咨询与建议

限定检索结果

文献类型

  • 429 篇 会议
  • 411 篇 期刊文献

馆藏范围

  • 840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 514 篇 工学
    • 391 篇 计算机科学与技术...
    • 306 篇 软件工程
    • 98 篇 信息与通信工程
    • 78 篇 生物工程
    • 68 篇 电气工程
    • 66 篇 控制科学与工程
    • 35 篇 电子科学与技术(可...
    • 30 篇 机械工程
    • 30 篇 交通运输工程
    • 29 篇 生物医学工程(可授...
    • 27 篇 光学工程
    • 24 篇 化学工程与技术
    • 18 篇 网络空间安全
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 13 篇 材料科学与工程(可...
    • 12 篇 建筑学
  • 262 篇 理学
    • 132 篇 数学
    • 88 篇 生物学
    • 43 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 28 篇 化学
    • 16 篇 系统科学
  • 140 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 33 篇 医学
    • 25 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 16 篇 公共卫生与预防医...
  • 20 篇 法学
    • 15 篇 社会学
  • 9 篇 经济学
  • 6 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 28 篇 semantics
  • 27 篇 feature extracti...
  • 27 篇 training
  • 26 篇 computational mo...
  • 23 篇 deep learning
  • 18 篇 accuracy
  • 15 篇 contrastive lear...
  • 15 篇 predictive model...
  • 15 篇 data models
  • 14 篇 task analysis
  • 14 篇 machine learning
  • 13 篇 reinforcement le...
  • 13 篇 deep neural netw...
  • 13 篇 memory managemen...
  • 13 篇 codes
  • 12 篇 convolution
  • 12 篇 graph neural net...
  • 12 篇 costs
  • 12 篇 adaptation model...
  • 11 篇 scalability

机构

  • 144 篇 national enginee...
  • 102 篇 national enginee...
  • 81 篇 college of compu...
  • 63 篇 school of comput...
  • 54 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 29 篇 shenzhen univers...
  • 28 篇 huazhong univers...
  • 28 篇 hubei key labora...
  • 22 篇 school of softwa...
  • 21 篇 national enginee...
  • 21 篇 guangdong provin...
  • 18 篇 shenzhen institu...
  • 17 篇 school of comput...
  • 17 篇 school of inform...
  • 14 篇 zhejiang lab
  • 12 篇 computer vision ...

作者

  • 124 篇 hai jin
  • 121 篇 jin hai
  • 43 篇 xiaofei liao
  • 43 篇 shen linlin
  • 29 篇 li jianqiang
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 17 篇 zhang leo yu
  • 17 篇 yu zhang
  • 17 篇 linlin shen
  • 16 篇 zou deqing
  • 15 篇 wang jinbao
  • 15 篇 li tianrui
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 li minghui

语言

  • 743 篇 英文
  • 87 篇 其他
  • 14 篇 中文
检索条件"机构=National Engineering Laboratory for Big Data System Computing Technology"
840 条 记 录,以下是681-690 订阅
Finedge: A Dynamic Cost-Efficient Edge Resource Management Platform for NFV Network
Finedge: A Dynamic Cost-Efficient Edge Resource Management P...
收藏 引用
International Workshop on Quality of Service
作者: Miao Li Qixia Zhang Fangming Liu National Engineering Research Center for Big Data Technology and System Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology China
With the evolution of network function virtualization (NFV) and edge computing, software-based network functions (NFs) can be deployed on closer-to-end-user edge servers to support a broad range of new services with h... 详细信息
来源: 评论
Disentangled Cascaded Graph Convolution Networks for Multi-Behavior Recommendation
arXiv
收藏 引用
arXiv 2024年
作者: Cheng, Zhiyong Dong, Jianhua Liu, Fan Zhu, Lei Yang, Xun Wang, Meng School of Computer Science and Information Engineering Hefei University of Technology No. 485 Danxia Road Anhui Hefei230009 China Shandong Artificial Intelligence Institute Qilu University of Technology Shandong Academy of Sciences No. 19 Keyuan Road Shandong Jinan250014 China School of Computing National University of Singapore 21 Lower Kent Ridge Road Singapore119077 Singapore School of Electronic and Information Engineering University of Tongji No. 4800 Caoan Road Shanghai201804 China School of Information Science and Technology University of Science and Technology of China No. 443 Huangshan Road Anhui Hefei230027 China Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Institute of Artificial Intelligence Hefei Comprehensive National Science Centery No. 485 Danxia Road Anhui Hefei230009 China
Multi-behavioral recommender systems have emerged as a solution to address data sparsity and cold-start issues by incorporating auxiliary behaviors alongside target behaviors. However, existing models struggle to accu... 详细信息
来源: 评论
Heat to Power: Thermal Energy Harvesting and Recycling for Warm Water-Cooled datacenters
Heat to Power: Thermal Energy Harvesting and Recycling for W...
收藏 引用
Annual International Symposium on Computer Architecture, ISCA
作者: Xinhui Zhu Weixiang Jiang Fangming Liu Qixia Zhang Li Pan Qiong Chen Ziyang Jia National Engineering Research Center for Big Data Technology and System Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology China
Warm water cooling has been regarded as a promising method to improve the energy efficiency of water-cooled datacenters. In warm water-cooling systems, hot spots occur as a common problem where the hybrid cooling arch...
来源: 评论
Towards making deep learning-based vulnerability detectors robust
arXiv
收藏 引用
arXiv 2021年
作者: Li, Zhen Tang, Jing Zou, Deqing Chen, Qian Xu, Shouhuai Zhang, Chao Li, Yichen Jin, Hai The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China The University of Texas at San Antonio San AntonioTX78249 United States The University of Colorado Colorado Springs Colorado SpringsCO80918 United States Tsinghua University Beijing100084 China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
Automatically detecting software vulnerabilities in source code is an important problem that has attracted much attention. In particular, deep learning-based vulnerability detectors, or DL-based detectors, are attract... 详细信息
来源: 评论
A zero-shot based fingerprint presentation attack detection system
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Haozhe Zhang, Wentian Liu, Guojie Liu, Feng National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of IntelligentInformation Processing College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
With the development of presentation attacks, Automated Fingerprint Recognition systems(AFRSs) are vulnerable to presentation attack. Thus, numerous methods of presentation attack detection(PAD) have been proposed to ... 详细信息
来源: 评论
Decentralized Task Offloading in Edge computing: A Multi-User Multi-Armed Bandit Approach
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Xiong Ye, Jiancheng Lui, John C.S. National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Network Technology Lab Hong Kong Research Center Huawei Technologies Co. Ltd. Hong Kong Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong
Mobile edge computing facilitates users to offload computation tasks to edge servers for meeting their stringent delay requirements. Previous works mainly explore task offloading when system-side information is given ... 详细信息
来源: 评论
A Heterogeneous PIM Hardware-Software Co-Design for Energy-Efficient Graph Processing
A Heterogeneous PIM Hardware-Software Co-Design for Energy-E...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Yu Huang Long Zheng Pengcheng Yao Jieshan Zhao Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Service Computing Technology and System Lab/Cluster and Grid Computing Lab Huazhong University of Science and Technology China UNSW Sydney Australia
Processing-In-Memory (PIM) is an emerging technology that addresses the memory bottleneck of graph processing. In general, analog memristor-based PIM promises high parallelism provided that the underlying matrix-struc... 详细信息
来源: 评论
Spara: An Energy-Efficient ReRAM-Based Accelerator for Sparse Graph Analytics Applications
Spara: An Energy-Efficient ReRAM-Based Accelerator for Spars...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Long Zheng Jieshan Zhao Yu Huang Qinggang Wang Zhen Zeng Jingling Xue Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System/Service Computing Technology and System Lab/Cluster and Grid Computing Lab Huazhong University of Science and Technology China UNSW Sydney Australia
Resistive random access memory (ReRAM) addresses the high memory bandwidth requirement challenge of graph analytics by integrating the computing logic in the memory. Due to the matrix-structured crossbar architecture,... 详细信息
来源: 评论
Group-wise inhibition based feature regularization for robust classification
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Haozhe Wu, Haoqian Xie, Weicheng Liu, Feng Shen, Linlin 1Computer Vision Institute College of Computer Science and Software Engineering 2SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society 3National Engineering Laboratory for Big Data System Computing Technology 4Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen 518060 China
The convolutional neural network (CNN) is vulnerable to degraded images with even very small variations (e.g. corrupted and adversarial samples). One of the possible reasons is that CNN pays more attention to the most... 详细信息
来源: 评论
Universal deep network for steganalysis of color image based on channel representation
arXiv
收藏 引用
arXiv 2021年
作者: Wei, Kangkang Luo, Weiqi Tan, Shunquan Huang, Jiwu The Guangdong Key Lab of Information Security Technology School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Up to now, most existing steganalytic methods are designed for grayscale images, and they are not suitable for color images that are widely used in current social networks. In this paper, we design a universal color i... 详细信息
来源: 评论