咨询与建议

限定检索结果

文献类型

  • 1,088 篇 会议
  • 722 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,813 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,152 篇 工学
    • 749 篇 计算机科学与技术...
    • 554 篇 软件工程
    • 214 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 140 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 106 篇 机械工程
    • 87 篇 生物工程
    • 51 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 44 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 564 篇 理学
    • 315 篇 数学
    • 120 篇 物理学
    • 108 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 305 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 50 篇 医学
    • 42 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 42 篇 法学
    • 33 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 36 篇 training
  • 35 篇 bandwidth
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 41 篇 institute of com...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 37 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 32 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 128 篇 hai jin
  • 46 篇 xiaowei li
  • 44 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,674 篇 英文
  • 82 篇 中文
  • 62 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1813 条 记 录,以下是201-210 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Study on the Depth Control for an "Egg-shaped" Underwater Robot Based on Backstepping Sliding Mode Algorithm
Study on the Depth Control for an "Egg-shaped" Underwater Ro...
收藏 引用
IEEE International Conference on Mechatronics and Automation
作者: Haotian Li Shuxiang Guo Chunying Li Jipeng Long National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China The Department of Electronic and Electrical Engineering Southern University of Science and Technology Shenzhen China The Aerospace Center Hospital School of Life Science and the Key Laboratory of Convergence Medical Engineering System and Healthcare Technology Ministry of Industry and Information Technology Beijing Institute of Technology Beijing China
With the growing demand for autonomous underwater vehicles (AUVs) capable of precise navigation in intricate environments, achieving accurate depth control becomes pivotal. This paper introduced a pioneering study on ... 详细信息
来源: 评论
Evaluation of the Dynamic Performance of a Novel Egg-shaped Underwater Robot
Evaluation of the Dynamic Performance of a Novel Egg-shaped ...
收藏 引用
IEEE International Conference on Mechatronics and Automation
作者: Jipeng Long Shuxiang Guo Chunying Li National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China The Department of Electronic and Electrical Engineering Southern University of Science and Technology Shenzhen China The Aerospace Center Hospital School of Life Science and the Key Laboratory of Convergence Medical Engineering System and Healthcare Technology Ministry of Industry and Information Technology Beijing Institute of Technology Beijing China
With the increasing demand for ocean exploration and underwater operations, the development of new autonomous underwater vehicles (AUVs) to adapt to specific marine environments has become crucial. This paper designed... 详细信息
来源: 评论
HairDiffusion: vivid multi-colored hair editing via latent diffusion  24
HairDiffusion: vivid multi-colored hair editing via latent d...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing systems
作者: Yu Zeng Yang Zhang Jiachen Liu Linlin Shen Kaijun Deng Weizhao He Jinbao Wang Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University and Shenzhen Institute of Artificial Intelligence and Robotics for Society and National Engineering Laboratory for Big Data System Computing Technology Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University and Guangdong Provincial Key Laboratory of Intelligent Information Processing
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ...
来源: 评论
Study on the Path Planning Based on A* Algorithm for Vascular Intervention Robots
Study on the Path Planning Based on A* Algorithm for Vascula...
收藏 引用
IEEE International Conference on Mechatronics and Automation
作者: Huiyin Xu Shuxiang Guo Chunying Li Sheng Cao National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China The Department of Electronic and Electrical Engineering Southern University of Science and Technology Shenzhen China The Aerospace Center Hospital School of Life Science and the Key Laboratory of Convergence Medical Engineering System and Healthcare Technology Ministry of Industry and Information Technology Beijing Institute of Technology Beijing China
In vascular interventional surgery, accurate path planning is essential to improve surgical success and reduce risk. This paper aimed to verify the effectiveness and practicability of the A* algorithm in the shortest ... 详细信息
来源: 评论
DarkFed: A Data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
An Automated Penetration Semantic Knowledge Mining Algorithm Based on Bayesian Inference
收藏 引用
Computers, Materials & Continua 2021年 第3期66卷 2573-2585页
作者: Yichao Zang Tairan Hu Tianyang Zhou Wanjiang Deng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000China National Engineering Technology Research Center of the Digital Switching System Zhengzhou450000China NUS Business School National University of SingaporeSingapore119077Singapore
Mining penetration testing semantic knowledge hidden in vast amounts of raw penetration testing data is of vital importance for automated penetration *** rule mining,a data mining technique,has been studied and explor... 详细信息
来源: 评论
LinNet: Linear Network for Efficient Point Cloud Representation Learning  38
LinNet: Linear Network for Efficient Point Cloud Representat...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Deng, Hao Jing, Kunlei Cheng, Shengmei Liu, Cheng Ru, Jiawei Bo, Jiang Wang, Lin State-Province Joint Engineering and Research Center of Advanced Networking and Intelligent Information Services School of Information Science and Technology Northwest University China Shaanxi Key Laboratory of Higher Education Institution of Generative Artificial Intelligence and Mixed Reality China School of Software Engineering Xi'an Jiaotong University China Department of Computing The Hong Kong Polytechnic University Hong Kong
Point-based methods have made significant progress, but improving their scalability in large-scale 3D scenes is still a challenging problem. In this paper, we delve into the point-based method and develop a simpler, f...
来源: 评论
SocialEdge: Socialized Learning-Based Request Scheduling for Edge-Cloud systems
SocialEdge: Socialized Learning-Based Request Scheduling for...
收藏 引用
International Conference on Distributed computing systems
作者: Ziwei Wang Yunfeng Zhao Chao Qiu Qiang He Xin Wang Xiaofei Wang Qinghua Hu College of Intelligence and Computing Tianjin University Tianjin China Guangdong Laboratory of Artificial Intelligence and DigitalEconomy (SZ) Shenzhen China School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China
The ability for cloud data centres and edge data centres to collaborate unleashes the potential of the edge-cloud system. However, its sophistication causes unexpected issues in request scheduling, such as Insufficien...
来源: 评论
Identification Algorithm Framework and Structural model on Input Pattern of Metamorphic Relations  9
Identification Algorithm Framework and Structural model on I...
收藏 引用
9th International Conference on Dependable systems and Their Applications, DSA 2022
作者: Yan, Shiyu Yang, Xiaohua Lu, Zhongjian Li, Meng Gong, Helin Liu, Jie Computer School University of South China Hunan Hengyang China Intelligent Equipment Software Evaluation Engineering Technology Research Center of Hunan Hengyang China Cnnc Key Laboratory on High Trusted Computing Hunan Hengyang China Nuclear Power Institute of China Science and Technology on Reactor System Design Technology Laboratory Chengdu China
Metamorphic Relation (MR) plays a crucial role in Metamorphic Testing (MT), which can be regarded as the implication relation from the input pattern to the output pattern. Based on MR's properties, the identificat... 详细信息
来源: 评论