咨询与建议

限定检索结果

文献类型

  • 42 篇 会议
  • 19 篇 期刊文献

馆藏范围

  • 61 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 25 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 7 篇 信息与通信工程
    • 6 篇 生物工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 建筑学
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 环境科学与工程(可...
    • 1 篇 城乡规划学
    • 1 篇 网络空间安全
  • 13 篇 理学
    • 7 篇 数学
    • 7 篇 生物学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
    • 1 篇 公共管理
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 5 篇 computer archite...
  • 4 篇 grid computing
  • 4 篇 real-time system...
  • 4 篇 costs
  • 3 篇 deep learning
  • 3 篇 laboratories
  • 3 篇 authentication
  • 3 篇 semantics
  • 3 篇 protocols
  • 3 篇 blockchains
  • 3 篇 streaming media
  • 3 篇 open source soft...
  • 2 篇 computer science
  • 2 篇 base stations
  • 2 篇 real time system...
  • 2 篇 ontologies
  • 2 篇 resource managem...
  • 2 篇 consensus algori...
  • 2 篇 vehicular ad hoc...
  • 2 篇 distributed comp...

机构

  • 10 篇 school of inform...
  • 8 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 5 篇 engineering rese...
  • 4 篇 travelsky techno...
  • 4 篇 national enginee...
  • 3 篇 department of el...
  • 3 篇 china academy of...
  • 3 篇 institute for ne...
  • 3 篇 school of networ...
  • 3 篇 school of comput...
  • 3 篇 school of cyber ...
  • 3 篇 key laboratory o...
  • 2 篇 distributed comp...
  • 2 篇 key laboratory o...
  • 2 篇 jin yinhu labora...
  • 2 篇 beijing universi...
  • 2 篇 network interfac...
  • 2 篇 ministry of educ...
  • 2 篇 national enginee...

作者

  • 10 篇 songlin sun
  • 5 篇 dongbin wang
  • 4 篇 jiaqi zou
  • 4 篇 wang dongbin
  • 3 篇 shaokang wang
  • 2 篇 zhang tao
  • 2 篇 yang bo
  • 2 篇 min luo
  • 2 篇 gao yibo
  • 2 篇 zhang chao
  • 2 篇 gao hui
  • 2 篇 li zhen
  • 2 篇 han jing
  • 2 篇 xu mingying
  • 2 篇 xu shouhuai
  • 2 篇 zou deqing
  • 2 篇 li yating
  • 2 篇 lu yueming
  • 2 篇 xu zhang
  • 2 篇 hui zhi

语言

  • 55 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"机构=Network Distributed Computing Laboratory"
61 条 记 录,以下是1-10 订阅
排序:
A New Pipeline for Knowledge Graph Reasoning Enhanced by Large Language Models Without Fine-Tuning
A New Pipeline for Knowledge Graph Reasoning Enhanced by Lar...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Chen, Zhongwu Bai, Long Li, Zixuan Huang, Zhen Jin, Xiaolong Dou, Yong National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Conventional Knowledge Graph Reasoning (KGR) models learn the embeddings of KG components over the structure of KGs, but their performances are limited when the KGs are severely incomplete. Recent LLM-enhanced KGR mod... 详细信息
来源: 评论
FedIERF: Federated Incremental Extremely Random Forest for Wearable Health Monitoring
收藏 引用
Journal of Computer Science & Technology 2023年 第5期38卷 970-984页
作者: 胡春雨 忽丽莎 袁林 陆佃杰 吕蕾 陈益强 Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 25000China Institute of Information Technology Hebei University of Economics and BusinessShijiazhuang 050061China School of Information Science and Engineering Shandong Normal UniversityJinan 250358China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
Wearable health monitoring is a crucial technical tool that offers early warning for chronic diseases due to its superior portability and low power ***,most wearable health data is distributed across dfferent organiza... 详细信息
来源: 评论
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 评论
WBRP: Consensus Algorithm Based on Weak Proof of Work
WBRP: Consensus Algorithm Based on Weak Proof of Work
收藏 引用
IEEE International Conference on Blockchain (Blockchain)
作者: Jiarui Li Dongbin Wang Hui Zhi Wencheng Zhu Jianing Li Zedong Wang School of Cyberspace Engineering Beijing University of Post and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Beijing China TravelSky Technology Limited Beijing China Key Laboratory of Ministry of Education and Trustworthy Distributed Computing and Service Beijing China
Nakamoto Consensus (NC) is a classic Proof of Work (PoW) consensus algorithm where the probability of miners earning the right to a block is proportional to their computational power. To prevent blockchain forks, the ... 详细信息
来源: 评论
Enhancement for Versatile Video Coding in Vehicular Ad Hoc network Scenarios
Enhancement for Versatile Video Coding in Vehicular Ad Hoc N...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Jiacheng Wu Jiaqi Zou Songlin Sun School of Information and Communication Engineering Beijing University of Posts and Telecommunications (BUPT) Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing China
Vehicular Ad hoc network (VANET) allows infor-mation exchange between vehicles. In VANET, video is the most recommended medium for transmitting information. However, the characteristics of VANET and the requirements o... 详细信息
来源: 评论
DW-MLSR: Unsupervised Deformable Medical Image Registration Based on Dual-Window Attention and Multi-Latent Space
SSRN
收藏 引用
SSRN 2024年
作者: Huang, YuXuan Yin, MengXiao Zhong, Cheng Li, ZhiPan Yang, Feng School of Computer and Electronic Information Guangxi University Nanning530004 China Guangxi Key Laboratory of Multimedia Communications Network Technology Guangxi University Guangxi Nanning530004 China Key Laboratory of Parallel Distributed and Intelligent Computing of Guangxi Universities and Colleges Nanning530004 China
Thanks to the emergence of transformers and Vision Transformer (VIT), attention mechanisms have also been applied to medical image registration. However, the current attention mechanisms in medical image registration ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in network Moving Target Defense  7
A Hybrid Routing Mutation Mechanism based on Mutation Cost a...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Guo, Kun Gao, Yibo Wang, Dongbin Zhi, Hui Zhang, Tao Lu, Yueming Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Cyberspace Security Research Center Peng Cheng Laboratory Beijing China Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Beijing China TravelSky Technology Limited Beijing China China Academy of Launch Vehicle Technology Beijing China
network moving target defense technology can effectively defend against attacker monitoring of the service. The technology makes it more difficult for attackers to attack and can ensure secure communication for servic... 详细信息
来源: 评论
Joint Optimization Algorithm for Adaptive Bit Allocation Based on Temporal-Spatial Information
Joint Optimization Algorithm for Adaptive Bit Allocation Bas...
收藏 引用
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)
作者: Shaokang Wang Songlin Sun School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) China Ministry of Education Engineering Research Center of Blockchain and Network Convergence Technology China
Versatile Video Coding (VVC) standard further improves the video compression ratio. Despite inter prediction and intra prediction effectively eliminating temporal and spatial residual information, there is still room ...
来源: 评论
Progressive Evolution Scheme with Socialization Swarm for Privacy Blockchain
Progressive Evolution Scheme with Socialization Swarm for Pr...
收藏 引用
Pacific Rim International Symposium on Dependable computing
作者: Daoqi Han Tao Yu Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Institute of Network Science and Cyberspace Tsinghua University Beijing China
To enhance the dependability of lightweight blockchain, this paper presents a privacy protection mechanism in open networks with a secure ledger for each cell of society. We propose a swarm intelligence scheme called ... 详细信息
来源: 评论