咨询与建议

限定检索结果

文献类型

  • 2,387 篇 会议
  • 1,956 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,359 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,834 篇 工学
    • 1,933 篇 计算机科学与技术...
    • 1,510 篇 软件工程
    • 583 篇 信息与通信工程
    • 352 篇 电气工程
    • 349 篇 控制科学与工程
    • 314 篇 电子科学与技术(可...
    • 256 篇 生物工程
    • 218 篇 机械工程
    • 202 篇 光学工程
    • 164 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 142 篇 动力工程及工程热...
    • 140 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 91 篇 网络空间安全
    • 89 篇 材料科学与工程(可...
    • 81 篇 土木工程
    • 79 篇 安全科学与工程
  • 1,428 篇 理学
    • 703 篇 数学
    • 385 篇 物理学
    • 308 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 152 篇 化学
    • 144 篇 系统科学
  • 754 篇 管理学
    • 503 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 175 篇 医学
    • 145 篇 临床医学
    • 114 篇 基础医学(可授医学...
  • 117 篇 法学
    • 77 篇 社会学
  • 73 篇 经济学
  • 52 篇 农学
  • 24 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 101 篇 feature extracti...
  • 92 篇 semantics
  • 78 篇 computational mo...
  • 72 篇 computer science
  • 72 篇 deep learning
  • 66 篇 training
  • 64 篇 computer archite...
  • 59 篇 cloud computing
  • 56 篇 laboratories
  • 56 篇 optimization
  • 56 篇 servers
  • 54 篇 accuracy
  • 53 篇 scalability
  • 52 篇 grid computing
  • 50 篇 protocols
  • 49 篇 predictive model...
  • 48 篇 bandwidth
  • 45 篇 data models
  • 43 篇 resource managem...
  • 43 篇 analytical model...

机构

  • 129 篇 school of comput...
  • 101 篇 national enginee...
  • 94 篇 hubei province k...
  • 90 篇 school of comput...
  • 77 篇 department of co...
  • 55 篇 services computi...
  • 49 篇 services computi...
  • 49 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 45 篇 national enginee...
  • 44 篇 state key labora...
  • 42 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 national enginee...
  • 34 篇 school of comput...
  • 34 篇 university of ch...
  • 33 篇 key laboratory o...

作者

  • 235 篇 hai jin
  • 187 篇 jin hai
  • 53 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 29 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 21 篇 li peng
  • 19 篇 liu yang
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 18 篇 liu jun
  • 18 篇 li bo

语言

  • 3,762 篇 英文
  • 463 篇 其他
  • 148 篇 中文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4359 条 记 录,以下是781-790 订阅
排序:
ShiftwiseConv: Small Convolutional Kernel with Large Kernel Effect
arXiv
收藏 引用
arXiv 2024年
作者: Li, Dachong Li, Li Chen, Zhuangzhuang Li, Jianqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Mathematical Sciences Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology China
Large kernels make standard convolutional neural networks (CNNs) great again over transformer architectures in various vision tasks. Nonetheless, recent studies meticulously designed around increasing kernel size have... 详细信息
来源: 评论
An Efficient Block Validation Mechanism for UTXO-based Blockchains
An Efficient Block Validation Mechanism for UTXO-based Block...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Xiaohai Dai Bin Xiao Jiang Xiao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing The Hong Kong Polytechnic University Hong Kong
It has been recognized that one of the bottlenecks in the UTXO-based blockchain systems is the slow block validation - the process of validating a newly-received block by a node before locally storing it and further b... 详细信息
来源: 评论
An improvised CNN model for fake image detection
收藏 引用
International Journal of Information technology (Singapore) 2023年 第1期15卷 5-15页
作者: Hamid, Yasir Elyassami, Sanaa Gulzar, Yonis Balasaraswathi, Veeran Ranganathan Habuza, Tetiana Wani, Sharyar Information Security and Engineering Technology Abu Dhabi Polytechnic Abu Dhabi United Arab Emirates Department of Management Information System College of Business Administration King Faisal University Riyadh Saudi Arabia Department of Networking and Communications School of Computing SRM Institute of Science and Technology Chengalpattu India Department of Computer Science and SWE College of Info. Tech UAEU Al Ain United Arab Emirates Department of Computer Science International Islamic University Malaysia Kuala Lumpur Malaysia
The last decade has witnessed a multifold growth of image data courtesy of the emergence of social networking services like Facebook, Instagram, LinkedIn etc. The major menace faced by today’s world is the issue of d... 详细信息
来源: 评论
A Hybrid Blockchain Scheme for Tracing Manufacturing Processes and Trading Transactions  22
A Hybrid Blockchain Scheme for Tracing Manufacturing Process...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Yuan, Ye Yang, Mingxing Xiong, Ruoting Sun, Yani Zhang, Xianchao Ren, Wei HuBei Land Resources Vocational College China China University of Geosciences Gemological Institute Wuhan China University of East Anglia School of Computing Science United Kingdom Yunnan Innovation Institute Beihang University Yunnan Key Laboratory of Blockchain Application Technology Kunming China Jiaxing University Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province Jiaxing China State Key Laboratory of Geo-Information Engineering Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology Mnr Beijing China Ministry of Education China China University of Geosciences School of Computer Science Wuhan China
Blockchain can be envisioned as an enabling framework in terms of cryptography and distributed computing to construct trusted data records among un-trusted users. It can be applied in two typical scenarios - historica... 详细信息
来源: 评论
A Novel Hybrid Makeup Transfer Method Based on Latent Vector Manipulation  2
A Novel Hybrid Makeup Transfer Method Based on Latent Vector...
收藏 引用
2nd International Conference on Artificial Intelligence and computer Information technology, AICIT 2023
作者: Li, Yumiao Li, Peng Shen, Ziqi Li, Wenhui Key Laboratory of Intelligent Computing and Service Technology for Folk Song Ministry of Culture and Tourism Xi'an710119 China School of Computer Science Shaanxi Normal University Xi'an710119 China Key Laboratory of Modern Teaching Technology Ministry of Education Xi'an710062 China Engineering Laboratory of Teaching Information Technology of Shaanxi Province Xi'an710119 China Xi'an Key Laboratory of Cultural Tourism Resources Development and Utilization Xi'an710062 China
With the development of image processing technology and the improvement of people's living standards, there is a wide demand for makeup services in society. In this paper, we focus on style transfer and its applic... 详细信息
来源: 评论
Two-Sided Online Task Assignment Based on Worker Portraits in Mobile CrowdSensing
Two-Sided Online Task Assignment Based on Worker Portraits i...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Zhenyang Mao Peng Li Guangzhong Liao Lei Nie Haizhou Bao Qin Liu School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System China School of Cyber Science and Engineering Wuhan University China
Task assignment is a challenging problem in mobile crowdsensing (MCS), especially since workers and tasks are online. Existing work does not consider the portrait of the workers when assigning tasks, which may result ... 详细信息
来源: 评论
FlashWalker: An In-Storage Accelerator for Graph Random Walks
FlashWalker: An In-Storage Accelerator for Graph Random Walk...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Fuping Niu Jianhui Yue Jiangqiu Shen Xiaofei Liao Haikun Liu Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computer Science Michigan Technological University Houghton Michigan USA
Graph random walk is widely used in the graph processing as it is a fundamental component in graph analysis, ranging from vertices ranking to the graph embedding. Different from traditional graph processing workload, ... 详细信息
来源: 评论
A Practical Cloud API Complementary Recommendation Service for Mashup Creation
A Practical Cloud API Complementary Recommendation Service f...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xiaowei Liu Wenhui Chen Mengmeng Sun Yali Si Zhen Chen School of Information Science and Engineering Yanshan University Qinhuangdao China School of Computer Science and Engineering Changshu Institute of Technology Changshu China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao China
With the popularity of the service-oriented development paradigm in the cloud era, numerous cloud APIs have been developed. The continuous proliferation of cloud APIs has submerged developers in a sea of options, brin... 详细信息
来源: 评论
The Security and Privacy of Mobile Edge computing: An Artificial Intelligence Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Cheng Yuan, Zenghui Zhou, Pan Xu, Zichuan Li, Ruixuan Wu, Dapeng Oliver Hubei Engineering Research Center on Big Data Security Key Laboratory of Distributed System Security of Hubei Province School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Software The Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian University of Technology Dalian116024 China Intelligent and Distributed Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong
Mobile Edge computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network’s edge. By shifting the load of cloud computing to individu... 详细信息
来源: 评论
Natural image matting based on image inpainting  2
Natural image matting based on image inpainting
收藏 引用
2nd International Conference on computer Graphics, Image and Virtualization, ICCGIV 2022
作者: Zhang, Yuan Tan, Mian Zhou, Zhulian Yang, Yuan Liang, Yihui Feng, Fujian Guizhou Minzu University Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guiyang550025 China University of Electronic Science and Technology China School of Computer Science Zhongshan528400 China
Deep image matting is a hot problem with applications in computer vision and image processing. It has been widely used in image composition, film production and video editing etc. The current matting method based on i... 详细信息
来源: 评论