咨询与建议

限定检索结果

文献类型

  • 446 篇 会议
  • 84 篇 期刊文献

馆藏范围

  • 530 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 205 篇 工学
    • 161 篇 计算机科学与技术...
    • 142 篇 软件工程
    • 56 篇 信息与通信工程
    • 48 篇 电气工程
    • 29 篇 控制科学与工程
    • 18 篇 生物工程
    • 15 篇 机械工程
    • 15 篇 电子科学与技术(可...
    • 15 篇 交通运输工程
    • 14 篇 网络空间安全
    • 12 篇 光学工程
    • 11 篇 安全科学与工程
    • 9 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 4 篇 化学工程与技术
  • 91 篇 理学
    • 58 篇 数学
    • 20 篇 物理学
    • 16 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 7 篇 系统科学
  • 53 篇 管理学
    • 32 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 14 篇 法学
    • 8 篇 法学
    • 8 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 公共卫生与预防医...
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 文学

主题

  • 74 篇 feature extracti...
  • 62 篇 accuracy
  • 48 篇 semantics
  • 42 篇 computational mo...
  • 38 篇 data models
  • 30 篇 federated learni...
  • 29 篇 training
  • 27 篇 neural networks
  • 26 篇 transformers
  • 21 篇 predictive model...
  • 19 篇 deep learning
  • 18 篇 data mining
  • 17 篇 noise
  • 17 篇 adaptation model...
  • 16 篇 visualization
  • 16 篇 attention mechan...
  • 15 篇 measurement
  • 14 篇 object detection
  • 14 篇 image segmentati...
  • 14 篇 analytical model...

机构

  • 201 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 44 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 36 篇 shandong fundame...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 22 篇 shandong provinc...
  • 15 篇 quan cheng labor...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...
  • 12 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 10 篇 faculty of data ...
  • 10 篇 shandong fundame...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 18 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 jin haiyan
  • 12 篇 aimin li
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 lei zhu
  • 11 篇 wenpeng lu
  • 10 篇 wang lei
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 guixin zhao

语言

  • 505 篇 英文
  • 24 篇 其他
  • 3 篇 中文
检索条件"机构=Shaanxi Provincial Key Laboratory of Network Computing and Security Technology"
530 条 记 录,以下是221-230 订阅
排序:
Pervasive Container computing–––a Fine-Grained Loosely Coupled Cloud Cluster
Pervasive Container Computing–––a Fine-Grained Loosely Co...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous computing and Communications (ISPA/IUCC)
作者: Xinhong Hei Dan Wu YiFan Liu Wenjiang Ji Yichuan Wang Lei Zhu School of computer science and engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the emergence of CaaS, a cloud service model that can quickly build a production environment, this model has been widely used in the industry. However, the degree of loose coupling of various containers in the cl... 详细信息
来源: 评论
Precise and Efficient:A Hybrid Analysis-Based Stack Overflow Detection Model under MIPS
Precise and Efficient:A Hybrid Analysis-Based Stack Overflow...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Yichuan Wang Chenhao Huang Tong Zhang Li Zhao Zhendong Gu Gangyang Li Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Hanjiang.to.Weihan River Valley Water Diversion Project Construction.co.ltd Xi’an China
Although the vulnerability detection techniques under the MIPS platform can detect stack overflow vulnerabilities, the stack overflow vulnerability of the stack frame changes is complex and hard to recover. The input ...
来源: 评论
An Efficient Energy Consumption Prediction Framework for High Performance computing Cluster Jobs
An Efficient Energy Consumption Prediction Framework for Hig...
收藏 引用
International Conference on Computer Engineering and Applications (ICCEA)
作者: Yantao Lou Jibin Wang Shoupeng Feng Xian Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Public Security of Shandong Province Shandong Intelligent Public Security Technology Innovation Center Jinan China
Energy consumption prediction is a crucial approach to enhance the operational efficiency of HPC (High Performance computing) clusters. Existing predicting methods for the energy consumption mainly rely on time series... 详细信息
来源: 评论
A Grouping Strategy-Based Progressive Fusion network for Hyperspectral Image Super-Resolution
A Grouping Strategy-Based Progressive Fusion Network for Hyp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Baodong Zhang Yongbiao Gao Guixin Zhao Guotao Wang Juncan Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
Hyperspectral super-resolution involves combining low-resolution hyperspectral images with high-resolution multispectral images to produce a high-resolution hyperspectral image. Recently, although many methods for hyp... 详细信息
来源: 评论
DHD: Double Hard Decision Decoding Scheme for NAND Flash Memory
DHD: Double Hard Decision Decoding Scheme for NAND Flash Mem...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Lanlan Cui Yichuan Wang Renzhi Xiao Miao Li Xiaoxue Liu Xinhong Hei School of Computer Science and Engineering XI'AN University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Software Engineering Jiangxi University of Science and Technology Nanchang China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
With the advancement of NAND flash technology, the increased storage density leads to intensified interference, which in turn raises the error rate during data retrieval. To ensure data reliability, low-density parity... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qiliang Gu Qin Lu Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
Robust Visual Question Answering: Datasets, Methods, and Future Challenges
arXiv
收藏 引用
arXiv 2023年
作者: Ma, Jie Wang, Pinghui Kong, Dechen Wang, Zewei Liu, Jun Pei, Hongbin Zhao, Junzhou Di, Jia The Ministry of Education of Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The Ministry of Education of Key Laboratory for Intelligent Networks and Network Security School of Automation Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The Shannxi Provincial Key Laboratory of Big Data Knowledge Engineering School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China
Visual question answering requires a system to provide an accurate natural language answer given an image and a natural language question. However, it is widely recognized that previous generic VQA methods often tend ... 详细信息
来源: 评论
Complex Matrix and Multi-Feature Collaborative Learning for Polarimetric Sar Image Classification
SSRN
收藏 引用
SSRN 2022年
作者: Shi, Junfei Wang, Wei Jin, Haiyan He, Tiansheng Xi’an University of Technology No.5 South Jinhua Road Shaanxi Xian China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China
Nearest regularized subspace (NRS) algorithm is an effective tool to obtain both accuracy and speed for PolSAR image classification. However, Existing NRS-based methods can only learn the polarimetric feature vec... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Ru Li Aimin Li Rong Fei Xie Guo Fang-Xiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Computer Science Department of Mechanical Engineering Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ...
来源: 评论
A permission generation and configuration method based on Rules and FP-Growth algorithm
A permission generation and configuration method based on Ru...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhu, Lei Zhang, Ziheng Hei, Xinhong Wang, Yichuan Yang, Ziliang Hu, Feixiong He, Ping Xi'an University of technology School of Computer Science and Engineering Shaanxi Xi'an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi'an710048 China Shenzhen Tencent Computer System Co. Ltd Shenzhen518054 China
With the development of computer technology, lots of enterprises had begun to build a data platform, and the data and its services already paly the import role in enterprises. However, the guarantee the data security ... 详细信息
来源: 评论