咨询与建议

限定检索结果

文献类型

  • 687 篇 会议
  • 642 篇 期刊文献

馆藏范围

  • 1,329 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 819 篇 工学
    • 594 篇 计算机科学与技术...
    • 477 篇 软件工程
    • 190 篇 信息与通信工程
    • 142 篇 电气工程
    • 115 篇 生物工程
    • 101 篇 控制科学与工程
    • 85 篇 电子科学与技术(可...
    • 77 篇 光学工程
    • 74 篇 生物医学工程(可授...
    • 40 篇 机械工程
    • 38 篇 仪器科学与技术
    • 35 篇 交通运输工程
    • 33 篇 动力工程及工程热...
    • 32 篇 安全科学与工程
    • 29 篇 化学工程与技术
    • 26 篇 土木工程
    • 26 篇 网络空间安全
  • 440 篇 理学
    • 224 篇 数学
    • 139 篇 生物学
    • 98 篇 物理学
    • 74 篇 统计学(可授理学、...
    • 39 篇 化学
    • 25 篇 系统科学
  • 213 篇 管理学
    • 136 篇 管理科学与工程(可...
    • 93 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 71 篇 医学
    • 59 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 38 篇 法学
    • 27 篇 社会学
  • 32 篇 农学
  • 19 篇 经济学
  • 12 篇 教育学
  • 3 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 54 篇 semantics
  • 49 篇 feature extracti...
  • 43 篇 computational mo...
  • 39 篇 deep learning
  • 33 篇 training
  • 32 篇 accuracy
  • 28 篇 predictive model...
  • 26 篇 machine learning
  • 23 篇 graph neural net...
  • 22 篇 data models
  • 21 篇 neural networks
  • 21 篇 convolution
  • 21 篇 data mining
  • 21 篇 federated learni...
  • 19 篇 image segmentati...
  • 18 篇 memory managemen...
  • 16 篇 task analysis
  • 16 篇 transformers
  • 16 篇 contrastive lear...
  • 14 篇 robustness

机构

  • 102 篇 national enginee...
  • 66 篇 school of comput...
  • 58 篇 shandong provinc...
  • 50 篇 school of cyber ...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 37 篇 national enginee...
  • 33 篇 university of ch...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 28 篇 huazhong univers...
  • 27 篇 cluster and grid...
  • 26 篇 hubei key labora...
  • 24 篇 beijing advanced...
  • 22 篇 henan key labora...
  • 21 篇 zhejiang lab
  • 21 篇 college of compu...
  • 20 篇 engineering rese...
  • 18 篇 fujian key labor...
  • 18 篇 college of infor...

作者

  • 130 篇 jin hai
  • 128 篇 hai jin
  • 43 篇 xiaofei liao
  • 29 篇 liao xiaofei
  • 24 篇 long zheng
  • 23 篇 hu shengshan
  • 21 篇 haikun liu
  • 18 篇 yu zhang
  • 17 篇 zou deqing
  • 17 篇 yu huang
  • 16 篇 zhang leo yu
  • 15 篇 deqing zou
  • 14 篇 zhang jie
  • 13 篇 shutian liu
  • 13 篇 xianda hou
  • 13 篇 changhong mi
  • 13 篇 hongyan zheng
  • 13 篇 jiang xiao
  • 13 篇 yanlin hou
  • 13 篇 zhiping huang

语言

  • 1,230 篇 英文
  • 83 篇 其他
  • 33 篇 中文
检索条件"机构=Research Center of Intelligent Computing & Big Data Technology"
1329 条 记 录,以下是1-10 订阅
排序:
RE-SEGNN:recurrent semantic evidence-aware graph neural network for temporal knowledge graph forecasting
收藏 引用
Science China(Information Sciences) 2025年 第2期68卷 103-119页
作者: Wenyu CAI Mengfan LI Xuanhua SHI Yuanxin FAN Quntao ZHU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and Technology
Temporal knowledge graph(TKG) reasoning, has seen widespread use for modeling real-world events, particularly in extrapolation settings. Nevertheless, most previous studies are embedded models, which require both enti... 详细信息
来源: 评论
A Method for Fast Feature Selection Utilizing Cross-Similarity within the Context of Fuzzy Relations
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1195-1218页
作者: Wenchang Yu Xiaoqin Ma Zheqing Zhang Qinli Zhang School of Big Data and Artificial Intelligence Chizhou UniversityChizhou247000China Anhui Education Big Data Intelligent Perception and Application Engineering Research Center Anhui Provincial Joint Construction Key Laboratory of Intelligent Education Equipment and TechnologyChizhou247000China
Feature selection methods rooted in rough sets confront two notable limitations:their high computa-tional complexity and sensitivity to noise,rendering them impractical for managing large-scale and noisy *** primary i... 详细信息
来源: 评论
MSMAE-Net: multi-semantic and multi-attention enhanced network for image forgery localization
收藏 引用
Signal, Image and Video Processing 2025年 第7期19卷 1-11页
作者: Liao, Jianjun Su, Lichao Lu, Menghan Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
The popularization of modern digital image technology has brought convenience to us, but it also poses many risks. The advancement of image editing software allows anyone to modify image content effortlessly. If these... 详细信息
来源: 评论
A Helmet Detection Algorithm Based on Transformers with Deformable Attention Module
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 229-241页
作者: Songle Chen Hongbo Sun Yuxin Wu Lei Shang Xiukai Ruan Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Nanjing University of Posts and Telecommunications State Key Lab for Novel Software Technology Nanjing University Institute of Intelligent Locks Wenzhou University
Wearing a helmet is one of the effective measures to protect workers' safety. To address the challenges of severe occlusion, multi-scale, and small target issues in helmet detection, this paper proposes a helmet d... 详细信息
来源: 评论
Cost-Effective Edge data Caching With Failure Tolerance and Popularity Awareness
收藏 引用
IEEE Transactions on Mobile computing 2025年 第6期24卷 5357-5369页
作者: Luo, Ruikun Zhang, Zujia He, Qiang Xu, Mengxi Chen, Feifei Dai, Xiaohai Wu, Song Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of  Computer Science and Technology Wuhan430074 China Deakin University School of Information Technology GeelongVIC3125 Australia
In the mobile edge computing environment, caching data in edge storage systems can significantly reduce data retrieval latency for users while saving the costs incurred by cloud-edge data transmissions for app vendors... 详细信息
来源: 评论
Attribute-Based Access Control Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2227-2242页
作者: Wang, Xiuhua Yu, Mengyang Wang, Yaohui Pi, Yinjia Xu, Peng Wang, Shuai Jin, Hai Han, Min Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan430074 China State Key Laboratory of Cryptology Beijing100878 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The burgeoning complexity of communication necessitates a high demand for security. Access control encryption is a promising primitive to meet the security demand but the bulk of its constructions rely on formulating ... 详细信息
来源: 评论
Rational molecular design of P-doped porous carbon material for the VOCs adsorption
收藏 引用
Chinese Journal of Chemical Engineering 2025年 第3期79卷 155-163页
作者: Changqing Su Wentao Jiang Yang Guo Guodong Yi Zengxing Li Huan Li Hunan Key Laboratory of Carbon Neutrality and Intelligent Energy School of Resources & Environment Hunan University of Technology and Business Xiangjiang Laboratory School of Advanced Interdisciplinary Studies Research Institute for Big Data & Internet Innovation Hunan University of Technology and Business Industry Training Center Shenzhen Polytechnic University
The objective of this study was to identify and synthesize functional groups for the efficient adsorption of volatile organic compounds(VOCs) through a combination of theoretical calculations,molecular design,and ex... 详细信息
来源: 评论
A numerical magnitude aware multi-channel hierarchical encoding network for math word problem solving
收藏 引用
Neural computing and Applications 2025年 第3期37卷 1651-1672页
作者: Xu, Junjie Chen, Yuzhong Xiao, Lingsheng Liao, Hongmiao Zhong, Jiayuan Dong, Chen College of Computer and Data Science Fuzhou University Fujian Province Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350108 China
Math word problem (MWP) represents a critical research area within reading comprehension, where accurate comprehension of math problem text is crucial for generating math expressions. However, current approaches still... 详细信息
来源: 评论
Soft-GNN:towards robust graph neural networks via self-adaptive data utilization
收藏 引用
Frontiers of Computer Science 2025年 第4期19卷 1-12页
作者: Yao WU Hong HUANG Yu SONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China College of Information and Communication National University of Defense TechnologyWuhan 430019China Department of Computer Science and Operations Research Universitéde MontréalMontreal H3C 3J7Canada
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h... 详细信息
来源: 评论
AegonKV: A High Bandwidth, Low Tail Latency, and Low Storage Cost KV-Separated LSM Store with SmartSSD-based GC Offloading  23
AegonKV: A High Bandwidth, Low Tail Latency, and Low Storage...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Duan, Zhuohui Feng, Hao Liu, Haikun Liao, Xiaofei Jin, Hai Li, Bangyu National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
The key-value separation is renowned for its significant mitigation of the write amplification inherent in traditional LSM trees. However, KV separation potentially increases performance overhead in the management of ... 详细信息
来源: 评论