咨询与建议

限定检索结果

文献类型

  • 463 篇 会议
  • 372 篇 期刊文献

馆藏范围

  • 835 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 482 篇 工学
    • 379 篇 计算机科学与技术...
    • 310 篇 软件工程
    • 109 篇 信息与通信工程
    • 72 篇 生物工程
    • 67 篇 电气工程
    • 53 篇 电子科学与技术(可...
    • 47 篇 控制科学与工程
    • 42 篇 生物医学工程(可授...
    • 40 篇 光学工程
    • 19 篇 仪器科学与技术
    • 19 篇 动力工程及工程热...
    • 19 篇 网络空间安全
    • 18 篇 机械工程
    • 18 篇 化学工程与技术
    • 17 篇 交通运输工程
    • 12 篇 建筑学
  • 251 篇 理学
    • 127 篇 数学
    • 89 篇 生物学
    • 49 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 22 篇 化学
    • 17 篇 系统科学
  • 126 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 46 篇 医学
    • 37 篇 临床医学
    • 28 篇 基础医学(可授医学...
    • 17 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 27 篇 法学
    • 18 篇 社会学
  • 11 篇 农学
  • 9 篇 经济学
  • 5 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 44 篇 semantics
  • 37 篇 computational mo...
  • 36 篇 feature extracti...
  • 26 篇 deep learning
  • 23 篇 predictive model...
  • 23 篇 accuracy
  • 23 篇 training
  • 18 篇 memory managemen...
  • 18 篇 data models
  • 15 篇 machine learning
  • 14 篇 neural networks
  • 14 篇 convolution
  • 14 篇 data mining
  • 14 篇 federated learni...
  • 13 篇 task analysis
  • 13 篇 image segmentati...
  • 12 篇 deep neural netw...
  • 12 篇 adaptation model...
  • 11 篇 scalability
  • 11 篇 graph neural net...

机构

  • 99 篇 national enginee...
  • 64 篇 school of comput...
  • 58 篇 shandong provinc...
  • 49 篇 school of cyber ...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 huazhong univers...
  • 27 篇 cluster and grid...
  • 26 篇 hubei key labora...
  • 18 篇 school of softwa...
  • 17 篇 zhejiang lab
  • 16 篇 beijing advanced...
  • 14 篇 school of inform...
  • 12 篇 national enginee...
  • 12 篇 university of ch...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...

作者

  • 124 篇 jin hai
  • 122 篇 hai jin
  • 42 篇 xiaofei liao
  • 26 篇 liao xiaofei
  • 23 篇 hu shengshan
  • 21 篇 long zheng
  • 21 篇 haikun liu
  • 19 篇 yu zhang
  • 17 篇 zou deqing
  • 16 篇 zhang leo yu
  • 15 篇 deqing zou
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 wang lihui
  • 12 篇 li zhen
  • 12 篇 wan yao
  • 12 篇 shi xuanhua
  • 12 篇 li minghui
  • 11 篇 qin yongbin
  • 11 篇 zhang hongyu

语言

  • 779 篇 英文
  • 46 篇 其他
  • 23 篇 中文
检索条件"机构=Technology Research Center of Big Data and Social Computing"
835 条 记 录,以下是81-90 订阅
排序:
Layered Structure Aware Dependent Microservice Placement Toward Cost Efficient Edge Clouds  42
Layered Structure Aware Dependent Microservice Placement Tow...
收藏 引用
42nd IEEE International Conference on Computer Communications, INFOCOM 2023
作者: Zeng, Deze Geng, Hongmin Gu, Lin Li, Zhexiong China University of Geosciences School of Computer Science Wuhan China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China
Although the containers are featured by light-weightness, it is still resource-consuming to pull and startup a large container image, especially in relatively resource-constrained edge cloud. Fortunately, Docker, as t... 详细信息
来源: 评论
Tensor Graph Convolutional Network for Dynamic Graph Representation Learning  7
Tensor Graph Convolutional Network for Dynamic Graph Represe...
收藏 引用
7th International Symposium on Autonomous Systems, ISAS 2024
作者: Wang, Ling Yuan, Ye The School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China The Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Engineering Research Center of Big Data Application For Smart Cities Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China College of Computer and Information Science Southwest University Chongqing400715 China
Dynamic graphs (DG) represent evolving interactions between entities in various real-world scenarios. Many existing DG representation learning models employ a combination of graph convolutional networks and sequence n... 详细信息
来源: 评论
Demystifying Ethereum account diversity:observations,models and analysis
收藏 引用
Frontiers of Computer Science 2022年 第4期16卷 119-130页
作者: Chaofan Wang Xiaohai Dai Jiang Xiao Chenchen Li Ming Wen Bingbing Zhou Hai Jin Clusters and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China Centre for Distributed and High Performance Computing School of Information TechnologiesThe University of SydneyCamperdownNew South Wales2006Australia
Blockchain platform Ethereum has involved millions of accounts due to its strong potential for providing numerous services based on smart *** massive accounts can be divided into diverse categories,such as miners,toke... 详细信息
来源: 评论
LESaET: Low-Dimensional Embedding Method for Link Prediction Combining Self-Attention and Enhanced-TuckER
LESaET: Low-Dimensional Embedding Method for Link Prediction...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Ding, Lichao Zhao, Jing Lu, Kai Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Knowledge graphs (KGs) provide a structured representation of the real world through entity-relation triples. However, current KGs are often incomplete, typically containing only a small fraction of all possible facts... 详细信息
来源: 评论
Dispatcher: Resource-aware Nakamoto Blockchain via Hierarchical Topology and Adaptive Incentives
收藏 引用
Distributed Ledger Technologies: research and Practice 2024年 第2期3卷 1-20页
作者: Hai Jin Shuohua Dong Xiaohai Dai Yuandi Cai Jiang Xiao National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Mainstream blockchain systems such as Bitcoin and Ethereum are revolutionizing the financial industry by adopting the Nakamoto consensus protocol, i.e., Proof-of-Work (PoW). Only nodes with sufficient computing resour... 详细信息
来源: 评论
A Study on a Reduced Indicator System for the Network Security Situational Assessment Model
A Study on a Reduced Indicator System for the Network Securi...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Zhang, Hongbin Bai, Yikang Zhao, Dongmei Liu, Bin Xu, Ying Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China
It is a challenge to monitor the network security state in a large-scale network environment because the selection of situation assessment indicators is overrun by massive observational information. To address this is... 详细信息
来源: 评论
A Fine-Grained Anomaly Detection Method Fusing Isolation Forest and Knowledge Graph Reasoning  19th
A Fine-Grained Anomaly Detection Method Fusing Isolation For...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Xu, Jie Zhou, Jiantao College of Computer Science Engineering Research Center of Ecological Big Data Ministry of Education National and Local Joint Engineering Research Center of Mongolian Intelligent Information Processing Technology Inner Mongolia Cloud Computing and Service Software Engineering Laboratory Inner Mongolia Social Computing and Data Processing Key Laboratory Inner Mongolia Discipline Inspection and Supervision Big Data Key Laboratory Inner Mongolia Big Data Analysis Technology Engineering Laboratory Inner Mongolia University Hohhot China
Anomaly detection aims to find outliers data that do not conform to expected behaviors in a specific scenario, which is indispensable and critical in current safety environments related studies. However, when performi... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
Abnormal Clustering and Cross Slicing Transformer for Insect Fine-Grained Image Classification
Abnormal Clustering and Cross Slicing Transformer for Insect...
收藏 引用
Algorithm, Image Processing and Machine Vision (AIPMV), International Conference on
作者: Aokun Mei Hua Huo Big Data Analysis Laboratory of Henan Medical Big Data and Computing Intelligence Engineering Technology Research Center School of Information Engineering Henan University of Science and Technology Luoyang China
Insect fine-grained image classification is an application scenario in fine-grained image classification. It not only has the characteristics of small inter-class differences and large intra-class differences, but als... 详细信息
来源: 评论
OpticE: A Coherence Theory-Based Model for Link Prediction  29
OpticE: A Coherence Theory-Based Model for Link Prediction
收藏 引用
29th International Conference on Computational Linguistics, COLING 2022
作者: Gui, Xiangyu Zhao, Feng Jin, Langjunqing Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Knowledge representation learning is a key step required for link prediction tasks with knowledge graphs (KGs). During the learning process, the semantics of each entity are embedded by a vector or a point in a featur... 详细信息
来源: 评论