咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 288 篇 期刊文献

馆藏范围

  • 627 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 327 篇 计算机科学与技术...
    • 244 篇 软件工程
    • 67 篇 信息与通信工程
    • 63 篇 控制科学与工程
    • 53 篇 生物工程
    • 51 篇 电气工程
    • 31 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 19 篇 化学工程与技术
    • 19 篇 生物医学工程(可授...
    • 17 篇 动力工程及工程热...
    • 17 篇 交通运输工程
    • 16 篇 光学工程
    • 15 篇 网络空间安全
    • 10 篇 仪器科学与技术
    • 9 篇 材料科学与工程(可...
    • 7 篇 建筑学
  • 178 篇 理学
    • 91 篇 数学
    • 60 篇 生物学
    • 26 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 22 篇 化学
    • 15 篇 系统科学
  • 108 篇 管理学
    • 61 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 18 篇 医学
    • 12 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 8 篇 公共卫生与预防医...
  • 11 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 23 篇 training
  • 21 篇 feature extracti...
  • 19 篇 computational mo...
  • 19 篇 semantics
  • 15 篇 deep learning
  • 14 篇 machine learning
  • 13 篇 task analysis
  • 13 篇 memory managemen...
  • 12 篇 accuracy
  • 12 篇 data models
  • 11 篇 deep neural netw...
  • 11 篇 contrastive lear...
  • 11 篇 predictive model...
  • 10 篇 reinforcement le...
  • 10 篇 computer archite...
  • 10 篇 optimization
  • 10 篇 codes
  • 9 篇 scalability
  • 9 篇 robustness
  • 8 篇 parallel process...

机构

  • 149 篇 national enginee...
  • 103 篇 national enginee...
  • 82 篇 college of compu...
  • 63 篇 school of comput...
  • 54 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 30 篇 shenzhen univers...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 18 篇 shenzhen institu...
  • 18 篇 zhejiang lab
  • 17 篇 school of inform...
  • 13 篇 huazhong univers...
  • 12 篇 computer vision ...
  • 12 篇 national enginee...

作者

  • 134 篇 jin hai
  • 126 篇 hai jin
  • 44 篇 shen linlin
  • 43 篇 xiaofei liao
  • 29 篇 liao xiaofei
  • 29 篇 li jianqiang
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 18 篇 linlin shen
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 16 篇 yu zhang
  • 15 篇 wang jinbao
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 liu haikun
  • 14 篇 li minghui

语言

  • 537 篇 英文
  • 86 篇 其他
  • 6 篇 中文
检索条件"机构=National Engineering Lab for Big Data System Computing Technology"
627 条 记 录,以下是431-440 订阅
排序:
Grace: An Efficient Parallel SPARQL Query system over Large-Scale RDF data
Grace: An Efficient Parallel SPARQL Query System over Large-...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xiang Kang Yuying Zhao Pingpeng Yuan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
As a markup language for describing web resources, RDF is often used to represent graph data. SPARQL is a standard query language for RDF data, which is convenient in querying RDF. As RDF data grows rapidly, how to de... 详细信息
来源: 评论
Text-augmented long-term relation dependency learning for knowledge graph representation
High-Confidence Computing
收藏 引用
High-Confidence computing 2025年
作者: Quntao Zhu Mengfan Li Yuanjun Gao Yao Wan Xuanhua Shi Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Knowledge graph (KG) representation learning aims to map entities and relations into a low-dimensional representation space, showing significant potential in many tasks. Existing approaches follow two categories: (1) ... 详细信息
来源: 评论
Cross-Language Binary-Source Code Matching with Intermediate Representations
arXiv
收藏 引用
arXiv 2022年
作者: Gui, Yi Wan, Yao Zhang, Hongyu Huang, Huifang Sui, Yulei Xu, Guandong Shao, Zhiyuan Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China The University of Newcastle Australia School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan China School of Computer Science University of Technology Sydney Australia
Binary-source code matching plays an important role in many security and software engineering related tasks such as malware detection, reverse engineering and vulnerability assessment. Currently, several approaches ha... 详细信息
来源: 评论
Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Yao He, Yang Bi, Zhangqian Zhang, Jianguo Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai Yu, Philip S. National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Simon Fraser University Vancouver Canada School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Salesforce Research United States Chongqing University China University of New South Wales Australia University of Technology Sydney Australia University of Illinois at Chicago Chicago United States
Code intelligence leverages machine learning techniques to extract knowledge from extensive code corpora, with the aim of developing intelligent tools to improve the quality and productivity of computer programming. C... 详细信息
来源: 评论
Realizing Emotional Interactions to Learn User Experience and Guide Energy Optimization for Mobile Architectures  22
Realizing Emotional Interactions to Learn User Experience an...
收藏 引用
Proceedings of the 55th Annual IEEE/ACM International Symposium on Microarchitecture
作者: Xueliang Li Zhuobin Shi Junyang Chen Yepang Liu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China Research Institute of Trustworthy Autonomous Systems Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation and Department of Computer Science and Engineering Southern University of Science and Technology China
In the age of AI, mobile architectures such as smartphones are still "cold machines"; machines do not feel. If the architecture is able to feel users' feelings and runtime user experience (UX), it will a...
来源: 评论
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhang, Junwei Liu, Wei Hou, Junhui Li, Minghui Zhang, Leo Yu Jin, Hai Sun, Lichao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China Cluster and Grid Computing Lab China National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Services Computing Technology and System Lab China City University of Hong Kong Hong Kong Deakin University Australia Lehigh University United States
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ... 详细信息
来源: 评论
Semantic and syntactic enhanced aspect sentiment triplet extraction
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Zhexue Huang, Hong Liu, Bang Shi, Xuanhua Jin, Hai National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Huazhong University of Science and Technology China RALI & Mila University of Montreal
Aspect Sentiment Triplet Extraction (ASTE) aims to extract triplets from sentences, where each triplet includes an entity, its associated sentiment, and the opinion span explaining the reason for the sentiment. Most e... 详细信息
来源: 评论
A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of Computer Science  20
A Multi-Dimensional Assessment Model and Its Application in ...
收藏 引用
21st Annual Conference of the Special Interest Group in Information technology Education, SIGITE 2020
作者: Luo, Jiwen Lu, Feng Wang, Tao Key Lab. of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Computer science is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su... 详细信息
来源: 评论
Like an Ophthalmologist: Dynamic Selection Driven Multi-View Learning for Diabetic Retinopathy Grading  39
Like an Ophthalmologist: Dynamic Selection Driven Multi-View...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Luo, Xiaoling Xu, Qihao Wu, Huisi Liu, Chengliang Lai, Zhihui Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Key Laboratory of Visual Object Detection and Recognition Harbin Institute of Technology Shenzhen China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Diabetic retinopathy (DR), with its large patient population, has become a formidable threat to human visual health. In the clinical diagnosis of DR, multi-view fundus images are considered to be more suitable for DR ... 详细信息
来源: 评论
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean label
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhou, Ziqi Zhang, Yechao Zhang, Leo Yu Zheng, Yifeng He, Yuanyuan Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Information Technology Deakin University VIC3216 Australia School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security HUST Wuhan430074 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Due to its powerful feature learning capability and high efficiency, deep hashing has achieved great success in large-scale image retrieval. Meanwhile, extensive works have demonstrated that deep neural networks (DNNs... 详细信息
来源: 评论