咨询与建议

限定检索结果

文献类型

  • 10,058 篇 会议
  • 276 篇 期刊文献
  • 36 册 图书
  • 2 篇 科技报告

馆藏范围

  • 10,372 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,280 篇 工学
    • 5,756 篇 计算机科学与技术...
    • 3,610 篇 软件工程
    • 1,367 篇 信息与通信工程
    • 1,287 篇 电气工程
    • 909 篇 控制科学与工程
    • 831 篇 电子科学与技术(可...
    • 465 篇 机械工程
    • 462 篇 生物工程
    • 387 篇 光学工程
    • 370 篇 动力工程及工程热...
    • 364 篇 生物医学工程(可授...
    • 290 篇 仪器科学与技术
    • 261 篇 化学工程与技术
    • 239 篇 交通运输工程
    • 232 篇 网络空间安全
    • 205 篇 材料科学与工程(可...
    • 187 篇 土木工程
    • 184 篇 安全科学与工程
    • 183 篇 建筑学
  • 2,754 篇 理学
    • 1,405 篇 数学
    • 872 篇 物理学
    • 503 篇 生物学
    • 358 篇 统计学(可授理学、...
    • 345 篇 化学
    • 240 篇 系统科学
  • 1,334 篇 管理学
    • 820 篇 管理科学与工程(可...
    • 630 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 445 篇 医学
    • 346 篇 临床医学
    • 192 篇 基础医学(可授医学...
  • 184 篇 教育学
  • 141 篇 法学
  • 124 篇 经济学
  • 48 篇 农学
  • 41 篇 军事学
  • 31 篇 文学
  • 10 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 1,025 篇 program processo...
  • 727 篇 computer archite...
  • 418 篇 computational mo...
  • 384 篇 hardware
  • 343 篇 high performance...
  • 260 篇 parallel process...
  • 238 篇 computer science
  • 192 篇 optimization
  • 171 篇 benchmark testin...
  • 164 篇 concurrent compu...
  • 163 篇 application soft...
  • 159 篇 runtime
  • 156 篇 computer vision
  • 149 篇 bandwidth
  • 129 篇 registers
  • 129 篇 libraries
  • 129 篇 deep learning
  • 122 篇 parallel program...
  • 120 篇 scalability
  • 120 篇 throughput

机构

  • 69 篇 college of compu...
  • 57 篇 school of comput...
  • 55 篇 university of ch...
  • 44 篇 school of comput...
  • 33 篇 department of co...
  • 32 篇 college of compu...
  • 31 篇 univ chinese aca...
  • 30 篇 school of comput...
  • 30 篇 tsinghua univers...
  • 27 篇 school of comput...
  • 25 篇 school of data a...
  • 23 篇 college of compu...
  • 23 篇 computer network...
  • 23 篇 high energy astr...
  • 22 篇 graduate school ...
  • 21 篇 graduate school ...
  • 21 篇 college of compu...
  • 20 篇 center for astro...
  • 20 篇 department of ph...
  • 20 篇 department of ph...

作者

  • 25 篇 tokuno h.
  • 24 篇 ikeda d.
  • 23 篇 belz j.w.
  • 22 篇 jui c.c.h.
  • 22 篇 oshima a.
  • 22 篇 tsuda r.
  • 22 篇 kim j.h.
  • 22 篇 bergman d.r.
  • 22 篇 allen m.
  • 22 篇 matsuyama t.
  • 22 篇 wong t.
  • 22 篇 ishii t.
  • 22 篇 kim s.w.
  • 22 篇 takamura m.
  • 22 篇 yashiro k.
  • 22 篇 kadota k.
  • 22 篇 mayta r.
  • 22 篇 ozawa s.
  • 22 篇 kasami s.
  • 22 篇 rodriguez d.c.

语言

  • 9,909 篇 英文
  • 422 篇 其他
  • 53 篇 中文
  • 3 篇 西班牙文
  • 2 篇 土耳其文
  • 1 篇 葡萄牙文
检索条件"任意字段=Conference on High Performance Computer Modernization Program"
10372 条 记 录,以下是4461-4470 订阅
排序:
Virtual Machine Introspection for Anomaly-Based Keylogger Detection
Virtual Machine Introspection for Anomaly-Based Keylogger De...
收藏 引用
IEEE Workshop on high performance Switching and Routing
作者: Huseyn Huseynov Kenichi Kourai Tarek Saadawi Obinna Igbe Department of Electrical Engineering City University of New York City College New York United States Department of Computer Science and Networks Kyushu Institute of Technology Fukuoka Japan
Software Keyloggers are dominant class of malicious applications that surreptitiously logs all the user activity to gather confidential information. Among many other types of keyloggers, API-based keyloggers can prete... 详细信息
来源: 评论
CCGraph: a PDG-based code clone detector with approximate graph matching
CCGraph: a PDG-based code clone detector with approximate gr...
收藏 引用
IEEE International conference on Automated Software Engineering (ASE)
作者: Yue Zou Bihuan Ban Yinxing Xue Yun Xu Key Laboratory on High Performance Computing Anhui Province School of Computer Science and Technology University of Science and Technology of China Hefei China
Software clone detection is an active research area, which is very important for software maintenance, bug detection, etc. The two pieces of cloned code reflect some similarities or equivalents in the syntax or struct... 详细信息
来源: 评论
Exploring the Relationship Between Collaborative Discourse, programming Actions, and Cybersecurity and Computational Thinking Knowledge
Exploring the Relationship Between Collaborative Discourse, ...
收藏 引用
IEEE International conference on Teaching, Assessment and Learning for Engineering (TALE)
作者: Bernard Yett Caitlin Snyder Nicole Hutchins Gautam Biswas Institute for Software Integrated Systems Vanderbilt University Nashville USA
Computational thinking (CT) skills are necessary for solving the real-world problems of today and are therefore being incorporated into K-12 curricula. Cybersecurity is of similar importance; however, it can be diffic... 详细信息
来源: 评论
Automatic computer Aided System for Lung Cancer in Chest CTs Using MD-RFCN Combined with Tri-Level Region Proposal Network  17
Automatic Computer Aided System for Lung Cancer in Chest CTs...
收藏 引用
17th IEEE International conference on Industrial Informatics (INDIN)
作者: Masood, Anum Sheng, Bin Li, Ping Yang, Po Kim, Jinman Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai Peoples R China Hong Kong Polytech Univ Dept Comp Kowloon Hong Kong Peoples R China Liverpool John Moores Univ Dept Comp Sci Liverpool Merseyside England Univ Sydney Sch Informat Technol Sydney NSW Australia
Pulmonary cancer is one of the major causes of deaths caused by cancer around the globe. Early stage lung cancer detection can prove to be essential for the patients, for which the computed tomography (CT) images are ... 详细信息
来源: 评论
Dynamic remote attestation service for virtual machine on the IaaS cloud platform  3
Dynamic remote attestation service for virtual machine on th...
收藏 引用
3rd Annual International conference on Network and Information Systems for computers, ICNISC 2017
作者: Zhou, Huaizhe Ba, Haihe Ren, Jiangchun Chen, Yong Wang, Yongjun Wang, Zhiying College of Computer National University of Defense Technology Changsha Hunan410073 China
While the Infrastructure-as-a-Service (IaaS) cloud computing model has become a compelling computing solution, the security concerns on the data and application integrity in the virtual machines (VMs) have drastically... 详细信息
来源: 评论
Scale-aware camera localization in 3D LiDAR maps with a monocular visual odometry
Scale-aware camera localization in 3D LiDAR maps with a mono...
收藏 引用
conference on computer Animation and Social Agents (CASA)
作者: Sun, Manhui Yang, Shaowu Liu, Henzhu Natl Univ Def Technol Coll Comp State Key Lab High Performance Comp Changsha 410073 Hunan Peoples R China
Localization information is essential for mobile robot systems in navigation tasks. Many visual-based approaches focus on localizing a robot within prior maps acquired with cameras. It is critical where the Global Pos... 详细信息
来源: 评论
Adaptive hybrid projective models for aerial video stitching  6
Adaptive hybrid projective models for aerial video stitching
收藏 引用
6th International conference on Systems and Informatics, ICSAI 2019
作者: Xi, Runping Han, Tianyi Zhang, Yaqing Han, Qianqian Natl. Engineering Laboratory of Integrated Aero-Space-Ground-Ocean Big Data Application Technology Shaanxi Provincial Key Laboratory of Speech Image Information Processing School of Computer Science Northwestern Polytechnical University Xi'an China
Aerial video stitching has been widely used in many fields such as large-scale videos surveillance, disaster monitoring and unmanned aerial vehicle (UAV) navigation. Ghosting and parallax are challenging problems when... 详细信息
来源: 评论
high-speed Railway Fastener Detection Using Minima Significant Region and Local Binary Patterns  4
High-speed Railway Fastener Detection Using Minima Significa...
收藏 引用
2019 4th Annual International conference on Information System and Artificial Intelligence, ISAI 2019
作者: Fan, Hong Xiong, Ying Fei, Yaodong Southwest Jiaotong University School of Mechanical Engineering Chengdu610031 China
Railway fastener is an important part of the railway system. Keeping the fasteners effective is essential to ensure the safe operation of the railway, so abnormal railway fastener detection is a main task of railway m... 详细信息
来源: 评论
Retrieval by classification: Discriminative binary embedding for sketch-based image retrieval  2nd
Retrieval by classification: Discriminative binary embedding...
收藏 引用
2nd Chinese conference on Pattern Recognition and computer Vision, PRCV 2019
作者: Shi, Yufeng You, Xinge Wang, Wenjie Zheng, Feng Peng, Qinmu Wang, Shuo School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan China Research Institute of Huazhong University of Science and Technology in Shenzhen Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
Sketch-based image retrieval (SBIR) intends to use free-hand sketch drawings as query to retrieve correlated real-world images from database. Hashing based methods gradually become the mainstream approaches in SBIR wi... 详细信息
来源: 评论
Predicting Survived and Killed Mutants
Predicting Survived and Killed Mutants
收藏 引用
IEEE International conference on Software Testing Verification and Validation Workshop, ICSTW
作者: Alejandra Duque-Torres Natia Doliashvili Dietmar Pfahl Rudolf Ramler Institute of Computer Science University of Tartu Tartu Estonia Software Competence Center Hagenberg GmbH Hagenberg Austria
Mutation Testing (MT) is a state-of-the-art technique for assessing test suite effectiveness. The MT principle is to inject variants, known as mutants, into the System Under Test (SUT). Then, the behaviour of the orig... 详细信息
来源: 评论