咨询与建议

限定检索结果

文献类型

  • 207 篇 会议
  • 166 篇 期刊文献

馆藏范围

  • 373 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 198 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 41 篇 信息与通信工程
    • 32 篇 生物工程
    • 29 篇 控制科学与工程
    • 25 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 网络空间安全
    • 13 篇 机械工程
    • 13 篇 动力工程及工程热...
    • 9 篇 交通运输工程
    • 8 篇 化学工程与技术
    • 7 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 5 篇 安全科学与工程
  • 90 篇 理学
    • 50 篇 数学
    • 35 篇 生物学
    • 12 篇 化学
    • 10 篇 统计学(可授理学、...
    • 8 篇 物理学
    • 8 篇 系统科学
  • 66 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 22 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 9 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 1 篇 艺术学

主题

  • 15 篇 computational mo...
  • 13 篇 semantics
  • 12 篇 training
  • 11 篇 deep learning
  • 11 篇 memory managemen...
  • 11 篇 machine learning
  • 10 篇 deep neural netw...
  • 9 篇 feature extracti...
  • 8 篇 parallel process...
  • 8 篇 scalability
  • 7 篇 task analysis
  • 7 篇 computer archite...
  • 7 篇 throughput
  • 7 篇 containers
  • 7 篇 efficiency
  • 7 篇 data mining
  • 7 篇 privacy
  • 6 篇 bandwidth
  • 6 篇 optimization
  • 6 篇 codes

机构

  • 102 篇 national enginee...
  • 60 篇 school of comput...
  • 53 篇 school of cyber ...
  • 38 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 17 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 huazhong univers...
  • 12 篇 national enginee...
  • 10 篇 jinyinhu laborat...
  • 9 篇 school of comput...
  • 9 篇 national enginee...
  • 8 篇 school of comput...
  • 7 篇 national enginee...
  • 7 篇 national enginee...

作者

  • 138 篇 hai jin
  • 136 篇 jin hai
  • 44 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 24 篇 liao xiaofei
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 19 篇 zou deqing
  • 19 篇 deqing zou
  • 17 篇 zhang leo yu
  • 16 篇 shi xuanhua
  • 15 篇 yu zhang
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 wan yao
  • 13 篇 jiang xiao
  • 12 篇 zhang hongyu
  • 12 篇 wan wei
  • 12 篇 pengcheng yao

语言

  • 287 篇 英文
  • 82 篇 其他
  • 5 篇 中文
检索条件"机构=Services Computing Technology and System Lab/Big Data Technology"
373 条 记 录,以下是51-60 订阅
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective  32
How to Select Pre-Trained Code Models for Reuse? A Learning ...
收藏 引用
32nd IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025
作者: Bi, Zhangqian Wan, Yao Chu, Zhaoyang Hu, Yufei Zhang, Junyi Zhang, Hongyu Xu, Guandong Jin, Hai Services Computing Technology and System Lab Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Dispatcher: Resource-aware Nakamoto Blockchain via Hierarchical Topology and Adaptive Incentives
收藏 引用
Distributed Ledger Technologies: Research and Practice 2024年 第2期3卷 1-20页
作者: Hai Jin Shuohua Dong Xiaohai Dai Yuandi Cai Jiang Xiao National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Mainstream blockchain systems such as Bitcoin and Ethereum are revolutionizing the financial industry by adopting the Nakamoto consensus protocol, i.e., Proof-of-Work (PoW). Only nodes with sufficient computing resour... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
λGrapher: A Resource-Efficient Serverless system for GNN Serving through Graph Sharing  24
λGrapher: A Resource-Efficient Serverless System for GNN Se...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Hu, Haichuan Liu, Fangming Pei, Qiangyu Yuan, Yongjie Xu, Zichen Wang, Lin National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab in the School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan China Peng Cheng Laboratory Huazhong University of Science and Technology China School of Mathematics and Computer Science Nanchang University China Paderborn University Paderborn Germany
Graph Neural Networks (GNNs) have been increasingly adopted for graph analysis in web applications such as social networks. Yet, efficient GNN serving remains a critical challenge due to high workload fluctuations and... 详细信息
来源: 评论
FedEdge: Accelerating Edge-Assisted Federated Learning  23
FedEdge: Accelerating Edge-Assisted Federated Learning
收藏 引用
32nd ACM World Wide Web Conference, WWW 2023
作者: Wang, Kaibin He, Qiang Chen, Feifei Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Federated learning (FL) has been widely acknowledged as a promising solution to training machine learning (ML) model training with privacy preservation. To reduce the traffic overheads incurred by FL systems, edge ser... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
OpticE: A Coherence Theory-Based Model for Link Prediction  29
OpticE: A Coherence Theory-Based Model for Link Prediction
收藏 引用
29th International Conference on Computational Linguistics, COLING 2022
作者: Gui, Xiangyu Zhao, Feng Jin, Langjunqing Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Knowledge representation learning is a key step required for link prediction tasks with knowledge graphs (KGs). During the learning process, the semantics of each entity are embedded by a vector or a point in a featur... 详细信息
来源: 评论
WebCode2M: A Real-World dataset for Code Generation from Webpage Designs  25
WebCode2M: A Real-World Dataset for Code Generation from Web...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Gui, Yi Li, Zhen Wan, Yao Shi, Yemin Zhang, Hongyu Su, Yi Chen, Bohua Chen, Dongping Wu, Siyuan Zhou, Xing Jiang, Wenbin Jin, Hai Zhang, Xiangliang Huazhong University of Science and Technology Wuhan China Peking University Beijing China Chongqing University Chongqing China Hubei University of Automotive Technology Shiyan China Rabbitpre AI Shenzhen China University of Notre Dame Notre Dame United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster Grid Computing Lab School of Computer Science and Technology China
Automatically generating webpage code from webpage designs can significantly reduce the workload of front-end developers, and recent Multimodal Large Language Models (MLLMs) have shown promising potential in this area... 详细信息
来源: 评论