咨询与建议

限定检索结果

文献类型

  • 318 篇 会议
  • 283 篇 期刊文献

馆藏范围

  • 601 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 370 篇 工学
    • 305 篇 计算机科学与技术...
    • 241 篇 软件工程
    • 67 篇 信息与通信工程
    • 52 篇 生物工程
    • 49 篇 电气工程
    • 42 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 19 篇 化学工程与技术
    • 18 篇 生物医学工程(可授...
    • 17 篇 动力工程及工程热...
    • 17 篇 交通运输工程
    • 16 篇 光学工程
    • 15 篇 网络空间安全
    • 10 篇 仪器科学与技术
    • 9 篇 材料科学与工程(可...
  • 177 篇 理学
    • 91 篇 数学
    • 59 篇 生物学
    • 26 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 22 篇 化学
    • 15 篇 系统科学
  • 107 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 17 篇 医学
    • 12 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 8 篇 公共卫生与预防医...
  • 11 篇 法学
    • 6 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 22 篇 training
  • 19 篇 computational mo...
  • 19 篇 semantics
  • 19 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 task analysis
  • 13 篇 memory managemen...
  • 13 篇 machine learning
  • 12 篇 accuracy
  • 12 篇 data models
  • 10 篇 computer archite...
  • 10 篇 optimization
  • 10 篇 contrastive lear...
  • 10 篇 predictive model...
  • 10 篇 codes
  • 9 篇 scalability
  • 9 篇 deep neural netw...
  • 9 篇 robustness
  • 8 篇 parallel process...
  • 8 篇 reinforcement le...

机构

  • 135 篇 national enginee...
  • 100 篇 national enginee...
  • 74 篇 college of compu...
  • 61 篇 school of comput...
  • 51 篇 school of cyber ...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 28 篇 shenzhen univers...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei key labora...
  • 20 篇 school of softwa...
  • 18 篇 shenzhen institu...
  • 18 篇 zhejiang lab
  • 16 篇 school of inform...
  • 15 篇 guangdong provin...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...

作者

  • 131 篇 jin hai
  • 126 篇 hai jin
  • 43 篇 xiaofei liao
  • 40 篇 shen linlin
  • 28 篇 liao xiaofei
  • 24 篇 li jianqiang
  • 23 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 18 篇 linlin shen
  • 17 篇 zou deqing
  • 16 篇 zhang leo yu
  • 16 篇 yu zhang
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 liu haikun
  • 13 篇 jiang xiao
  • 13 篇 li minghui
  • 12 篇 wan yao

语言

  • 550 篇 英文
  • 47 篇 其他
  • 5 篇 中文
检索条件"机构=National Engineering Lab for Big Data System Computing Technology"
601 条 记 录,以下是141-150 订阅
排序:
Accumulative Time Based Ranking Method to Reputation Evaluation in Information Networks
收藏 引用
Journal of Computer Science & technology 2022年 第4期37卷 960-974页
作者: Hao Liao Qi-Xin Liu Ze-Cheng Huang Ke-Zhong Lu Chi Ho Yeung Yi-Cheng Zhang National Engineering Laboratory on Big Data System Computing Technology College of Computer Science and SoftwareEngineeringShenzhen UniversityShenzhen 518060China Guangdong Province Key Laboratory of Popular High Performance Computers Shenzhen UniversityShenzhen 518060China Guangdong Province Engineering Center of China-Made High Performance Data Computing System College of ComputerScience and Software EngineeringShenzhen UniversityShenzhen 518060China Institute of Big Data Intelligent Management and Decision Shenzhen UniversityShenzhen 518060China Department of Science and Environmental Studies The Education University of Hong KongHong Kong 999077China Department of Physics University of FribourgFribourg 1700Switzerland
Due to over-abundant information on the Web, information filtering becomes a key task for online users to obtain relevant suggestions and how to extract the most related item is always a key topic for researchers in v... 详细信息
来源: 评论
Image super‐resolution via dynamic network
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 837-849页
作者: Chunwei Tian Xuanyu Zhang Qi Zhang Mingming Yang Zhaojie Ju School of Software Northwestern Polytechnical UniversityXi'anChina National Engineering Laboratory for Integrated Aero‐Space‐Ground‐Ocean Big Data Application Technology Xi'anChina Research&Development Institute Northwestern Polytechnical UniversityShenzhenChina School of Economics and Management Harbin Institute of Technology at WeihaiWeihaiChina Tencent AI Lab ShenzhenChina School of Computing University of PortsmouthPortsmouthUK
Convolutional neural networks depend on deep network architectures to extract accurate information for image super‐***,obtained information of these con-volutional neural networks cannot completely express predicted ... 详细信息
来源: 评论
Efficient Hardware Redo Logging for Secure Persistent Memory  23
Efficient Hardware Redo Logging for Secure Persistent Memory
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on data Science and systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and big data systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Zhan Yue, Jianhui Liao, Xiaofei Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China Michigan Technological University Computer Science Department HoughtonMI United States
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and data security for persistent memory (PM). The encryption/decryption of both data and log requests increase the memory ... 详细信息
来源: 评论
Software-Defined, Fast and Strongly-Consistent data Replication for RDMA-Based PM datastores
Software-Defined, Fast and Strongly-Consistent Data Replicat...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Haodi Lu Haikun Liu Chencheng Ye Xiaofei Liao Fubing Mao Yu Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computing Science and Technology Huazhong University of Science and Technology China
Modern storage systems typically replicate data on multiple servers to provide high reliability and availability. However, most commercially-deployed datastores often fail to offer low latency, high throughput, and st...
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
OUTLIER SYNTHESIS VIA HAMILTONIAN MONTE CARLO FOR OUT-OF-DISTRIBUTION DETECTION
arXiv
收藏 引用
arXiv 2025年
作者: Li, Hengzhuang Zhang, Teng National Engineering Research Center for Big Data Technology and System Service Computing Technology and Systems Laboratory Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Out-of-distribution (OOD) detection is crucial for developing trustworthy and reliable machine learning systems. Recent advances in training with auxiliary OOD data demonstrate efficacy in enhancing detection capabili... 详细信息
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
arXiv
收藏 引用
arXiv 2025年
作者: Bi, Zhangqian Wan, Yao Chu, Zhaoyang Hu, Yufei Zhang, Junyi Zhang, Hongyu Xu, Guandong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
How to Select Pre-Trained Code Models for Reuse? A Learning ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Zhangqian Bi Yao Wan Zhaoyang Chu Yufei Hu Junyi Zhang Hongyu Zhang Guandong Xu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论
KubeSPT: Stateful Pod Teleportation for Service Resilience with Live Migration
收藏 引用
IEEE Transactions on Services computing 2025年
作者: Zhang, Hansheng Wu, Song Fan, Hao Huang, Zhuo Xue, Weibin Yu, Chen Ibrahim, Shadi Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong China
Container orchestration systems, such as Kubernetes, streamline containerized application deployment. As more and more applications are being deployed in Kubernetes, there is an increasing need for rescheduling - relo... 详细信息
来源: 评论
Air Pollution Source Tracing by VIME-XGBoost
Air Pollution Source Tracing by VIME-XGBoost
收藏 引用
International Symposium on Computational and Business Intelligence (ISCBI)
作者: Wenchuan Zhao Qi Zhang Ting Shu Faculty of Data Science City University of Macau Macau China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Air pollution source tracing, which mainly identifies and analyzes the specific sources that lead to air pollution, is a prerequisite for preventing and controlling air pollution. Traditional source analysis methods a... 详细信息
来源: 评论