咨询与建议

限定检索结果

文献类型

  • 2,380 篇 会议
  • 1,974 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,868 篇 工学
    • 1,961 篇 计算机科学与技术...
    • 1,517 篇 软件工程
    • 590 篇 信息与通信工程
    • 372 篇 控制科学与工程
    • 356 篇 电气工程
    • 318 篇 电子科学与技术(可...
    • 258 篇 生物工程
    • 220 篇 机械工程
    • 204 篇 光学工程
    • 168 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 141 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 90 篇 材料科学与工程(可...
    • 90 篇 网络空间安全
    • 82 篇 安全科学与工程
    • 81 篇 土木工程
    • 77 篇 建筑学
  • 1,444 篇 理学
    • 711 篇 数学
    • 382 篇 物理学
    • 313 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 153 篇 化学
    • 148 篇 系统科学
  • 760 篇 管理学
    • 506 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 198 篇 工商管理
  • 184 篇 医学
    • 150 篇 临床医学
    • 119 篇 基础医学(可授医学...
  • 116 篇 法学
  • 72 篇 经济学
  • 57 篇 农学
  • 22 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 100 篇 feature extracti...
  • 90 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 70 篇 deep learning
  • 67 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 55 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 50 篇 protocols
  • 49 篇 accuracy
  • 48 篇 bandwidth
  • 48 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 128 篇 school of comput...
  • 102 篇 national enginee...
  • 93 篇 hubei province k...
  • 88 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 national enginee...
  • 43 篇 state key labora...
  • 43 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 34 篇 key laboratory o...
  • 34 篇 university of ch...

作者

  • 234 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 25 篇 wang wei
  • 22 篇 li peng
  • 20 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,938 篇 英文
  • 299 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4370 条 记 录,以下是461-470 订阅
排序:
Quantum Remote State Preparation Based on Quantum Network Coding
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 119-132页
作者: Zhen-Zhen Li Zi-Chen Li Yi-Ru Sun Haseeb Ahmad Gang Xu Xiu-Bo Chen School of Information Engineering Beijing Institute of Graphic CommunicationBeijing102600China School of Computer Science and Information Engineering Zhejiang Gongshang UniversityHangzhou310018China Information Security Center State key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile UniversityFaisalabad37610Pakistan School of Information Science and Technology North China University of TechnologyBeijing100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province China
As an innovative theory and technology,quantum network coding has become the research hotspot in quantum network *** this paper,a quantum remote state preparation scheme based on quantum network coding is *** with the... 详细信息
来源: 评论
Modeling and Analyzing of Breast Tumor Deterioration Process with Petri Nets and Logistic Regression
收藏 引用
Complex system Modeling and Simulation 2022年 第3期2卷 264-272页
作者: Xuyue Wang Wangyang Yu Zeyuan Ding Xiaojun Zhai Sangeet Saha Key Laboratory of Intelligent Computing and Service Technology for Folk Song Ministry of Culture and Tourismand School of Computer ScienceShaanxi Normal UniversityXi’an 710100China School of Computer Science Shaanxi Normal UniversityXi’an 710100China School of Computer Science and Electronic Engineering University of EssexColchesterCO43SQUK
It is important to understand the process of cancer cell metastasis and some cancer characteristics that increase disease *** the occurrence of the disease is caused by many factors,and the pathogenesis process is als... 详细信息
来源: 评论
OCDB: REVISITING CAUSAL DISCOVERY WITH A COMPREHENSIVE BENCHMARK AND EVALUATION FRAMEWORK
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Wei Huang, Hong Zhang, Guowen Shi, Ruize Yin, Kehan Lin, Yuanyuan Liu, Bang Huazhong University of Science and Technology China DIRO Université de Montréal & Mila Canada CIFAR AI Chair Canada The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Large language models (LLMs) have excelled in various natural language processing tasks, but challenges in interpretability and trustworthiness persist, limiting their use in high-stakes fields. Causal discovery offer... 详细信息
来源: 评论
SQLStateGuard: Statement-Level SQL Injection Defense Based on Learning-Driven Middleware  15
SQLStateGuard: Statement-Level SQL Injection Defense Based o...
收藏 引用
15th Annual ACM Symposium on Cloud computing, SoCC 2024
作者: Liu, Xin Huang, Yuanyuan Wang, Tianyi Li, Song Niu, Weina Shen, Jun Zhou, Qingguo Zhou, Xiaokang School of Information Science and Engineering Lanzhou University Gansu Lanzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou China School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu China School of Computing and Information Technology University of Wollongong WollongongNSW Australia Kansai University Osaka Suita Japan
SQL injection is a significant and persistent threat to web services. Most existing protections against SQL injections rely on traffic-level anomaly detection, which often results in high false-positive rates and can ... 详细信息
来源: 评论
Domain knowledge discovery from abstracts of scientific literature on Nickel-based single crystal superalloys
收藏 引用
science China(Technological sciences) 2023年 第6期66卷 1815-1830页
作者: LIU Yue DING Lin YANG ZhengWei GE XianYuan LIU DaHui LIU Wei YU Tao AVDEEV Maxim SHI SiQi School of Computer Engineering and Science Shanghai UniversityShanghai 200444China Shanghai Engineering Research Center of Intelligent Computing System Shanghai 200444China State Key Laboratory of Advanced Special Steel&Shanghai Key Laboratory of Advanced Ferrometallurgy&School of Materials Science and Engineering Shanghai UniversityShanghai 200444China Materials Genome Institute Shanghai UniversityShanghai 200444China Institute of Functional Materials Central Iron&Steel Research InstituteBeijing 100081China Australian Nuclear Science and Technology Organisation Locked Bag 2001Kirrawee DC NSW 2232Australia School of Chemistry The University of SydneySydney 2006Australia Zhejiang Laboratory Hangzhou 311100China
Despite the huge accumulation of scientific literature,it is inefficient and laborious to manually search it for useful information to investigate structure-activity ***,we propose an efficient text-mining framework f... 详细信息
来源: 评论
CMD: A Cache-Assisted GPU Memory Deduplication Architecture
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and systems 2025年
作者: Zhao, Wei Feng, Dan Tong, Wei Wei, Xueliang Wu, Bing Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of data storage systems and Technology China
Massive off-chip accesses in GPUs are the main performance bottleneck. We find that many writes are duplicate, and the duplication can be inter-dup and intra-dup. While inter-dup means different memory blocks are iden... 详细信息
来源: 评论
Smart Captures- An Advanced Attendance system using Facial Recognition  1
Smart Captures- An Advanced Attendance System using Facial R...
收藏 引用
1st International Conference on Cognitive computing and Engineering Education, ICCCEE 2023
作者: Gunjan, Reena Mital, Anannya Jain, Muskan Pangaonkar, Satyajit Shete, Virendra Rokade, Prakash MIT School of Computing MIT Art Design and Technology University Department of Computer Science Engineering Pune India School of Computer Science and Engineering Avantika University Madhya Pradesh Ujjain India MIT School of Engineering and Science MIT Art Design and Technology University Department of Electronics and Communication Engineering Pune India Cloud and Infrastructure Services Infosys Ltd Maharashtra Pune India
Facial Recognition is one of the most productive and important techniques in image processing. It uses Machine Learning and Artificial Intelligence techniques to identify, collect, store, and evaluate face characteris... 详细信息
来源: 评论
FusionANNS: An Efficient CPU/GPU Cooperative Processing Architecture for Billion-scale Approximate Nearest Neighbor Search
arXiv
收藏 引用
arXiv 2024年
作者: Tian, Bing Liu, Haikun Tang, Yuhang Xiao, Shihai Duan, Zhuohui Liao, Xiaofei Zhang, Xuecang Zhu, Junhua Zhang, Yu National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Huawei Technologies Co. Ltd China
Approximate nearest neighbor search (ANNS) has emerged as a crucial component of database and AI infrastructure Ever-increasing vector datasets pose significant challenges in terms of performance, cost, and accuracy f... 详细信息
来源: 评论
Artificial Impostors: An Efficient and Scalable Scheme for Location Privacy Preservation
收藏 引用
IEEE Transactions on services computing 2025年 第3期18卷 1262-1277页
作者: Hao Tang Kunfeng Chen Zhiyang Xie Cheng Wang College of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Shanghai Artificial Intelligence Laboratory Shanghai China
The progress of location-based services has led to severe concerns about location privacy leakage. However, existing methods are still incompetent for efficient and scalable location privacy preservation (LPP). They a... 详细信息
来源: 评论
Tensor and Minimum Connected Dominating Set based Confident Information Coverage Reliability Evaluation for IoT
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable computing 2024年 第3期10卷 547-561页
作者: Xiao, Ziheng Zhu, Chenlu Feng, Wei Liu, Shenghao Deng, Xianjun Lu, Hongwei Yang, Laurence T. Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430074 China Artificial Intelligence and Intelligent Transportation Joint Technical Center of HUST and Hubei Chutian Intelligent Transportation Company Ltd United States Network and Industrial Control Information Security Technology Department China Nuclear Power Operation Technology Company Ltd. 1011 Xiongchu Avenue Hubei Wuhan430070 China The Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul01811 Korea Republic of
Internet of Things (IoT) reliability evaluation contributes to the sustainable computing and enhanced stability of the network. Previous algorithms usually evaluate the reliability of IoT by enumenating the states of ... 详细信息
来源: 评论