咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 167 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 541 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 314 篇 工学
    • 260 篇 计算机科学与技术...
    • 202 篇 软件工程
    • 49 篇 信息与通信工程
    • 36 篇 生物工程
    • 35 篇 控制科学与工程
    • 23 篇 机械工程
    • 23 篇 电子科学与技术(可...
    • 14 篇 电气工程
    • 12 篇 网络空间安全
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 交通运输工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 农业工程
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 127 篇 理学
    • 75 篇 数学
    • 37 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 15 篇 化学
    • 9 篇 系统科学
  • 100 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 17 篇 feature extracti...
  • 15 篇 training
  • 14 篇 deep neural netw...
  • 14 篇 laboratories
  • 14 篇 semantics
  • 13 篇 cloud computing
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 deep learning
  • 10 篇 programming
  • 9 篇 scalability
  • 9 篇 costs
  • 9 篇 data models
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware
  • 8 篇 accuracy

机构

  • 38 篇 school of cyber ...
  • 36 篇 college of compu...
  • 32 篇 school of comput...
  • 29 篇 national key lab...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 16 篇 school of softwa...
  • 16 篇 national laborat...
  • 15 篇 school of inform...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...

作者

  • 26 篇 jin hai
  • 25 篇 wang huaimin
  • 23 篇 li dongsheng
  • 21 篇 hai jin
  • 19 篇 wang yijie
  • 18 篇 hu shengshan
  • 18 篇 huaimin wang
  • 16 篇 dongsheng li
  • 15 篇 ding bo
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 11 篇 lai zhiquan
  • 11 篇 zhou ziqi
  • 10 篇 wang tao
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang
  • 9 篇 gang yin

语言

  • 507 篇 英文
  • 26 篇 中文
  • 8 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing"
541 条 记 录,以下是421-430 订阅
排序:
MTD: Multi-Timestep Detector for Delayed Streaming Perception
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Yihui Chen, Ningjiang School of Computer and Electronic Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Nanning China Key Laboratory of Parallel Distributed and Intelligent Computing Guangxi University Education Department of Guangxi Zhuang Autonomous Region Nanning China
Autonomous driving systems require real-time environmental perception to ensure user safety and experience. Streaming perception is a task of reporting the current state of the world, which is used to evaluate the del... 详细信息
来源: 评论
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in...
收藏 引用
IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)
作者: Pengfei Qiu Qiang Gao Dongsheng Wang Yongqiang Lyu Chang Liu Xiaoyong Li Chunlu Wang Gang Qu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Tsinghua University Beijing China Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua University Beijing China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing China Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland Maryland USA
The processor's Performance Monitor Unit (PMU) allows the recording of architectural and microarchitectural events for profiling purposes. In this study, we reveal a security issue caused by the fact that current ... 详细信息
来源: 评论
Feasibility Analysis of the Sanchez-Pomraning Method to Treat the Particle Size Distribution in Particle-Dispersed Fuel
SSRN
收藏 引用
SSRN 2024年
作者: Qin, Shuai Zhang, Qian Feng, Xing Liang, Yuechao Laboratory for Advanced Nuclear Energy Theory and Applications Zhejiang Institute of Modern Physics Department of Physics Zhejiang University Zhejiang Hangzhou310027 China Huaneng Shandong Shidao Bay Nuclear Power Co. LTD. Shandong Rongcheng264300 China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Hunan Changsha410073 China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Hunan Changsha410073 China
The non-uniform size of particles appears in the particle-dispersed fuel generally, but this phenomenon is usually neglected. This study aims to evaluate the feasibility of the Sanchez-Pomraning method to solve the pa... 详细信息
来源: 评论
A Retina-LGN-V1 Structure-like Spiking Neuron Network for Image Feature Extraction  21
A Retina-LGN-V1 Structure-like Spiking Neuron Network for Im...
收藏 引用
Proceedings of the 2021 5th International Conference on Video and Image Processing
作者: Sheng Ji Qijun Gu Ye Yuan Peng Zhao Tao Fang Hong Huo Xin Niu Department of Automation_School of Electronic Information and Electrical Engineering_Key Laboratory of System Control and Information Processing Ministry of Education Shanghai Jiao Tong University China College of Computer Science and Technology on Parallel and Distributed Laboratory National University of Defense Technology China
SNNs have achieved great attention in recent years as they contain neurons more like those in the brain and use spikes to encode and transmit information efficiently among neurons with lower energy consumption. A Reti... 详细信息
来源: 评论
Antenna calibration method for MMSE-based network MIMO system
Antenna calibration method for MMSE-based network MIMO syste...
收藏 引用
IEEE International Conference on Communications in China Workshops (ICCC)
作者: Qiang Liu Xin Su Jie Zeng Lili Liu Tiejun Lv Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Beijing University of Posts and Telecommunications Beijing Beijing CN
In this paper, we propose a new channel reciprocity calibration method based on minimum mean square error (MMSE) in network multiple-input and multiple-output (MIMO) system. Network MIMO system can mitigate the inter-... 详细信息
来源: 评论
Attribute-Based Access Control Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2024年 第03期22卷 2227-2242页
作者: Wang, Xiuhua Yu, Mengyang Wang, Yaohui Pi, Yinjia Xu, Peng Wang, Shuai Jin, Hai Han, Min Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan430074 China State Key Laboratory of Cryptology Beijing100878 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Cluster and Grid Computing Lab Services Computing Technology and System Lab Wuhan430074 China
The burgeoning complexity of communication necessitates a high demand for security. Access control encryption is a promising primitive to meet the security demand but the bulk of its constructions rely on formulating ... 详细信息
来源: 评论
Knowledge Distillation with Source-free Unsupervised Domain Adaptation for BERT Model Compression
Knowledge Distillation with Source-free Unsupervised Domain ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Jing Tian Juan Chen Ning Jiang Chen Lin Bai Suqun Huang School of Computer and Electronic Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Nanning China Education Department of Guangxi Zhuang Autonomous Region Key Laboratory of Parallel Distributed and Intelligent Computing (Guangxi University) Nanning China
The pre-training language model BERT has brought significant performance improvements to a series of natural language processing tasks, but due to the large scale of the model, it is difficult to be applied in many pr...
来源: 评论
On the Security of Smart Home Systems:A Survey
收藏 引用
Journal of Computer Science & Technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论
DSE-GAN: Dynamic Semantic Evolution Generative Adversarial Network for Text-to-Image Generation
arXiv
收藏 引用
arXiv 2022年
作者: Huang, Mengqi Mao, Zhendong Wang, Penghui Wang, Quan Zhang, Yongdong University of Science and Technology of China China MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications China Institute of Artificial Intelligence Hefei Comprehensive National Science Center China
Text-to-image generation aims at generating realistic images which are semantically consistent with the given text. Previous works mainly adopt the multi-stage architecture by stacking generator-discriminator pairs to... 详细信息
来源: 评论