咨询与建议

限定检索结果

文献类型

  • 1,467 篇 会议
  • 995 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,464 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,604 篇 工学
    • 1,045 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 322 篇 信息与通信工程
    • 246 篇 控制科学与工程
    • 175 篇 电子科学与技术(可...
    • 171 篇 电气工程
    • 145 篇 机械工程
    • 128 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 69 篇 材料科学与工程(可...
    • 67 篇 化学工程与技术
    • 65 篇 生物医学工程(可授...
    • 63 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 789 篇 理学
    • 435 篇 数学
    • 154 篇 生物学
    • 144 篇 物理学
    • 128 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 66 篇 化学
    • 32 篇 大气科学
  • 422 篇 管理学
    • 266 篇 管理科学与工程(可...
    • 176 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 85 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 41 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 35 篇 federated learni...
  • 34 篇 delay
  • 33 篇 web services
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 51 篇 national enginee...
  • 47 篇 key laboratory o...
  • 41 篇 school of comput...
  • 41 篇 shandong provinc...
  • 40 篇 school of cyber ...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 33 篇 university of ch...
  • 30 篇 national enginee...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 24 篇 shen linlin
  • 23 篇 li xiaowei
  • 22 篇 cheng wang
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 20 篇 hu shengshan
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,223 篇 英文
  • 146 篇 其他
  • 102 篇 中文
检索条件"机构=Service Computing Technology and System Key Laboratory"
2464 条 记 录,以下是1201-1210 订阅
排序:
Global context aware RCNN for object detection
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenchao Fu, Chong Xie, Haoyu Zhu, Mai Tie, Ming Chen, Junxin School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Science and Technology on Space Physics Laboratory Beijing100076 China College of Medicine and Biological Information Engineering Northeastern University Shenyang110819 China
RoIPool/RoIAlign is an indispensable process for the typical two-stage object detection algorithm, it is used to rescale the object proposal cropped from the feature pyramid to generate a fixed size feature map. Howev... 详细信息
来源: 评论
TCPModel: A short-term traffic congestion prediction model based on deep learning  2nd
TCPModel: A short-term traffic congestion prediction model b...
收藏 引用
2nd CCF International Conference on Artificial Intelligence, CCF-ICAI 2019
作者: Xu, Xiujuan Gao, Xiaobo Xu, Zhenzhen Zhao, Xiaowei Pang, Wei Zhou, Hongmei School of Software Dalian University of Technology Dalian116620 China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian116620 China School of Natural and Computing Sciences University of Aberdeen AberdeenAB24 3UE United Kingdom School of Transportation and Logistics Dalian University of Technology Dalian116024 China
With the progress of the urbanization, a series of traffic problems have occurred because of the growing urban population and the far lower growth rate of roads than that of cars. One of the most prominent problems is... 详细信息
来源: 评论
Performance Analysis for Drone-Assisted HetNets with Flexible Cell Association
Performance Analysis for Drone-Assisted HetNets with Flexibl...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Hongguang Sun Xijun Wang Chao Xu Yan Zhang Tony Q.S. Quek School of Information Engineering Northwest A&F University Yangling Shaanxi China School of Electronics and Communication Engineering Sun Yat-sen University Guangzhou Guangdong China State Key Laboratory of Integrated Service Networks Xidian University Xi’an Shaanxi China Information System Technology and Design Pillar Singapore University of Technology and Design Singapore
Drone small cells (DSCs) are served as aerial base stations to complement the terrestrial cellular networks, in order to provide seamless wireless coverage and increased network capacity. In this paper, we study a dro... 详细信息
来源: 评论
Ready for emerging threats to recommender systems? A graph convolution-based generative shilling attack
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Fan Gao, Min Yu, Junliang Wang, Zongwei Liu, Kecheng Wang, Xu Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Ministry of Education Chongqing401331 China School of Big Data and Software Engineering Chongqing University Chongqing401331 China School of Information Technology and Electrical Engineering The University of Queensland Queensland4072 Australia Informatics Research Centre Henley Business School University of Reading Berkshire ReadingRG6 6UD United Kingdom School of Mechanical Engineering Chongqing University Chongqing400044 China
To explore the robustness of recommender systems, researchers have proposed various shilling attack models and analyzed their adverse effects. Primitive attacks are highly feasible but less effective due to simplistic... 详细信息
来源: 评论
A Web-Based Theme-Related Word Set Construction Algorithm
收藏 引用
Asia Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint Conference on Web and Big Data, APWeb-WAIM 2018
作者: Wu, Yingkai Li, Yukun Hao, Gang Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin Tianjin China
Constructing theme-related word set is a basic work for establishing theme-oriented information retrieval systems. Nowadays, most of previous studies focus on identifying representative words of a specific document, a... 详细信息
来源: 评论
Computation Offloading and Resource Allocation for MEC in C-RAN: A Deep Reinforcement Learning Approach  19
Computation Offloading and Resource Allocation for MEC in C-...
收藏 引用
19th IEEE International Conference on Communication technology, ICCT 2019
作者: Jin, Xiaoyan Zhang, Jun Sun, Xinghua Zhang, Ping Cai, Shu Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Nanjing210003 China Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks Ministry of Education Nanjing University of Posts and Telecommunications Nanjing210003 China School of Electronics and Communication Engineering Sun Yat-sen University Guangzhou510006 China Key Laboratory of Wireless Sensor Network and Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai200050 China Key Laboratory of Computer Application Technology Anhui Polytechnic University Wuhu241000 China
Mobile edge computing (MEC) technology has become a promising example for cloud radio access networks (CRAN) to provide close-range services, thereby reducing service delays and saving energy consumption. In this pape... 详细信息
来源: 评论
Classifying Personal Photo Collections: An Event-Based Approach
收藏 引用
Asia Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint Conference on Web and Big Data, APWeb-WAIM 2018
作者: Geng, Ming Li, Yukun Liu, Fenglian Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin Tianjin China
Due to the increasing number of photos taken by mobile phone, how to improve the efficiency of re-finding personal photos becomes an important research issue. Based on the survey of the current methods to re-find expe... 详细信息
来源: 评论
Detection of Huanglongbing(citrus greening) based on hyperspectral image analysis and PCR
收藏 引用
Frontiers of Agricultural Science and Engineering 2019年 第2期6卷 172-180页
作者: Kejian WANG Dongmei GUO Yao ZHANG Lie DENG Rangjin XIE Qiang LV Shilai YI Yongqiang ZHENG Yanyan MA Shaolan HE Southwest University/Citrus Research Institute of Chinese Academy of Agricultural Sciences Chongqing 400712 China National Agricultural Technology Extension and Service Center Beijing 100125 China Chengdu Plant Quarantine Station Chengdu 610000 China Key Laboratory of Modern Precision Agriculture System Integration Research China Agricultural University Beijing 100083 China
Huanglongbing (HLB, citrus greening) is one of the most serious quarantine diseases of citrus worldwide. To monitor in real-time, recognize diseased trees, and efficiently prevent and control HLB disease in citrus, it... 详细信息
来源: 评论
CSF: An Efficient Parallel Deduplication Algorithm by Clustering Scattered Fingerprints
CSF: An Efficient Parallel Deduplication Algorithm by Cluste...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Hao Fan Guangping Xu Yi Zhang Liming Yuan Yanbing Xue Tianjin University of Technology Tianjin China School of Computer Science and Engineering Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China
Deduplication is one of the most effective and efficient techniques to save memory space. It is widely used in data centers and cloud storage systems. Multi-stream concurrency is expected to increase the throughput of... 详细信息
来源: 评论
Preventing Spread of Spam Transactions in Blockchain by Reputation
Preventing Spread of Spam Transactions in Blockchain by Repu...
收藏 引用
International Workshop on Quality of service
作者: Jiarui Zhang Yukun Cheng Xiaotie Deng Bo Wang Jan Xie Yuanyuan Yang Mengqian Zhang Stony Brook University Stony Brook NY USA School of Business Suzhou Key Laboratory for Big Data and Information Service Suzhou University of Science and Technology Suzhou China Centers on Frontiers of Computing Studies Peking University Beijing China Hangzhou Cryptape Technology Co. Ltd. Hangzhou China Shanghai Jiao Tong University Shanghai China
As one of the fastest-growing applications in the Peer-to-Peer (P2P) network, the development of blockchain technology is accompanied by different attacks. Those include whitewashing, free-riding, and distributed deni... 详细信息
来源: 评论