咨询与建议

限定检索结果

文献类型

  • 415 篇 期刊文献
  • 408 篇 会议

馆藏范围

  • 823 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 503 篇 工学
    • 383 篇 计算机科学与技术...
    • 304 篇 软件工程
    • 97 篇 信息与通信工程
    • 77 篇 生物工程
    • 73 篇 电气工程
    • 58 篇 控制科学与工程
    • 38 篇 电子科学与技术(可...
    • 33 篇 交通运输工程
    • 29 篇 机械工程
    • 29 篇 生物医学工程(可授...
    • 25 篇 光学工程
    • 24 篇 化学工程与技术
    • 18 篇 网络空间安全
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 13 篇 材料科学与工程(可...
  • 261 篇 理学
    • 132 篇 数学
    • 87 篇 生物学
    • 43 篇 物理学
    • 36 篇 统计学(可授理学、...
    • 28 篇 化学
    • 17 篇 系统科学
  • 142 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 33 篇 医学
    • 25 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
    • 11 篇 药学(可授医学、理...
  • 21 篇 法学
    • 15 篇 社会学
  • 9 篇 经济学
  • 6 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 28 篇 semantics
  • 26 篇 training
  • 25 篇 computational mo...
  • 25 篇 feature extracti...
  • 21 篇 deep learning
  • 18 篇 accuracy
  • 15 篇 data models
  • 14 篇 task analysis
  • 14 篇 memory managemen...
  • 14 篇 contrastive lear...
  • 14 篇 predictive model...
  • 14 篇 machine learning
  • 13 篇 costs
  • 13 篇 codes
  • 12 篇 graph neural net...
  • 11 篇 scalability
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...
  • 11 篇 convolution
  • 11 篇 optimization

机构

  • 130 篇 national enginee...
  • 100 篇 national enginee...
  • 74 篇 college of compu...
  • 61 篇 school of comput...
  • 51 篇 school of cyber ...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 huazhong univers...
  • 29 篇 services computi...
  • 27 篇 cluster and grid...
  • 27 篇 shenzhen univers...
  • 26 篇 hubei key labora...
  • 20 篇 national enginee...
  • 18 篇 school of comput...
  • 18 篇 shenzhen institu...
  • 18 篇 school of softwa...
  • 18 篇 zhejiang lab
  • 15 篇 guangdong provin...
  • 15 篇 school of inform...
  • 12 篇 hubei key labora...

作者

  • 126 篇 jin hai
  • 123 篇 hai jin
  • 43 篇 xiaofei liao
  • 40 篇 shen linlin
  • 26 篇 liao xiaofei
  • 24 篇 li jianqiang
  • 23 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 17 篇 yu zhang
  • 17 篇 linlin shen
  • 16 篇 zou deqing
  • 16 篇 zhang leo yu
  • 15 篇 li tianrui
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 li minghui
  • 12 篇 zhou ziqi

语言

  • 747 篇 英文
  • 66 篇 其他
  • 13 篇 中文
检索条件"机构=The National Engineering Laboratory for Big Data System Computing Technology"
823 条 记 录,以下是211-220 订阅
排序:
Biogas Fermentation Monitoring Research Based on Borderline-SMOTE Algorithm and Stacking Ensemble Learning  13
Biogas Fermentation Monitoring Research Based on Borderline-...
收藏 引用
13th International Conference of Information and Communication technology, ICTech 2024
作者: Xiu, Pengfei Fu, Lijun Sun, Yukun Wang, Hongliang Li, Xuerao Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China Shandong University Big Data Technology and Cognitive Intelligence Laboratory University of Chinese Academy of Sciences Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China
Anaerobic fermentation is the most important link to gas production, this paper solves the current problem with the help of the current complete machine learning technology, combining perception and intelligent proces... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
ACGraph: Accelerating Streaming Graph Processing via Dependence Hierarchy  23
ACGraph: Accelerating Streaming Graph Processing via Depende...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Zihan Jiang Fubing Mao Yapu Guo Xu Liu Haikun Liu Xiaofei Liao Hai Jin Wei Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Electronic and Computer Engineering HKUST Hong Kong
Streaming graph processing needs to timely evaluate continuous queries. Prior systems suffer from massive redundant computations due to the irregular order of processing vertices influenced by updates. To address this... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
A Real-time Demonstration of Bidirectional Multiformat/Rate-adjustable Integrated Laser Communication/Ranging for Satellite Communication
A Real-time Demonstration of Bidirectional Multiformat/Rate-...
收藏 引用
CLEO: Science and Innovations in CLEO 2024, CLEO: S and I 2024 - Part of Conference on Lasers and Electro-Optics
作者: Wang, Yizhou Wang, Yuanxiang Luo, Zhen Zhong, Linsheng Zou, Yang Ao, Xueyuan Liu, Jiale Fan, Feng Li, Xiaoliang Dai, Xiaoxiao Yang, Qi Liu, Deming National Engineering Laboratory for Next Generation Internet Access System School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science andEngineering Huazhong University of Science and Technology Wuhan430074 China Beijing Research Institute of Telemetry Beijing100094 China Jinyinhu Laboratory Wuhan430040 China
A multi-format/rate-adjustable integrated laser communication/ranging system is proposed, achieving adjustable rates between 0.625-10Gbit/s. Real-time experiment shows that at 1e-4 BER the ranging error is only 0.29% ... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
PSMiner: A Pattern-Aware Accelerator for High-Performance Streaming Graph Pattern Mining  23
PSMiner: A Pattern-Aware Accelerator for High-Performance St...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Hao Qi Yu Zhang Ligang He Kang Luo Jun Huang Haoyu Lu Jin Zhao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China and Zhejiang-HUST Joint Research Center for Graph Processing Zhejiang Lab China Department of Computer Science University of Warwick United Kingdom
Streaming Graph Pattern Mining (GPM) has been widely used in many application fields. However, the existing streaming GPM solution suffers from many unnecessary explorations and isomorphism tests, while the existing s...
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
arXiv
收藏 引用
arXiv 2025年
作者: Bi, Zhangqian Wan, Yao Chu, Zhaoyang Hu, Yufei Zhang, Junyi Zhang, Hongyu Xu, Guandong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论
MeG2: In-Memory Acceleration for Genome Graphs Analysis
MeG2: In-Memory Acceleration for Genome Graphs Analysis
收藏 引用
Design Automation Conference
作者: Yu Huang Long Zheng Haifeng Liu Zhuoran Zhou Dan Chen Pengcheng Yao Qinggang Wang Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China
Genome graphs analysis has emerged as an effective means to enable mapping DNA fragments (known as reads) to the reference genome. It replaces the traditional linear reference with a graph-based representation to augm...
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
How to Select Pre-Trained Code Models for Reuse? A Learning ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Zhangqian Bi Yao Wan Zhaoyang Chu Yufei Hu Junyi Zhang Hongyu Zhang Guandong Xu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论