咨询与建议

限定检索结果

文献类型

  • 1,999 篇 会议
  • 10 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,013 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,633 篇 工学
    • 1,175 篇 计算机科学与技术...
    • 724 篇 软件工程
    • 330 篇 信息与通信工程
    • 239 篇 机械工程
    • 181 篇 材料科学与工程(可...
    • 179 篇 控制科学与工程
    • 153 篇 电气工程
    • 109 篇 电子科学与技术(可...
    • 95 篇 冶金工程
    • 93 篇 化学工程与技术
    • 80 篇 仪器科学与技术
    • 67 篇 力学(可授工学、理...
    • 57 篇 动力工程及工程热...
    • 55 篇 生物医学工程(可授...
    • 53 篇 生物工程
    • 52 篇 土木工程
    • 49 篇 建筑学
    • 44 篇 光学工程
    • 42 篇 交通运输工程
  • 602 篇 理学
    • 362 篇 数学
    • 171 篇 物理学
    • 100 篇 统计学(可授理学、...
    • 80 篇 化学
    • 69 篇 系统科学
    • 62 篇 生物学
  • 463 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 135 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 55 篇 教育学
    • 53 篇 教育学
  • 53 篇 经济学
    • 53 篇 应用经济学
  • 42 篇 农学
  • 41 篇 法学
  • 39 篇 医学
  • 15 篇 文学
  • 10 篇 军事学
  • 9 篇 艺术学

主题

  • 34 篇 educational inst...
  • 32 篇 cloud computing
  • 26 篇 computational mo...
  • 25 篇 genetic algorith...
  • 22 篇 conferences
  • 22 篇 data mining
  • 22 篇 algorithm design...
  • 21 篇 neural networks
  • 21 篇 feature extracti...
  • 20 篇 deep learning
  • 20 篇 mathematical mod...
  • 19 篇 computer archite...
  • 19 篇 servers
  • 19 篇 network security
  • 19 篇 clustering algor...
  • 18 篇 wireless sensor ...
  • 17 篇 vectors
  • 17 篇 neural network
  • 17 篇 computer vision
  • 17 篇 training

机构

  • 9 篇 3-30-1 wajiro-hi...
  • 8 篇 school of comput...
  • 7 篇 beijing key labo...
  • 6 篇 school of comput...
  • 6 篇 kunming universi...
  • 6 篇 national univers...
  • 6 篇 the islamic univ...
  • 5 篇 school of comput...
  • 5 篇 school of inform...
  • 5 篇 college of infor...
  • 5 篇 school of comput...
  • 5 篇 college of infor...
  • 5 篇 college of infor...
  • 5 篇 beijing universi...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 college of compu...
  • 4 篇 school of mathem...
  • 4 篇 college of infor...
  • 4 篇 institute of inf...

作者

  • 8 篇 barolli leonard
  • 7 篇 piao lin hua
  • 6 篇 ikeda makoto
  • 5 篇 kulla elis
  • 5 篇 liu yang
  • 5 篇 xhafa fatos
  • 5 篇 zhang bao li
  • 5 篇 zhao yang
  • 5 篇 li ying
  • 5 篇 li bo
  • 5 篇 zhang jun
  • 5 篇 zhang wei
  • 4 篇 wan ahmad wan fa...
  • 4 篇 kim ji-hwan
  • 4 篇 liu ying
  • 4 篇 park jeong-sik
  • 4 篇 huang lin na
  • 4 篇 xia yao wen
  • 4 篇 tian anhong
  • 4 篇 mei chuan zhi

语言

  • 1,968 篇 英文
  • 38 篇 中文
  • 7 篇 其他
检索条件"任意字段=2013 3rd International Conference on Computer Science and Network Technology, ICCSNT 2013"
2013 条 记 录,以下是71-80 订阅
排序:
LTE Fixed-Point Handover Algorithm For High-Speed Railway Scenario  3
LTE Fixed-Point Handover Algorithm For High-Speed Railway Sc...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Tomasov, Gleb Wu, Muqing Wen, Jingrong Liu, Hui Beijing Univ Posts & Telecommun Beijing Lab Network Syst Architecture & Convergen Beijing Peoples R China
In this paper the innovative fixed-point LTE handover algorithm for the high-speed railway environment is proposed. The handover process effectiveness is researched through the measurement of information gathered by U... 详细信息
来源: 评论
Hierarchical Cognition Cycle: Making Cognitive Radio networks More Intelligent  3
Hierarchical Cognition Cycle: Making Cognitive Radio Network...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Feng, Shuo Wu, Qihui Wang, Jinlong Zheng, Xueqiang Xu, Yuhua Ding, Guoru PLA Univ Sci & Technol Coll Commun Engn Nanjing Jiangsu Peoples R China
Cognitive radio (CR) is viewed as a promising technology that can bring about remarkable improvement in spectrum utilization. Different cognition cycles have been proposed to direct basic research areas in CR. However... 详细信息
来源: 评论
Distributed and Parallel Subarray Beamforming for Near-Field 3D Sonar Imaging  3
Distributed and Parallel Subarray Beamforming for Near-Field...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Han, Yeqiang Fu, Jiabao Zhou, Fan Tian, Xiang Chen, Yaowu Zhejiang Univ Inst Adv Digital Technol & Instrumentat Hangzhou Zhejiang Peoples R China Zhejiang Prov Key Lab Network Multimedia Technol Hangzhou Zhejiang Peoples R China
The computational load is prohibitive in 3D sonar systems for real-time image generation. In the literature, an efficient frequency beamforming method based on the distributed and parallel subarray (DPS) has been intr... 详细信息
来源: 评论
A Double-Layer Sparse Honeycomb Topology for NoC  3
A Double-Layer Sparse Honeycomb Topology for NoC
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Gao, Rong Liu, Feiyang Gu, Huaxi Fu, Xisong Xidian Univ Shenzhen CU Xidian Joint Ctr State Key Lab ISN Xian Peoples R China
network-on-chip (NoC) is emerging as an effective architecture which address the shortcomings of traditional bus based System-on-chip (SoC). Since its better properties, such as the lower power consumption, smaller si... 详细信息
来源: 评论
The Research and Implementation of PCI Express Driver for DSP Based on KeyStone Architecture  3
The Research and Implementation of PCI Express Driver for DS...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Xu, Yong Jiang, Hongxu Liu, Tingshan Zhai, Donglin Lu, Jinyuan Beihang Univ Sch Comp Sci & Engn Beijing Peoples R China China United Network Commun Corp Hebei Branch Shijiazhuang Hebei Peoples R China
As a third-generation universal I/O interconnect technology succeeding ISA and PCI bus, PCI Express has characteristics of lower pin count, higher reliability and faster transfer rate, which makes it a promising prosp... 详细信息
来源: 评论
An EPA-FRT Based Dual-network Platform for Humanoid Robot Control Systems  3
An EPA-FRT Based Dual-network Platform for Humanoid Robot Co...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Lu, Hanrong Wei, Haitao Zheng, Feng Lu, Li Air Force Early Warning Acad Dept Early Warning Intelligence Wuhan Peoples R China Air Force Early Warning Acad Huangpi NCO Sch Wuhan Peoples R China Zhejiang Univ Dept Control Sci & Engn Hangzhou Zhejiang Peoples R China
In order to accomplish complex movements and interact with the environment, humanoid robots are required to be equipped with many motors, servo drivers and sensors to provide enough DOF, achieve fast responses and acq... 详细信息
来源: 评论
A Fast Method for RGB to YCrCb Conversion Based on FPGA  3
A Fast Method for RGB to YCrCb Conversion Based on FPGA
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Jiang, Hongxu Li, Hanqing Liu, Tingshan Zhang, Ping Lu, Jinyuan Beihang Univ Sch Comp Sci & Engn Beijing Peoples R China China United Network Commun Corp Hebei Branch Shijiazhuang Hebei Peoples R China
Both RGB and YCrCb color space are often used in video image processing, along with the wide application of FPGA in the field of video image processing, RGB to YCrCb color space conversion is frequently needed on FPGA... 详细信息
来源: 评论
Research on Developing a Lab Environment for Cross Site Request Forgery Attack and Defense Education in Higher Vocational Colleges  3
Research on Developing a Lab Environment for Cross Site Requ...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Zeng, Huangcun Guangdong Teachers Coll Foreign Language & Arts Dept Informat Technol Guangzhou Guangdong Peoples R China
Cross Site Request Forgery (CSRF) is among the most exploited web security vulnerabilities. Yet it has received comparatively less attention. It's a must for web site administrators to protect their web sites from... 详细信息
来源: 评论
Research on Simulators for Peer-to-Peer Systems  3
Research on Simulators for Peer-to-Peer Systems
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Zhou, Shijie Zhou, Yanghong Luo, Jiaqing Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 610054 Sichuan Peoples R China
Traffics produced by P2P system such as BitTorrent, Skype, etc, has been the primary networking traffic. Peer-to-peer systems can be very large and highly dynamic. Therefore, testing a new algorithm for P2P computing ... 详细信息
来源: 评论
network Simulation and Evaluation for the Size Reduction of a Given Topology  5
Network Simulation and Evaluation for the Size Reduction of ...
收藏 引用
5th international conference on computer science and network technology (iccsnt)
作者: Guan, Linyu Jiao, Bo Huang, Chengdong Li, Bo Huang, Fei Liu, Yinglong Peoples Repb China 3rd Res Inst Minist Publ Secur Key Lab Informat Network Secur Shanghai 20031 Peoples R China Luoyang Elect Equipment Test Ctr Luoyang 471003 Peoples R China
Running on a size-reduction network simulated by a given large-scale topology can obviously enhance the time efficiency. In this paper, we realize the size-reduction using the input extracting of a network simulator a... 详细信息
来源: 评论