咨询与建议

限定检索结果

文献类型

  • 184 篇 会议
  • 90 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 276 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 139 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 31 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 21 篇 生物工程
    • 13 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 8 篇 电气工程
    • 6 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 轻工技术与工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
  • 67 篇 理学
    • 34 篇 数学
    • 21 篇 生物学
    • 9 篇 物理学
    • 9 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 7 篇 化学
  • 46 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 医学
    • 3 篇 临床医学
  • 3 篇 农学
    • 3 篇 作物学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 9 篇 deep neural netw...
  • 9 篇 feature extracti...
  • 9 篇 training
  • 7 篇 semantics
  • 6 篇 deep learning
  • 6 篇 computational mo...
  • 6 篇 accuracy
  • 6 篇 data models
  • 5 篇 conferences
  • 5 篇 scalability
  • 5 篇 anomaly detectio...
  • 5 篇 neural networks
  • 5 篇 costs
  • 5 篇 distributed proc...
  • 5 篇 machine learning
  • 4 篇 object detection
  • 4 篇 self-supervised ...
  • 4 篇 performance eval...
  • 4 篇 cyberspace
  • 4 篇 robustness

机构

  • 37 篇 school of cyber ...
  • 34 篇 school of comput...
  • 25 篇 national enginee...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 hubei engineerin...
  • 23 篇 cluster and grid...
  • 22 篇 national key lab...
  • 17 篇 school of softwa...
  • 15 篇 college of compu...
  • 15 篇 school of inform...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national key lab...
  • 9 篇 school of comput...
  • 9 篇 national key lab...
  • 8 篇 jinyinhu laborat...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 7 篇 key laboratory o...

作者

  • 26 篇 jin hai
  • 21 篇 hai jin
  • 17 篇 hu shengshan
  • 14 篇 wang yijie
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 yijie wang
  • 10 篇 wan wei
  • 9 篇 li dongsheng
  • 8 篇 huaimin wang
  • 7 篇 dongsheng li
  • 7 篇 xu wu
  • 7 篇 deqing zou
  • 7 篇 shengshan hu
  • 6 篇 peichang shi
  • 6 篇 dou yong
  • 6 篇 wang wei
  • 6 篇 minghui li
  • 6 篇 lai zhiquan

语言

  • 241 篇 英文
  • 19 篇 其他
  • 16 篇 中文
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing School of Computer"
276 条 记 录,以下是11-20 订阅
排序:
Deep Time Series Anomaly Detection with Local Temporal Pattern Learning
Deep Time Series Anomaly Detection with Local Temporal Patte...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Yizhou Wang, Yijie Xu, Hongzuo Zhou, Xiaohui National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China Beijing100091 China
Self-supervised time series anomaly detection (TSAD) demonstrates remarkable performance improvement by extracting high-level data semantics through proxy tasks. Nonetheless, most existing self-supervised TSAD techniq... 详细信息
来源: 评论
Why API documentation is insufficient for developers: an empirical study
收藏 引用
Science China(Information Sciences) 2021年 第1期64卷 248-250页
作者: Qiang FAN Yue YU Tao WANG Gang YIN Huaimin WANG Key Laboratory of Parallel and Distributed Computing College of ComputerNational University of Defense Technology
Dear editor,Application programming interface (API) documentation plays an important role in software development and reuse [1] for both API maintainers and API *** documentation helps developers understand and reuse ... 详细信息
来源: 评论
A Connectivity-Enhanced Multi-Task Learning based on Anatomical Priors for 3D Class-Balanced Pulmonary Airway Segmentation
A Connectivity-Enhanced Multi-Task Learning based on Anatomi...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Jia, Yan Dou, Yong Qiao, Peng Cheng, Yuqing Xu, Kele He, Zhouyu National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology Changsha China National University of Defense Technology College of Systems Engineering Changsha China
Accurate and efficient airway segmentation is essential for evaluating pulmonary diseases, aiding diagnosis, reducing the preoperative burden of airway identification, and minimizing patient discomfort during prolonge... 详细信息
来源: 评论
MARO: Enabling Full MPI Automatic Refactoring in DSL-Based Programming Framework  24th
MARO: Enabling Full MPI Automatic Refactoring in DSL-Based ...
收藏 引用
24th International Conference on Algorithms and Architectures for parallel Processing, ICA3PP 2024
作者: Lei, Tong Chen, Zongjing Che, Yonggang Xu, Chuanfu Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
Currently, the landscape of computer hardware architecture presents the characteristics of heterogeneity and diversity, prompting widespread attention to cross-platform portable parallel programming techniques. Most e... 详细信息
来源: 评论
Graph Structure Learning via Transfer Entropy for Multivariate Time Series Anomaly Detection
Graph Structure Learning via Transfer Entropy for Multivaria...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Mingyu Wang, Yijie Zhou, Xiaohui Wang, Yongjun National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China College of Computer Science and Technology National University of Defense Technology Changsha China
Multivariate time series anomaly detection (MTAD) poses a challenge due to temporal and feature dependencies. The critical aspects of enhancing the detection performance lie in accurately capturing the dependencies be... 详细信息
来源: 评论
Adaptive and augmented active anomaly detection on dynamic network traffic streams
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2024年 第3期25卷 446-460页
作者: Bin LI Yijie WANG Li CHENG National Key Laboratory of Parallel and Distributed Computing College of ComputerNational University of Defense TechnologyChangsha 410073China College of System Engineering National University of Defense TechnologyChangsha 410073China
Active anomaly detection queries labels of sampled instances and uses them to incrementally update the detection model,and has been widely adopted in detecting network ***,existing methods cannot achieve desirable per... 详细信息
来源: 评论
A Counterfactual Ultrasound Anti-Interference Self-Supervised Network for B-mode Ultrasound Tongue Extraction
A Counterfactual Ultrasound Anti-Interference Self-Supervise...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Jia, Yan Cheng, Yuqing Xu, Kele Dou, Yong Qiao, Peng He, Zhouyu National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China College of Systems Engineering National University of Defense Technology Changsha China
B-mode ultrasound tongue imaging is a non-invasive and real-time method for visualizing vocal tract deformation. However, accurately extracting the tongue's surface contour remains a significant challenge due to t... 详细信息
来源: 评论
parallel Accelerating Ultra-Long Read Alignment by Vertical Partitioning Data  13
Parallel Accelerating Ultra-Long Read Alignment by Vertical ...
收藏 引用
13th IEEE International Symposium on parallel Architectures, Algorithms and Programming, PAAP 2022
作者: Pan, Deng Zhong, Cheng Chen, Danyang Zhang, Jinxiong Yang, Feng Guangxi University Key Laboratory of Parallel Distributed Computing Technology Guangxi Universities School of Computer Electronics and Information Guangxi Nanning China Guangxi University Key Laboratory of Parallel Distributed Computing School of Computer Electronics and Information Guangxi Nanning China
The alignment between sequencing reads and genome is a basic work in biological big data analysis. Each read of the third generation sequencing data is getting longer, and the data size is getting larger. To effective... 详细信息
来源: 评论
Optimizing Batched Small Matrix Multiplication on Multi-core DSP Architecture  22
Optimizing Batched Small Matrix Multiplication on Multi-core...
收藏 引用
22nd IEEE International Symposium on parallel and distributed Processing with Applications, ISPA 2024
作者: Zuo, Xiaohan Xiao, Chunhua Wang, Qinglin Shi, Chen Chongqing University College of Computer Science Chongqing China Ministry of Education Key Laboratory of Dependable Service Computing in Cyber Physical Society China National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing Changsha410073 China National University of Defense Technology Laboratory of Digitizing Software for Frontier Equipment Changsha410073 China
General Matrix Multiplication (GEMM) is a critical computational operation in scientific computing and machine learning domains. While traditional GEMM performs well on large matrices, it is inefficient in terms of da... 详细信息
来源: 评论
Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles  18th
Recommendation-Aware Collaborative Edge Caching Strategy in...
收藏 引用
18th International Conference on Wireless Artificial Intelligent computing Systems and Applications, WASA 2024
作者: Ou, Pingjie Chen, Ningjiang Huang, Zizhan School of Computer and Electronic Information Guangxi University Guangxi Nanning530004 China Key Laboratory of Parallel Distributed and Intelligent Computing Education Department of Guangxi Zhuang Autonomous Region Guangxi University Guangxi Nanning530004 China
Due to the limited resources of edge networks, the heterogeneity of user content requests, high-cost caching from direct resource hits, and redundancy in resource retention time hinder system performance. Traditional ... 详细信息
来源: 评论