咨询与建议

限定检索结果

文献类型

  • 368 篇 会议
  • 158 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 320 篇 工学
    • 256 篇 计算机科学与技术...
    • 197 篇 软件工程
    • 55 篇 信息与通信工程
    • 39 篇 电子科学与技术(可...
    • 33 篇 控制科学与工程
    • 30 篇 生物工程
    • 24 篇 电气工程
    • 21 篇 机械工程
    • 12 篇 仪器科学与技术
    • 11 篇 动力工程及工程热...
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 6 篇 环境科学与工程(可...
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 农业工程
    • 4 篇 冶金工程
  • 133 篇 理学
    • 77 篇 数学
    • 31 篇 生物学
    • 21 篇 系统科学
    • 20 篇 物理学
    • 19 篇 统计学(可授理学、...
    • 15 篇 化学
  • 80 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 12 篇 法学
    • 9 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 4 篇 医学
  • 3 篇 教育学
  • 2 篇 军事学
  • 1 篇 文学

主题

  • 26 篇 computational mo...
  • 16 篇 concurrent compu...
  • 14 篇 distributed proc...
  • 12 篇 fault tolerance
  • 12 篇 computer archite...
  • 12 篇 laboratories
  • 11 篇 scalability
  • 11 篇 application soft...
  • 11 篇 graphics process...
  • 11 篇 semantics
  • 11 篇 kernel
  • 11 篇 delay
  • 10 篇 analytical model...
  • 10 篇 feature extracti...
  • 10 篇 distributed comp...
  • 10 篇 training
  • 9 篇 parallel process...
  • 9 篇 deep learning
  • 9 篇 servers
  • 9 篇 cloud computing

机构

  • 81 篇 national laborat...
  • 36 篇 school of comput...
  • 33 篇 school of cyber ...
  • 32 篇 school of comput...
  • 26 篇 science and tech...
  • 23 篇 national laborat...
  • 22 篇 national enginee...
  • 22 篇 national key lab...
  • 21 篇 hubei key labora...
  • 21 篇 hubei engineerin...
  • 21 篇 cluster and grid...
  • 20 篇 college of compu...
  • 20 篇 services computi...
  • 16 篇 national laborat...
  • 14 篇 school of softwa...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 13 篇 school of inform...
  • 12 篇 national key lab...
  • 12 篇 national laborat...

作者

  • 25 篇 jin hai
  • 20 篇 hai jin
  • 15 篇 hu shengshan
  • 15 篇 wang yijie
  • 14 篇 dongsheng li
  • 14 篇 peng yuxing
  • 12 篇 yijie wang
  • 12 篇 huaimin wang
  • 12 篇 wang huaimin
  • 11 篇 li dongsheng
  • 11 篇 zhang leo yu
  • 11 篇 li minghui
  • 10 篇 wang huai-min
  • 9 篇 liu jie
  • 9 篇 wang ji
  • 9 篇 zhou ziqi
  • 9 篇 xu xinhai
  • 8 篇 yuxing peng
  • 8 篇 dou yong
  • 8 篇 guibin wang

语言

  • 496 篇 英文
  • 28 篇 中文
  • 5 篇 其他
检索条件"机构=National Laboratory of Parallel and Distributed Computing School of Computer"
529 条 记 录,以下是141-150 订阅
排序:
MilKBQA: A Complex Knowledge Base Question Answering Dataset on Chinese Military Field
MilKBQA: A Complex Knowledge Base Question Answering Dataset...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Pike Xu Tiejun Li Zhen Huang Min Guo Jiezhong He Ding Sun Institute of Computer National University of Defense Technology Changsha China Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China School of Computer National University of Defense Technology Changsha China
Facts in military field tend to involve elements of time, space, quantity, status, and so on. Existing methods of representing knowledge in the form of triples fail to adequately express these facts, and also cause ob... 详细信息
来源: 评论
A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of computer Science  20
A Multi-Dimensional Assessment Model and Its Application in ...
收藏 引用
21st Annual Conference of the Special Interest Group in Information Technology Education, SIGITE 2020
作者: Luo, Jiwen Lu, Feng Wang, Tao Key Lab. of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
computer science is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Review of Semi-Structured Document Information Extraction Techniques Based on Deep Learning
Review of Semi-Structured Document Information Extraction Te...
收藏 引用
Machine Learning, Cloud computing and Intelligent Mining (MLCCIM), International Conference on
作者: Yangchun Li Wei Jiang Shouyou Song Chinese Academy of Cybersapce Studies School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Chinese Academy of Cybersapce Studies Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Chinese Academy of Cybersapce Studies Ministry of Education Beijing University of Posts and Telecommunications Beijing China
With the advent of global digital transformation, using an intelligent method based on deep learning to extract crucial information from semi-structured documents, as represented by various types of receipts and invoi...
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论
Rate Control for VVC Intra Coding with Simplified Cubic Rate-Distortion Model
Rate Control for VVC Intra Coding with Simplified Cubic Rate...
收藏 引用
IEEE Workshop on Multimedia Signal Processing
作者: Yizhao Wang Jiaqi Zhang Songlin Sun School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education China National Engineering Research Center of Visual Technology School of Computer Science Peking University Beijing China
In this paper, we propose a simplified cubic polynomial R-D model with corresponding rate control methods for Versatile Video Coding (VVC) intra frame coding. First, we explore the rate-distortion (R-D) characteristic...
来源: 评论
Effective Concurrency Testing for Go via Directional Primitive-Constrained Interleaving Exploration
Effective Concurrency Testing for Go via Directional Primiti...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zongze Jiang Ming Wen Yixin Yang Chao Peng Ping Yang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System ByteDance Beijing China School of Computer Science and Technology Huazhong University of Science and Technology China
The Go language (Go/Golang) has been attracting increasing attention from the industry over recent years due to its strong concurrency support and ease of deployment. This programming language encourages developers to...
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论
Research on Staged Practice Teaching System Based on Systems Engineering
收藏 引用
计算机教育 2021年 第12期 51-55页
作者: Wanjiang Han Jincui Yang Tao Qi Pengfei Sun Xin Jin Jinpeng Chen Yongping Zhang School of Computer Science(National Pilot Software Engineering School)Beijing University of Posts and Telecommunication Key Laboratory of Trustworthy Distributed Computing and Service(BUPT)Ministry of EducationBeijing100876China
The practical teaching management system is an important factor to ensure the quality of *** training of systematic thinking needs a systematic teaching system,and a systematic process is a gradual process and a stand... 详细信息
来源: 评论