咨询与建议

限定检索结果

文献类型

  • 1,088 篇 会议
  • 722 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,813 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,152 篇 工学
    • 749 篇 计算机科学与技术...
    • 554 篇 软件工程
    • 214 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 140 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 106 篇 机械工程
    • 87 篇 生物工程
    • 51 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 44 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 564 篇 理学
    • 315 篇 数学
    • 120 篇 物理学
    • 108 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 305 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 50 篇 医学
    • 42 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 42 篇 法学
    • 33 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 36 篇 training
  • 35 篇 bandwidth
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 41 篇 institute of com...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 37 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 32 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 128 篇 hai jin
  • 46 篇 xiaowei li
  • 44 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,674 篇 英文
  • 82 篇 中文
  • 62 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1813 条 记 录,以下是121-130 订阅
排序:
Simulation of Nuclear Reactor Accident Scenarios using Physics-Informed Neural Networks and Transfer-Learning  4
Simulation of Nuclear Reactor Accident Scenarios using Physi...
收藏 引用
4th International Conference on Electronic Information Engineering and Computer Science, EIECS 2024
作者: Yu, Yang Xie, Yufei Wang, Wenlin Wu, Guohua Lan, Haitao Lin, Enbo An, Ping Sun, Zibin Zhang, Haichuan Wu, Yixian National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing Changsha China Nuclear Power Institute of China Science and Technology on Reactor System Design Technology Laboratory Chengdu China School of Automation Wuhan University of Technology Wuhan China Sino-German College of Intelligent Manufacturing Shenzhen Technology University Shenzhen China Institute of Automotive Engineers Hubei University of Automotive Technology Shiyan China Nuclear Power Institute of China Chengdu China
In a Loss of Coolant Accident (LOCA), reactor core temperatures can rise rapidly, leading to potential fuel damage and radioactive material release. This research presents a groundbreaking method that combines the pow... 详细信息
来源: 评论
Pushing the Throughput Limit of OFDM-based Wi-Fi Backscatter Communication  24
Pushing the Throughput Limit of OFDM-based Wi-Fi Backscatter...
收藏 引用
30th International Conference on Mobile computing and Networking, ACM MobiCom 2024
作者: Qin, Qihui Chen, Kai Xie, Yaxiong Luo, Heng Fang, Dingyi Chen, Xiaojiang Northwest University China Shaanxi International Joint Research Centre for the Battery-Free Internet of Things China Xi'an Key Laboratory of Advanced Computing and System Security China Internet of Things Research Center Northwest University China University at Buffalo SUNY New York United States Xi'an Advanced Battery-Free Sensing and Computing Technology International Science and Technology Cooperation Base China
The majority of existing Wi-Fi backscatter systems transmit tag data at rates lower than 250 kbps, as the tag data is modulated at OFDM symbol level, allowing for demodulation using commercial Wi-Fi receivers. However... 详细信息
来源: 评论
Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification
Stealthy Backdoor Attack Towards Federated Automatic Speaker...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Longling Zhang Lyqi Liu Dan Meng Jun Wang Shengshan Hu School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security OPPO Research Institute China
Automatic speech verification (ASV) authenticates individuals based on distinct vocal patterns, playing a pivotal role in many applications such as voice-based unlocking systems for devices. The ASV system comprises t...
来源: 评论
A Multiple-Path Learning Neural Network Model for Code Completion
A Multiple-Path Learning Neural Network Model for Code Compl...
收藏 引用
2023 IEEE International Conference on Web services, ICWS 2023
作者: Liu, Yi Liu, Jianxun Zhang, Xiangping Hu, Haize Hunan University of Science and Technology Hunan Provincial Key Laboratory for Services Computing and Novel Software Technology Xiangtan411201 China Hunan University of Humanities Science and Technology School of Informationn Loudi417000 China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411201 China
Code completion, which can accelerate the software development process and improve the quality of software products, is an essential part of today's integrated development environments. It has become an important ... 详细信息
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论
Mining World Indicators for Analyzing and Modeling the Development of Countries
收藏 引用
ACM/IMS Transactions on Data Science 2021年 第4期2卷 1–27页
作者: Huang, Hong Chi, Mingyuan Song, Yu Jin, Hai The National Engineering Research Center for Big Data Technology and System Key Laboratory of Service Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
The world indicators released by the World Bank or other organizations usually give the basic public knowledge about the world. However, separate and static index lacks the complex interplay among different indicators... 详细信息
来源: 评论
Attack by Yourself: Effective and Unnoticeable Multi-Category Graph Backdoor Attacks with Subgraph Triggers Pool
arXiv
收藏 引用
arXiv 2024年
作者: Li, Jiangtong Liu, Dongyi Cheng, Dawei Jiang, Changjun School of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education China
Graph Neural Networks (GNNs) have achieved significant success in various real-world applications, including social networks, finance systems, and traffic management. Recent researches highlight their vulnerability to... 详细信息
来源: 评论
Information Security Evaluation by Information Flow Analysis Based on Stochastic Petri Nets
Information Security Evaluation by Information Flow Analysis...
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Tu, Hanqian Xiang, Dongming Lin, Wang Liu, Guanjun Zhejiang Sci-Tech University Department of Computer Science and Technology Hangzhou310018 China Shanghai Electronic Transactions and Information Service Collaborative Innovation Center Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science Shanghai201804 China
The Petri-net-based information flow analysis offers an effective approach for detecting information leakage by the concept of non-interference. Although the related studies propose efficient solutions, they lack quan... 详细信息
来源: 评论
CONSISTENT REPRESENTATION LEARNING ACROSS MODALITIES FOR ZERO-SHOT IMAGE RECOGNITION
CONSISTENT REPRESENTATION LEARNING ACROSS MODALITIES FOR ZER...
收藏 引用
2021 IEEE International Conference on Multimedia and Expo, ICME 2021
作者: Wang, Yu Zhao, Sev-Jue Key Laboratory of Embedded System and Service Computing Ministry of Education China HaiBa Technology China
Zero-shot learning (ZSL) recently has drawn widespread attention due to the demand for scalability of object recognition in real scenes. Existing approaches typically focus on directly learning various mapping functio... 详细信息
来源: 评论
Prototype Guided Personalized Federated Intrusion Detection system  10
Prototype Guided Personalized Federated Intrusion Detection ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Cheng, Long Yan, Huiru Zhou, Hanlin Wang, Ying Tang, Haichuan Fang, Fang North China Electric Power University State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources School of Control and Computer Engineering Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China Ai Lab of Crrc Academy Beijing China
Preventing network attacks and protecting user privacy are consistently hot research topics in the Internet of Things (IoT) and edge computing fields. Recent advancements in Federated Learning (FL) have shown promise ... 详细信息
来源: 评论