咨询与建议

限定检索结果

文献类型

  • 543 篇 期刊文献
  • 474 篇 会议
  • 1 册 图书

馆藏范围

  • 1,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 558 篇 计算机科学与技术...
    • 481 篇 软件工程
    • 162 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 78 篇 生物工程
    • 55 篇 生物医学工程(可授...
    • 50 篇 机械工程
    • 46 篇 电子科学与技术(可...
    • 45 篇 电气工程
    • 40 篇 化学工程与技术
    • 33 篇 光学工程
    • 23 篇 仪器科学与技术
    • 21 篇 航空宇航科学与技...
    • 18 篇 交通运输工程
    • 15 篇 土木工程
    • 14 篇 动力工程及工程热...
    • 13 篇 网络空间安全
  • 378 篇 理学
    • 259 篇 数学
    • 90 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 45 篇 物理学
    • 40 篇 化学
    • 30 篇 系统科学
  • 247 篇 管理学
    • 131 篇 管理科学与工程(可...
    • 119 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 15 篇 法学
    • 13 篇 社会学
  • 12 篇 农学
  • 5 篇 经济学
  • 5 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 52 篇 computer science
  • 44 篇 educational inst...
  • 44 篇 laboratories
  • 43 篇 knowledge engine...
  • 41 篇 educational tech...
  • 26 篇 data mining
  • 24 篇 computer science...
  • 22 篇 semantics
  • 14 篇 reinforcement le...
  • 14 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 image segmentati...
  • 13 篇 artificial intel...
  • 12 篇 ontologies
  • 11 篇 contrastive lear...
  • 11 篇 topology
  • 10 篇 recommender syst...
  • 10 篇 authentication
  • 9 篇 genetic algorith...
  • 9 篇 data models

机构

  • 424 篇 college of compu...
  • 273 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 42 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 35 篇 college of softw...
  • 33 篇 school of artifi...
  • 32 篇 college of compu...
  • 29 篇 key laboratory o...
  • 23 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 15 篇 key laboratory o...
  • 15 篇 school of cyber ...
  • 15 篇 the college of c...
  • 14 篇 key laboratory o...
  • 14 篇 college of compu...

作者

  • 38 篇 yang bo
  • 35 篇 sun geng
  • 28 篇 li ximing
  • 27 篇 ouyang jihong
  • 26 篇 liu dayou
  • 25 篇 dantong ouyang
  • 23 篇 niyato dusit
  • 22 篇 ouyang dantong
  • 22 篇 yanheng liu
  • 22 篇 bo yang
  • 21 篇 li jiahui
  • 21 篇 liu yanheng
  • 19 篇 liu da-you
  • 19 篇 da-you liu
  • 19 篇 li xiongfei
  • 18 篇 chen haipeng
  • 18 篇 dayou liu
  • 18 篇 huang lan
  • 17 篇 chang yi
  • 17 篇 wang jian

语言

  • 923 篇 英文
  • 57 篇 其他
  • 38 篇 中文
检索条件"机构=Key Laboratory of Symbolic Computing and Knowledge Engineering of"
1018 条 记 录,以下是401-410 订阅
排序:
Dynamic QoS-Driven Framework for Co-Scheduling of Distributed Long-Running Applications on Shared Clusters
收藏 引用
IEEE Transactions on Cloud computing 2025年
作者: Zhu, Jianyong Wang, Hongtao Su, Pan Wang, Yang Pan, Weihua North China Electric Power University Department of Computer China Hebei Key Laboratory of Knowledge Computing for Energy & Power China Ministry of Education Engineering Research Center of Intelligent Computing for Complex Energy Systems China
Cloud service providers typically co-locate various workloads within the same production cluster to improve resource utilization and reduce operational costs. These workloads primarily consist of batch analysis jobs c... 详细信息
来源: 评论
Spirit distillation: Precise real-time semantic segmentation of road scenes with insufficient data
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Zhiyuan Jiang, Yu Cui, Chupeng Yang, Zongmin Xue, Xinhui Qi, Hong Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China With College of Computer Science and Technology Jilin University Changchun China College of Computer Science and Technology Jilin University Changchun China
Semantic segmentation of road scenes is one of the key technologies for realizing autonomous driving scene perception, and the effectiveness of deep Convolutional Neural Networks(CNNs) for this task has been demonstra... 详细信息
来源: 评论
Article Reranking by Memory-Enhanced key Sentence Matching for Detecting Previously Fact-Checked Claims
arXiv
收藏 引用
arXiv 2021年
作者: Sheng, Qiang Cao, Juan Zhang, Xueyao Li, Xirong Zhong, Lei Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Key Lab of Data Engineering and Knowledge Engineering Renmin University of China China
False claims that have been previously fact-checked can still spread on social media. To mitigate their continual spread, detecting previously fact-checked claims is indispensable. Given a claim, existing works retrie... 详细信息
来源: 评论
Size-Invariance Matters: Rethinking Metrics and Losses for Imbalanced Multi-object Salient Object Detection
arXiv
收藏 引用
arXiv 2024年
作者: Li, Feiran Xu, Qianqian Bao, Shilong Yang, Zhiyong Cong, Runmin Cao, Xiaochun Huang, Qingming Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Science Beijing Jiaotong University Beijing China School of Control Science and Engineering Shandong University Jinan China Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Cyber Science and Tech. Sun Yat-Sen University Shenzhen Campus China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores the size-invariance of evaluation metrics in Salient Object Detection (SOD), especially when multiple targets of diverse sizes co-exist in the same image. We observe that current metrics are size-s... 详细信息
来源: 评论
Federated Coordinate Descent for Privacy-Preserving Multiparty Linear Regression
arXiv
收藏 引用
arXiv 2022年
作者: Leng, Xinlin Li, Chenxu Xu, Weifeng Sun, Yuyan Wang, Hongtao School of Control and Computer Engineering North China Electric Power University Baoding071051 China School of Computer Science and Technology Shandong University of Finance and Economics Jinan250014 China Beijing Key Laboratory of IoT Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Hebei Key Laboratory of Knowledge Computing for Energy & Power Baoding071051 China
Federated linear regressions have been developed and applied in various domains, where multiparties collaboratively and securely perform optimization algorithms, e.g., Gradient Descent, to learn a set of optimal model... 详细信息
来源: 评论
Enhanced Doubly Robust Learning for Debiasing Post-Click Conversion Rate Estimation
arXiv
收藏 引用
arXiv 2021年
作者: Guo, Siyuan Zou, Lixin Liu, Yiding Ye, Wenwen Cheng, Suqi Wang, Shuaiqiang Chen, Hechang Yin, Dawei Chang, Yi School of Artificial Intelligence Jilin University China Baidu Inc. China International Center of Future Science Jilin University China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University China
Post-click conversion, as a strong signal indicating the user preference, is salutary for building recommender systems. However, accurately estimating the post-click conversion rate (CVR) is challenging due to the sel... 详细信息
来源: 评论
A Novel Distributed Differential Privacy Preserving Based on Random Forest in Data Centers
收藏 引用
Procedia Computer Science 2022年 214卷 1531-1540页
作者: Xi Wang Weibei Fan Jing He Chi-Hung Chi Suzhou Institute of Industrial Technology Suzhou 215006 China Key laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 P.R. China College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China Department of Neuroscience University of Oxford Oxford OX1 3QR England School of Computer Nanyang Technological University Nanyang Avenue 639798 Singapore
Traditional privacy-preserving technologies have been unable to provide adequate protection and are vulnerable to background knowledge. MapReduce is parallel distributed computing model which has the advantages of goo... 详细信息
来源: 评论
ER: Equivariance Regularizer for knowledge Graph Completion
arXiv
收藏 引用
arXiv 2022年
作者: Cao, Zongsheng Xu, Qianqian Yang, Zhiyong Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Peng Cheng Laboratory Shenzhen China
Tensor factorization and distanced based models play important roles in knowledge graph completion (KGC). However, the relational matrices in KGC methods often induce a high model complexity, bearing a high risk of ov... 详细信息
来源: 评论
TJCCT: A Two-timescale Approach for UAV-assisted Mobile Edge computing
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Zemin Sun, Geng Wu, Qingqing He, Long Liang, Shuang Pan, Hongyang Niyato, Dusit Yuen, Chau Leung, Victor C.M. The College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun130012 China Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China The School of Information Science and Technology Northeast Normal University Changchun130024 China The School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore The School of Electrical and Electronics Engineering Nanyang Technological University Singapore639798 Singapore The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering University of British Columbia VancouverBCV6T 1Z4 Canada
Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) is emerging as a promising paradigm to provide aerial-terrestrial computing services in close proximity to mobile devices (MDs). However, meeting the ... 详细信息
来源: 评论
ESAE: Evolutionary Strategy-Based Architecture Evolution  14th
ESAE: Evolutionary Strategy-Based Architecture Evolution
收藏 引用
14th International Conference on Bio-inspired computing: Theories and Applications, BIC-TA 2019
作者: Gu, Xue Meng, Ziyao Liang, Yanchun Xu, Dong Huang, Han Han, Xiaosong Wu, Chunguo Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Jilin University Changchun130012 China Zhuhai Laboratory of Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education School of Computer Zhuhai College of Jilin University Zhuhai519041 China Department of Electrical Engineering and Computer Science Informatics Institute and Christopher S. Bond Life Sciences Center University of Missouri ColumbiaMO65211 United States School of Software Engineering South China University of Technology GuangZhou510006 China
Although deep neural networks (DNNs) play important roles in many fields, the architecture design of DNNs can be challenging due to the difficulty of input data representation, the huge number of parameters and the co... 详细信息
来源: 评论