咨询与建议

限定检索结果

文献类型

  • 2,387 篇 会议
  • 1,941 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,833 篇 工学
    • 1,934 篇 计算机科学与技术...
    • 1,510 篇 软件工程
    • 583 篇 信息与通信工程
    • 352 篇 电气工程
    • 349 篇 控制科学与工程
    • 314 篇 电子科学与技术(可...
    • 256 篇 生物工程
    • 218 篇 机械工程
    • 201 篇 光学工程
    • 164 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 142 篇 动力工程及工程热...
    • 140 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 91 篇 网络空间安全
    • 89 篇 材料科学与工程(可...
    • 81 篇 土木工程
    • 79 篇 安全科学与工程
  • 1,426 篇 理学
    • 703 篇 数学
    • 385 篇 物理学
    • 307 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 152 篇 化学
    • 144 篇 系统科学
  • 753 篇 管理学
    • 502 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 173 篇 医学
    • 144 篇 临床医学
    • 112 篇 基础医学(可授医学...
  • 118 篇 法学
    • 78 篇 社会学
  • 73 篇 经济学
  • 52 篇 农学
  • 24 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 101 篇 feature extracti...
  • 92 篇 semantics
  • 78 篇 computational mo...
  • 72 篇 deep learning
  • 71 篇 computer science
  • 66 篇 training
  • 65 篇 computer archite...
  • 59 篇 cloud computing
  • 56 篇 laboratories
  • 56 篇 optimization
  • 56 篇 servers
  • 54 篇 accuracy
  • 53 篇 scalability
  • 52 篇 grid computing
  • 51 篇 protocols
  • 49 篇 predictive model...
  • 48 篇 bandwidth
  • 45 篇 data models
  • 43 篇 resource managem...
  • 43 篇 analytical model...

机构

  • 124 篇 school of comput...
  • 100 篇 national enginee...
  • 91 篇 hubei province k...
  • 89 篇 school of comput...
  • 76 篇 department of co...
  • 57 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 services computi...
  • 44 篇 state key labora...
  • 43 篇 hubei province k...
  • 43 篇 national enginee...
  • 41 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 37 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 national enginee...
  • 34 篇 university of ch...
  • 33 篇 key laboratory o...
  • 33 篇 school of comput...

作者

  • 237 篇 hai jin
  • 191 篇 jin hai
  • 51 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 33 篇 niyato dusit
  • 32 篇 deqing zou
  • 30 篇 dan feng
  • 30 篇 shi xuanhua
  • 29 篇 zou deqing
  • 27 篇 shen linlin
  • 26 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 21 篇 li peng
  • 19 篇 liu yang
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 17 篇 zhang xiaolong
  • 17 篇 liu jun
  • 17 篇 li bo

语言

  • 3,748 篇 英文
  • 463 篇 其他
  • 147 篇 中文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4344 条 记 录,以下是21-30 订阅
Evaluating RISC-V Vector Instruction Set Architecture Extension with computer Vision Workloads
收藏 引用
Journal of computer science & technology 2023年 第4期38卷 807-820页
作者: 李若时 彭平 邵志远 金海 郑然 National Engineering Research Center for Big Data Technology and System Huazhong University of Science and Technology Wuhan 430074China Services Computing Technology and System Laboratory Huazhong University of Science and TechnologyWuhan 430074 China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
computer vision(CV)algorithms have been extensively used for a myriad of applications *** the multimedia data are generally well-formatted and regular,it is beneficial to leverage the massive parallel processing power... 详细信息
来源: 评论
A Distributed Self-Tallying Electronic Voting system Using the Smart Contract
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 1063-1076页
作者: Jingyu YAO Bo YANG Tao WANG Wenzheng ZHANG School of Computer Science Shaanxi Normal University State Key Laboratory of Integrated Services Networks Xidian University Science and Technology on Communication Security Laboratory
For electronic voting(e-voting) with a trusted authority, the ballots may be discarded or tampered, so it is attractive to eliminate the dependence on the trusted party. An e-voting protocol, where the final voting re... 详细信息
来源: 评论
Method and Practice of Trusted Embedded computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论
Efficient distributed algorithms for holistic aggregation functions on random regular graphs
收藏 引用
science China(Information sciences) 2022年 第5期65卷 32-50页
作者: Lin JIA Qiang-Sheng HUA Haoqiang FAN Qiuping WANG Hai JIN National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology Institute for Interdisciplinary Information Science Tsinghua University
In this paper, we propose efficient distributed algorithms for three holistic aggregation functions on random regular graphs that are good candidates for network topology in next-generation data *** three holistic agg... 详细信息
来源: 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
science China(Information sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论
Image Enhancement via Associated Perturbation Removal and Texture Reconstruction Learning
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2253-2269页
作者: Kui Jiang Ruoxi Wang Yi Xiao Junjun Jiang Xin Xu Tao Lu IEEE the School of Computer Science and Technology Harbin Institute of Technology Zhengzhou Research Institute Harbin Institute of Technology the School of Artificial Intelligence Jianghan University the School of Geodesy and Geomatics Wuhan University the Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan University of Science and Technology the School of Computer Science and Engineering and also with the Hubei Province Key Laboratory of Intelligent Robot Wuhan Institute of Technology
Degradation under challenging conditions such as rain, haze, and low light not only diminishes content visibility, but also results in additional degradation side effects, including detail occlusion and color distorti... 详细信息
来源: 评论
AccelES: Accelerating Top-K SpMV for Embedding Similarity via Low-bit Pruning  31
AccelES: Accelerating Top-K SpMV for Embedding Similarity vi...
收藏 引用
31st IEEE International Symposium on High Performance computer Architecture, HPCA 2025
作者: Zhai, Jiaqi Shi, Xuanhua Huang, Kaiyi Ye, Chencheng Hu, Weifang He, Bingsheng Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China National University of Singapore School of Computing 119077 Singapore
In the realm of recommendation systems, achieving real-time performance in embedding similarity tasks is often hindered by the limitations of traditional Top-K sparse matrix-vector multiplication (SpMV) methods, which... 详细信息
来源: 评论
A Review of Intelligent Configuration and Its Security for Complex Networks
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 920-947页
作者: Yue ZHAO Bin YANG Fei TENG Xianhua NIU Ning HU Bo TIAN Science and Technology on Communication Security Laboratory School of Computer and Information Engineering Chuzhou University School of Computing and Artificial Intelligence Southwest Jiaotong University School of Computer and Software Engineering Xihua University Cyberspace Institute of Advanced Technology Guangzhou University
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur... 详细信息
来源: 评论
Enhancement Methods for Chiral Optical Signals by Tailoring Optical Fields and Nanostructures
收藏 引用
Engineering 2025年 第2期45卷 25-43页
作者: Hanqing Cai Liangliang Gu Haifeng Hu Qiwen Zhan School of Optical-Electrical and Computer Engineering University of Shanghai for Science and TechnologyShanghai 200093China Zhangjiang Laboratory Shanghai 201204China Shanghai Key Laboratory of Modern Optical System University of Shanghai for Science and TechnologyShanghai 200093China
The unique property of chirality is widely used in various *** the past few decades,a great deal of research has been conducted on the interactions between light and matter,resulting in significant technical advanceme... 详细信息
来源: 评论
Fast Parallel Recovery for Transactional Stream Processing on Multicores  40
Fast Parallel Recovery for Transactional Stream Processing o...
收藏 引用
40th IEEE International Conference on Data Engineering, ICDE 2024
作者: Zhao, Jianjun Liu, Haikun Zhang, Shuhao Duan, Zhuohui Liao, Xiaofei Jin, Hai Zhang, Yu School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Engineering Nanyang Technological University Singapore
Transactional stream processing engines (TSPEs) have gained increasing attention due to their capability of processing real-time stream applications with transactional semantics. However, TSPEs remain susceptible to s... 详细信息
来源: 评论