咨询与建议

限定检索结果

文献类型

  • 292 篇 会议
  • 128 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 422 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 276 篇 工学
    • 223 篇 计算机科学与技术...
    • 162 篇 软件工程
    • 68 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 电气工程
    • 24 篇 生物工程
    • 20 篇 机械工程
    • 13 篇 仪器科学与技术
    • 11 篇 动力工程及工程热...
    • 8 篇 化学工程与技术
    • 8 篇 农业工程
    • 8 篇 网络空间安全
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 力学(可授工学、理...
    • 4 篇 冶金工程
    • 4 篇 建筑学
  • 118 篇 理学
    • 76 篇 数学
    • 26 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 11 篇 化学
  • 80 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 9 篇 农学
    • 8 篇 作物学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 医学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 16 篇 computational mo...
  • 13 篇 feature extracti...
  • 12 篇 deep learning
  • 12 篇 distributed proc...
  • 10 篇 computer archite...
  • 10 篇 semantics
  • 9 篇 laboratories
  • 8 篇 computer science
  • 8 篇 conferences
  • 8 篇 scalability
  • 8 篇 concurrent compu...
  • 8 篇 fault tolerance
  • 8 篇 kernel
  • 7 篇 application soft...
  • 7 篇 anomaly detectio...
  • 7 篇 neural networks
  • 7 篇 predictive model...
  • 7 篇 benchmark testin...
  • 7 篇 costs
  • 7 篇 machine learning

机构

  • 37 篇 national laborat...
  • 36 篇 science and tech...
  • 26 篇 college of compu...
  • 22 篇 national key lab...
  • 21 篇 school of comput...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national laborat...
  • 9 篇 national laborat...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 7 篇 national laborat...
  • 6 篇 national key lab...
  • 6 篇 college of compu...
  • 6 篇 school of softwa...
  • 6 篇 laboratory of di...

作者

  • 18 篇 wang yijie
  • 16 篇 yijie wang
  • 15 篇 peng yuxing
  • 14 篇 wang huaimin
  • 12 篇 jie liu
  • 10 篇 liu jie
  • 10 篇 huaimin wang
  • 9 篇 yuxing peng
  • 8 篇 peichang shi
  • 8 篇 hangjun zhou
  • 8 篇 ding bo
  • 8 篇 fu yongquan
  • 7 篇 dongsheng li
  • 7 篇 qinglin wang
  • 7 篇 yin gang
  • 6 篇 zhou hangjun
  • 6 篇 shi peichang
  • 6 篇 wang huai-min
  • 6 篇 wang yi-jie
  • 6 篇 sikun li

语言

  • 391 篇 英文
  • 26 篇 中文
  • 5 篇 其他
检索条件"机构=National Key Laboratory for Parallel and Distributed Processing School of Computer Science"
422 条 记 录,以下是91-100 订阅
FAAD:an unsupervised fast and accurate anomaly detection method for a multi-dimensional sequence over data stream
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2019年 第3期20卷 388-404页
作者: Bin LI Yi-jie WANG Dong-sheng YANG Yong-mou LI Xing-kong MA Science and Technology on Parallel and Distributed Processing Laboratory College of ComputerNational University of Defense Technology Block Chain Research Institute of LianLian Pay
Recently, sequence anomaly detection has been widely used in many fields. Sequence data in these fields are usually multi-dimensional over the data stream. It is a challenge to design an anomaly detection method for a... 详细信息
来源: 评论
Unlearnable 3D point clouds: class-wise transformation is all you need  24
Unlearnable 3D point clouds: class-wise transformation is al...
收藏 引用
Proceedings of the 38th International Conference on Neural Information processing Systems
作者: Xianlong Wang Minghui Li Wei Liu Hangtao Zhang Shengshan Hu Yechao Zhang Ziqi Zhou Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
MixedCache: Enabling Flow Directed Rule-Caching Scheme based on Heterogeneous Cache for OpenFlow  3
MixedCache: Enabling Flow Directed Rule-Caching Scheme based...
收藏 引用
2020 3rd International Conference on computer Information science and Artificial Intelligence, CISAI 2020
作者: Yang, Jialun Yang, Yi Liu, Jiahao Liu, Rulin Qiao, Peng Wang, Baosheng College of Computer Science and Technology National University of Defense Technology Changsha410073 China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China
OpenFlow switches in SDN use Multiple Flow Tables (MFTs) for fine-grained flow control. Commodity switches integrate hardware storage resources such as SRAM and TCAM to store flow tables to achieve high-speed lookups.... 详细信息
来源: 评论
DrugProtKGE: Weakly Supervised Knowledge Graph Embedding for Highly-Effective Drug-Protein Interaction Representation
DrugProtKGE: Weakly Supervised Knowledge Graph Embedding for...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yanlong Qiu Siqi Wang Xi Yang Xinyuan Qiu Chengkun Wu Yingbo Cui Canqun Yang Institute for Quantum Information & State Key Laboratory of High-Performance Computing College of Computer Science National University of Defense Technology Changsha P. R. China National Supercomputer Center in Tianjin Tianjin P. R. China National Key Laboratory of Parallel and Distributed Computing College of Computer Science National University of Defense Technology Changsha P. R. China Department of Biology and Chemistry College of Science National University of Defense Technology Changsha P. R. China
With the exponential growth of biomedical knowledge in unstructured text repositories such as PubMed, it is imminent to establish a knowledge graph-style, efficient searchable and targeted database that can support th...
来源: 评论
Transformer-Based Deep Hashing Method for Multi-Scale Feature Fusion
Transformer-Based Deep Hashing Method for Multi-Scale Featur...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Chao He Hongxi Wei School of Computer Science Inner Mongolia University Hohhot China Provincial Key Laboratory of Mongolian Information Processing Technology Hohhot China National and Local Joint Engineering Research Center of Mongolian Information Processing Technology Hohhot China
The deep image hashing aims to map the input image into simply binary hash codes via deep neural networks. Motivated by the recent advancements of Vision Transformers (ViT), many deep hashing methods based on ViT have... 详细信息
来源: 评论
RGBManip: Monocular Image-based Robotic Manipulation through Active Object Pose Estimation
arXiv
收藏 引用
arXiv 2023年
作者: An, Boshi Geng, Yiran Chen, Kai Li, Xiaoqi Dou, Qi Dong, Hao Hyperplane Lab School of CS Peking University National Key Laboratory for Multimedia Information Processing China China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong
Robotic manipulation requires accurate perception of the environment, which poses a significant challenge due to its inherent complexity and constantly changing nature. In this context, RGB image and point-cloud obser... 详细信息
来源: 评论
NH-CIL: A Nested Hierarchy Algorithm for Class Incremental Learning
NH-CIL: A Nested Hierarchy Algorithm for Class Incremental L...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Mingyu Liu Yijie Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha Hunan P.R.China
Class incremental learning is widely applied in the classification scenarios as the number of classes is usually dynamically changing. However, the existing algorithms increase computational cost to implement class in... 详细信息
来源: 评论
A Novel Deep Neural Network Model for Credit Risk Prediction of Chinese Farmers
A Novel Deep Neural Network Model for Credit Risk Prediction...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Yalong Xie Aiping Li Ziniu Liu Kai Chen Hongkui Tu College of Computer National University of Defense Technology Changsha China Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
China is a big agricultural county with more than 500 million rural population. In China, farmers usually loan from rural commercial banks or rural credit cooperatives. It is crucial for the national economic developm... 详细信息
来源: 评论
NUMA-aware FFT-based Convolution on ARMv8 Many-core CPUs
NUMA-aware FFT-based Convolution on ARMv8 Many-core CPUs
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Xiandong Huang Qinglin Wang Shuyu Lu Ruochen Hao Songzhu Mei Jie Liu Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China School of Computer Science National University of Defense Technology Changsha China University of Pittsburgh Pittsburgh USA
Convolutional Neural Networks (CNNs), one of the most representative algorithms of deep learning, are widely used in various artificial intelligence applications. Convolution operations often take most of the computat... 详细信息
来源: 评论
Word-level BERT-CNN-RNN Model for Chinese Punctuation Restoration  6
Word-level BERT-CNN-RNN Model for Chinese Punctuation Restor...
收藏 引用
6th IEEE International Conference on computer and Communications, ICCC 2020
作者: Zhang, Zhe Liu, Jie Chi, Lihua Chen, Xinhai Science and Technology on Parallel and Distributed Processing Laboratory Laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha China College of Computer Science and Electronic Engineering Hunan University Changsha China
Punctuation restoration in speech recognition has a wide range of application scenarios. Despite the widespread success of neural networks methods at performing punctuation restoration for English, there have been onl... 详细信息
来源: 评论