咨询与建议

限定检索结果

文献类型

  • 318 篇 会议
  • 282 篇 期刊文献

馆藏范围

  • 600 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 369 篇 工学
    • 304 篇 计算机科学与技术...
    • 241 篇 软件工程
    • 66 篇 信息与通信工程
    • 52 篇 生物工程
    • 49 篇 电气工程
    • 42 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 19 篇 化学工程与技术
    • 18 篇 生物医学工程(可授...
    • 17 篇 动力工程及工程热...
    • 17 篇 交通运输工程
    • 16 篇 光学工程
    • 15 篇 网络空间安全
    • 10 篇 仪器科学与技术
    • 9 篇 材料科学与工程(可...
  • 177 篇 理学
    • 91 篇 数学
    • 59 篇 生物学
    • 26 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 22 篇 化学
    • 15 篇 系统科学
  • 107 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 17 篇 医学
    • 12 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 8 篇 公共卫生与预防医...
  • 11 篇 法学
    • 6 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 22 篇 training
  • 19 篇 computational mo...
  • 19 篇 semantics
  • 19 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 task analysis
  • 13 篇 memory managemen...
  • 13 篇 machine learning
  • 12 篇 accuracy
  • 12 篇 data models
  • 10 篇 computer archite...
  • 10 篇 optimization
  • 10 篇 contrastive lear...
  • 10 篇 predictive model...
  • 10 篇 codes
  • 9 篇 scalability
  • 9 篇 deep neural netw...
  • 9 篇 robustness
  • 8 篇 parallel process...
  • 8 篇 reinforcement le...

机构

  • 134 篇 national enginee...
  • 100 篇 national enginee...
  • 74 篇 college of compu...
  • 61 篇 school of comput...
  • 51 篇 school of cyber ...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 28 篇 shenzhen univers...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei key labora...
  • 20 篇 school of softwa...
  • 18 篇 shenzhen institu...
  • 18 篇 zhejiang lab
  • 16 篇 school of inform...
  • 15 篇 guangdong provin...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...

作者

  • 131 篇 jin hai
  • 126 篇 hai jin
  • 43 篇 xiaofei liao
  • 40 篇 shen linlin
  • 28 篇 liao xiaofei
  • 24 篇 li jianqiang
  • 23 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 18 篇 linlin shen
  • 17 篇 zou deqing
  • 16 篇 zhang leo yu
  • 16 篇 yu zhang
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 liu haikun
  • 13 篇 jiang xiao
  • 13 篇 li minghui
  • 12 篇 wan yao

语言

  • 549 篇 英文
  • 47 篇 其他
  • 5 篇 中文
检索条件"机构=National Engineering Lab for Big Data System Computing Technology"
600 条 记 录,以下是281-290 订阅
排序:
Adaptive Evolutionary Reinforcement Learning Algorithm with Early Termination Strategy  24
Adaptive Evolutionary Reinforcement Learning Algorithm with ...
收藏 引用
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent systems
作者: Xiaoqiang Wu Qingling Zhu Qiuzhen Lin Weineng Chen Jianqiang Li College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China School of Computer Science and Engineering South China University of Technology Guangzhou China
Evolutionary reinforcement learning algorithms (ERLs), which combine evolutionary algorithms (EAs) with reinforcement learning (RL), have demonstrated significant success in enhancing RL performance. However, most ERL... 详细信息
来源: 评论
CPSAA: Accelerating Sparse Attention using Crossbar-based Processing-In-Memory Architecture
arXiv
收藏 引用
arXiv 2022年
作者: Li, Huize Jin, Hai Zheng, Long Liao, Xiaofei Huang, Yu Liu, Cong Xu, Jiahong Duan, Zhuohui Chen, Dan Gui, Chuangyi National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
The attention-based neural network attracts great interest due to its excellent accuracy enhancement. However, the attention mechanism requires huge computational efforts to process unnecessary calculations, significa... 详细信息
来源: 评论
Design and Simulation of Multi-tiered Heterogeneous Memory Architecture
Design and Simulation of Multi-tiered Heterogeneous Memory A...
收藏 引用
International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication systems (MASCOTS)
作者: Jinyuan Hu Haikun Liu Hai Jin Xiaofei Liao National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Heterogeneous memory systems have become increasingly popular in recent years. Because heterogeneous storage media often show significantly different characteristics in terms of bandwidth, latency, capacity, and energ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
Super-Resolution of Diffusion-Weighted Images via TDI-Conditioned Diffusion Model  15th
Super-Resolution of Diffusion-Weighted Images via TDI-Cond...
收藏 引用
15th International Workshop on Computational Diffusion MRI, CDMRI 2024, held in conjunction with 27th International Conference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2024
作者: Ma, Jiquan Teng, Yujun Chen, Geng Jiang, Haotian Zhang, Kai Liu, Feihong Rekik, Islem Shen, Dinggang School of Computer Science and Technology Heilongjiang University Harbin China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering Northwestern Polytechnical University Xi’an China School of Biomedical Engineering and State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai China School of Information Science and Technology Northwest University Xi’an China BASIRA Lab Imperial-X and Department of Computing Imperial College London London United Kingdom
Diffusion-Weighted Imaging (DWI) is a significant technique for studying white matter. However, it suffers from low-resolution obstacles in clinical settings. Post-acquisition Super-Resolution (SR) can enhance the res... 详细信息
来源: 评论
Cross-links matter for link prediction: rethinking the debiased GNN from a data perspective  23
Cross-links matter for link prediction: rethinking the debia...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing systems
作者: Zihan Luo Hong Huang Jianxun Lian Xiran Song Xing Xie Hai Jin National Engineering Research Center for Big Data Technology and System Service Computing Technology and Systems Laboratory Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Microsoft Research Asia Beijing China
Recently, the bias-related issues in GNN-based link prediction have raised widely spread concerns. In this paper, we emphasize the bias on links across different node clusters, which we call cross-links, after conside...
来源: 评论
Comprehensive Architecture Search for Deep Graph Neural Networks
收藏 引用
IEEE Transactions on big data 2025年
作者: Dong, Yukang Pan, Fanxing Gui, Yi Jiang, Wenbin Wan, Yao Zheng, Ran Jin, Hai National Engineering Research Center for Big Data Technology Huazhong University of Science and Technology Wuhan430074 China Huazhong University of Science and Technology Service Computing Technology and System Laboratory Wuhan430074 China Huazhong University of Science and Technology Cluster and Grid Computing Laboratory Wuhan430074 China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
In recent years, Neural Architecture Search (NAS) has emerged as a promising approach for automatically discovering superior model architectures for deep Graph Neural Networks (GNNs). Different methods have paid atten... 详细信息
来源: 评论
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning
Challenges and Approaches for Mitigating Byzantine Attacks i...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Junyu Shi Wei Wan Shengshan Hu Jianrong Lu Leo Yu Zhang School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Information Technology Deakin University
Recently emerged federated learning (FL) is an attractive distributed learning framework in which numerous wireless end-user devices can train a global model with the data remained autochthonous. Compared with the tra... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Fast and Scalable Gate-Level Simulation in Massively Parallel systems
Fast and Scalable Gate-Level Simulation in Massively Paralle...
收藏 引用
IEEE International Conference on Computer-Aided Design
作者: Haichuan Hu Zichen Xu Yuhao Wang Fangming Liu Services Computing Technology and System Lab Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Mathematics and Computer Science Nanchang University Nanchang China Pengcheng Laboratory Shenzhen China
The natural bijection between a proposed circuit design and its graph representation shall allow any graph optimization algorithm deploying into many-core systems efficiently. However, this process suffers from the ex...
来源: 评论