咨询与建议

限定检索结果

文献类型

  • 391 篇 会议
  • 272 篇 期刊文献

馆藏范围

  • 663 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 304 篇 工学
    • 208 篇 计算机科学与技术...
    • 150 篇 软件工程
    • 67 篇 信息与通信工程
    • 46 篇 电气工程
    • 40 篇 控制科学与工程
    • 35 篇 生物工程
    • 31 篇 网络空间安全
    • 28 篇 电子科学与技术(可...
    • 17 篇 机械工程
    • 15 篇 光学工程
    • 15 篇 化学工程与技术
    • 12 篇 交通运输工程
    • 11 篇 材料科学与工程(可...
    • 11 篇 安全科学与工程
    • 9 篇 核科学与技术
    • 9 篇 生物医学工程(可授...
    • 6 篇 力学(可授工学、理...
  • 196 篇 理学
    • 93 篇 物理学
    • 64 篇 数学
    • 35 篇 生物学
    • 20 篇 系统科学
    • 16 篇 统计学(可授理学、...
    • 15 篇 化学
  • 74 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 38 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 13 篇 法学
    • 9 篇 社会学
  • 9 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 8 篇 军事学
    • 8 篇 军队指挥学
  • 3 篇 经济学
  • 3 篇 文学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 72 篇 feature extracti...
  • 70 篇 accuracy
  • 39 篇 computational mo...
  • 36 篇 federated learni...
  • 33 篇 training
  • 30 篇 semantics
  • 30 篇 data models
  • 23 篇 deep learning
  • 22 篇 transformers
  • 22 篇 robustness
  • 22 篇 adaptation model...
  • 17 篇 neural networks
  • 17 篇 data mining
  • 16 篇 attention mechan...
  • 15 篇 object detection
  • 15 篇 optimization
  • 15 篇 measurement
  • 14 篇 visualization
  • 14 篇 privacy
  • 13 篇 speech processin...

机构

  • 178 篇 key laboratory o...
  • 128 篇 shandong provinc...
  • 58 篇 information secu...
  • 39 篇 shandong provinc...
  • 38 篇 department of ph...
  • 38 篇 faculty of scien...
  • 38 篇 departamento de ...
  • 38 篇 department for p...
  • 38 篇 department of ph...
  • 38 篇 dipartimento di ...
  • 38 篇 yerevan physics ...
  • 38 篇 institute of phy...
  • 38 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 physics departme...
  • 37 篇 lehrstuhl für ex...
  • 37 篇 west university ...
  • 37 篇 kirchhoff-instit...
  • 37 篇 graduate school ...
  • 37 篇 tomsk state univ...

作者

  • 30 篇 m. khader
  • 30 篇 a. t. law
  • 30 篇 c. alexa
  • 30 篇 j. d. mansour
  • 30 篇 j. m. izen
  • 30 篇 s. veneziano
  • 30 篇 d. di valentino
  • 30 篇 g. bella
  • 30 篇 j. strandberg
  • 30 篇 d. calvet
  • 30 篇 c. amelung
  • 30 篇 a. grummer
  • 30 篇 k. j. r. cormier
  • 30 篇 n. orlando
  • 30 篇 c. gumpert
  • 30 篇 f. a. förster
  • 30 篇 h. a. gordon
  • 30 篇 y. tayalati
  • 30 篇 g. spigo
  • 30 篇 v. chiarella

语言

  • 546 篇 英文
  • 113 篇 其他
  • 5 篇 中文
检索条件"机构=Key Laboratory of Information Security and National Computing Grid"
663 条 记 录,以下是61-70 订阅
排序:
Unleashing the Potential of Decentralized Federated Learning in Healthcare: A Comprehensive Survey on Insights and Challenges  9
Unleashing the Potential of Decentralized Federated Learning...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Cheng, Haibo Liu, Wenjian Qu, Youyang Fu, Kexue Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
Federated learning (FL) is a distributed learning method that reduces data transmission and privacy risks. However, the existence of a central server may become a target of attackers, resulting in an increased risk of... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Object Segmentation-Assisted Inter Prediction for Versatile Video Coding
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhuoyuan Yuan, Zikun Li, Li Liu, Dong Tang, Xiaohu Wu, Feng CAS Key Laboratory of Technology in Geo-Spatial Information Processing and Application System University of Science and Technology of China Hefei230027 China Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu610031 China
In modern video coding standards, block-based inter prediction is widely adopted, which brings high compression efficiency. However, in natural videos, there are usually multiple moving objects of arbitrary shapes, re... 详细信息
来源: 评论
AH-TDMA: An Adaptive Heterogeneous Tridiagonal Matrix Algorithm on the New Sunway Supercomputer  29
AH-TDMA: An Adaptive Heterogeneous Tridiagonal Matrix Algori...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Tian, Min Liu, Qi Li, Yanlong Du, Wei Ren, Zenghui Liu, Yue Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks China Jinan Institute of Supercomputing Technology Jinan Key Laboratory of High Performance Computing China
The solution of tridiagonal linear systems is used in in various fields and plays a crucial role in numerical simulations. However, there is few efficient solver for tridiagonal linear systems on the new Sunway superc... 详细信息
来源: 评论
Joint Alignment of Multi-Task Feature and Label Spaces for Emotion Cause Pair Extraction  29
Joint Alignment of Multi-Task Feature and Label Spaces for E...
收藏 引用
29th International Conference on Computational Linguistics, COLING 2022
作者: Chen, Shunjie Shi, Xiaochuan Li, Jingye Wu, Shengqiong Fei, Hao Li, Fei Ji, Donghong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Computing National University of Singapore Singapore Singapore
Emotion cause pair extraction (ECPE), as one of the derived subtasks of emotion cause analysis (ECA), shares rich inter-related features with emotion extraction (EE) and cause extraction (CE). Therefore EE and CE are ... 详细信息
来源: 评论
hcaPCG: A Heterogeneous and communication-avoid PCG with Jacobi preconditioner on SW26010-Pro architecture  29
hcaPCG: A Heterogeneous and communication-avoid PCG with Jac...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Tian, Min Liu, Yue Wang, Li Chen, Yanyan Liu, Qi Pan, Jingshan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks China Jinan Institute of Supercomputing Technology Jinan Key Laboratory of High Performance Computing China
Due to its efficiency and versatility, the preconditioned conjugate gradient algorithm has long been a staple in the realm of iterative linear system solvers. In this paper, we proposed an optimized preconditioned con... 详细信息
来源: 评论
Text information Mining in Cyberspace: An information Extraction Method Based on T5 and keyBERT  9
Text Information Mining in Cyberspace: An Information Extrac...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Liu, Kuan Li, Yumei Qi, Yuanhua Qi, Ning Zhai, Mengran Qilu University of Technology Shandong Academy of Sciences Information Research Institute Shandong Academy of Sciences Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Institute of Economy and Informatization Development Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Shandong Institute of Economy and Informatization Development Jinan China
With the development of the digital economy and the advent of the big data era, the rapid growth of textual information in cyberspace has placed higher demands on information processing technology. This paper proposes... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Resource Allocation for MEC in Ultra-dense Networks
收藏 引用
Journal of Computers (Taiwan) 2025年 第1期36卷 143-162页
作者: Ma, Huan Li, Shuyun Wang, Zhihui Dou, Xubing Zhang, Xinchang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Normal University Jinan China
In the complex context of 5G ultra-dense networks, the unprecedented growth in traffic and computing demand has made the interaction between edge devices and edge servers extremely intricate due to the time-varying na... 详细信息
来源: 评论
A barotropic solver capable of reducing global synchronization latency in parallel ocean program
收藏 引用
CCF Transactions on High Performance computing 2025年 1-16页
作者: Fan, Xiaoyong Zhuang, Yuan Zeng, Yunhui Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
High-resolution community earth system model (CESM) plays a crucial role in studying climate complexity and predicting future climate change trends. In the parallel ocean program (POP) component of CESM, the communica... 详细信息
来源: 评论