咨询与建议

限定检索结果

文献类型

  • 292 篇 会议
  • 173 篇 期刊文献

馆藏范围

  • 465 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 306 篇 工学
    • 216 篇 计算机科学与技术...
    • 172 篇 软件工程
    • 45 篇 控制科学与工程
    • 41 篇 信息与通信工程
    • 28 篇 机械工程
    • 28 篇 电子科学与技术(可...
    • 26 篇 电气工程
    • 24 篇 化学工程与技术
    • 22 篇 交通运输工程
    • 19 篇 生物工程
    • 14 篇 仪器科学与技术
    • 14 篇 材料科学与工程(可...
    • 13 篇 光学工程
    • 13 篇 动力工程及工程热...
    • 12 篇 生物医学工程(可授...
    • 12 篇 安全科学与工程
    • 9 篇 冶金工程
    • 9 篇 建筑学
  • 133 篇 理学
    • 65 篇 数学
    • 51 篇 物理学
    • 23 篇 生物学
    • 20 篇 化学
    • 19 篇 统计学(可授理学、...
    • 10 篇 系统科学
  • 97 篇 管理学
    • 69 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 12 篇 法学
    • 8 篇 社会学
  • 12 篇 医学
    • 10 篇 基础医学(可授医学...
    • 10 篇 临床医学
  • 8 篇 农学
  • 6 篇 经济学
  • 6 篇 教育学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 15 篇 feature extracti...
  • 15 篇 training
  • 12 篇 computational mo...
  • 12 篇 semantics
  • 11 篇 cloud computing
  • 10 篇 reinforcement le...
  • 8 篇 deep learning
  • 8 篇 optimization
  • 8 篇 data models
  • 7 篇 three-dimensiona...
  • 7 篇 quality of servi...
  • 7 篇 data mining
  • 7 篇 real-time system...
  • 7 篇 vehicles
  • 6 篇 bandwidth
  • 6 篇 algorithm design...
  • 6 篇 machine learning
  • 6 篇 security
  • 6 篇 business
  • 6 篇 accuracy

机构

  • 35 篇 school of artifi...
  • 34 篇 cloud computing ...
  • 28 篇 beijing engineer...
  • 28 篇 guangdong engine...
  • 20 篇 state key labora...
  • 17 篇 state key labora...
  • 16 篇 trusted cloud co...
  • 15 篇 guangxi cooperat...
  • 15 篇 the state key la...
  • 14 篇 qingdao academy ...
  • 12 篇 guangdong instit...
  • 12 篇 dongguan researc...
  • 11 篇 university of ch...
  • 10 篇 dongguan researc...
  • 10 篇 huawei cloud com...
  • 9 篇 school of comput...
  • 9 篇 intelligent manu...
  • 9 篇 guangxi colleges...
  • 9 篇 the beijing engi...
  • 9 篇 alibaba cloud co...

作者

  • 72 篇 gang xiong
  • 40 篇 xiong gang
  • 31 篇 zhen shen
  • 24 篇 xisong dong
  • 20 篇 shen zhen
  • 19 篇 fenghua zhu
  • 18 篇 dong xisong
  • 15 篇 xiuqin shang
  • 13 篇 fei-yue wang
  • 10 篇 timo r. nyberg
  • 10 篇 bin hu
  • 9 篇 jian-tao zhou
  • 9 篇 zhu fenghua
  • 8 篇 hui li
  • 8 篇 zou xiaofeng
  • 8 篇 shichao chen
  • 7 篇 xiwei liu
  • 7 篇 sheng liu
  • 7 篇 li tuo
  • 7 篇 yang rui

语言

  • 444 篇 英文
  • 13 篇 中文
  • 10 篇 其他
检索条件"机构=Key Laboratory of Cloud Computing"
465 条 记 录,以下是1-10 订阅
排序:
IMPRESS: An Importance-Informed Multi-Tier Prefix KV Storage System for Large Language Model Inference  23
IMPRESS: An Importance-Informed Multi-Tier Prefix KV Storage...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Chen, Weijian He, Shuibing Qu, Haoyang Zhang, Ruidong Yang, Siling Chen, Ping Zheng, Yi Huai, Baoxing Chen, Gang The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Huawei Cloud China
Modern advanced large language model (LLM) applications often prepend long contexts before user queries to improve model output quality. These contexts frequently repeat, either partially or fully, across multiple que...
来源: 评论
Task Prioritization in Multiagent Environments: A Novel Approach Using Nash Q-Learning
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Li, Kexin Hu, Yu Wang, Jielei Li, Lin Zhang, Shuyuan Luo, Guangchun Laboratory of Intelligent Collaborative Computing University of Electronic Science and Technology of China China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu611731 China College of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
—With the rapid proliferation of smartphones and various terminal devices, edge computing has gained increasing importance in overcoming computational limitations and enhancing service quality through task offloading... 详细信息
来源: 评论
Pronounced advance on typhoon track forecast with global convection-permitting model
收藏 引用
Science Bulletin 2025年 第9期70卷 1424-1428页
作者: Gu, Jun Zhao, Chun Li, Gudongze Feng, Jiawang Xu, Mingyue Du, Qiuyan Xia, Zihan Li, Yubin Chen, Guanghua Hao, Xiaoyu Chen, Junshi An, Hong Deep Space Exploration Laboratory / School of Earth and Space Sciences / CMA-USTC Laboratory of Fengyun Remote Sensing / State Key Laboratory of Fire Science / Institute of Advanced Interdisciplinary Research on High-Performance Computing Systems and Software University of Science and Technology of China Hefei230026 China Laoshan Laboratory Qingdao266237 China CAS Center for Excellence in Comparative Planetology University of Science and Technology of China Hefei230026 China School of Atmospheric Physics Nanjing University of Information Science and Technology Nanjing210044 China Key Laboratory of Cloud-Precipitation Physics and Severe Storms Institute of Atmospheric Physics Chinese Academy of Sciences Beijing100029 China School of Computer Science and Technology University of Science and Technology of China Hefei230026 China
来源: 评论
Towards Robust Video Anomaly Detection in 6G Networks: A Scene-Adaptive Framework
收藏 引用
IEEE Network 2025年
作者: Zhang, Sijia Yu, Yong Tao, Xiaoling Wang, Lianhai Shaanxi Normal University School of Computer Science China Guilin University of Electronic Technology Guangxi Cooperative Innovation Center of Cloud Computing and Big Data China Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing China
With the rapid advancement of 5th Generation (5G) networks, their low latency and high bandwidth facilitate the development of smart city systems. Among the smart city systems, anomaly detection in surveillance videos... 详细信息
来源: 评论
Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models  6th
Removing Regional Steering Vectors to Achieve Knowledge Dom...
收藏 引用
6th International Conference on Machine Learning for Cyber Security, ML4CS 2024
作者: Wu, Wei Wang, Chen Xu, Qiuhao Kong, Wei Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Key Laboratory of Digital Fashion and Data Governance Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou310018 China
Large language models (LLMs), as a significant direction in the development of artificial intelligence in recent years, are becoming increasingly popular. These models demonstrate significant potential in applications... 详细信息
来源: 评论
Improving Retrieval-Augmented Deep Assertion Generation via Joint Training
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Quanjun Fang, Chunrong Zheng, Yi Qian, Ruixiang Yu, Shengcheng Zhao, Yuan Zhou, Jianyi Yang, Yun Zheng, Tao Chen, Zhenyu State Key Laboratory for Novel Software Technology Nanjing University China Huawei Cloud Computing Technologies Co. Ltd Department of Computing Technologies Swinburne University of Technology MelbourneVIC3122 Australia
Unit testing attempts to validate the correctness of basic units of the software system under test and has a crucial role in software development and testing. However, testing experts have to spend a huge amount of ef... 详细信息
来源: 评论
IMPRESS: an importance-informed multi-tier prefix KV storage system for large language model inference  25
IMPRESS: an importance-informed multi-tier prefix KV storage...
收藏 引用
Proceedings of the 23rd USENIX Conference on File and Storage Technologies
作者: Weijian Chen Shuibing He Haoyang Qu Ruidong Zhang Siling Yang Ping Chen Yi Zheng Baoxing Huai Gang Chen The State Key Laboratory of Blockchain and Data Security Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security and Zhejiang Key Laboratory of Big Data Intelligent Computing The State Key Laboratory of Blockchain and Data Security Zhejiang University Huawei Cloud
Modern advanced large language model (LLM) applications often prepend long contexts before user queries to improve model output quality. These contexts frequently repeat, either partially or fully, across multiple que...
来源: 评论
EagerLog: Active Learning Enhanced Retrieval Augmented Generation for Log-based Anomaly Detection
EagerLog: Active Learning Enhanced Retrieval Augmented Gener...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Duan, Chiming Jia, Tong Yang, Yong Liu, Guiyang Liu, Jinbu Zhang, Huxing Zhou, Qi Li, Ying Huang, Gang School of Software and Microelectronics Peking University Beijing China Institute for Artificial Intelligence Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China National Key Laboratory of Data Space Technology and System Beijing China Alibaba Cloud Computing Company Hangzhou China
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-... 详细信息
来源: 评论
Multi-keyword Searchable Data Auditing for cloud-Based Machine Learning  6th
Multi-keyword Searchable Data Auditing for Cloud-Based Mach...
收藏 引用
6th International Conference on Machine Learning for Cyber Security, ML4CS 2024
作者: Yu, Haiyan Ma, Qingru Zhu, Yilu Cui, Yuxin Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Key Laboratory of Digital Fashion and Data Governance Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Sci-Tech University Hangzhou310018 China
Machine learning (ML) relies on large amounts of data for training, which often requires outsourcing data to cloud servers. This raises concerns about data integrity and security. Preventing data from being tampered w... 详细信息
来源: 评论
Outage Evaluation for STAR-RIS Assisted Satellite-UAV-Terrestrial NOMA Networks With Imperfect CSI
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Luo, Wenwei Zhang, Jiliang Song, Jize Liu, Xin Xie, Yiyuan Xu, Jiayou Pan, Gaofeng Southwest University Key Laboratory of Networks and Cloud Computing Security of Universities in Chongqing School of Electronic and Information Engineering Chongqing400715 China Shanghai Institute of Satellite Engineering Shanghai201109 China Beijing Institute of Technology School of Cyberspace Security Beijing100081 China
Due to some transmission delays and channel estimation errors, it is always difficult to acquire perfect channel state information (CSI) in practical communications. Therefore, in this study, taking the practical scen... 详细信息
来源: 评论