咨询与建议

限定检索结果

文献类型

  • 2,387 篇 会议
  • 1,956 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,359 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,834 篇 工学
    • 1,933 篇 计算机科学与技术...
    • 1,510 篇 软件工程
    • 583 篇 信息与通信工程
    • 352 篇 电气工程
    • 349 篇 控制科学与工程
    • 314 篇 电子科学与技术(可...
    • 256 篇 生物工程
    • 218 篇 机械工程
    • 202 篇 光学工程
    • 164 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 142 篇 动力工程及工程热...
    • 140 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 91 篇 网络空间安全
    • 89 篇 材料科学与工程(可...
    • 81 篇 土木工程
    • 79 篇 安全科学与工程
  • 1,428 篇 理学
    • 703 篇 数学
    • 385 篇 物理学
    • 308 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 152 篇 化学
    • 144 篇 系统科学
  • 754 篇 管理学
    • 503 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 175 篇 医学
    • 145 篇 临床医学
    • 114 篇 基础医学(可授医学...
  • 117 篇 法学
    • 77 篇 社会学
  • 73 篇 经济学
  • 52 篇 农学
  • 24 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 101 篇 feature extracti...
  • 92 篇 semantics
  • 78 篇 computational mo...
  • 72 篇 computer science
  • 72 篇 deep learning
  • 66 篇 training
  • 64 篇 computer archite...
  • 59 篇 cloud computing
  • 56 篇 laboratories
  • 56 篇 optimization
  • 56 篇 servers
  • 54 篇 accuracy
  • 53 篇 scalability
  • 52 篇 grid computing
  • 50 篇 protocols
  • 49 篇 predictive model...
  • 48 篇 bandwidth
  • 45 篇 data models
  • 43 篇 resource managem...
  • 43 篇 analytical model...

机构

  • 129 篇 school of comput...
  • 101 篇 national enginee...
  • 94 篇 hubei province k...
  • 90 篇 school of comput...
  • 77 篇 department of co...
  • 55 篇 services computi...
  • 49 篇 services computi...
  • 49 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 45 篇 national enginee...
  • 44 篇 state key labora...
  • 42 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 national enginee...
  • 34 篇 school of comput...
  • 34 篇 university of ch...
  • 33 篇 key laboratory o...

作者

  • 235 篇 hai jin
  • 187 篇 jin hai
  • 53 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 29 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 21 篇 li peng
  • 19 篇 liu yang
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 18 篇 liu jun
  • 18 篇 li bo

语言

  • 3,762 篇 英文
  • 463 篇 其他
  • 148 篇 中文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4359 条 记 录,以下是861-870 订阅
排序:
Petri net modeling and vulnerability analysis of the Heartbleed
Petri net modeling and vulnerability analysis of the Heartbl...
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Wang, Yichuan Wang, He Hei, Xinhong Ji, Wenjiang Zhu, Lei Xi'an University of technology School of computer science and engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
In recent years, a variety of network attacks emerge in an endless stream, and network attacks gradually show the characteristics of higher secrecy and greater harm. At present, the analysis of system vulnerabilities ... 详细信息
来源: 评论
Generative Positive-Unlabeled Classification for Hunting Small Open Reading Frames
Generative Positive-Unlabeled Classification for Hunting Sma...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jie Chen Wenbin Liao Du Wen Jianqiang Li Fangzhong Wang College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Laboratory of Synthetic Microbiology School of Chemical Engineering & Technology Tianjin University China
The annotation of Open Reading Frames (ORFs) is a crucial step in gene annotation, as it precisely delineates the specific regions of expressed genes. However, small Open Reading Frames (smORFs), in comparison to ORFs...
来源: 评论
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
Scalar optical hopfions
收藏 引用
eLight 2022年 第1期2卷 284-290页
作者: Chenhao Wan Yijie Shen Andy Chong Qiwen Zhan School of Optical‑Electrical and Computer Engineering University of Shanghai for Science and TechnologyShanghai 200093China School of Optical and Electronic Information and Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430074HubeiChina Optoelectronics Research Centre University of SouthamptonSouthampton SO171BJUK Department of Physics Pusan National UniversityGeumjeong‑GuBusan 46241South Korea Zhangjiang Laboratory 100 Haike RoadShanghai 201204China Shanghai Key Lab of Modern Optical System University of Shanghai for Science and TechnologyShanghai 200093China
Hopfions are three-dimensional(3D)topological states discovered in field theory,magnetics,and hydrodynamics that resemble particle-like objects in physical *** inherit the topological features of the Hopf fibration,a ... 详细信息
来源: 评论
BA-Audit: Blockchain-Based Public Auditing for Aggregated Data Sharing in Edge-Assisted IoT  1
收藏 引用
4th EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2021
作者: Liu, Mingxi Lu, Ning Yin, Jingli Cheng, Qingfeng Shi, Wenbo School of Computer Science and Engineering Northeastern University Shenyang China School of Computer Science and Technology Xidian University Xi’an China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Strategic Support Force Information Engineering University Zhengzhou China
With the massive placement of sensors leading to a surge in IoT data, it is wise for system administrators to use data aggregation strategies to collect and share data in edge-assisted IoT scenarios because traditiona... 详细信息
来源: 评论
Coordination of networking and computing: toward new information infrastructure and new services mode
收藏 引用
Frontiers of Information technology & Electronic Engineering 2024年 第5期25卷 629-632页
作者: Xiaoyun WANG Tao SUN Yong CUI Rajkumar BUYYA Deke GUO Qun HUANG Hassnaa MOUSTAFA Chen TIAN Shangguang WANG China Mobile Communications Corporation Beijing 100032China China Mobile Research Institute Beijing 100053China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China CLOUDS Lab School of Computing and Information SystemsUniversity of MelbourneMelbourneVIC 3010Australia National Key Laboratory of Information Systems Engineering National University of Defense TechnologyChangsha 410073China School of Computer Science Peking UniversityBeijing 100871China Intel Corporation Santa ClaraCA 95054USA State Key Laboratory for Novel Sofiware Technology Nanjing UniversityNanjing 210023China State Key Laboratory of Networking and Switching Technology Bejing University of Posts and TelecommunicationsBeijing 100876China
computing,serving as the cornerstone of information processing,plays a pivotal role in the digital service ***"network"and"computing,"responsible for information transmission and processing respect... 详细信息
来源: 评论
Scavenger: Better Space-Time Trade-Offs for Key-Value Separated LSM-trees
Scavenger: Better Space-Time Trade-Offs for Key-Value Separa...
收藏 引用
International Conference on Data Engineering
作者: Jianshun Zhang Fang Wang Sheng Qiu Yi Wang Jiaxin Ou Junxun Huang Baoquan Li Peng Fang Dan Feng Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of data storage systems and Technology Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology China Shenzhen Huazhong University of Science and Technology Research Institute Bytefrance Inc.
Key- Value Stores (KVS) implemented with log- structured merge-tree (LSM-tree) have gained widespread ac-ceptance in storage systems. Nonetheless, a significant challenge arises in the form of high write amplification... 详细信息
来源: 评论
EPL: Empirical Prototype Learning for Deep Face Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Fan, Weijia Wen, Jiajun Jia, Xi Shen, Linlin Zhou, Jiancan Li, Qiufu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Computer Vision Institute Shenzhen University Shenzhen518060 China School of Computer Science University of Birmingham Birmingham United Kingdom Aqara Lumi United Technology Coopration Shenzhen China
Prototype learning is widely used in face recognition, which takes the row vectors of coefficient matrix in the last linear layer of the feature extraction model as the prototypes for each class. When the prototypes a... 详细信息
来源: 评论
Bandwidth-Efficient Two-Server ORAMs with O(1) Client Storage
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Wei Zhang, Xianglong Xu, Peng Chen, Rongmao Yang, Laurence Tianruo School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Jinyinhu Laboratory Wuhan430040 China School of Computer National University of Defense Technology Changsha410073 China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou450001 China Department of Computer Science St. Francis Xavier University AntigonishNSB2G 2W5 Canada
Oblivious RAM (ORAM) allows a client to securely retrieve elements from outsourced servers without leakage about the accessed elements or their virtual addresses. Two-server ORAM, designed for secure two-party RAM com... 详细信息
来源: 评论
On the Outage of Far-Reach Communications via RIS-Empowered Satellites
On the Outage of Far-Reach Communications via RIS-Empowered ...
收藏 引用
IEEE Pacific Rim Conference on Communications, computers and Signal Processing
作者: Fan Wang Ruihong Jiang Yuan Liu Tingnan Bao Mugen Peng State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Zhejiang Laboratory Research Center for Space Computing System Hangzhou China School of Electrical Engineering and Computer Science University of Ottawa Ottawa ON Canada
The rising demand for reliable, high-bandwidth satellite communications in far-reach areas drives the integration of low earth orbit (LEO) satellites into future 6G networks. In this paper, we investigate the deployme... 详细信息
来源: 评论