咨询与建议

限定检索结果

文献类型

  • 622 篇 会议
  • 190 篇 期刊文献

馆藏范围

  • 812 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 362 篇 工学
    • 287 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 88 篇 信息与通信工程
    • 84 篇 电气工程
    • 49 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 29 篇 网络空间安全
    • 26 篇 生物工程
    • 25 篇 机械工程
    • 20 篇 光学工程
    • 20 篇 交通运输工程
    • 18 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
  • 163 篇 理学
    • 101 篇 数学
    • 43 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 11 篇 化学
    • 10 篇 系统科学
  • 84 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 100 篇 feature extracti...
  • 95 篇 accuracy
  • 65 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 52 篇 data models
  • 45 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 32 篇 deep learning
  • 30 篇 robustness
  • 30 篇 adaptation model...
  • 25 篇 privacy
  • 24 篇 optimization
  • 24 篇 attention mechan...
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 22 篇 measurement
  • 21 篇 real-time system...
  • 21 篇 visualization

机构

  • 274 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 60 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 40 篇 shandong provinc...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 16 篇 quan cheng labor...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 15 篇 wei zhang
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 chunxiao wang
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han

语言

  • 660 篇 英文
  • 150 篇 其他
  • 10 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
812 条 记 录,以下是301-310 订阅
排序:
Towards Efficient Edge Caching: A Federated Reinforcement Learning Approach in Cloud-Edge-End networks
Towards Efficient Edge Caching: A Federated Reinforcement Le...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Zheng Su Huiling Shi Hao Hao Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center(National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
In this paper, we address the problem of recommendation-enabled caching for cloud-edge-end collaborative networks. We leverage collaborative filtering techniques to predict user content preferences and construct a con... 详细信息
来源: 评论
Machine Learning-Based Prediction of MPI Communication Time in High-Performance computing Applications
Machine Learning-Based Prediction of MPI Communication Time ...
收藏 引用
Frontiers technology of Information and Computer (ICFTIC), IEEE International Conference on
作者: Zhuang Wang Yuan Zhuang Yunhui Zeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
The rapid advancements in high-performance computing (HPC) have made large-scale parallel computing feasible. As a commonly used parallel programming model, Message Passing Interface (MPI) plays a crucial role in HPC ... 详细信息
来源: 评论
Parallel Optimization of Computational Fluid Dynamics Application code_saturne Based on Next Generation Sunway Supercomputer  14
Parallel Optimization of Computational Fluid Dynamics Applic...
收藏 引用
14th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2023
作者: Liu, Anjun Liao, Yin Xu, Xihao Chen, YanYan Zhong, Hongjun Wu, Jianming Kong, Bo Raikov, Alexander Guo, Meng Jinan Institute of Supercomputing Technology Jinan Key Laboratory of High Performance Industrial Software Jinan China Zhejiang Yuansuan Technology Co. Ltd Jinan Supercomputing-Zhejiang Yuansuan Industrial Simulation System Joint Laboratory Hangzhou China Qilu University of Technology Shandong Academy of Sciences Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security China Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Shandong Jinan China
code_saturne is an open-source general large-scale computational fluid dynamics software independently developed by Electricite de France since 1997. Due to its high computing performance, code_saturne has been widely... 详细信息
来源: 评论
Rail Transit Event Extraction based on the Fusion of Semantic and Local Dependency Features
Rail Transit Event Extraction based on the Fusion of Semanti...
收藏 引用
IEEE International Conference on Big Knowledge (ICBK)
作者: Qiang Chen Haining Meng Yihao Bao Mingsong Yang Xinyu Tong Qin Zhao Muhammad Bilal Khan Xinhong Hei School of Computer Science and Engineering Xi’an University of Technology Xi’an China School of Computer Science and Engineering Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an University of Technology Xi’an China School of Civil Engineering and Architecture Xi’an University of Technology Xi’an China
Event extraction in rail transit plays a vital role in all stages of design, construction, and final acceptance. Event extraction is a key part of building event logic graph (ELG). However, the difficulty in obtaining... 详细信息
来源: 评论
Cross-Chain Identity Authentication Protocol based on Group Signature and Zero-Knowledge Proof
Cross-Chain Identity Authentication Protocol based on Group ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Shujiang Xu Duanzhen Li Lianhai Wang Miodrag J. Mihaljević Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan PR China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan PR China Serbian Academy of Sciences and Arts Mathematical Institute Belgrade Serbia
Cross-chain interaction plays a crucial role in enhancing asset circulation and data sharing across diverse blockchain systems. Cross-chain identity authentication is the primary pre-requisite of cross-chain security ... 详细信息
来源: 评论
Cerebrovascular segmentation from mesoscopic optical images using Swin Transformer
收藏 引用
Journal of Innovative Optical Health Sciences 2023年 第4期16卷 120-133页
作者: Yuxin Li Qianlong Zhang Hang Zhou Junhuai Li Xiangning Li Anan Li Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048P.R.China School of Computer Science Chengdu University of Information Technology Chengdu 610225P.R.China Britton Chance Center for Biomedical Photonics Wuhan National Laboratory for Optoelectronics MoE Key Laboratory for Biomedical Photonics Huazhong University of Science and Technology Wuhan 430074 P.R.China HUST-Suzhou Institute for Brainsmatics Suzhou 215123 P.R.China
Vascular segmentation is a crucial task in biomedical image processing,which is significant for analyzing and modeling vascular networks under physiological and pathological *** advances in fluorescent labeling and me... 详细信息
来源: 评论
GHTO: Improving Byzantine Robustness in Distributed Machine Learning Through Gradient Heterogeneity Twofold Optimization
GHTO: Improving Byzantine Robustness in Distributed Machine ...
收藏 引用
Frontiers technology of Information and Computer (ICFTIC), IEEE International Conference on
作者: Caiyun Li Ming Yang Jian Cao Xiaoming Wu Yunpeng He Xin Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Evayinfo Technology Co. Ltd Jinan P. R. China
Heterogeneous datasets induce local gradient variance and global gradient variance in distributed learning, collectively referred to as gradient heterogeneity. Gradient heterogeneity increases the system's vulnera... 详细信息
来源: 评论
Efficient Caching in Cyber-Physical-Social Systems Based on Social-Aware and Popularity Prediction
Efficient Caching in Cyber-Physical-Social Systems Based on ...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Wei Zhang Xukun Sun Hao Hao Huiling Shi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng laboratory Jinan China
Cyber-Physical-Social Systems (CPSS) aim to enhance societal efficiency by integrating intelligent, interactive systems. To support CPSS, data is often gathered from the cloud, but non-real-time cloud-user connections... 详细信息
来源: 评论
PWPH:Proactive Deepfake Detection Method Based on Watermarking and Perceptual Hashing
PWPH:Proactive Deepfake Detection Method Based on Watermarki...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Jian Li Shuanshuan Li Bin Ma Chunpeng Wang Linna Zhou Fei Wang Yule Wang Miaomiao Yang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
The popularity of Deepfake technology has raised the challenge of recognizing real and fake faces. While detection methods already exist, most of them are passive forensics and face challenges of generalizability and ... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qiliang Gu Qin Lu Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论