咨询与建议

限定检索结果

文献类型

  • 273 篇 期刊文献
  • 260 篇 会议

馆藏范围

  • 533 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 227 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 50 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 32 篇 电气工程
    • 27 篇 化学工程与技术
    • 26 篇 机械工程
    • 25 篇 生物工程
    • 24 篇 光学工程
    • 23 篇 仪器科学与技术
    • 17 篇 材料科学与工程(可...
    • 12 篇 生物医学工程(可授...
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
    • 11 篇 环境科学与工程(可...
    • 10 篇 动力工程及工程热...
    • 9 篇 航空宇航科学与技...
  • 195 篇 理学
    • 83 篇 数学
    • 76 篇 物理学
    • 32 篇 化学
    • 31 篇 生物学
    • 28 篇 系统科学
    • 24 篇 统计学(可授理学、...
  • 82 篇 管理学
    • 47 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 25 篇 医学
    • 20 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 10 篇 药学(可授医学、理...
  • 10 篇 法学
  • 6 篇 艺术学
  • 5 篇 经济学
  • 5 篇 农学
  • 2 篇 教育学

主题

  • 17 篇 computational mo...
  • 15 篇 semantics
  • 9 篇 data models
  • 8 篇 analytical model...
  • 8 篇 solid modeling
  • 7 篇 mathematical mod...
  • 6 篇 optimization
  • 6 篇 cloud computing
  • 6 篇 training
  • 5 篇 reliability
  • 5 篇 authentication
  • 5 篇 visualization
  • 5 篇 feature extracti...
  • 5 篇 remote sensing
  • 5 篇 machine learning
  • 5 篇 natural language...
  • 5 篇 artificial intel...
  • 4 篇 internet of thin...
  • 4 篇 knowledge based ...
  • 4 篇 deep learning

机构

  • 63 篇 beijing institut...
  • 53 篇 school of comput...
  • 41 篇 beijing engineer...
  • 25 篇 university of ch...
  • 15 篇 chengdu institut...
  • 11 篇 school of comput...
  • 10 篇 kavli institute ...
  • 10 篇 yanqi lake beiji...
  • 10 篇 science and tech...
  • 10 篇 beijing simulati...
  • 9 篇 state key labora...
  • 8 篇 national astrono...
  • 8 篇 department of co...
  • 8 篇 school of astron...
  • 7 篇 department of as...
  • 7 篇 school of comput...
  • 7 篇 shanghai astrono...
  • 7 篇 department of ph...
  • 7 篇 graduate school ...
  • 7 篇 kamioka branch n...

作者

  • 36 篇 huang heyan
  • 17 篇 heyan huang
  • 13 篇 kimura n.
  • 13 篇 ohkawa m.
  • 13 篇 miyoki s.
  • 13 篇 oohara k.
  • 13 篇 hayama k.
  • 13 篇 aso y.
  • 13 篇 kokeyama k.
  • 13 篇 cannon k.
  • 13 篇 morisaki s.
  • 13 篇 michimura y.
  • 13 篇 nakano h.
  • 12 篇 sato s.
  • 12 篇 lejian liao
  • 12 篇 mao xian-ling
  • 11 篇 takahashi h.
  • 11 篇 suzuki t.
  • 11 篇 tagoshi h.
  • 11 篇 mio n.

语言

  • 486 篇 英文
  • 36 篇 其他
  • 13 篇 中文
检索条件"机构=Beijing Institute of Computer Applications and Simulation Technology"
533 条 记 录,以下是491-500 订阅
排序:
Study on Parallel Computing
收藏 引用
Journal of computer Science & technology 2006年 第5期21卷 665-673页
作者: 陈国良 孙广中 张云泉 莫则尧 Anhui Province-MOST Key Co-Lab of High Performance Computing and Its Applications Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 P.R. China Laboratory of Parallel Computing Institute of Software Chinese Academy of Sciences Beijing 100080 P.R. China Laboratory of Computational Physics Institute of Applied Physics and Computational Mathematics Beijing 100088 P.R. China
In this paper, we present a general survey on parallel computing. The main contents include parallel computer system which is the hardware platform of parallel computing, parallel algorithm which is the theoretical ba... 详细信息
来源: 评论
A CLASS OF TWO-STEP CONTINUITY RUNGE-KUTTA METHODS FOR SOLVING SINGULAR DELAY DIFFERENTIAL EQUATIONS AND ITS STABILITY ANALYSIS
收藏 引用
Journal of Computational Mathematics 2005年 第6期23卷 647-656页
作者: Xin Leng De-gui Liu Xiao-qiu Song Li-rong Chen Beijing Institute of Computer Application and Simulation Technology 100854 China Beijing Institute of Applied Physics and Computational Mathematics 100088 China
In this paper, a class of two-step continuity Runge-Kutta(TSCRK) methods for solving singular delay differential equations(DDEs) is presented. Analysis of numerical stability of this methods is given. We consider ... 详细信息
来源: 评论
Illustrative visualization
Illustrative visualization
收藏 引用
VIS 05: IEEE Visualization 2005, Proceedings
作者: Viola, Ivan Gröller, Meister E. Hadwiger, Markus Bühler, Katja Preim, Bernhard Sousa, Mario Costa Ebert, David S. Stredney, Don Kanitsar, Armin Bruckner, Stefan Grimm, Sören Svakhine, Nikolai A. Jang, Yun Gaithert, Kelly Tietjen, Christian Krüger, Arno Peitgen, Heinz-Otto Isenberg, Tobias Hintze, Jana Hertel, Ilka Strauß, Gero Institute of Computer Graphics and Algorithms Vienna University of Technology Austria VRVis Research Center Vienna Austria Department of Simulation and Graphics University of Magdeburg Germany Department of Computer Science University of Calgary Canada School of Electrical and Computer Engineering Purdue University United States Ohio Supercomputer Center United States Institute of Computer Graphics and Algorithms Vienna University of Technology Austria VRVis Research Center Vienna Austria Electrical and Computer Engineering Purdue University United States IEEE Austria Department of Computer Science University of Calgary Canada Department of Computer Science Computer Graphics Research Lab. University of Calgary Canada Purdue University United States Ohio Supercomputer Center United States University of Texas Austin United States Interface Laboratory United States Biomedical Applications United States Department of Simulation and Graphics Otto-von-Guericke-University of Magdeburg Germany Otto-von-Guericke-University of Magdeburg FIN/ISG Germany Institute for Simulation and Graphics Department for Computer Science Otto-von-Guericke-University of Magdeburg Universitaetsplatz 2 39106 Magdeburg Germany Center for Medical Diagnosic Systems and Visualization Universitaetsallee 29 28359 Bremen Germany Department of Simulation and Graphics Otto-von-Guericke University of Magdeburg Germany ENT Department University Hospital of Leipzig Germany
The tutorial presents state-of-the-art visualization techniques inspired by traditional technical and medical illustrations. Such techniques exploit the perception of the human visual system and provide effective visu... 详细信息
来源: 评论
Soil moisture retrieval from MODIS data in northern china plain using thermal inertia model (SoA-TI)
Soil moisture retrieval from MODIS data in northern china pl...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Guoyin Cai Jian Wu Yong Xue Yincui Hu Jianping Guo Jiakui Tang State Key Laboratory of Remote Sensing Science Jointly Sponsored by the Institute of Remote Sensing Applications of Chinese Academy of Sciences Institute of Remote Sensing Applications Chinese Academy of Sciences Beijing Normal University Beijing China Department of Computer Science Beijing Information Technology College Beijing China Department of Computing London Metropolitan University London UK
来源: 评论
The recent research on virtual prototyping engineering for complex products
The recent research on virtual prototyping engineering for c...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Bo Hu Li Xudong Chai Wenhai Zhu Yanqiang Di Xiao Song Xuefeng Yan Peng Wang Baocun Hou Gouqiang Shi Xiaohua Wang Beijing Aeronautics and Astronautics University Beijing China Beijing Simulation Center Beijing China CS Department Beijing Institute of Technology Beijing China Computer Science & Technology Institute Harbin Institute of Technology Harbin China
In recent years, based on the previous research work, "virtual prototyping engineering for complex product (CPVPE)" project, combined with current technology developments and application requirements, is fur... 详细信息
来源: 评论
Distributed ids tracing back to attacking sources
收藏 引用
2nd International Workshop on Grid and Cooperative Computing, GCC 2003
作者: Liu, Wu Duan, Hai-Xin Wu, Jian-Ping Ren, Ping Lu, Li-Hua Chengdu Institute of Computer Applications Chinese Academy of Sciences Chengdu610041 China Network Research Center of Tsinghua University Beijing100084 China Sichuan Agricultural University DujiangyanSichuan611830 China Business Management School of Sichuan University Chengdu610064 China Electronic Science and Technical College National University of Defense Technology Changsha410073 China
In this paper we present robust algorithms of transmission and reconstruction of attacking path(s) in IDS for providing traceback information in IP packets without requiring interactive operational support from Intern... 详细信息
来源: 评论
Class of modified parallel combined methods of real-time numerical simulation for a stiff system
收藏 引用
Chinese Journal of Systems Engineering and Electronics 2004年 第3期000卷
A class of modified parallel combined methods of real-time numerical simulation are presented for a stiff dynamic system. By combining the parallelism across the system with the parallelism across the method, and rela... 详细信息
来源: 评论
Shift visual cryptography scheme of two secret images
收藏 引用
自然科学进展(英文版) 2003年 第6期13卷 457-463页
作者: WANG Daoshun LUO Ping YANG Lu Qi Dongxu Dai Yiqi Department of Computer Science and Technology Tsinghua University Beijing 100084 China Chengdu Institute of Computer Applications Chinese Academy of Sciences Chengdu 610041 China School of Information Science and Technology Zhongshan University Guangzhou 510275 China
A new visual cryptography scheme of two secret images, which is named the shift visual cryptography of two secret images, is given. The compound function family of a general construction model is also introduced. The ... 详细信息
来源: 评论
A new method for classification and segmentation of the textured images
A new method for classification and segmentation of the text...
收藏 引用
Picture Coding Symposium
作者: Wang, Yao-Wei Wang, Yan-Fei Gao, Wen Xue, Yong Institute of Computer and Technology Chinese Academy of Sciences Beijing 100080 China Lab. of Remote Sensing Info. Sci. Inst. of Remote Sensing Applications Chinese Academy of Sciences PO Box 9718 Beijing 100101 China Department of Computing London Metropolitan University 166-220 Holloway Road London N7 8DB United Kingdom
Texture provides a very useful cue for retrieving images from a database. Many objects can be recognized based on their distinctive texture patterns. In this paper, we propose a new method, called the regularized simu... 详细信息
来源: 评论
Wavelet-based analysis of network security databases
收藏 引用
International Conference on Communication technology (ICCT)
作者: Wu Liu Haixin Duan Peng Wang Jianping Wu Lu Yang Department of Computer Science and technology Sichuan Agricultural University Dujiangyan China Network Research Center Tsinghua University Beijing China Chengdu Institute of Computer Applications Chinese Academy and Sciences Chengdu China
The phenomenal increase in the amounts of network security data are due to the hacker attacks, virus, worm and Shapper etc. Network security log file databases are very important in computer forensics. From researches... 详细信息
来源: 评论