咨询与建议

限定检索结果

文献类型

  • 318 篇 会议
  • 283 篇 期刊文献

馆藏范围

  • 601 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 370 篇 工学
    • 305 篇 计算机科学与技术...
    • 241 篇 软件工程
    • 67 篇 信息与通信工程
    • 52 篇 生物工程
    • 49 篇 电气工程
    • 42 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 19 篇 化学工程与技术
    • 18 篇 生物医学工程(可授...
    • 17 篇 动力工程及工程热...
    • 17 篇 交通运输工程
    • 16 篇 光学工程
    • 15 篇 网络空间安全
    • 10 篇 仪器科学与技术
    • 9 篇 材料科学与工程(可...
  • 177 篇 理学
    • 91 篇 数学
    • 59 篇 生物学
    • 26 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 22 篇 化学
    • 15 篇 系统科学
  • 107 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 17 篇 医学
    • 12 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 8 篇 公共卫生与预防医...
  • 11 篇 法学
    • 6 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 22 篇 training
  • 19 篇 computational mo...
  • 19 篇 semantics
  • 19 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 task analysis
  • 13 篇 memory managemen...
  • 13 篇 machine learning
  • 12 篇 accuracy
  • 12 篇 data models
  • 10 篇 computer archite...
  • 10 篇 optimization
  • 10 篇 contrastive lear...
  • 10 篇 predictive model...
  • 10 篇 codes
  • 9 篇 scalability
  • 9 篇 deep neural netw...
  • 9 篇 robustness
  • 8 篇 parallel process...
  • 8 篇 reinforcement le...

机构

  • 135 篇 national enginee...
  • 100 篇 national enginee...
  • 74 篇 college of compu...
  • 61 篇 school of comput...
  • 51 篇 school of cyber ...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 28 篇 shenzhen univers...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei key labora...
  • 20 篇 school of softwa...
  • 18 篇 shenzhen institu...
  • 18 篇 zhejiang lab
  • 16 篇 school of inform...
  • 15 篇 guangdong provin...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...

作者

  • 131 篇 jin hai
  • 126 篇 hai jin
  • 43 篇 xiaofei liao
  • 40 篇 shen linlin
  • 28 篇 liao xiaofei
  • 24 篇 li jianqiang
  • 23 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 18 篇 linlin shen
  • 17 篇 zou deqing
  • 16 篇 zhang leo yu
  • 16 篇 yu zhang
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 liu haikun
  • 13 篇 jiang xiao
  • 13 篇 li minghui
  • 12 篇 wan yao

语言

  • 550 篇 英文
  • 47 篇 其他
  • 5 篇 中文
检索条件"机构=National Engineering Lab for Big Data System Computing Technology"
601 条 记 录,以下是191-200 订阅
排序:
Working Smarter Not Harder: Hybrid Cooling for Deep Learning in Edge datacenters
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable computing 2025年
作者: Pei, Qiangyu Yuan, Yongjie Hu, Haichuan Wang, Lin Zhang, Dong Yan, Bingheng Yu, Chen Liu, Fangming Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology 1037 Luoyu Road Wuhan430074 China Paderborn University TU Darmstadt Germany Jinan Inspur Data Co. Ltd. China Huazhong University of Science and Technology Peng Cheng Laboratory China
The proliferation of deep-learning-based mobile and IoT applications has driven the increasing deployment of edge datacenters equipped with domain-specific accelerators. The unprecedented computing power offered by th... 详细信息
来源: 评论
The Entry-Extensible Cuckoo Filter  17th
The Entry-Extensible Cuckoo Filter
收藏 引用
17th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2020
作者: Yu, Shuiying Wu, Sijie Chen, Hanhua Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
The emergence of large-scale dynamic sets in real applications brings severe challenges in approximate set representation structures. A dynamic set with changing cardinality requires an elastic capacity of the approxi... 详细信息
来源: 评论
Graph for Science: From API based Programming to Graph Engine based Programming for HPC
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yu Wang, Zixiao Zhao, Jin Guo, Yuluo Yu, Hui Huang, Zhiying Shi, Xuanhua Liao, Xiaofei National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Modern scientific applications predominantly run on large-scale computing platforms, necessitating collaboration between scientific domain experts and high-performance computing (HPC) experts. While domain experts are... 详细信息
来源: 评论
A multi-dimensional index for privacy-preserving queries in cloud computing
A multi-dimensional index for privacy-preserving queries in ...
收藏 引用
作者: Xu, Hui Ding, Xiaofeng Jin, Hai Yu, Qing National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Although cloud computing saves the cost of enterprises and individuals to manage data in various applications on public cloud servers, it also causes the problem of the leakage of critical personal information and sen... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Intelligent Blocking and Prevention of SARS-CoV-2 Based on Evolutionary Reinforcement Learning
Intelligent Blocking and Prevention of SARS-CoV-2 Based on E...
收藏 引用
Congress on Evolutionary Computation
作者: Chengwei He Huaping Hong Lijia Ma Qingling Zhu Yuan Bai College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
In recent years, the global repercussions of SARS-CoV-2 and its variants have posed significant challenges to various areas, including the economic order, transportation, healthcare, and education, and the mitigation ... 详细信息
来源: 评论
Robust UAV Policy Learning for Urban Infrastructure Surface Screening*
Robust UAV Policy Learning for Urban Infrastructure Surface ...
收藏 引用
International Conference on Advanced Robotics and Mechatronics (ICARM)
作者: Bingqing Du Uddin Md. Borhan Tianxing Chen Jianyong Chen Jianqiang Li Jie Chen College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Unmanned Aerial Vehicles (UAVs) have emerged as pivotal tools for infrastructure inspection, mitigating risks to human life and enhancing operational efficiency. Despite advancements, achieving autonomous surface cove... 详细信息
来源: 评论
Heterogeneous differential privacy for vertically partitioned databases
Heterogeneous differential privacy for vertically partitione...
收藏 引用
作者: Xia, Yang Zhu, Tianqing Ding, Xiaofeng Jin, Hai Zou, Deqing National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China Deakin University Victoria Australia
Existing privacy-preserving approaches are generally designed to provide privacy guarantee for individual data in a database, which reduces the utility of the database for data analysis. In this paper, we propose a no... 详细信息
来源: 评论