咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 288 篇 期刊文献

馆藏范围

  • 627 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 327 篇 计算机科学与技术...
    • 244 篇 软件工程
    • 67 篇 信息与通信工程
    • 63 篇 控制科学与工程
    • 53 篇 生物工程
    • 51 篇 电气工程
    • 31 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 19 篇 化学工程与技术
    • 19 篇 生物医学工程(可授...
    • 17 篇 动力工程及工程热...
    • 17 篇 交通运输工程
    • 16 篇 光学工程
    • 15 篇 网络空间安全
    • 10 篇 仪器科学与技术
    • 9 篇 材料科学与工程(可...
    • 7 篇 建筑学
  • 178 篇 理学
    • 91 篇 数学
    • 60 篇 生物学
    • 26 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 22 篇 化学
    • 15 篇 系统科学
  • 108 篇 管理学
    • 61 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 18 篇 医学
    • 12 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 8 篇 公共卫生与预防医...
  • 11 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 23 篇 training
  • 21 篇 feature extracti...
  • 19 篇 computational mo...
  • 19 篇 semantics
  • 15 篇 deep learning
  • 14 篇 machine learning
  • 13 篇 task analysis
  • 13 篇 memory managemen...
  • 12 篇 accuracy
  • 12 篇 data models
  • 11 篇 deep neural netw...
  • 11 篇 contrastive lear...
  • 11 篇 predictive model...
  • 10 篇 reinforcement le...
  • 10 篇 computer archite...
  • 10 篇 optimization
  • 10 篇 codes
  • 9 篇 scalability
  • 9 篇 robustness
  • 8 篇 parallel process...

机构

  • 149 篇 national enginee...
  • 103 篇 national enginee...
  • 82 篇 college of compu...
  • 63 篇 school of comput...
  • 54 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 30 篇 shenzhen univers...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 18 篇 shenzhen institu...
  • 18 篇 zhejiang lab
  • 17 篇 school of inform...
  • 13 篇 huazhong univers...
  • 12 篇 computer vision ...
  • 12 篇 national enginee...

作者

  • 134 篇 jin hai
  • 126 篇 hai jin
  • 44 篇 shen linlin
  • 43 篇 xiaofei liao
  • 29 篇 liao xiaofei
  • 29 篇 li jianqiang
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 18 篇 linlin shen
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 16 篇 yu zhang
  • 15 篇 wang jinbao
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 liu haikun
  • 14 篇 li minghui

语言

  • 537 篇 英文
  • 86 篇 其他
  • 6 篇 中文
检索条件"机构=National Engineering Lab for Big Data System Computing Technology"
627 条 记 录,以下是381-390 订阅
排序:
Sal-Guide Diffusion: Saliency Maps Guide Emotional Image Generation through Adapter
Sal-Guide Diffusion: Saliency Maps Guide Emotional Image Gen...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Xiangru Lin Shenghua Zhong Yan Liu Gong Chen College of Computer Science Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China College of Computer Science Shenzhen University Shenzhen China Department of Computer Science The Hong Kong Polytechnic University HK China
The existing text-to-image generation methods based on stable diffusion yield better results in low-semantic prompt but often neglect the generation quality of high-semantic prompt such as emotional vocabulary, result... 详细信息
来源: 评论
Securing Sdn/Nfv-Enabled Campus Networks with Software-Defined Perimeter-Based Zero-Trust Architecture
SSRN
收藏 引用
SSRN 2023年
作者: Ruambo, Francis A. Zou, Deqing Lopes, Ivandro O. Yuan, Bin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on Big Data Security Wuhan China National Engineering Research Center for Big Data Technology and System Wuhan China Services Computing Technology and System Lab Wuhan China Cluster and Grid Computing Lab Wuhan China Mbeya university of Science and Technology Mbeya131 Tanzania United Republic of Nucleo Operacional para a Sociedade de Informacao Cape Verde Songshan Laboratory Zhengzhou China
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt... 详细信息
来源: 评论
TCSloT: Text Guided 3D Context and Slope Aware Triple Network for Dental Implant Position Prediction
TCSloT: Text Guided 3D Context and Slope Aware Triple Networ...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xinquan Yang Jinheng Xie Xuechen Li Xuguang Li Linlin Shen Yongqiang Deng College of Computer Science and Software Engineering Shenzhen University Shenzhen China Show Lab National University of Singapore Singapore National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Stomatology Shenzhen University General Hospital Shenzhen China
In implant prosthesis treatment, the surgical guide of implant is used to ensure accurate implantation. However, such design heavily relies on the manual location of the implant position. When deep neural network has ...
来源: 评论
Evolutionary Multiobjective Feature Selection Assisted by Unselected Features
Evolutionary Multiobjective Feature Selection Assisted by Un...
收藏 引用
Congress on Evolutionary Computation
作者: Xuan Duan Songbai Liu Junkai Ji Lingjie Li Qiuzhen Lin Kay Chen Tan College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ) Shenzhen University Shenzhen China Department of Computing The Hong Kong Polytechnic University Hong Kong SAR
To enhance the generalization of multi-objective feature selection (MOFS) in classification, this paper proposes an evolutionary multitasking algorithm, diverging from previous approaches that exclusively target selec... 详细信息
来源: 评论
FlashWalker: An In-Storage Accelerator for Graph Random Walks
FlashWalker: An In-Storage Accelerator for Graph Random Walk...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Fuping Niu Jianhui Yue Jiangqiu Shen Xiaofei Liao Haikun Liu Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computer Science Michigan Technological University Houghton Michigan USA
Graph random walk is widely used in the graph processing as it is a fundamental component in graph analysis, ranging from vertices ranking to the graph embedding. Different from traditional graph processing workload, ... 详细信息
来源: 评论
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning  24
Towards High-resolution 3D Anomaly Detection via Group-Level...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhu, Hongze Xie, Guoyang Hou, Chengbin Dai, Tao Gao, Can Wang, Jinbao Shen, Linlin National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong Department of Intelligent Manufacturing CATL Ningde China Fuzhou Fuyao Institute for Advanced Study Fuyao University of Science and Technology Fuzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ... 详细信息
来源: 评论
Metadata-Driven Federated Learning of Connectional Brain Templates in Non-IID Multi-Domain Scenarios
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Geng Wang, Qingyue Rekik, Islem National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering Northwestern Polytechnical University China BASIRA Lab Imperial-X Department of Computing Imperial College London United Kingdom
A connectional brain template (CBT) is a holistic representation of a population of multi-view brain connectivity graphs, encoding shared patterns and normalizing typical variations across individuals. The federation ... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
APSeg: Auto-Prompt Network for Cross-Domain Few-Shot Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: He, Weizhao Zhang, Yang Zhuo, Wei Shen, Linlin Yang, Jiaqi Deng, Songhe Sun, Liang Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China School of Computer Science University of Nottingham China
Few-shot semantic segmentation (FSS) endeavors to segment unseen classes with only a few labeled samples. Current FSS methods are commonly built on the assumption that their training and application scenarios share si... 详细信息
来源: 评论
Fingerprint Presentation Attack Detector Using Global-Local Model
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Haozhe Zhang, Wentian Liu, Feng Wu, Haoqian Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society The National Engineering Laboratory for Big Data System Computing Technology The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
The vulnerability of automated fingerprint recognition systems (AFRSs) to presentation attacks (PAs) promotes the vigorous development of PA detection (PAD) technology. However, PAD methods have been limited by inform... 详细信息
来源: 评论