咨询与建议

限定检索结果

文献类型

  • 426 篇 期刊文献
  • 410 篇 会议

馆藏范围

  • 836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 515 篇 工学
    • 391 篇 计算机科学与技术...
    • 305 篇 软件工程
    • 103 篇 信息与通信工程
    • 82 篇 电气工程
    • 77 篇 生物工程
    • 66 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 36 篇 交通运输工程
    • 31 篇 机械工程
    • 29 篇 生物医学工程(可授...
    • 25 篇 光学工程
    • 24 篇 化学工程与技术
    • 22 篇 网络空间安全
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 13 篇 材料科学与工程(可...
  • 269 篇 理学
    • 137 篇 数学
    • 88 篇 生物学
    • 44 篇 物理学
    • 41 篇 统计学(可授理学、...
    • 28 篇 化学
    • 17 篇 系统科学
  • 148 篇 管理学
    • 85 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 34 篇 医学
    • 26 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
  • 20 篇 法学
    • 14 篇 社会学
  • 9 篇 经济学
  • 6 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 28 篇 semantics
  • 26 篇 training
  • 25 篇 computational mo...
  • 25 篇 feature extracti...
  • 21 篇 deep learning
  • 18 篇 accuracy
  • 15 篇 data models
  • 14 篇 task analysis
  • 14 篇 memory managemen...
  • 14 篇 contrastive lear...
  • 14 篇 predictive model...
  • 14 篇 machine learning
  • 13 篇 costs
  • 13 篇 codes
  • 12 篇 graph neural net...
  • 11 篇 scalability
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...
  • 11 篇 convolution
  • 11 篇 optimization

机构

  • 132 篇 national enginee...
  • 102 篇 national enginee...
  • 75 篇 college of compu...
  • 61 篇 school of comput...
  • 51 篇 school of cyber ...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 huazhong univers...
  • 29 篇 services computi...
  • 28 篇 shenzhen univers...
  • 27 篇 cluster and grid...
  • 26 篇 hubei key labora...
  • 20 篇 national enginee...
  • 19 篇 zhejiang lab
  • 18 篇 school of comput...
  • 18 篇 shenzhen institu...
  • 18 篇 school of softwa...
  • 15 篇 guangdong provin...
  • 15 篇 school of inform...
  • 13 篇 huazhong univers...

作者

  • 130 篇 jin hai
  • 129 篇 hai jin
  • 43 篇 xiaofei liao
  • 39 篇 shen linlin
  • 28 篇 liao xiaofei
  • 25 篇 li jianqiang
  • 24 篇 long zheng
  • 23 篇 hu shengshan
  • 21 篇 haikun liu
  • 17 篇 yu zhang
  • 17 篇 linlin shen
  • 16 篇 zou deqing
  • 16 篇 zhang leo yu
  • 16 篇 yu huang
  • 15 篇 li tianrui
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 13 篇 jiang xiao
  • 13 篇 li minghui
  • 12 篇 zhou ziqi

语言

  • 757 篇 英文
  • 69 篇 其他
  • 13 篇 中文
检索条件"机构=The National Engineering Laboratory for Big Data System Computing Technology"
836 条 记 录,以下是321-330 订阅
排序:
Joint Sparsification and Quantization for Wireless Federated Learning under Communication Constraints  24
Joint Sparsification and Quantization for Wireless Federated...
收藏 引用
24th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2023
作者: Su, Junshen Wang, Xijun Chen, Xiang Cheng, Ray-Guang Sun Yat-Sen University School of Electronics and Information Technology Guangzhou China The Chinese University of HongKong Guangdong Provincial Key Laboratory of Big Data Computing Shenzhen China National Taiwan University of Science and Technology Department of Electronic and Computer Engineering Taipei Taiwan
Communication efficiency is one of the key bottlenecks in Federated Learning (FL). Compression techniques, such as sparsification and quantization, are used to reduce communication overhead. However, joint designs of ... 详细信息
来源: 评论
Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification
Stealthy Backdoor Attack Towards Federated Automatic Speaker...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Longling Zhang Lyqi Liu Dan Meng Jun Wang Shengshan Hu School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security OPPO Research Institute China
Automatic speech verification (ASV) authenticates individuals based on distinct vocal patterns, playing a pivotal role in many applications such as voice-based unlocking systems for devices. The ASV system comprises t...
来源: 评论
Diabetes Mellitus Type 2 data Sharing system Based on Blockchain and Attribute-Encryption
Diabetes Mellitus Type 2 Data Sharing System Based on Blockc...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Weiqi Dai Zhenhui Lu Xia Xie Duoqiang Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
Medical data sharing can improve the quality of medical care and promote progress in the field of public health. However, medical data has high confidentiality and complexity. Taking the clinical diagnosis and treatme... 详细信息
来源: 评论
Shared Incentive system for Clinical Pathway Experience
Shared Incentive System for Clinical Pathway Experience
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Weiqi Dai Wenhao Zhao Xia Xie Song Wu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
The phenomenon of unbalanced regional medical resources has led to large differences in the implementation experience of clinical pathways in hospitals with different medical levels. However, due to the fear of privac... 详细信息
来源: 评论
A Two-Stage Missing Value Imputation Method Based on Autoencoder Neural Network
A Two-Stage Missing Value Imputation Method Based on Autoenc...
收藏 引用
IEEE International Conference on big data
作者: Jiayin Yu Yulin He Joshua Zhexue Huang College of Computer Science & Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Due to the ubiquitous presence of missing values in real-world datasets, an imputation algorithm can recover the missing values and provide users with a complete dataset that utilizes all the available observed inform... 详细信息
来源: 评论
Random Sample Partition-Based Clustering Ensemble Algorithm for big data
Random Sample Partition-Based Clustering Ensemble Algorithm ...
收藏 引用
IEEE International Conference on big data
作者: Xueqin Du Yulin He Joshua Zhexue Huang College of Computer Science & Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
A novel random sample partition-based clustering ensemble (RSP-CE) algorithm is proposed in this paper to handle the big data clustering problems. There are three key components in RSP-CE algorithm, i.e., generating t... 详细信息
来源: 评论
Whale: Efficient One-to-Many data Partitioning in RDMA-Assisted Distributed Stream Processing systems
Whale: Efficient One-to-Many Data Partitioning in RDMA-Assis...
收藏 引用
Supercomputing Conference
作者: Jie Tan Hanhua Chen Yonghui Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computing Science and Technology Huazhong University of Science and Technology Wuhan China
To process large-scale real-time data streams, existing distributed stream processing systems (DSPSs) leverage different stream partitioning strategies. The one-to-many data partitioning strategy plays an important ro... 详细信息
来源: 评论
Robust UAV Policy Learning for Urban Infrastructure Surface Screening*
Robust UAV Policy Learning for Urban Infrastructure Surface ...
收藏 引用
International Conference on Advanced Robotics and Mechatronics (ICARM)
作者: Bingqing Du Uddin Md. Borhan Tianxing Chen Jianyong Chen Jianqiang Li Jie Chen College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Unmanned Aerial Vehicles (UAVs) have emerged as pivotal tools for infrastructure inspection, mitigating risks to human life and enhancing operational efficiency. Despite advancements, achieving autonomous surface cove... 详细信息
来源: 评论
Research on the Application of Business data Fusion in the engineering Management of Oil and Gas Storage and Transportation Station  4
Research on the Application of Business Data Fusion in the E...
收藏 引用
4th International Conference on Computer Science and Management technology, ICCSMT 2023
作者: Xie, Rui Fan, Bo Ma, Jianlin Pan, Meng Southwest Pipeline Ltd. PipeChina ChengDu610213 China School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu610031 China Chengdu Aerospace Science and Industry Big Data Institute Ltd. Casic Chengdu610213 China National Engineering Laboratory of Industrial Big-Data Application Technology Casic Chengdu610218 China
Due to challenges such as complex contractor personnel, a large amount of scattered form data, a cumbersome business implementation process, low levels of digitalization and security, and difficult management in the e... 详细信息
来源: 评论
Autonomous Emergency Landing on 3D Terrains: Approaches for Monocular Vision-based UAVs
Autonomous Emergency Landing on 3D Terrains: Approaches for ...
收藏 引用
International Conference on Advanced Robotics and Mechatronics (ICARM)
作者: Weiming Du Junmou Lin Binqing Du Uddin Md. Borhan Jianqiang Li Jie Chen College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
With the increasing use of unmanned aerial vehicles (UAVs) in a variety of applications, their safety has become a critical concern. UAVs face numerous emergencies during missions, in these situations, the UAVs need t...
来源: 评论