咨询与建议

限定检索结果

文献类型

  • 2,342 篇 会议
  • 1,935 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,807 篇 工学
    • 1,915 篇 计算机科学与技术...
    • 1,504 篇 软件工程
    • 583 篇 信息与通信工程
    • 350 篇 电气工程
    • 338 篇 控制科学与工程
    • 310 篇 电子科学与技术(可...
    • 257 篇 生物工程
    • 216 篇 机械工程
    • 203 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 150 篇 仪器科学与技术
    • 141 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 102 篇 交通运输工程
    • 88 篇 网络空间安全
    • 86 篇 材料科学与工程(可...
    • 82 篇 安全科学与工程
    • 78 篇 土木工程
  • 1,430 篇 理学
    • 712 篇 数学
    • 376 篇 物理学
    • 309 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 151 篇 化学
    • 148 篇 系统科学
  • 757 篇 管理学
    • 504 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 196 篇 工商管理
  • 180 篇 医学
    • 146 篇 临床医学
    • 116 篇 基础医学(可授医学...
  • 115 篇 法学
    • 76 篇 社会学
  • 72 篇 经济学
  • 55 篇 农学
  • 21 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 96 篇 feature extracti...
  • 89 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 68 篇 deep learning
  • 66 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 53 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 49 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 accuracy
  • 47 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 121 篇 school of comput...
  • 99 篇 national enginee...
  • 91 篇 hubei province k...
  • 86 篇 school of comput...
  • 76 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 services computi...
  • 43 篇 state key labora...
  • 40 篇 national enginee...
  • 39 篇 huazhong univers...
  • 39 篇 hubei province k...
  • 39 篇 school of cyber ...
  • 38 篇 tsinghua nationa...
  • 37 篇 school of inform...
  • 35 篇 school of comput...
  • 34 篇 key laboratory o...
  • 33 篇 school of comput...
  • 33 篇 university of ch...

作者

  • 235 篇 hai jin
  • 189 篇 jin hai
  • 53 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 niyato dusit
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 song wu
  • 26 篇 shen linlin
  • 24 篇 wang wei
  • 22 篇 li peng
  • 22 篇 hu shengshan
  • 19 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,974 篇 英文
  • 187 篇 其他
  • 138 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4293 条 记 录,以下是191-200 订阅
排序:
Enabling Complete Atomicity for Cross-Chain Applications Through Layered State Commitments
Enabling Complete Atomicity for Cross-Chain Applications Thr...
收藏 引用
Reliable Distributed systems
作者: Yuandi Cai Ru Cheng Yifan Zhou Shijie Zhang Jiang Xiao Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and Technology China
Cross-chain Decentralized Applications (dApps) are increasingly popular for their ability to handle complex tasks across various blockchains, extending beyond simple asset transfers or swaps. However, ensuring all dep... 详细信息
来源: 评论
Video matting based on local-global features fusion  4
Video matting based on local-global features fusion
收藏 引用
4th International Conference on Machine Learning and computer Application, ICMLCA 2023
作者: Dong, Niuniu Liang, Yihui Zou, Kun Li, Wensheng Feng, Fujian School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science Zhongshan Institute University of Electronic Science and Technology of China Zhongshan China Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guizhou Minzu University Guiyang China
Video matting aims at accurately separating foreground from videos. Recent video matting researches pursue to eliminate auxiliary inputs. However, due to the limited ability of extracting global correlation features, ... 详细信息
来源: 评论
AccelES: Accelerating Top-K SpMV for Embedding Similarity via Low-bit Pruning
AccelES: Accelerating Top-K SpMV for Embedding Similarity vi...
收藏 引用
IEEE Symposium on High-Performance computer Architecture
作者: Jiaqi Zhai Xuanhua Shi Kaiyi Huang Chencheng Ye Weifang Hu Bingsheng He Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computing National University of Singapore Singapore
In the realm of recommendation systems, achieving real-time performance in embedding similarity tasks is often hindered by the limitations of traditional Top-K sparse matrix-vector multiplication (SpMV) methods, which... 详细信息
来源: 评论
A Study of Data Augmentation for Imbalance Problem in Network Traffic  3
A Study of Data Augmentation for Imbalance Problem in Networ...
收藏 引用
3rd International Conference on Blockchain technology and Information Security, ICBCTIS 2023
作者: Wang, Xu Sun, Shimin Han, Li School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Software Tiangong University Tianjin China School of Computer Science and Engineering Tianjin University of Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China
The complexity and diversity of smart grid systems increase the likelihood of anomalies in communications between devices in the system, and how these anomalies are detected is critical to the security of the grid sys... 详细信息
来源: 评论
Trimap generation with background for natural image matting  3
Trimap generation with background for natural image matting
收藏 引用
3rd International Conference on Optics and Machine Vision, ICOMV 2024
作者: Fu, Qian Liang, Yihui Kun, Zou Feng, Fujian Xu, Xiang School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science Zhongshan Institute University of Electronic Science and Technology of China Zhongshan China Guizou Key Laboratory of Pattern Recognition and Intelligent System Guizhou Minzu University Guiyang China
Image matting is a widely-used image processing technique that aims at accurately separating foreground from an image. However, this is a challenging and ill-posed problem that demands additional input, such as trimap... 详细信息
来源: 评论
Anti-3CLpro Molecular Design Based on the Model Constrained by Specific DTIs
Anti-3CLpro Molecular Design Based on the Model Constrained ...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Lin, Xiaoli Liu, Xuan Zhang, Xiaolong School of Computer Science and Technology Wuhan University of Science and Technology Hubei Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China
computer-aided drug design and artificial intelligence-driven drug design have accelerated drug discovery. However, how to design effective drugs that have strong interaction ability with target proteins to further im... 详细信息
来源: 评论
Generating Molecules Conditional on 3D Protein Pockets with HGAF
Generating Molecules Conditional on 3D Protein Pockets with ...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Zhu, Qinglian Lin, Xiaoli Zhang, Xiaolong Wuhan University of Science and Technology Hubei Key Laboratory of Intelligent Information Processing and Real-Time Industrial System School of Computer Science and Technology Wuhan China
Most current representations of protein pockets are the atom-pair graph, which ignore the global structural information of amino acids. Therefore, we propose a new molecular generation model, which uses the hypergraph... 详细信息
来源: 评论
A Single Image Derain Method Based on Residue Channel Decomposition in Edge computing
收藏 引用
Intelligent Automation & Soft computing 2023年 第8期37卷 1469-1482页
作者: Yong Cheng Zexuan Yang Wenjie Zhang Ling Yang Jun Wang Tingzhao Guan School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China School of Automation Nanjing University of Information Science and TechnologyNanjing210044China School of Geographical Sciences Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of SciencesBeijing100101China School of Applied Technology Nanjing University of Information Science and TechnologyNanjing210044China
The numerous photos captured by low-price Internet of Things(IoT)sensors are frequently affected by meteorological factors,especially *** causes varying sizes of white streaks on the image,destroying the image texture... 详细信息
来源: 评论
A Composite Decomposition Method for Large-Scale Global Optimization
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6304-6319页
作者: Tian, Maojiang Chen, Minyang Du, Wei Tang, Yang Jin, Yaochu Yen, Gary G. Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen518055 China East China University of Science and Technology Key Laboratory of Smart Manufacturing in Energy Chemical Process Ministry of Education Shanghai200237 China East China University of Science and Technology Engineering Research Center of Process System Engineering Ministry of Education Shanghai200237 China Westlake University School of Engineering Hangzhou310030 China Oklahoma State University School of Electrical and Computer Engineering StillwaterOK74048 United States
Cooperative coevolution (CC) algorithms, based on the divide-and-conquer strategy, have emerged as the predominant approach to solving large-scale global optimization (LSGO) problems. The efficiency and accuracy of th... 详细信息
来源: 评论
Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-23页
作者: Liu, Shengcai Lu, Ning Hong, Wenjing Qian, Chao Tang, Ke Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen College of Engineering South Tower 1088 Xueyuan Avenue Guangdong Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 10F Zhizhen Building Canghai Campus 3688 Nanhai Avenue Guangdong Shenzhen China National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University Nanjing International College Area Xianlin Campus 163 Xianlin Avenue Jiangsu Nanjing China
The field of adversarial textual attack has significantly grown over the past few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. Howe... 详细信息
来源: 评论