咨询与建议

限定检索结果

文献类型

  • 143 篇 会议
  • 78 篇 期刊文献

馆藏范围

  • 221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 141 篇 工学
    • 99 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 32 篇 控制科学与工程
    • 17 篇 电气工程
    • 14 篇 信息与通信工程
    • 14 篇 交通运输工程
    • 12 篇 机械工程
    • 11 篇 安全科学与工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物医学工程(可授...
    • 8 篇 生物工程
    • 6 篇 动力工程及工程热...
    • 6 篇 化学工程与技术
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 4 篇 建筑学
  • 67 篇 理学
    • 40 篇 数学
    • 15 篇 物理学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 9 篇 统计学(可授理学、...
    • 6 篇 化学
    • 4 篇 地球物理学
  • 55 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 5 篇 法学
    • 4 篇 社会学
  • 5 篇 农学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 9 篇 feature extracti...
  • 8 篇 cloud computing
  • 8 篇 training
  • 7 篇 reinforcement le...
  • 6 篇 optimization
  • 6 篇 predictive model...
  • 5 篇 task analysis
  • 5 篇 three-dimensiona...
  • 5 篇 computational mo...
  • 5 篇 digital twin
  • 4 篇 complex networks
  • 4 篇 deep learning
  • 4 篇 delays
  • 4 篇 monitoring
  • 4 篇 algorithm design...
  • 4 篇 machine learning
  • 4 篇 sociology
  • 4 篇 industries
  • 4 篇 business
  • 4 篇 collaboration

机构

  • 26 篇 school of artifi...
  • 21 篇 cloud computing ...
  • 21 篇 beijing engineer...
  • 20 篇 state key labora...
  • 17 篇 guangdong engine...
  • 17 篇 state key labora...
  • 15 篇 the state key la...
  • 12 篇 dongguan researc...
  • 11 篇 qingdao academy ...
  • 10 篇 dongguan researc...
  • 10 篇 engineering rese...
  • 10 篇 key laboratory o...
  • 10 篇 school of comput...
  • 9 篇 guangxi colleges...
  • 9 篇 the beijing engi...
  • 8 篇 the state key la...
  • 7 篇 the guangdong en...
  • 7 篇 college of infor...
  • 6 篇 guangxi colleges...
  • 6 篇 the state key la...

作者

  • 61 篇 gang xiong
  • 31 篇 xiong gang
  • 23 篇 zhen shen
  • 21 篇 xisong dong
  • 17 篇 fenghua zhu
  • 15 篇 xiuqin shang
  • 14 篇 shen zhen
  • 14 篇 dong xisong
  • 13 篇 fei-yue wang
  • 11 篇 timo r. nyberg
  • 11 篇 fu chong
  • 10 篇 bin hu
  • 7 篇 xiwei liu
  • 7 篇 sheng liu
  • 7 篇 zhu fenghua
  • 7 篇 wang yong
  • 7 篇 peijun ye
  • 6 篇 yisheng lv
  • 6 篇 hu bin
  • 6 篇 he qian

语言

  • 213 篇 英文
  • 4 篇 其他
  • 4 篇 中文
检索条件"机构=Key Laboratory of Cloud Computing and Complex System"
221 条 记 录,以下是1-10 订阅
排序:
EagerLog: Active Learning Enhanced Retrieval Augmented Generation for Log-based Anomaly Detection
EagerLog: Active Learning Enhanced Retrieval Augmented Gener...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Duan, Chiming Jia, Tong Yang, Yong Liu, Guiyang Liu, Jinbu Zhang, Huxing Zhou, Qi Li, Ying Huang, Gang School of Software and Microelectronics Peking University Beijing China Institute for Artificial Intelligence Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China National Key Laboratory of Data Space Technology and System Beijing China Alibaba Cloud Computing Company Hangzhou China
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Ming Northeastern University School of Computer Science and Engineering Engineering Research Center of Security Technology of Complex Network System Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University School of Computer Science and Engineering Shenyang110819 China
Mobile edge computing (MEC) integrated with Network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual Network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
Few-Shot Source Separation for IoT Anti-Jamming via Multi-Task Learning and Meta-Learning
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Guo, Pengcheng Yu, Miao Li, Cheng An, Kang Sun, Yifu Chatzinotas, Symeon Niyato, Dusit National University of Defense Technology Sixty-Third Research Institute China State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System China Kyung Hee University College of Electronics and Information Yongin-si17104 Korea Republic of Nanyang Technological University College of Computing and Data Science Singapore639798 Singapore
Malicious jamming attacks pose a significant threat to the integrity and performance of Internet of Things (IoT) networks. However, many jamming patterns are rare or infrequent, which makes them difficult to counter e... 详细信息
来源: 评论
A data acquisition system of CNC based on Zigbee and GPRS technology
A data acquisition system of CNC based on Zigbee and GPRS te...
收藏 引用
2016 IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference(IMCEC 2016)
作者: Xiao Bin CAO Xiang Li ZHANG Hong Mei ZHANG Key Laboratory of Cloud Computing & Complex System Guilin University of Electronic Technology
A data acquisition and monitoring system of machine tools is designed,which is based on Zigbee and GPRS wireless communication *** monitoring and alerting about the safety status of the machine tools operates via the ... 详细信息
来源: 评论
EagerLog: Active Learning Enhanced Retrieval Augmented Generation for Log-based Anomaly Detection
EagerLog: Active Learning Enhanced Retrieval Augmented Gener...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Chiming Duan Tong Jia Yong Yang Guiyang Liu Jinbu Liu Huxing Zhang Qi Zhou Ying Li Gang Huang School of Software and Microelectronics Peking University Beijing China Institute for Artificial Intelligence Peking University Beijing China National Key Laboratory of Data Space Technology and System Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China Alibaba Cloud Computing Company Hangzhou China
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-... 详细信息
来源: 评论
Joint Secure and Covert Communications for Active STAR-RIS Assisted ISAC systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Guo, Liang Jia, Jie Mu, Xidong Liu, Yuanwei Chen, Jian Wang, Xingwei Northeastern University School of Computer Science and Engineering China Northeastern University Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China BelfastBT3 9DT United Kingdom Department of Electrical and Electronic Engineering China
This paper investigates the design of jointly supporting physical layer security (PLS) and covert communications (CCs) in an active simultaneously transmitting and reflecting reconfigurable intelligent surface (a-STAR... 详细信息
来源: 评论
Cramér-Rao Bound Minimization for a Passive Sensing Multi-ISAC system
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Chen, Jian Chen, Qikai Deng, Yansha Jia, Jie Yin, Baoxin Wang, Xingwei Northeastern University School of Computer Science and Engineering Shenyang110819 China Northeastern University Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China King's College London LondonWC2R 2LS United Kingdom
The integrated sensing and communication (ISAC) system can simultaneously provide communication and radar sensing, effectively improving spectrum utilization. However, existing research mainly focuses on the mono-stat... 详细信息
来源: 评论
Parallel implementation of w-projection wide-field imaging
收藏 引用
Science Bulletin 2019年 第9期64卷 586-594页
作者: Baoqiang Lao Tao An Ang Yu Wenhui Zhang Junyi Wang Quan Guo Shaoguang Guo Xiaocong Wu Shanghai Astronomical Observatory Key Laboratory of Radio AstronomyChinese Academy of Sciences Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology
w-Projection is a wide-field imaging technique that is widely used in radio synthesis arrays. Processing the wide-field big data generated by the future Square Kilometre Array(SKA) will require significant updates to ... 详细信息
来源: 评论
CodeIF-Bench: Evaluating Instruction-Following Capabilities of Large Language Models in Interactive Code Generation
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Peiding Zhang, Li Liu, Fang Shi, Lin Li, Minxiao Shen, Bo Fu, An School of Computer Science and Engineering State Key Laboratory of Complex & Critical Software Environment Beihang University China Huawei Cloud Computing Technologies Co. Ltd China
Large Language Models (LLMs) have demonstrated exceptional performance in code generation tasks and have become indispensable programming assistants for developers. However, existing code generation benchmarks primari... 详细信息
来源: 评论
Detection of Android Malware Security on system Calls
Detection of Android Malware Security on System Calls
收藏 引用
2016 IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference(IMCEC 2016)
作者: Chen Da Zhang Hongmei Zhang Xiangli Guangxi Colleges and Universities Key Laboratory of cloud computing and complex systems Guilin University of Electronic Technology
In order to detect the security of Android software which isn't installed efficiently and accurately,this paper pro poses a new malware detection method based on system calls *** samples are pretreated by Classifi... 详细信息
来源: 评论