on DVFS  1
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Liu, Xun Zhao, Hui College of Computer Science and Technology Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China Henan University Kaifeng475000 China
With the continuous improvement of various high-performance computing systems, various data centers had also been fully expanded. Energy consumption and actual performance measurement were very important indicators, w... 详细信息
来源: 评论
Object Oriented BDD and Executable Human-Language Module Specification  26
Object Oriented BDD and Executable Human-Language Module Spe...
收藏 引用
26th ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD-Winter 2023
作者: Lee, Eric Gong, Jiayu Cao, Qinghong Intelligent Technology Co. Ltd. Shanghai China Shanghai Key Laboratory of Computer Software Testing & Evaluation Shanghai Development Center of Computer Software Technology Shanghai China System Operation Department Shanghai Stock Exchange Shanghai China
This paper presents an approach to software development which uses a generative AI Model as compiler to translate human language requirements into high-level programming language. We propose an executable human-langua... 详细信息
来源: 评论
A Practical Cloud API Complementary Recommendation Service for Mashup Creation
A Practical Cloud API Complementary Recommendation Service f...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xiaowei Liu Wenhui Chen Mengmeng Sun Yali Si Zhen Chen School of Information Science and Engineering Yanshan University Qinhuangdao China School of Computer Science and Engineering Changshu Institute of Technology Changshu China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao China
With the popularity of the service-oriented development paradigm in the cloud era, numerous cloud APIs have been developed. The continuous proliferation of cloud APIs has submerged developers in a sea of options, brin... 详细信息
来源: 评论
A Programming Language Learning Service by Linking Stack Overflow with Textbooks
A Programming Language Learning Service by Linking Stack Ove...
收藏 引用
2023 IEEE International Conference on Web Services, ICWS 2023
作者: Wu, Jiawei Sun, Yanchun Zhang, Jiaqi Zhou, Yuqi Huang, Gang Ministry of Education Key Laboratory of High Confidence Software Technologies China Peking University School of Computer Science Beijing China Peking University School of Software and Microelectronics Beijing China National Key Laboratory of Data Space Technology and System China
Before software developers actually start coding, an essential requirement is to be proficient in a programming language. However, as an important learning resource, programming language textbooks usually contain much... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
PMM: A Smart Shopping Guider Based on Mobile AR  23
PMM: A Smart Shopping Guider Based on Mobile AR
收藏 引用
16th International Symposium on Visual Information Communication and Interaction, VINCI 2023
作者: Han, Jiahao Ding, Zhifei Chen, Yuxuan Yu, Lingxin Chen, Siru Liu, Richen School of Computer and Electronic Information/School of Artificial Intelligence Nanjing Normal University China School of Computer and Electronic Information/School of Artificial Intelligence Nanjing Normal University China and State Key Laboratory of Virtual Reality Technology and Systems Beihang University China
Augmented reality (AR) is a burgeoning interaction technology with the ability to provide users with immersive everyday experiences. Shopping is among the most common experiences. When consumers purchase products, the... 详细信息
来源: 评论
User Behavior-Based Collaborative Filtering Recommendation Algorithm and Visualization in Second-Hand Trading Platform  2
User Behavior-Based Collaborative Filtering Recommendation A...
收藏 引用
2nd IEEE International Conference on Sensors, Electronics and computer Engineering, ICSECE 2024
作者: Qiao, Rui Wang, Xin Zhong, Xiaoben School of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Hubei Wuhan China Yunnan College of Business Management Anning650301 China
In the backdrop of the digital era, the demand for second-hand trading within campuses has seen a significant rise. This project aims at designing a second-hand trading platform that merges the latest technological tr... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Feature Decoupled of Deep Mutual Information Maximization  2
Feature Decoupled of Deep Mutual Information Maximization
收藏 引用
2nd International Conference on Automation, Robotics and computer Engineering, ICARCE 2023
作者: He, Xing Peng, Changgen Wang, Lin Tan, Weijie Wang, Zifan State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guizhou Minzu University Guiyang China Guizhou Big Data Academy Guizhou University Guiyang China Guizhou Minzu University Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guiyang China Institute of Guizhou Aerospace Measuring and Testing Technology Guiyang China
In deep learning, supervised learning techniques usually require a large amount of expensive labeled data to train the network, and the feature representations extracted by the model usually mix multiple attributes, r... 详细信息
来源: 评论
An NTT/INTT Accelerator with Ultra-High Throughput and Area Efficiency for FHE  24
An NTT/INTT Accelerator with Ultra-High Throughput and Area ...
收藏 引用
61st ACM/IEEE Design Automation Conference, DAC 2024
作者: Lu, Zhaojun Yu, Weizong Xu, Peng Wang, Wei Zhang, Jiliang Feng, Dengguo Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Hust Wuhan JinYinHu Laboratory Hubei Wuhan China School of Cyber Science and Engineering Hust Hubei Wuhan China School of Computer Science and Technology Hust Hubei Wuhan China Hnu Hunan Changsha China State Key Laboratory of Cryptology Beijing China
As a core arithmetic operation and security guarantee of Fully Homomorphic Encryption (FHE), Number Theoretic Transform (NTT) of a large degree is the primary source of computational and time overhead. In this paper, ... 详细信息
来源: 评论