咨询与建议

限定检索结果

文献类型

  • 68 篇 期刊文献
  • 56 篇 会议

馆藏范围

  • 124 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 87 篇 工学
    • 52 篇 计算机科学与技术...
    • 42 篇 软件工程
    • 25 篇 信息与通信工程
    • 12 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 化学工程与技术
    • 8 篇 光学工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 控制科学与工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 动力工程及工程热...
    • 4 篇 生物医学工程(可授...
    • 3 篇 冶金工程
    • 3 篇 生物工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 土木工程
    • 2 篇 安全科学与工程
  • 37 篇 理学
    • 16 篇 数学
    • 16 篇 物理学
    • 7 篇 化学
    • 6 篇 生物学
    • 6 篇 统计学(可授理学、...
    • 3 篇 系统科学
  • 22 篇 管理学
    • 15 篇 图书情报与档案管...
    • 10 篇 管理科学与工程(可...
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 农学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 9 篇 semantics
  • 8 篇 network coding
  • 5 篇 geography
  • 5 篇 signal processin...
  • 5 篇 computational mo...
  • 5 篇 speech recogniti...
  • 5 篇 data models
  • 5 篇 adaptation model...
  • 5 篇 engines
  • 4 篇 raman spectrosco...
  • 4 篇 speech enhanceme...
  • 4 篇 acoustics
  • 4 篇 data mining
  • 4 篇 contracts
  • 4 篇 feature extracti...
  • 4 篇 training
  • 3 篇 zinc
  • 3 篇 indexes
  • 3 篇 speech processin...
  • 3 篇 vectors

机构

  • 12 篇 shenzhen institu...
  • 12 篇 tianjin key labo...
  • 11 篇 peng cheng labor...
  • 9 篇 university of ch...
  • 6 篇 the shenzhen key...
  • 5 篇 key laboratory o...
  • 5 篇 oppo research in...
  • 5 篇 co. ltd.
  • 4 篇 huiyan technolog...
  • 4 篇 china-america ca...
  • 4 篇 shanghai key lab...
  • 4 篇 the school of co...
  • 4 篇 the key laborato...
  • 4 篇 huawei cloud com...
  • 4 篇 moe engineering ...
  • 3 篇 faculty of envir...
  • 3 篇 peking universit...
  • 3 篇 高可信软件技术教...
  • 3 篇 guangdong labora...
  • 3 篇 moe key lab of a...

作者

  • 13 篇 li hui
  • 11 篇 hui li
  • 9 篇 wang longbiao
  • 8 篇 dang jianwu
  • 8 篇 longbiao wang
  • 7 篇 jianwu dang
  • 6 篇 wang xiaobao
  • 6 篇 chen chen
  • 6 篇 xiaolin wang
  • 6 篇 chen fuxing
  • 6 篇 yingwei luo
  • 5 篇 tian qi
  • 5 篇 ge meng
  • 5 篇 huang qingming
  • 5 篇 meng ge
  • 5 篇 wang shuhui
  • 5 篇 tianrui wang
  • 4 篇 xiaobao wang
  • 4 篇 lv xiaoyi
  • 4 篇 chen cheng

语言

  • 110 篇 英文
  • 10 篇 中文
  • 4 篇 其他
检索条件"机构=Shenzhen Key Laboratory of Cloud Computing Technology & Application"
124 条 记 录,以下是61-70 订阅
排序:
Adaptive Meta-Path Selection Based Heterogeneous Spatial Enhancement for circRNA-Disease Associations Prediction
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2024年 第5期29卷 3792-3804页
作者: Zhihao Ma Guitao Cao Wenming Cao Shanghai Key Laboratory of Trustworthy Computing and MoE Engineering Research Center of SW/HW Co-design Technology and Application East China Normal University Shanghai China College of Information Engineering Shenzhen University Shenzhen China
Circular RNAs (circRNAs) play a crucial role in human biological processes as miRNA sponges, regulating gene expression and affecting disease manifestations. Establishing heterogeneous nodal feature relationships thro... 详细信息
来源: 评论
t-PSI: Efficient Multi-party Private Set Intersection with Threshold  19
t-PSI: Efficient Multi-party Private Set Intersection with T...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Meng, Dan Fu, Zhihui Kong, Chao Qi, Yue Cao, Guitao Oppo Research Institute Shenzhen China Anhui Polytechnic University School of Computer and Information Wuhu China East China Normal University Shanghai Key Laboratory of Trustworthy Computing Shanghai China MoE Engineering Research Center of SH/HW Co-design Technology and Application Ecnu Shanghai China
Multi-party privacy set intersection (MPSI) enables multiple parties to compute the intersection of their datasets without leaking data privacy. Among existing MPSI protocols, e.g., KMPRT-based protocols, oblivious ev... 详细信息
来源: 评论
When Adversarial Example Attacks Meet Vertical Federated Learning  19
When Adversarial Example Attacks Meet Vertical Federated Lea...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Meng, Dan Fu, Zhihui Kong, Chao Qi, Yue Cao, Guitao Oppo Research Institute Shenzhen China Anhui Polytechnic University School of Computer and Information Wuhu China East China Normal University Shanghai Key Laboratory of Trustworthy Computing Shanghai China MoE Engineering Research Center of SH/HW Co-design Technology and Application Ecnu Shanghai China
Federated learning (FL) is proposed to enable efficient machine learning while protecting the privacy of user data. In non-federated scenarios, machine learning models are vulnerable to adversarial attacks. The attack... 详细信息
来源: 评论
Multi-Sentence Matching via Exploiting List-level Semantics Expansion
Multi-Sentence Matching via Exploiting List-level Semantics ...
收藏 引用
IEEE International Conference on Big Knowledge (ICBK)
作者: Ruijun Sun Zhi Li Qi Liu Zhefeng Wang Xinyu Duan Baoxing Huai Nicholas Jing Yuan Anhui Province Key Laboratory of Big Data Analysis and Application University of Science and Technology of China State Key Laboratory of Cognitive Intelligence Hefei China Shenzhen International Graduate School Tsinghua University Huawei Cloud
Sentence semantic matching plays a fundamental role in natural language understanding and is widely used in various tasks. Previous methods are mainly based on the One-to-One single pair matching process, while in man... 详细信息
来源: 评论
Efficient cube computing on an extended multidimensional model over uncertain data
Efficient cube computing on an extended multidimensional mod...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Chunyang Wei Hongyan Li Kai Lei Tengjiao Wang Key Laboratory of High Confidence Software Technologies Ministry of Education School of Electronics Engineering and Computer Science Peking University Beijing China The Shenzhen Key Laboratory for Cloud Computing Technology and Applications (SPCCTA) Peking University Shenzhen Graduate School Shenzhen China
Data uncertainty is an inherent property in various applications due to reasons such as measurement errors, incompleteness of data and so on. While On-Line Analytical Processing (OLAP) has been a powerful method for a... 详细信息
来源: 评论
Holistic twig joins based on Sketch Tree
Holistic twig joins based on Sketch Tree
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: JunWen Ji Yue Wang Kai Lei Tengjiao Wang Key Laboratory of High Confidence Software Technologies Ministry of Education School of Electronics Engineering and Computer Science Peking University Beijing China The Shenzhen Key Laboratory for Cloud Computing Technology and Applications (SPCCTA) Peking University Shenzhen Graduate School Shenzhen China
Due to the wide spread of XML and its importance, twig query matching, which has been identified as a core operation in querying XML data, has become a research hotspot. Although a number of algorithms have been propo... 详细信息
来源: 评论
Enhancing Complex Causality Extraction via Improved Subtask Interaction and Knowledge Fusion
arXiv
收藏 引用
arXiv 2024年
作者: Gao, Jinglong Lu, Chen Ding, Xiao Li, Zhongyang Liu, Ting Qin, Bing Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China National Key Laboratory of Information Systems Engineering Nanjing China Huawei Cloud Shenzhen China
Event Causality Extraction (ECE) aims at extracting causal event pairs from texts. Despite ChatGPT’s recent success, fine-tuning small models remains the best approach for the ECE task. However, existing fine-tuning ... 详细信息
来源: 评论
Electrical Transport Properties of Few-Layer SnS2 Field-effect Transistors
Electrical Transport Properties of Few-Layer SnS2 Field-effe...
收藏 引用
2022 International Conference on Electrical, Electronics and Information Engineering, EEIE 2022
作者: Zhang, Lu Li, Tuo Yao, Peng Zou, Xiaofeng Ji, Chao Zhan, Yongzheng He, Jiaqi Zhang, Qing State Key Laboratory of High-end Server & Storage Technology Jinan250013 China Inspur Electronic Information Industry Co. Ltd. Jinan250013 China Shandong Yunhai Guochuang Cloud Computing Equipment Industry Innovation Co. Ltd. Jinan250013 China Beijing Institute of Computer Technology and Application Beijing100854 China College of Mathematics and Physics Beijing University of Chemical Technology Beijing100029 China
After the discovery of graphene in 2004, two dimensional (2D) materials have fascinated a lot of view due to the excellent properties. Nowadays, the research on 2D materials has spread to other graphene-like layer str... 详细信息
来源: 评论
EdgeCross: cloud Scale Traffic Management at Peering Edges
Proceedings of the ACM on Networking
收藏 引用
Proceedings of the ACM on Networking 2024年 第CoNEXT4期2卷 1-23页
作者: Xiaoliang Wang Penghui Mi Yong Zhu Baoyi An Yinhua Wang Lixiang Wang Xuezhi Yu Qiong Xie Xiang Huang Mingliang Yin Chaoyang Ji Wei Sun Yihang Lv Yuhang Chen Cam-Tu Nguyen Chen Tian Xiaoming Fu State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Huawei Cloud Computing Technologies Co. Ltd. Shenzhen China Institute of Computer Science University of Göttingen Göttingen Germany
cloud providers deployed dozens of PoPs and data centers globally to serve billions of geo-distributed users. The traffic management at peering edges has become a key capability of cloud network operators to meet the ... 详细信息
来源: 评论
Synchronous network coding algorithm based on Galois field
收藏 引用
Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and technology 2012年 第SUPPL.1期36卷 44-51页
作者: Li, Jiang Chen, Jia Li, Yi-Ning Li, Hui Shenzhen Key Lab of Cloud Computing Technology and Application Shenzhen Graduate School Peking University Shenzhen 518055 China Shenzhen Media Group Shenzhen 518055 China
A network coding(NC) algorithm based on hardware logic is presented. At first, a synchronous mechanism to solve the challenge of transmission-rate mismatch in the real network is proposed. Then a novel method to accel... 详细信息
来源: 评论