咨询与建议

限定检索结果

文献类型

  • 1,267 篇 会议
  • 1,098 篇 期刊文献
  • 29 册 图书

馆藏范围

  • 2,394 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,418 篇 工学
    • 784 篇 计算机科学与技术...
    • 568 篇 软件工程
    • 215 篇 信息与通信工程
    • 153 篇 电子科学与技术(可...
    • 153 篇 控制科学与工程
    • 136 篇 仪器科学与技术
    • 130 篇 电气工程
    • 130 篇 生物工程
    • 104 篇 土木工程
    • 94 篇 机械工程
    • 87 篇 光学工程
    • 85 篇 动力工程及工程热...
    • 84 篇 核科学与技术
    • 79 篇 化学工程与技术
    • 77 篇 建筑学
    • 63 篇 材料科学与工程(可...
    • 59 篇 航空宇航科学与技...
    • 59 篇 生物医学工程(可授...
  • 921 篇 理学
    • 390 篇 物理学
    • 333 篇 数学
    • 167 篇 生物学
    • 117 篇 地球物理学
    • 109 篇 统计学(可授理学、...
    • 107 篇 化学
    • 66 篇 系统科学
  • 303 篇 管理学
    • 205 篇 管理科学与工程(可...
    • 103 篇 图书情报与档案管...
    • 98 篇 工商管理
  • 69 篇 医学
    • 58 篇 临床医学
    • 46 篇 基础医学(可授医学...
  • 52 篇 法学
  • 34 篇 经济学
  • 23 篇 农学
  • 21 篇 教育学
  • 6 篇 艺术学
  • 4 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学
  • 1 篇 军事学

主题

  • 106 篇 hadron colliders
  • 88 篇 computer archite...
  • 81 篇 computer science
  • 51 篇 hardware
  • 43 篇 computational mo...
  • 39 篇 wireless sensor ...
  • 35 篇 machine learning
  • 31 篇 neutrons
  • 29 篇 application soft...
  • 28 篇 w & z bosons
  • 28 篇 training
  • 27 篇 optimization
  • 27 篇 software
  • 26 篇 deep learning
  • 26 篇 monitoring
  • 25 篇 quality of servi...
  • 24 篇 higgs bosons
  • 23 篇 runtime
  • 23 篇 neural networks
  • 23 篇 testing

机构

  • 152 篇 centro brasileir...
  • 151 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 universidad iber...
  • 149 篇 university of sp...
  • 149 篇 yerevan physics ...
  • 146 篇 brunel universit...
  • 146 篇 indian institute...
  • 144 篇 academy of scien...
  • 144 篇 charles universi...
  • 142 篇 university of de...
  • 141 篇 rwth aachen univ...
  • 139 篇 università di to...
  • 139 篇 imperial college...
  • 137 篇 infn sezione di ...
  • 137 篇 department of ph...
  • 136 篇 zhejiang univers...
  • 132 篇 université de st...
  • 130 篇 department of ph...
  • 129 篇 indian institute...

作者

  • 147 篇 ardid m.
  • 133 篇 ferrara g.
  • 116 篇 coleiro a.
  • 115 篇 kalekin o.
  • 115 篇 díaz a.f.
  • 111 篇 enzenhöfer a.
  • 110 篇 brunner j.
  • 109 篇 g. tonelli
  • 109 篇 d. barney
  • 109 篇 l. valencia palo...
  • 109 篇 t. liu
  • 109 篇 c. hensel
  • 109 篇 a. garcia-bellid...
  • 109 篇 a. steen
  • 109 篇 n. cartiglia
  • 109 篇 n. colino
  • 109 篇 f. moortgat
  • 109 篇 b. clerbaux
  • 109 篇 celli s.
  • 108 篇 a. babaev

语言

  • 2,281 篇 英文
  • 62 篇 其他
  • 44 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 1 篇 法文
检索条件"机构=Chair of Computer Architecture Institute of Computer Science"
2394 条 记 录,以下是71-80 订阅
排序:
Self-X evaluation model for wireless mesh networks
Self-X evaluation model for wireless mesh networks
收藏 引用
IEEE Vehicular Technology Conference
作者: Kasparick, Martin Gladisch, Alexander Daher, Robil Krohn, Martin Tavangarian, Djamshid Department of Computer Architecture Institute of Computer Science University of Rostock Germany
Wireless network infrastructures such as Wireless Mesh Networks (WMNs) are increasingly applied for various applications. Increasing complexity concerning configuration, organization, management and maintenance is a m... 详细信息
来源: 评论
Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2025年 14784 LNCS卷 v页
作者: Bai, Guangdong Ishikawa, Fuyuki Aït-Ameur, Yamine Papadopoulos, George A. School of Electrical Engineering and Computer Science Faculty of Engineering Architecture and Information Technology University of Queensland BrisbaneQLD Australia Information Systems Architecture Science Research Division National Institute of Informatics Tokyo Chiyoda-ku Japan IRIT University of Toulouse Toulouse France Department of Computer Science University of Cyprus Nicosia Cyprus
来源: 评论
Theoretical Treatment of Target Coverage in Wireless Sensor Networks
收藏 引用
Journal of computer science & Technology 2011年 第1期26卷 117-129页
作者: 谷雨 赵保华 计宇生 李颉 School of Computer Science University of Science and Technology of China State Key Laboratory of Networking and Switching Technology Information Systems Architecture Science Research Division National Institute of InformaticsTokyoJapan Department of Computer Science University of TsukubaTsukuba Science CityIbarakiJapan
The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies... 详细信息
来源: 评论
Middleware support for transparent client-side caching
Middleware support for transparent client-side caching
收藏 引用
SC 2002, Workshop on Software Composition Affiliated with ETAPS 2002 (Satellite Event of ETAPS 2002)
作者: Pohl, Christoph Schill, Alexander Dresden University of Technology Institute for System Architecture Chair for Computer Networks Germany
This paper reflects on existing caching concepts in proxies and stubs of component technologies and lines out their advantages and deficiencies. A new concept is introduced that averts proliferation of component stubs... 详细信息
来源: 评论
Memory Efficient Two-Pass 3D FFT Algorithm for Intel~ Xeon Phi^(TM) Coprocessor
收藏 引用
Journal of computer science & Technology 2014年 第6期29卷 989-1002页
作者: 刘益群 李焱 张云泉 张先轶 Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences Department of Computer Science and Technology Tsinghua University CCF ACM IEEE State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of Sciences
Equipped with 512-bit wide SIMD inst d large numbers of computing cores, the emerging x86-based Intel(R) Many Integrated Core (MIC) architecture ot only high floating-point performance, but also substantial ... 详细信息
来源: 评论
Evaluation of grid workflow scheduling techniques in dynamic grid simulation environments  10
Evaluation of grid workflow scheduling techniques in dynamic...
收藏 引用
Proceedings of the 8th International Conference on Frontiers of Information Technology
作者: Rehman, Attiqa Institute of Computer Architecture Faculty of Mathematics and Computer Science University of Hagen Germany
In this paper, we present a simulation of dynamic grid environments. We consider two types of dynamicity namely: 1) dynamic job arrival and 2) dynamically changing the resource load along with dynamic job arrival. We ... 详细信息
来源: 评论
Efficient Algorithm for Energy-Aware Virtual Network Embedding
收藏 引用
Tsinghua science and Technology 2016年 第4期21卷 407-414页
作者: Shuxian Jia Guiyuan Jiang Peilan He Jigang Wu School of Computer Software Technology Zhejiang University Ningbo 315048 China School of Computer Science and Engineering Nanyang Technological University 639798 Singapore State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Network virtualization is a promising approach for resource management that allows customized Virtual Networks (VNs) to be multiplexed on a shared physical infrastructure. A key function that network virtualization ... 详细信息
来源: 评论
A multi-layer approach for cross-technology communication in a pervasive community
A multi-layer approach for cross-technology communication in...
收藏 引用
2009 6th Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2009
作者: Dressier, Enrico Zender, Raphael Lucke, Ulrike Tavangarian, Djamshid Department of Computer Architecture Faculty of Engineering Institute of Computer Science Rostock Germany
This paper presents a middleware and an application scenario for communication in a pervasive community which is characterized by the use of different network and service technologies. To achieve the required cross-te... 详细信息
来源: 评论
Trainbow: a new trusted virtual machine based platform
收藏 引用
中国高等学校学术文摘·计算机科学 2010年 第1期4卷 47-64页
作者: Yuzhong SUN Yongbing HUANG Yunwei GAO Haifeng FANG Ying SONG Lei DU Kai ZHANG Hongyong ZANG Yaqiong LI Yajun YANG Ran AO Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049China Key Laboratory of Computer System and Architecture Institute of Computing TechnologyChinese Academy of Sciences Beijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing... 详细信息
来源: 评论
ArmorCLIP: A hybrid defense strategy for boosting adversarial robustness in vision-language models
ArmorCLIP: A hybrid defense strategy for boosting adversaria...
收藏 引用
2024 International Conference on computer Application and Information Security, ICCAIS 2024
作者: Li, Yijun Liang, Yuhan Niu, Yumeng Shen, Qianhe Liu, Hangyu Computer Science and Technology Harbin Institute of Technology Guangdong Shenzhen518055 China Faculty of Engineering University of Bristol BristolBS8 1TH United Kingdom Beijing University of Civil Engineering and Architecture Beijing102612 China University of Toronto Mississauga MississaugaL5L 1C6 Canada Xi’an Tieyi ICC Shaanxi Xi’an710054 China
The robustness of Vision-Language Models (VLMs) such as Contrastive Language-Image Pretraining (CLIP) is critical for their deployment in safety-critical applications like autonomous driving, healthcare diagnostics, a... 详细信息
来源: 评论