咨询与建议

限定检索结果

文献类型

  • 250 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 264 篇 工学
    • 211 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 54 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 7 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 86 篇 管理学
    • 49 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 16 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 156 篇 school of inform...
  • 97 篇 shandong provinc...
  • 78 篇 shandong provinc...
  • 18 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 school of softwa...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 11 篇 shandong provinc...
  • 11 篇 school of inform...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zhang huaxiang
  • 21 篇 zheng xiangwei
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 377 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
389 条 记 录,以下是71-80 订阅
排序:
Feature and Performance Comparison of FaaS Platforms
Feature and Performance Comparison of FaaS Platforms
收藏 引用
IEEE International Conference on software Engineering and Service Sciences (ICSESS)
作者: Penghui Ma Peichang Shi Guodong Yi National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha China Xiangjiang Lab Changsha China School of Advanced Interdisciplinary Studies Hunan University Of Technology and Business Changsha China
With serverless computing offering more efficient and cost-effective application deployment, the diversity of serverless platforms presents challenges to users, including platform lock-in and costly migration. Moreove...
来源: 评论
Financial Trading Decisions based on Deep Fuzzy Self-Organizing Map
arXiv
收藏 引用
arXiv 2022年
作者: Dehao, Pei Chao, Luo School of Information Science and Engineering Shandong Normal University Jinan250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan250014 China
The volatility features of financial data would considerably change in different periods, that is one of the main factors affecting the applications of machine learning in quantitative trading. Therefore, to effective... 详细信息
来源: 评论
Towards Accurate and Efficient Super Spreader Detection with Sketching
Towards Accurate and Efficient Super Spreader Detection with...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Shouyou Song Pu Wang Yangchun Li Nanyang Wang Wei Jiang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education BUPT Beijing China Chinese Academy of Cyberspace Studies Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT Beijing China School of Computer and Information Engineering Chuzhou University Anhui China
Super spreaders are the flow that have a large number of distinct connections (also called spread), which related with many threats to networks. Estimating flow spread is the crucial step in super spreader detection. ...
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle Networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
PPSS: A Privacy-Preserving Supervision Scheme Based on Blockchain
PPSS: A Privacy-Preserving Supervision Scheme Based on Block...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Ming Chen Peichang Shi Xiang Fu Feng Jiang Fei Gao Penghui Ma Jinzhu Kong National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha China Kylin Software Co.LTD Changsha China Zhejiang Lab Hangzhou China
In JointCloud Computing, multi-party participation introduces complexity and uncertainty. For all participants in JointCloud Computing, both continuous supervision and necessary privacy protection are required. Tradit... 详细信息
来源: 评论
TNRAS: Tor Nodes Reliability Analysis Scheme  2021
TNRAS: Tor Nodes Reliability Analysis Scheme
收藏 引用
2021 the 11th International Conference on Communication and Network Security
作者: Wenzhen Zhang Tianbo Lu Zeyu Du School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications China and Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications China School of Computer Science (National Pilot Software Engineering School) School of Cyberspace Security Beijing University of Posts and Telecommunications China and Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications China
With the rapid Internet development, the security attacks become more and more noteworthy that people have paid more concentration on personal privacy. The Onion Router (Tor), a distributed anonymous communication net... 详细信息
来源: 评论
FCloudless: A Performance-Aware Collaborative Mechanism for JointCloud Serverless
FCloudless: A Performance-Aware Collaborative Mechanism for ...
收藏 引用
IEEE International Conference on Joint Cloud Computing (JCC)
作者: Jianfei Liu Huaimin Wang Peichang Shi Yaojie Li Penghui Ma Guodong Yi National Key Laboratory of Parallel and Distributed Computing College of Computer Science National University of Defense Technology Changsha 410073 China Key Laboratory of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha 410073 China Xiangjiang Lab Changsha 410073 China School of Advanced Interdisciplinary Studies Hunan University Of Technology and Business Changsha 410073 China
As a new stage in the development of the cloud computing paradigm, serverless computing has the high-level abstraction characteristic of shielding underlying details. This makes it extremely challenging for users to c...
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
EFM: A Negative Network Public Opinion Early Warning Model Based on Evolutionary Feature Mining
EFM: A Negative Network Public Opinion Early Warning Model B...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Fanfeixue Meng Jingchen Wu Feifan Song Xu Wu Lan Hu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT Beijing University of Posts and Telecommunications Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT School of Economics and Finance Changchun Finance College
With the popularity of the Internet and the increase in the number of netizens, it is of great significance to effectively monitor and predict the negative network public opinion on social media platforms. Most mainst...
来源: 评论
Vehicle Destination Prediction Based on Trajectory Data
Vehicle Destination Prediction Based on Trajectory Data
收藏 引用
Neural Networks, Information and Communication Engineering (NNICE), International Conference on
作者: Wenming Guo Ruiqi Jia Che Zong Ruichao Li Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China School of Information Engineering Xinjiang Institute of Engineering Urumqi China School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China
With the increasing requirements of real-time traffic management in urban transportation, vehicle destination prediction data, as an important part of smart city brain data, is becoming more and more important in urba...
来源: 评论