咨询与建议

限定检索结果

文献类型

  • 214 篇 会议
  • 166 篇 期刊文献

馆藏范围

  • 380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 240 篇 工学
    • 206 篇 计算机科学与技术...
    • 147 篇 软件工程
    • 41 篇 信息与通信工程
    • 32 篇 生物工程
    • 30 篇 控制科学与工程
    • 26 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 15 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 光学工程
    • 6 篇 仪器科学与技术
    • 4 篇 安全科学与工程
  • 94 篇 理学
    • 50 篇 数学
    • 35 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
    • 10 篇 统计学(可授理学、...
    • 9 篇 物理学
  • 70 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 9 篇 医学
    • 6 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 1 篇 艺术学

主题

  • 15 篇 computational mo...
  • 13 篇 semantics
  • 12 篇 memory managemen...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 deep neural netw...
  • 9 篇 machine learning
  • 8 篇 parallel process...
  • 8 篇 scalability
  • 8 篇 feature extracti...
  • 7 篇 task analysis
  • 7 篇 computer archite...
  • 7 篇 throughput
  • 7 篇 containers
  • 7 篇 efficiency
  • 7 篇 privacy
  • 6 篇 bandwidth
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 graph neural net...

机构

  • 103 篇 national enginee...
  • 59 篇 school of comput...
  • 54 篇 school of cyber ...
  • 38 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 18 篇 zhejiang lab
  • 17 篇 school of inform...
  • 13 篇 huazhong univers...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 9 篇 school of comput...
  • 9 篇 jinyinhu laborat...
  • 8 篇 school of comput...
  • 7 篇 national enginee...
  • 7 篇 nanyang technolo...

作者

  • 142 篇 jin hai
  • 138 篇 hai jin
  • 44 篇 xiaofei liao
  • 30 篇 liao xiaofei
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 19 篇 zou deqing
  • 18 篇 deqing zou
  • 17 篇 zhang leo yu
  • 15 篇 shi xuanhua
  • 15 篇 yu zhang
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 liu haikun
  • 14 篇 li minghui
  • 13 篇 jiang xiao
  • 12 篇 wan yao
  • 12 篇 wan wei
  • 12 篇 pengcheng yao

语言

  • 338 篇 英文
  • 38 篇 其他
  • 5 篇 中文
检索条件"机构=Services Computing Technology and System Lab/Big Data Technology"
380 条 记 录,以下是201-210 订阅
排序:
PSMiner: A Pattern-Aware Accelerator for High-Performance Streaming Graph Pattern Mining
PSMiner: A Pattern-Aware Accelerator for High-Performance St...
收藏 引用
Design Automation Conference
作者: Hao Qi Yu Zhang Ligang He Kang Luo Jun Huang Haoyu Lu Jin Zhao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Zhejiang Lab Zhejiang-HUST Joint Research Center for Graph Processing China Department of Computer Science University of Warwick United Kingdom
Streaming Graph Pattern Mining (GPM) has been widely used in many application fields. However, the existing streaming GPM solution suffers from many unnecessary explorations and isomorphism tests, while the existing s...
来源: 评论
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Reducing data Redundancy
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Red...
收藏 引用
International Conference on Distributed computing systems
作者: Xiaohai Dai Yifan Zhou Jiang Xiao Feng Cheng Xia Xie Hai Jin Bo Li National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China School of Computer Science and Technology Hainan University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
To overcome the scaling and performance limitations, the Directed Acyclic Graph (DAG) is utilized as the underlying storage model of blockchain systems, which enables concurrent transaction processing and confirmation...
来源: 评论
WebCode2M: A Real-World dataset for Code Generation from Webpage Designs
arXiv
收藏 引用
arXiv 2024年
作者: Gui, Yi Li, Zhen Wan, Yao Shi, Yemin Zhang, Hongyu Su, Yi Chen, Bohua Chen, Dongping Wu, Siyuan Zhou, Xing Jiang, Wenbin Jin, Hai Zhang, Xiangliang Huazhong University of Science and Technology Wuhan China Peking University Beijing China Chongqing University Chongqing China Hubei University of Automotive Technology Shiyan China Rabbitpre AI Shenzhen China University of Notre Dame Notre Dame United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology
Automatically generating webpage code from webpage designs can significantly reduce the workload of front-end developers, and recent Multimodal Large Language Models (MLLMs) have shown promising potential in this area... 详细信息
来源: 评论
Hyperbit: A Financial Temporal Knowledge Graph data Storage system
SSRN
收藏 引用
SSRN 2022年
作者: Yuan, Pingpeng Han, Sheng Zang, Shaoqi Shi, Xuanhua Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
In the field of finance, data has the characteristics of temporal multi-frequency and heterogeneous high dimension, and the traditional knowledge graph is not suitable to express the temporal relation of financial dat... 详细信息
来源: 评论
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Xiaohu Wen, Ming Zhu, Jiahao Xie, Zifan Ji, Bin Liu, Huijun Shi, Xuanhua Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China College of Computer National University of Defense Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab HUST Wuhan430074 China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security HUST Wuhan430074 China JinYinHu Laboratory Wuhan430077 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Code Pre-trained Models (CodePTMs) based vulnerability detection have achieved promising results over recent years. However, these models struggle to generalize as they typically learn superficial mapping from source ... 详细信息
来源: 评论
Expediting Distributed GNN Training with Feature-only Partition and Optimized Communication Planning
Expediting Distributed GNN Training with Feature-only Partit...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Bingqian Du Jun Liu Ziyue Luo Chuan Wu Qiankun Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Electrical and Computer Engineering The Ohio State University USA Department of Computer Science The University of Hong Kong Hong Kong School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Feature-only partition of large graph data in distributed Graph Neural Network (GNN) training offers advantages over commonly adopted graph structure partition, such as minimal graph preprocessing cost and elimination... 详细信息
来源: 评论
A nearly optimal distributed algorithm for computing the weighted girth
收藏 引用
Science China(Information Sciences) 2021年 第11期64卷 80-94页
作者: Qiang-Sheng HUA Lixiang QIAN Dongxiao YU Xuanhua SHI Hai JIN National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology School of Computer Science and Technology Shandong University
computing the weighted girth, which is the sum of weights of edges in the minimum weight cycle,is an important problem in network analysis. The problem for distributively computing girth in unweighted graphs has garne... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
TCSloT: Text Guided 3D Context and Slope Aware Triple Network for Dental Implant Position Prediction
TCSloT: Text Guided 3D Context and Slope Aware Triple Networ...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Yang, Xinquan Xie, Jinheng Li, Xuechen Li, Xuguang Shen, Linlin Deng, Yongqiang Shenzhen University College of Computer Science and Software Engineering Shenzhen China National University of Singapore Show Lab Singapore Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China Shenzhen University General Hospital Department of Stomatology Shenzhen China
In implant prosthesis treatment, the surgical guide of implant is used to ensure accurate implantation. However, such design heavily relies on the manual location of the implant position. When deep neural network has ... 详细信息
来源: 评论
GraphInstruct: Empowering Large Language Models with Graph Understanding and Reasoning Capability
arXiv
收藏 引用
arXiv 2024年
作者: Luo, Zihan Song, Xiran Huang, Hong Lian, Jianxun Zhang, Chenhao Jiang, Jinqi Xie, Xing Huazhong University of Science and Technology Wuhan China Microsoft Research Asia Beijing China The National Engineering Research Center for Big Data Technology and System Service Computing Technology and Systems Laboratory Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Evaluating and enhancing the general capabilities of large language models (LLMs) has been an important research topic. Graph is a common data structure in the real world, and understanding graph data is a crucial par... 详细信息
来源: 评论