咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 288 篇 期刊文献

馆藏范围

  • 627 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 327 篇 计算机科学与技术...
    • 244 篇 软件工程
    • 67 篇 信息与通信工程
    • 63 篇 控制科学与工程
    • 53 篇 生物工程
    • 51 篇 电气工程
    • 31 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 19 篇 化学工程与技术
    • 19 篇 生物医学工程(可授...
    • 17 篇 动力工程及工程热...
    • 17 篇 交通运输工程
    • 16 篇 光学工程
    • 15 篇 网络空间安全
    • 10 篇 仪器科学与技术
    • 9 篇 材料科学与工程(可...
    • 7 篇 建筑学
  • 178 篇 理学
    • 91 篇 数学
    • 60 篇 生物学
    • 26 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 22 篇 化学
    • 15 篇 系统科学
  • 108 篇 管理学
    • 61 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 18 篇 医学
    • 12 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 8 篇 公共卫生与预防医...
  • 11 篇 法学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 23 篇 training
  • 21 篇 feature extracti...
  • 19 篇 computational mo...
  • 19 篇 semantics
  • 15 篇 deep learning
  • 14 篇 machine learning
  • 13 篇 task analysis
  • 13 篇 memory managemen...
  • 12 篇 accuracy
  • 12 篇 data models
  • 11 篇 deep neural netw...
  • 11 篇 contrastive lear...
  • 11 篇 predictive model...
  • 10 篇 reinforcement le...
  • 10 篇 computer archite...
  • 10 篇 optimization
  • 10 篇 codes
  • 9 篇 scalability
  • 9 篇 robustness
  • 8 篇 parallel process...

机构

  • 149 篇 national enginee...
  • 103 篇 national enginee...
  • 82 篇 college of compu...
  • 63 篇 school of comput...
  • 54 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 30 篇 shenzhen univers...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 18 篇 shenzhen institu...
  • 18 篇 zhejiang lab
  • 17 篇 school of inform...
  • 13 篇 huazhong univers...
  • 12 篇 computer vision ...
  • 12 篇 national enginee...

作者

  • 134 篇 jin hai
  • 126 篇 hai jin
  • 44 篇 shen linlin
  • 43 篇 xiaofei liao
  • 29 篇 liao xiaofei
  • 29 篇 li jianqiang
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 18 篇 linlin shen
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 16 篇 yu zhang
  • 15 篇 wang jinbao
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 liu haikun
  • 14 篇 li minghui

语言

  • 537 篇 英文
  • 86 篇 其他
  • 6 篇 中文
检索条件"机构=National Engineering Lab for Big Data System Computing Technology"
627 条 记 录,以下是561-570 订阅
排序:
SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis
SCDetector: Software Functional Clone Detection Based on Sem...
收藏 引用
IEEE International Conference on Automated Software engineering (ASE)
作者: Yueming Wu Deqing Zou Shihan Dou Siru Yang Wei Yang Feng Cheng Hong Liang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security HUST Wuhan China Shenzhen HUST Research Institute Shenzhen China School of Cyber Science and Engineering HUST Wuhan China School of Computer Science and Technology HUST Wuhan China University of Texas at Dallas United States
Code clone detection is to find out code fragments with similar functionalities, which has been more and more important in software engineering. Many approaches have been proposed to detect code clones, in which token... 详细信息
来源: 评论
Sledge: Towards Efficient Live Migration of Docker Containers
Sledge: Towards Efficient Live Migration of Docker Container...
收藏 引用
IEEE International Conference on Cloud computing, CLOUD
作者: Bo Xu Song Wu Jiang Xiao Hai Jin Yingxi Zhang Guoqiang Shi Tingyu Lin Jia Rao Li Yi Jizhong Jiang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory of Intelligent Manufacturing System Technology Beijing China The University of Texas at Arlington Arlington TX USA Alibaba Cloud Computing Co. Ltd. Hangzhou China
Modern large-scale cloud platforms require live migration technique on Docker containers with stateful workload to support load balancing, host maintenance, and Quality of Service (QoS) improvement. Efficient and scal... 详细信息
来源: 评论
N-Docker: A NVM-HDD Hybrid Docker Storage Framework to Improve Docker Performance  16th
N-Docker: A NVM-HDD Hybrid Docker Storage Framework to Impro...
收藏 引用
16th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2019
作者: Gu, Lin Tang, Qizhi Wu, Song Jin, Hai Zhang, Yingxi Shi, Guoqiang Lin, Tingyu Rao, Jia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China State Key Laboratory of Intelligent Manufacturing System Technology Beijing100854 China The University of Texas at Arlington ArlingtonTX76019 United States
Docker has been widely adopted in production environment, but unfortunately deployment and cold-start of container are limited by the low speed of disk. The emerging non-volatile memory (NVM) technology, which has hig... 详细信息
来源: 评论
Group-wise inhibition based feature regularization for robust classification
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Haozhe Wu, Haoqian Xie, Weicheng Liu, Feng Shen, Linlin 1Computer Vision Institute College of Computer Science and Software Engineering 2SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society 3National Engineering Laboratory for Big Data System Computing Technology 4Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen 518060 China
The convolutional neural network (CNN) is vulnerable to degraded images with even very small variations (e.g. corrupted and adversarial samples). One of the possible reasons is that CNN pays more attention to the most... 详细信息
来源: 评论
Minimum Spanning Tree Clustering Based on Density Filtering  7th
Minimum Spanning Tree Clustering Based on Density Filtering
收藏 引用
7th CCF Academic Conference on bigdata, CCF bigdata 2019
作者: Wang, Ke Xie, Xia Sun, Jiayu Cao, Wenzhi National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hunan University of Technology and Business Changsha410205 China
Clustering analysis is an important method in data mining. In order to recognize clusters with arbitrary shapes as well as clusters with different density, we propose a new clustering approach: minimum spanning tree c... 详细信息
来源: 评论
VulDeeLocator: A deep learning-based fine-grained vulnerability detector
arXiv
收藏 引用
arXiv 2020年
作者: Li, Zhen Zou, Deqing Xu, Shouhuai Chen, Zhaoxuan Zhu, Yawei Jin, Hai The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Cyber Security and Computer Hebei University Baoding071002 China The Department of Computer Science University of Colorado Colorado Springs CO80918 United States University of Texas San Antonio United States
Automatically detecting software vulnerabilities is an important problem that has attracted much attention from the academic research community. However, existing vulnerability detectors still cannot achieve the vulne... 详细信息
来源: 评论
RNC: Reliable network property classifier based on graph embedding  20
RNC: Reliable network property classifier based on graph emb...
收藏 引用
20th International Conference on Parallel and Distributed computing, Applications and Technologies, PDCAT 2019
作者: Liao, Hao Liu, Qixin Vidmer, Alexandre Zhou, Mingyang Mao, Rui National Engineering Laboratory for Big Data System Computing Technology Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
In the past two decades, analyzing the information network has been intensively studied from various disciplines. Small world property and scale-free property prevail in network science research. The comparison and cl... 详细信息
来源: 评论
Context aware 3d unet for brain tumor segmentation
arXiv
收藏 引用
arXiv 2020年
作者: Ahmad, Parvez Qamar, Saqib Shen, Linlin Saeed, Adnan National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China School of Hydropower and Information Technology Huazhong University of Science and Technology Wuhan430074 China
Deep convolutional neural network (CNN) achieves remarkable performance for medical image analysis. UNet is the primary source in the performance of 3D CNN architectures for medical imaging tasks, including brain tumo... 详细信息
来源: 评论
A codebook-driven approach for low-light image enhancement
收藏 引用
engineering Applications of Artificial Intelligence 2025年 156卷
作者: Xu Wu Xianxu Hou Zhihui Lai Jie Zhou Ya-nan Zhang Witold Pedrycz Linlin Shen College of Computer Science and Software Engineering Shenzhen University Shenzhen 518060 China School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University Suzhou 215400 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 518060 China School of Computer Science Sichuan Normal University Chengdu 610065 China The Department of Electrical & Computer Engineering University of Alberta Alberta T6G 1H9 Canada
Low-light image enhancement (LLIE) aims to improve low-illumination images. However, existing methods face two challenges: (1) uncertainty in restoration from diverse brightness degradations; (2) loss of texture and c... 详细信息
来源: 评论
Android malware family classification and characterization using CFG and DFG  13
Android malware family classification and characterization u...
收藏 引用
13th International Symposium on Theoretical Aspects of Software engineering, TASE 2019
作者: Xu, Zhiwu Ren, Kerong Song, Fu College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China School of Information Science and Technology ShanghaiTech University Shanghai China
Android malware has become a serious threat for our daily life, and thus there is a pressing need to effectively mitigate or defend against them. Recently, many approaches and tools to analyze Android malware have bee... 详细信息
来源: 评论