咨询与建议

限定检索结果

文献类型

  • 3,225 篇 会议
  • 3,134 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,443 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,994 篇 工学
    • 2,813 篇 计算机科学与技术...
    • 2,200 篇 软件工程
    • 782 篇 信息与通信工程
    • 537 篇 光学工程
    • 495 篇 生物工程
    • 444 篇 控制科学与工程
    • 440 篇 生物医学工程(可授...
    • 430 篇 电气工程
    • 396 篇 电子科学与技术(可...
    • 199 篇 机械工程
    • 166 篇 化学工程与技术
    • 159 篇 仪器科学与技术
    • 132 篇 材料科学与工程(可...
    • 131 篇 动力工程及工程热...
    • 108 篇 力学(可授工学、理...
    • 107 篇 土木工程
  • 2,541 篇 理学
    • 1,206 篇 数学
    • 1,078 篇 物理学
    • 575 篇 生物学
    • 371 篇 统计学(可授理学、...
    • 278 篇 化学
    • 211 篇 系统科学
  • 941 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 427 篇 图书情报与档案管...
    • 271 篇 工商管理
  • 470 篇 医学
    • 408 篇 临床医学
    • 319 篇 基础医学(可授医学...
    • 197 篇 药学(可授医学、理...
    • 146 篇 公共卫生与预防医...
  • 148 篇 法学
    • 129 篇 社会学
  • 94 篇 经济学
  • 89 篇 农学
  • 70 篇 教育学
  • 18 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 135 篇 computational mo...
  • 127 篇 machine learning
  • 119 篇 deep learning
  • 89 篇 visualization
  • 87 篇 application soft...
  • 79 篇 semantics
  • 78 篇 feature extracti...
  • 76 篇 artificial intel...
  • 75 篇 hardware
  • 74 篇 high performance...
  • 72 篇 training
  • 71 篇 accuracy
  • 70 篇 computer archite...
  • 67 篇 distributed comp...
  • 65 篇 data mining
  • 62 篇 costs
  • 57 篇 image segmentati...
  • 56 篇 algorithm design...
  • 55 篇 predictive model...

机构

  • 56 篇 center on fronti...
  • 45 篇 infn sezione di ...
  • 45 篇 north-west unive...
  • 45 篇 institut univers...
  • 43 篇 national centre ...
  • 43 篇 department of co...
  • 42 篇 tno technical sc...
  • 42 篇 université de st...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 40 篇 dipartimento di ...
  • 40 篇 yerevan physics ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 45 篇 chen a.
  • 45 篇 benoit d.m.
  • 45 篇 ferrara g.
  • 45 篇 ardid m.
  • 45 篇 calvo d.
  • 45 篇 eddymaoui a.
  • 43 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.

语言

  • 5,956 篇 英文
  • 449 篇 其他
  • 39 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center For Visual Computing and Department of Computer Science"
6443 条 记 录,以下是4891-4900 订阅
排序:
Replication-based highly available metadata management for cluster file systems
Replication-based highly available metadata management for c...
收藏 引用
作者: Chen, Zhuan Xiong, Jin Meng, Dan National Research Center for Intelligent Computing Systems Institute of Computing Technology Chinese Academy of Sciences China Graduate University of Chinese Academy of Sciences China Department of Computer Science University of Rochester United States
In cluster file systems, the metadata management is critical to the whole system. Past researches mainly focus on journaling which alone is not enough to provide high-available metadata service. Some others try to use... 详细信息
来源: 评论
Jedule: A tool for visualizing schedules of parallel applications
Jedule: A tool for visualizing schedules of parallel applica...
收藏 引用
International Workshop on Scheduling and Resource Management for Parallel and Distributed Systems
作者: Hunold, Sascha Hoffmann, Ralf Suter, Frédéric International Computer Science Institute Berkeley CA United States Department of Computer Science University of Bayreuth Germany IN2P3 Computing Center CNRS/IN2P3 Lyon-Villeurbanne France
Task scheduling is one of the most prominent problems in the era of parallel computing. We find scheduling algorithms in every domain of computer science, e.g., mapping multiprocessor tasks to clusters, mapping jobs t... 详细信息
来源: 评论
Efficient routing in delay tolerant networks with correlated node mobility
Efficient routing in delay tolerant networks with correlated...
收藏 引用
2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010
作者: Bulut, Eyuphan Geyik, Sahin Cem Szymanski, Boleslaw K. Department of Computer Science Center for Pervasive Computing and Networking Rensselaer Polytechnic Institute 110 8th Street Troy NY 12180 United States
In a delay tolerant network (DTN), nodes are connected intermittently and the future node connections are mostly unknown. Since in these networks, a fully connected path from source to destination is unlikely to exist... 详细信息
来源: 评论
A new Weighted Ensemble model for detecting DoS attack streams
A new Weighted Ensemble model for detecting DoS attack strea...
收藏 引用
2010 3rd IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Workshops, WI-IAT 2010
作者: Yan, Jinghua Yun, Xiaochun Zhang, Peng Tan, Jianlong Guo, Li Department of Computer Science Beijing University of Post and Telecommunications Beijing China Information Security Center Institute of Computing Technology Chinese Academy of Sciences Beijing China
Recently, DoS (Denial of Service) detection has become more and more important in web security. In this paper, we argue that DoS attack can be taken as continuous data streams, and thus can be detected by using stream... 详细信息
来源: 评论
Conditional shortest path routing in delay tolerant networks
Conditional shortest path routing in delay tolerant networks
收藏 引用
2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010
作者: Bulut, Eyuphan Geyik, Sahin Cem Szymanski, Boleslaw K. Department of Computer Science Center for Pervasive Computing and Networking Rensselaer Polytechnic Institute 110 8th Street Troy NY 12180 United States
Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since the future node connections are mostly unk... 详细信息
来源: 评论
Efficiently GPU-accelerating long kernel convolutions in 3-D DIRECT TOF PET reconstruction via a kernel decomposition scheme
Efficiently GPU-accelerating long kernel convolutions in 3-D...
收藏 引用
IEEE Symposium on Nuclear science (NSS/MIC)
作者: Sungsoo Ha Zhiyuan Zhang Klaus Mueller Samuel Matej Center of Visual Computing Computer Science Department Stony Brook University NY USA Department of Radiology University of Pennsylvania Philadelphia PA USA
The DIRECT approach for 3-D Time-of-Flight (TOF) PET reconstruction performs all iterative predictor-corrector operations directly in image space. A computational bottleneck here is the convolution with the long TOF (... 详细信息
来源: 评论
Bayesian cognitive trust model based self-clustering algorithm for MANETs
收藏 引用
science China(Information sciences) 2010年 第3期53卷 494-505页
作者: WANG Wei1,2,3 & ZENG GuoSun1,2,31department of computer science & Technology, Tongji University, Shanghai 200092, China 2Tongji Branch, National Engineering & Technology center of High Performance computer, Shanghai 200092, China 3Key Loboratory of Embedded System and Service computing, Ministry of Education, Shanghai 200092, China 1. Department of Computer Science & Technology Tongji University Shanghai 200092 China2. Tongji Branch National Engineering & Technology Center of High Performance Computer Shanghai 200092 China3. Key Loboratory of Embedded System and Service Computing Ministry of Education Shanghai 200092 China
With the introduction of mobile Ad hoc networks (MANETs), nodes are able to participate in a dynamic network which lacks an underlying infrastructure. Before two nodes agree to interact, they must trust that each will... 详细信息
来源: 评论
Steganography in Chinese text
Steganography in Chinese text
收藏 引用
2010 International Conference on computer Application and System Modeling, ICCASM 2010
作者: Sun, Xinmei Meng, Peng Ye, Yun Hang, Liusheng HuaiBei Vocational and Technical College Huaibei Anhui 235000 China Department of Computer Science and Technology National High Performance Computing Center at Hefei Hefei 230027 China
Steganography is an important research direction of information security, which mainly research how to embed secret information into carriers, in order to achieve the objectives of secure communication. In this paper,... 详细信息
来源: 评论
Two examples of GPGPU acceleration of memory-intensive algorithms
Two examples of GPGPU acceleration of memory-intensive algor...
收藏 引用
8th Eurographics Italian Chapter Conference 2010
作者: Marras, Stefano Mura, Claudio Gobbetti, Enrico Scateni, Riccardo Scopigno, Roberto University of Cagliari Dept. of Mathematics and Computer Science Italy Sardegna Ricerche DistrICT Lab. Italy CRS4 - Center for Advanced Studies Research and Development Sardinia Italy ISTI-CNR Visual Computing Lab. Italy
The advent of GPGPU technologies has allowed for sensible speed-ups in many high-dimension, memory-intensive computational problems. In this paper we demonstrate the effectiveness of such techniques by describing two ... 详细信息
来源: 评论
Supervised reinforcement learning in discrete environment domains
Supervised reinforcement learning in discrete environment do...
收藏 引用
2010 2nd World Congress on Nature and Biologically Inspired computing, NaBIC 2010
作者: Jensen, Boris Ortiz-Arroyo, Daniel Cruz-Cortés, Nareli Rodríguez-Henríquez, Francisco Computational Intelligence and Security Lab. Department of Electronic Systems Aalborg University Denmark Center for Computing Research National Politechnique Institute Mexico Computer Science Department CINVESTAV-IPN Mexico
This paper describes a supervised reinforcement learning-based model for discrete environment domains. The model was tested within the domain of backgammon game. Our results show that a supervised actor-critic based l... 详细信息
来源: 评论