咨询与建议

限定检索结果

文献类型

  • 356 篇 期刊文献
  • 353 篇 会议

馆藏范围

  • 709 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 421 篇 工学
    • 311 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 71 篇 信息与通信工程
    • 54 篇 生物工程
    • 48 篇 电气工程
    • 42 篇 电子科学与技术(可...
    • 42 篇 控制科学与工程
    • 26 篇 光学工程
    • 25 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 21 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 18 篇 动力工程及工程热...
    • 18 篇 土木工程
    • 17 篇 网络空间安全
    • 16 篇 交通运输工程
    • 13 篇 建筑学
  • 237 篇 理学
    • 113 篇 数学
    • 67 篇 物理学
    • 62 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 23 篇 地球物理学
    • 22 篇 化学
    • 19 篇 系统科学
  • 113 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 26 篇 医学
    • 20 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 21 篇 法学
    • 13 篇 社会学
  • 10 篇 经济学
  • 10 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 25 篇 feature extracti...
  • 23 篇 computational mo...
  • 23 篇 semantics
  • 17 篇 deep learning
  • 17 篇 machine learning
  • 15 篇 training
  • 14 篇 memory managemen...
  • 14 篇 accuracy
  • 12 篇 deep neural netw...
  • 11 篇 graph neural net...
  • 11 篇 cloud computing
  • 10 篇 scalability
  • 10 篇 computer archite...
  • 10 篇 codes
  • 10 篇 data models
  • 9 篇 parallel process...
  • 9 篇 optimization
  • 9 篇 predictive model...
  • 9 篇 costs
  • 9 篇 blockchain

机构

  • 99 篇 national enginee...
  • 62 篇 school of comput...
  • 50 篇 school of cyber ...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 28 篇 beijing advanced...
  • 27 篇 huazhong univers...
  • 27 篇 cluster and grid...
  • 26 篇 hubei key labora...
  • 21 篇 guangxi cooperat...
  • 18 篇 school of softwa...
  • 17 篇 zhejiang lab
  • 16 篇 school of inform...
  • 14 篇 dipartimento di ...
  • 13 篇 shandong provinc...
  • 13 篇 center for data ...
  • 13 篇 national center ...
  • 13 篇 key laboratory o...
  • 12 篇 national enginee...

作者

  • 126 篇 jin hai
  • 122 篇 hai jin
  • 42 篇 xiaofei liao
  • 27 篇 liao xiaofei
  • 23 篇 hu shengshan
  • 21 篇 long zheng
  • 21 篇 corianò claudio
  • 21 篇 haikun liu
  • 16 篇 zou deqing
  • 16 篇 zhang leo yu
  • 16 篇 yu zhang
  • 16 篇 lionetti stefano
  • 15 篇 deqing zou
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 li minghui
  • 12 篇 zhou ziqi
  • 12 篇 liu haikun
  • 11 篇 dinkar sitaram
  • 11 篇 wan yao

语言

  • 656 篇 英文
  • 45 篇 其他
  • 13 篇 中文
检索条件"机构=National Center in Big Data and Cloud Computing"
709 条 记 录,以下是121-130 订阅
排序:
ChestBox: Enabling Fast State Sharing for Stateful Serverless computing with State Functions
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable computing 2024年
作者: Zhang, Xinmin Wu, Song Gu, Lin He, Qiang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan Hubei430074 China
This paper presents ChestBox, a novel approach that utilizes state functions to facilitate low-latency state sharing for stateful serverless computing. When an application function needs to share a state, the state fu... 详细信息
来源: 评论
λGrapher: A Resource-Efficient Serverless System for GNN Serving through Graph Sharing  24
λGrapher: A Resource-Efficient Serverless System for GNN Se...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Hu, Haichuan Liu, Fangming Pei, Qiangyu Yuan, Yongjie Xu, Zichen Wang, Lin National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab in the School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan China Peng Cheng Laboratory Huazhong University of Science and Technology China School of Mathematics and Computer Science Nanchang University China Paderborn University Paderborn Germany
Graph Neural Networks (GNNs) have been increasingly adopted for graph analysis in web applications such as social networks. Yet, efficient GNN serving remains a critical challenge due to high workload fluctuations and... 详细信息
来源: 评论
Design of Bare Metal Network Architecture Based on Smart NIC  22
Design of Bare Metal Network Architecture Based on Smart NIC
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering
作者: Chuanhui Liu Peihui Wang Yuan Zhang Zhaozeng Zhang National Supercomputing Center in Zhengzhou Zhengzhou University China Cloud Computing Department Zhengzhou Inspur Data Technology Co. China
Currently, traditional virtualized servers in the cloud computing space suffer from excessive network stack overhead and insufficient CPU resources available for virtual machines. The article proposes a bare metal net... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Can Language Models Serve as Temporal Knowledge Bases?
Can Language Models Serve as Temporal Knowledge Bases?
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Zhao, Ruilin Zhao, Feng Xu, Guandong Zhang, Sixiao Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Data Science and Machine Intelligence Lab University of Technology Sydney Sydney Australia
Recent progress regarding the use of language models (LMs) as knowledge bases (KBs) has shown that language models can act as structured knowledge bases for storing relational facts. However, most existing works only ... 详细信息
来源: 评论
Research on Blockchain-based Decentralized Federated Learning
Research on Blockchain-based Decentralized Federated Learnin...
收藏 引用
International Conference on Computer Applications Technology (ICCAT)
作者: Boyuan Han Zhihong Liang Mingming Qin Rongxin Jiang Wei Dai School of Big Data and Intelligent Engineering Southwest Forestry University Kunming China Big Data and Cloud Computing Center Southwest Forestry University Kunming China Yunnan Pu'er Technical School Yunnan Pu'er Technical School Kunming China
The integration of blockchain and federated learning exhibits a highly synergistic relationship. Blockchain, with its assurance of trustworthiness in computational processes and data, combined with federated learning&...
来源: 评论
Using Rough Sets to Improve the High-dimensional data Anomaly Detection Method Based on Extended Isolation Forest
Using Rough Sets to Improve the High-dimensional Data Anomal...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Hanlin Liu Jiantao Zhou Hua Li College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Hohhot China
Anomaly detection refers to the identification of data objects that deviate from the general data distribution. One of the important challenges in anomaly detection is handling high-dimensional data, especially when i...
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
OUTLIER SYNTHESIS VIA HAMILTONIAN MONTE CARLO FOR OUT-OF-DISTRIBUTION DETECTION
arXiv
收藏 引用
arXiv 2025年
作者: Li, Hengzhuang Zhang, Teng National Engineering Research Center for Big Data Technology and System Service Computing Technology and Systems Laboratory Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Out-of-distribution (OOD) detection is crucial for developing trustworthy and reliable machine learning systems. Recent advances in training with auxiliary OOD data demonstrate efficacy in enhancing detection capabili... 详细信息
来源: 评论
Visitors Vis: Interactive Mining of Suspected Medical Insurance Fraud Groups  18th
Visitors Vis: Interactive Mining of Suspected Medical Insura...
收藏 引用
18th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2023
作者: Dong, Rixin Liu, Hanlin Guo, Xu Zhou, Jiantao College of Computer Science Inner Mongolia University Hohhot China National and Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolia Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
As medical insurance continues to grow in size, the losses caused by medical insurance fraud cannot be underestimated. Current data mining and predictive techniques have been applied to analyze and explore the health ... 详细信息
来源: 评论