咨询与建议

限定检索结果

文献类型

  • 3,187 篇 会议
  • 3,114 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,953 篇 工学
    • 2,784 篇 计算机科学与技术...
    • 2,184 篇 软件工程
    • 771 篇 信息与通信工程
    • 526 篇 光学工程
    • 495 篇 生物工程
    • 436 篇 控制科学与工程
    • 432 篇 生物医学工程(可授...
    • 420 篇 电气工程
    • 396 篇 电子科学与技术(可...
    • 196 篇 机械工程
    • 168 篇 化学工程与技术
    • 157 篇 仪器科学与技术
    • 133 篇 材料科学与工程(可...
    • 131 篇 动力工程及工程热...
    • 108 篇 力学(可授工学、理...
  • 2,529 篇 理学
    • 1,198 篇 数学
    • 1,070 篇 物理学
    • 573 篇 生物学
    • 369 篇 统计学(可授理学、...
    • 279 篇 化学
    • 211 篇 系统科学
  • 928 篇 管理学
    • 513 篇 管理科学与工程(可...
    • 425 篇 图书情报与档案管...
    • 267 篇 工商管理
  • 463 篇 医学
    • 401 篇 临床医学
    • 316 篇 基础医学(可授医学...
    • 197 篇 药学(可授医学、理...
    • 142 篇 公共卫生与预防医...
  • 150 篇 法学
    • 131 篇 社会学
  • 95 篇 经济学
  • 91 篇 农学
  • 68 篇 教育学
  • 19 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 134 篇 computational mo...
  • 126 篇 machine learning
  • 115 篇 deep learning
  • 88 篇 visualization
  • 87 篇 application soft...
  • 78 篇 semantics
  • 77 篇 artificial intel...
  • 76 篇 feature extracti...
  • 75 篇 hardware
  • 74 篇 high performance...
  • 71 篇 accuracy
  • 70 篇 computer archite...
  • 69 篇 training
  • 67 篇 distributed comp...
  • 65 篇 data mining
  • 62 篇 costs
  • 56 篇 image segmentati...
  • 56 篇 algorithm design...
  • 54 篇 predictive model...

机构

  • 55 篇 center on fronti...
  • 46 篇 infn sezione di ...
  • 46 篇 north-west unive...
  • 45 篇 institut univers...
  • 44 篇 national centre ...
  • 43 篇 université de st...
  • 42 篇 tno technical sc...
  • 42 篇 department of co...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 40 篇 dipartimento di ...
  • 40 篇 yerevan physics ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 46 篇 chen a.
  • 46 篇 benoit d.m.
  • 46 篇 ferrara g.
  • 46 篇 ardid m.
  • 46 篇 calvo d.
  • 46 篇 eddymaoui a.
  • 43 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.

语言

  • 6,038 篇 英文
  • 311 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center for Visual Computing and Computer Science Department"
6385 条 记 录,以下是4841-4850 订阅
排序:
Efficiently GPU-accelerating long kernel convolutions in 3-D DIRECT TOF PET reconstruction via a kernel decomposition scheme
Efficiently GPU-accelerating long kernel convolutions in 3-D...
收藏 引用
IEEE Symposium on Nuclear science (NSS/MIC)
作者: Sungsoo Ha Zhiyuan Zhang Klaus Mueller Samuel Matej Center of Visual Computing Computer Science Department Stony Brook University NY USA Department of Radiology University of Pennsylvania Philadelphia PA USA
The DIRECT approach for 3-D Time-of-Flight (TOF) PET reconstruction performs all iterative predictor-corrector operations directly in image space. A computational bottleneck here is the convolution with the long TOF (... 详细信息
来源: 评论
Bayesian cognitive trust model based self-clustering algorithm for MANETs
收藏 引用
science China(Information sciences) 2010年 第3期53卷 494-505页
作者: WANG Wei1,2,3 & ZENG GuoSun1,2,31department of computer science & Technology, Tongji University, Shanghai 200092, China 2Tongji Branch, National Engineering & Technology center of High Performance computer, Shanghai 200092, China 3Key Loboratory of Embedded System and Service computing, Ministry of Education, Shanghai 200092, China 1. Department of Computer Science & Technology Tongji University Shanghai 200092 China2. Tongji Branch National Engineering & Technology Center of High Performance Computer Shanghai 200092 China3. Key Loboratory of Embedded System and Service Computing Ministry of Education Shanghai 200092 China
With the introduction of mobile Ad hoc networks (MANETs), nodes are able to participate in a dynamic network which lacks an underlying infrastructure. Before two nodes agree to interact, they must trust that each will... 详细信息
来源: 评论
Steganography in Chinese text
Steganography in Chinese text
收藏 引用
2010 International Conference on computer Application and System Modeling, ICCASM 2010
作者: Sun, Xinmei Meng, Peng Ye, Yun Hang, Liusheng HuaiBei Vocational and Technical College Huaibei Anhui 235000 China Department of Computer Science and Technology National High Performance Computing Center at Hefei Hefei 230027 China
Steganography is an important research direction of information security, which mainly research how to embed secret information into carriers, in order to achieve the objectives of secure communication. In this paper,... 详细信息
来源: 评论
Two examples of GPGPU acceleration of memory-intensive algorithms
Two examples of GPGPU acceleration of memory-intensive algor...
收藏 引用
8th Eurographics Italian Chapter Conference 2010
作者: Marras, Stefano Mura, Claudio Gobbetti, Enrico Scateni, Riccardo Scopigno, Roberto University of Cagliari Dept. of Mathematics and Computer Science Italy Sardegna Ricerche DistrICT Lab. Italy CRS4 - Center for Advanced Studies Research and Development Sardinia Italy ISTI-CNR Visual Computing Lab. Italy
The advent of GPGPU technologies has allowed for sensible speed-ups in many high-dimension, memory-intensive computational problems. In this paper we demonstrate the effectiveness of such techniques by describing two ... 详细信息
来源: 评论
Supervised reinforcement learning in discrete environment domains
Supervised reinforcement learning in discrete environment do...
收藏 引用
2010 2nd World Congress on Nature and Biologically Inspired computing, NaBIC 2010
作者: Jensen, Boris Ortiz-Arroyo, Daniel Cruz-Cortés, Nareli Rodríguez-Henríquez, Francisco Computational Intelligence and Security Lab. Department of Electronic Systems Aalborg University Denmark Center for Computing Research National Politechnique Institute Mexico Computer Science Department CINVESTAV-IPN Mexico
This paper describes a supervised reinforcement learning-based model for discrete environment domains. The model was tested within the domain of backgammon game. Our results show that a supervised actor-critic based l... 详细信息
来源: 评论
Relation of PPAtMP and scalar product protocol and their applications
Relation of PPAtMP and scalar product protocol and their app...
收藏 引用
15th IEEE Symposium on computers and Communications, ISCC 2010
作者: Zhu, Youwen Huang, Liusheng Yang, Wei National High Performance Computing Center at Hefei Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 China Suzhou Institute for Advanced Study University of Science and Technology of China Suzhou 215123 China
Scalar product protocol and privacy preserving add to multiply protocol (PPAtMP) are two significant basic secure multiparty computation protocols. In this paper, we claim that the two protocols are equivalent to each... 详细信息
来源: 评论
Towards garbage collection mechanism for RTSJ-oriented embedded Java Processor
Towards garbage collection mechanism for RTSJ-oriented embed...
收藏 引用
10th IEEE International Conference on computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable computing and Communications, ScalCom-2010
作者: Hu, Guang Chai, Zhilei Zhao, Wenke Tu, Shiliang Department of Computer Science Shanghai International Studies University Shanghai China Department of Computer Science and Engineering Fudan University Shanghai China Siemens Corporate Technology Beijing China Center of Intelligent and High Performance Computing School of Information Technology Jiangnan University Wuxi China
Currently, Java has been gradually applied in embedded real-time area with the improvement by the Real-Time Specification for Java (RTSJ). Accordingly, a hardware Java execution engine for embedded real-time applicati... 详细信息
来源: 评论
Design of virtual honeynet collaboration system in existing security research networks
Design of virtual honeynet collaboration system in existing ...
收藏 引用
IEEE International Symposium on Communications and Information Technology
作者: Chang, Jason Chih-Hung Tsai, Yi-Lang CyberSecurity Lab. National Center for High-performance Computing Hsinchu Taiwan SENSE Lab. Department of Computer Science National Chiao Tung University Hsinchu Taiwan
This paper proposes the virtual honeynet collaboration system (VHS) to improve the designs and concepts of the honeynet architectures. Using virtualization technologies (VTs) as a development platform, the proposed ap... 详细信息
来源: 评论
Impact of sub-optimal checkpoint intervals on application efficiency in computational clusters  10
Impact of sub-optimal checkpoint intervals on application ef...
收藏 引用
Proceedings of the 19th ACM International Symposium on High Performance Distributed computing
作者: Jones, William M. Daly, John T. DeBardeleben, Nathan Department of Computer Science Coastal Carolina University Conway SC United States Center for Exceptional Computing Department of Defense Fort Meade MD United States High Performance Computing Los Alamos National Laboratory Los Alamos NM United States
As computational clusters rapidly grow in both size and complexity, system reliability and, in particular, application resilience have become increasingly important factors to consider in maintaining efficiency and pr... 详细信息
来源: 评论
A network management system based on DPI
A network management system based on DPI
收藏 引用
International Conference on Network-Based Information Systems
作者: Yang, Chu-Sing Liao, Ming-Yi Luo, Mon-Yen Wang, Shin-Min Yeh, C. Eugene Department of Electrical Engineering Institute of Computer and Communication Engineering National Cheng Kung University Taiwan Department of Computer Science and Information Engineering National Kaohsiung University of Applied Sciences Kaohsiung Taiwan National Center for High-Performance Computing Taiwan
More and more network applications have appeared in recent years. Government, university, industry and individual Internet users and network services need more bandwidth and various network applications. Many new netw... 详细信息
来源: 评论