咨询与建议

限定检索结果

文献类型

  • 347 篇 会议
  • 331 篇 期刊文献

馆藏范围

  • 678 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 453 篇 工学
    • 346 篇 计算机科学与技术...
    • 297 篇 软件工程
    • 109 篇 信息与通信工程
    • 74 篇 控制科学与工程
    • 68 篇 电气工程
    • 66 篇 生物工程
    • 43 篇 光学工程
    • 42 篇 生物医学工程(可授...
    • 29 篇 电子科学与技术(可...
    • 26 篇 机械工程
    • 20 篇 仪器科学与技术
    • 18 篇 化学工程与技术
    • 18 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 12 篇 安全科学与工程
  • 234 篇 理学
    • 135 篇 数学
    • 69 篇 生物学
    • 49 篇 物理学
    • 45 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 18 篇 化学
  • 155 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 77 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 38 篇 医学
    • 31 篇 临床医学
    • 29 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 22 篇 法学
    • 17 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 6 篇 农学
  • 4 篇 教育学
  • 2 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 30 篇 feature extracti...
  • 27 篇 deep learning
  • 27 篇 training
  • 25 篇 predictive model...
  • 23 篇 semantics
  • 20 篇 data models
  • 18 篇 computational mo...
  • 16 篇 graph neural net...
  • 15 篇 contrastive lear...
  • 14 篇 convolution
  • 13 篇 accuracy
  • 11 篇 reinforcement le...
  • 11 篇 signal processin...
  • 11 篇 speech processin...
  • 11 篇 machine learning
  • 10 篇 analytical model...
  • 10 篇 forecasting
  • 9 篇 object detection
  • 9 篇 anomaly detectio...
  • 9 篇 convergence

机构

  • 34 篇 chongqing key la...
  • 33 篇 national enginee...
  • 32 篇 key laboratory o...
  • 24 篇 school of comput...
  • 23 篇 college of compu...
  • 22 篇 zhejiang univers...
  • 21 篇 zhejiang key lab...
  • 20 篇 engineering rese...
  • 20 篇 xi'an key labora...
  • 18 篇 shaanxi key labo...
  • 17 篇 fujian key labor...
  • 16 篇 university of ch...
  • 15 篇 school of cyber ...
  • 15 篇 guangdong provin...
  • 15 篇 chongqing key la...
  • 14 篇 school of comput...
  • 14 篇 shenzhen institu...
  • 13 篇 peng cheng labor...
  • 13 篇 alibaba group
  • 12 篇 key laboratory o...

作者

  • 27 篇 wang guoyin
  • 22 篇 huang qingming
  • 20 篇 shen linlin
  • 20 篇 xu qianqian
  • 16 篇 chen huajun
  • 15 篇 yang zhiyong
  • 15 篇 miao qiguang
  • 13 篇 wang lihui
  • 12 篇 shang mingsheng
  • 12 篇 xia shuyin
  • 12 篇 zhang ningyu
  • 11 篇 xin luo
  • 11 篇 wang zhongmin
  • 11 篇 cao xiaochun
  • 10 篇 chen yanping
  • 9 篇 liu jun
  • 9 篇 jian-tao zhou
  • 9 篇 shi xiaoyu
  • 9 篇 mingsheng shang
  • 9 篇 li yunan

语言

  • 607 篇 英文
  • 61 篇 其他
  • 24 篇 中文
检索条件"机构=Xi’an Key Laboratory of Big Data and Intelligent Computing"
678 条 记 录,以下是541-550 订阅
排序:
An intelligent Resource Scheduling Method with Edge Channel Deployment for BPM
An Intelligent Resource Scheduling Method with Edge Channel ...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted computing, UIC-ATC
作者: Bowen Liu Wanchun Dou xiaokang Zhou Xuyun Zhang Lianyong Qi Fei Dai Chaochao Chen State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Faculty of Data Science Shiga University Hikone Japan Department of Computing Macquarie University Sydney Australia College of Computer and Software China University of Petroleum (East China) Qingdao China College of Big Data and Intelligent Engineering Southwest Forestry University Kunming China College of Computer Science and Technology Zhejiang University Hangzhou China
Edge computing is a novel computing paradigm that offers kinds of resources at the network edge. In edge computing, terminal users are connected to edge servers via the wireless network and there are various channels ...
来源: 评论
Enhanced Particle Swarm Optimization for Workflow Scheduling in Clouds
Enhanced Particle Swarm Optimization for Workflow Scheduling...
收藏 引用
Symposium of Image, Signal Processing, and Artificial Vision (STSIVA)
作者: Chang Lu Dayu Feng Jie Zhu Haiping Huang Nanjing University of Posts & Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China
As a NP-hard problem, it is always baffling to figure out a scheduling strategy to arrange the interconnected tasks of a workflow on the infinite number of resources in the cloud environment so that the workflow can b... 详细信息
来源: 评论
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail Problems
arXiv
收藏 引用
arxiv 2022年
作者: Hou, Wenzheng Xu, Qianqian Yang, Zhiyong Bao, Shilong He, Yuan Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Alibaba Group Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen China
It is well-known that deep learning models are vulnerable to adversarial examples. Existing studies of adversarial training have made great progress against this challenge. As a typical trait, they often assume that t... 详细信息
来源: 评论
The Temporal Structural Pattern in Scientific Collaborative Behavior from the Perspective of Complex Network  23rd
The Temporal Structural Pattern in Scientific Collaborative...
收藏 引用
23rd International Symposium on Knowledge and Systems Sciences, KSS 2024
作者: Zholdoshbaeva, Elina Zhang, Shuang Liu, Feifan xia, Haoxiang Institute of Systems Engineering Dalian University of Technology No. 2 Linggong Road Liaoning Dalian116024 China Center for Big Data and Intelligent Decision-Making Dalian University of Technology Linggong Road Liaoning Dalian116024 China School of Business East China University of Science and Technology 130 Meilong Road Xuhui District Shanghai200237 China Institute for Advanced Intelligence Dalian University of Technology Linggong Road Liaoning Dalian116024 China Key Laboratory of Social Computing and Cognitive Intelligence Ministry of Education of China Linggong Road Liaoning Dalian116024 China
The rapid advancement of science has underscored the importance of collaboration among scientists. While many studies have explored the structure of collaboration networks, there is a lack of comprehensive quantitativ... 详细信息
来源: 评论
Science as Exploration in a Knowledge Landscape: Tracing Hotspots or Seeking Opportunity?
arXiv
收藏 引用
arxiv 2023年
作者: Liu, Feifan Zhang, Shuang xia, Haoxiang Institute of Systems Engineering Dalian University of Technology No.2 Linggong Road Liaoning Dalian116024 China Center for Big Data and Intelligent Decision-Making Dalian University of Technology Linggong Road Liaoning Dalian116024 China Institute for Advanced Intelligence Dalian University of Technology Linggong Road Liaoning Dalian116024 China Key Laboratory of Social Computing and Cognitive Intelligence Ministry of Education of China Linggong Road Liaoning Dalian116024 China
The selection of research topics by scientists can be viewed as an exploration process conducted by individuals with cognitive limitations traversing a complex cognitive landscape influenced by both individual and soc... 详细信息
来源: 评论
Sample hardness based gradient loss for long-tailed cervical cell detection
arXiv
收藏 引用
arxiv 2022年
作者: Liu, Minmin Li, Xuechen Gao, xiangbo Chen, Junliang Shen, Linlin Wu, Huisi Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence of Robotics of Society Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China University of California Irvine United States
Due to the difficulty of cancer samples collection and annotation, cervical cancer datasets usually exhibit a long-tailed data distribution. When training a detector to detect the cancer cells in a WSI (Whole Slice Im... 详细信息
来源: 评论
Improving Incremental Learning: A Closer Look at the Softmax Function
SSRN
收藏 引用
SSRN 2024年
作者: Zhai, Zheng Zhang, Jiali Wang, Haiyu Wu, Mingxin Yang, Keshun Qiao, xiaoyan Sun, Qiang Beijing Normal University No.18 Jinfeng Road Guangdong Zhuhai519087 China Shandong Technology and Business University Shandong Yantai China Yantai Key Laboratory of Big Data Modeling and Intelligent Computing Shandong China Immersion Technology and Evaluation Shandong Engineering Research Center Shandong China School of Mathematics Sichuan University Chengdu China College of Liberal Arts and Sciences University of Illinois Urbana-Champaign IL United States Department of Statistical Sciences University of Toronto ON Canada Department of Computer Science University of Toronto ON Canada Department of Statistics and Data Science MBZUAI Abu Dhabi United Arab Emirates
This paper investigates the limitations of the widely adopted softmax cross-entropy loss in incremental learning problems. Specifically, we highlight how the shift-invariant property of this loss function can lead to ... 详细信息
来源: 评论
Towards Lightweight and Efficient Distributed Intrusion Detection Framework
Towards Lightweight and Efficient Distributed Intrusion Dete...
收藏 引用
2021 IEEE Global Communications Conference (GLOBECOM)
作者: Shuai Yuan Hongwei Li Rui Zhang Meng Hao Yiran Li Rongxing Lu School of Computer Science and Engineering University of Electronic Science and Technology of China China Chinese Academy of Sciences Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent Technology Chongqing China Faculty of Computer Science University of New Brunswick Canada
Federated learning (FL), as a promising distributed learning paradigm, has put many efforts into distributed intrusion detection systems (IDS), for defending against various malicious attacks, such as SQL injection an... 详细信息
来源: 评论
Mobility-aware Seamless Service Migration and Resource Allocation in Multi-edge IoV Systems
arXiv
收藏 引用
arxiv 2025年
作者: Chen, Zheyi Huang, Sijin Min, Geyong Ning, Zhaolong Li, Jie Zhang, Yan College of Computer and Data Science Fuzhou University Fuzhou350116 China Engineering Research Center of Big Data Intelligence Ministry of Education Fujian Key Laboratory of Network Fuzhou350002 China Computing and Intelligent Information Processing [Fuzhou University Fuzhou350116 China Department of Computer Science Faculty of Environment Science and Economy University of Exeter ExeterEX4 4QF United Kingdom School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China Department of Informatics University of Oslo Oslo0316 Norway
Mobile Edge computing (MEC) offers low-latency and high-bandwidth support for Internet-of-Vehicles (IoV) applications. However, due to high vehicle mobility and finite communication coverage of base stations, it is ha... 详细信息
来源: 评论
A Diverse Biases Non-negative Latent Factorization of Tensors Model for Dynamic Network Link Prediction
A Diverse Biases Non-negative Latent Factorization of Tensor...
收藏 引用
2020 IEEE International Conference on Networking, Sensing and Control, ICNSC 2020
作者: Wu, Xuke Gou, Hang Wu, Hao Wang, Juan Chen, Minzhi Lai, Siyu Computer School China West Normal University Nanchong Sichuan637002 China Chongqing Engineering Research Center of Big Data Application for Smart Cities Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China University of Chinese Academy of Sciences Beijing100049 China Department of Medical Imaging North Sichuan Medical College Nanchong Sichuan637000 China
Dynamic networks vary over time, making it vital to capture networks temporal patterns for predicting missing links with high accuracy. A biased non-negative latent factorization of tensors (BNLFT) model is very effec... 详细信息
来源: 评论