咨询与建议

限定检索结果

文献类型

  • 1,812 篇 期刊文献
  • 1,319 篇 会议
  • 20 册 图书

馆藏范围

  • 3,151 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,143 篇 工学
    • 1,538 篇 计算机科学与技术...
    • 1,219 篇 软件工程
    • 452 篇 信息与通信工程
    • 293 篇 生物工程
    • 288 篇 电气工程
    • 251 篇 光学工程
    • 241 篇 控制科学与工程
    • 225 篇 生物医学工程(可授...
    • 221 篇 电子科学与技术(可...
    • 116 篇 机械工程
    • 105 篇 化学工程与技术
    • 104 篇 仪器科学与技术
    • 72 篇 材料科学与工程(可...
    • 71 篇 网络空间安全
    • 59 篇 动力工程及工程热...
  • 1,245 篇 理学
    • 519 篇 数学
    • 489 篇 物理学
    • 328 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 158 篇 化学
    • 84 篇 系统科学
    • 58 篇 地球物理学
  • 507 篇 管理学
    • 293 篇 管理科学与工程(可...
    • 225 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 208 篇 医学
    • 179 篇 临床医学
    • 150 篇 基础医学(可授医学...
    • 86 篇 药学(可授医学、理...
    • 80 篇 公共卫生与预防医...
  • 87 篇 法学
    • 64 篇 社会学
  • 45 篇 农学
  • 41 篇 经济学
  • 33 篇 教育学
  • 10 篇 艺术学
  • 8 篇 文学
  • 3 篇 军事学

主题

  • 88 篇 deep learning
  • 82 篇 feature extracti...
  • 78 篇 semantics
  • 70 篇 computational mo...
  • 67 篇 machine learning
  • 63 篇 training
  • 50 篇 accuracy
  • 48 篇 federated learni...
  • 44 篇 data models
  • 37 篇 deep neural netw...
  • 37 篇 artificial intel...
  • 35 篇 computer science
  • 33 篇 optimization
  • 33 篇 data mining
  • 33 篇 servers
  • 31 篇 image segmentati...
  • 31 篇 graph neural net...
  • 29 篇 convolution
  • 29 篇 predictive model...
  • 29 篇 cloud computing

机构

  • 101 篇 national enginee...
  • 80 篇 school of comput...
  • 48 篇 school of comput...
  • 46 篇 infn sezione di ...
  • 46 篇 north-west unive...
  • 46 篇 tno technical sc...
  • 46 篇 université de st...
  • 45 篇 institut univers...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 40 篇 national centre ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 40 篇 nikhef national ...
  • 39 篇 dipartimento di ...

作者

  • 82 篇 hai jin
  • 76 篇 jin hai
  • 46 篇 chen a.
  • 46 篇 benoit d.m.
  • 46 篇 ferrara g.
  • 46 篇 ardid m.
  • 46 篇 calvo d.
  • 46 篇 eddymaoui a.
  • 42 篇 gagliardini s.
  • 42 篇 gal t.
  • 42 篇 bozza c.
  • 42 篇 díaz a.f.
  • 42 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 40 篇 boettcher m.
  • 39 篇 enzenhöfer a.
  • 39 篇 celli s.

语言

  • 2,708 篇 英文
  • 411 篇 其他
  • 39 篇 中文
  • 1 篇 日文
  • 1 篇 罗马尼亚文
检索条件"机构=School of Computer Science and Technology and Hopcroft Center on Computing Science"
3151 条 记 录,以下是41-50 订阅
NTFormer: A Composite Node Tokenized Graph Transformer for Node Classification
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Jinsong Jiang, Siyu He, Kun School of Computer Science and Technology Huazhong University of Science and Technology Institute of Artificial Intelligence Huazhong University of Science and Technology Hopcroft Center on Computing Science Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Hopcroft Center on Computing Science Huazhong University of Science and Technology Wuhan430074 China
Recently, the emerging graph Transformers have made significant advancements for node classification on graphs. In most graph Transformers, a crucial step involves transforming the input graph into token sequences as ... 详细信息
来源: 评论
AccelES: Accelerating Top-K SpMV for Embedding Similarity via Low-bit Pruning  31
AccelES: Accelerating Top-K SpMV for Embedding Similarity vi...
收藏 引用
31st IEEE International Symposium on High Performance computer Architecture, HPCA 2025
作者: Zhai, Jiaqi Shi, Xuanhua Huang, Kaiyi Ye, Chencheng Hu, Weifang He, Bingsheng Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China National University of Singapore School of Computing 119077 Singapore
In the realm of recommendation systems, achieving real-time performance in embedding similarity tasks is often hindered by the limitations of traditional Top-K sparse matrix-vector multiplication (SpMV) methods, which... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
science China(Information sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
RON-based cross-chain routing optimization strategy in metaverse
IET Blockchain
收藏 引用
IET Blockchain 2024年 第4期4卷 379-392页
作者: Huang, Junjie Tan, Liang Xiao, Jianmei College of Computer Science Sichuan Normal University Sichuan Chengdu China Information Technology Center Sichuan Rural Credit Sichuan Chengdu China Institute of Computing Technology Chinese Academy of Sciences Beijing China Science and Innovation Center Deyang Jinshajianglu School Sichuan Deyang China
Metaverse is a new ecology that integrates the digital world with the physical world, generates a mirror image of the real world based on digital twin technology, and guarantees the fairness of the virtual world throu... 详细信息
来源: 评论
DT-UPD: User Privacy Data Protection Through Distribution Transformation in Unlearning Cloud Service  24th
DT-UPD: User Privacy Data Protection Through Distribution Tr...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Sun, Shouyue Wu, Feng Zhang, Yingzhi Cui, Lei Gao, Longxiang Yu, Shui Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China School of Computer Science University of Technology Sydney Ultimo Australia
Providing machine unlearning services to users in the cloud, known as Machine Unlearning as a Service (MUaaS), has become a prominent privacy protection strategy. However, existing methods primarily focus on the effec... 详细信息
来源: 评论
Rethinking Tokenized Graph Transformers for Node Classification
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Jinsong Li, Chenyang Li, GaiChao hopcroft, John E. He, Kun School of Computer Science and Technology Huazhong University of Science and Technology China Hopcroft Center on Computing Science Huazhong University of Science and Technology China Department of Computer Science Cornell University United States
Node tokenized graph Transformers (GTs) have shown promising performance in node classification. The generation of token sequences is the key module in existing tokenized GTs which transforms the input graph into toke... 详细信息
来源: 评论
The Impact of Domain Name Server(DNS)over Hypertext Transfer Protocol Secure(HTTPS)on Cyber Security:Limitations,Challenges,and Detection Techniques
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4513-4542页
作者: Muhammad Dawood Shanshan Tu Chuangbai Xiao Muhammad Haris Hisham Alasmary Muhammad Waqas Sadaqat Ur Rehman Faculty of Information Technology Beijing University of TechnologyBeijing100124China National Center of Robotics and Automation University of Engineering and TechnologyPeshawar25000Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia School of Computing and Engineering Sciences Faculty of Engineering and ScienceUniversity of GreenwichLondonSE109LSUnited Kingdom School of Engineering Edith Cowan UniversityPerthWA 6027Australia School of Computer Science and Engineering University of SalfordManchesterM54BRUnited Kingdom
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such a... 详细信息
来源: 评论
Real-Time Road Damage Detection and Infrastructure Evaluation Leveraging Unmanned Aerial Vehicles and Tiny Machine Learning
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 21347-21358页
作者: Khan, Muhammad Waseem Obaidat, Mohammad S. Mahmood, Khalid Batool, Dania Badar, Hafiz Muhammad Sanaullah Aamir, Muhammad Gao, Wu Comsats University Islamabad Sahiwal Campus Department Of Computer Science Sahiwal57000 Pakistan Superior University Department Of Computer Science Lahore54000 Pakistan The University Of Jordan King Abdullah Ii School Of Information Technology Amman11942 Jordan University Of Science And Technology Beijing School Of Communication And Computing Engineering Beijing100083 China Amity University Amity School Of Engineering And Technology Uttar Pradesh Noida201301 India National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan University Of Palermo Department Of Engineering Palermo90133 Italy Emerson University Department Of Emerging Computing Technologies Multan60000 Pakistan Northwestern Polytechnical University Center For Bio-Inspired System-on-Chip School Of Computer Science Xi'an710060 China
Road damage detection (RDD) through computer vision and deep learning techniques can ensure the safety of vehicles and humans on the roads. Integrating unmanned aerial vehicles (UAVs) in RDD and infrastructure evaluat... 详细信息
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective  32
How to Select Pre-Trained Code Models for Reuse? A Learning ...
收藏 引用
32nd IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025
作者: Bi, Zhangqian Wan, Yao Chu, Zhaoyang Hu, Yufei Zhang, Junyi Zhang, Hongyu Xu, Guandong Jin, Hai Services Computing Technology and System Lab Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论
Towards optimized tensor code generation for deep learning on sunway many-core processor
收藏 引用
Frontiers of computer science 2024年 第2期18卷 1-15页
作者: Mingzhen LI Changxi LIU Jianjin LIAO Xuegui ZHENG Hailong YANG Rujun SUN Jun XU Lin GAN Guangwen YANG Zhongzhi LUAN Depei QIAN State Key Laboratory of Software Development Environment Beijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China National University of Singapore Singapore 119077Singapore State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214000China Science and Technology on Special System Simulation Laboratory Beijing Simulation Center Beijing 100854China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China
The flourish of deep learning frameworks and hardware platforms has been demanding an efficient compiler that can shield the diversity in both software and hardware in order to provide application *** the existing dee... 详细信息
来源: 评论