咨询与建议

限定检索结果

文献类型

  • 3,011 篇 会议
  • 2,090 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,106 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,231 篇 工学
    • 2,021 篇 计算机科学与技术...
    • 1,565 篇 软件工程
    • 565 篇 信息与通信工程
    • 485 篇 控制科学与工程
    • 427 篇 电子科学与技术(可...
    • 396 篇 电气工程
    • 325 篇 机械工程
    • 282 篇 生物工程
    • 255 篇 光学工程
    • 198 篇 仪器科学与技术
    • 175 篇 化学工程与技术
    • 164 篇 生物医学工程(可授...
    • 154 篇 动力工程及工程热...
    • 125 篇 材料科学与工程(可...
    • 115 篇 交通运输工程
    • 107 篇 土木工程
    • 85 篇 建筑学
    • 82 篇 安全科学与工程
  • 1,732 篇 理学
    • 923 篇 数学
    • 456 篇 物理学
    • 327 篇 生物学
    • 257 篇 统计学(可授理学、...
    • 197 篇 系统科学
    • 172 篇 化学
  • 838 篇 管理学
    • 529 篇 管理科学与工程(可...
    • 329 篇 图书情报与档案管...
    • 164 篇 工商管理
  • 143 篇 医学
    • 120 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 106 篇 法学
    • 83 篇 社会学
  • 59 篇 经济学
  • 53 篇 农学
  • 26 篇 教育学
  • 14 篇 艺术学
  • 13 篇 军事学
  • 8 篇 文学

主题

  • 167 篇 laboratories
  • 137 篇 feature extracti...
  • 125 篇 computer archite...
  • 107 篇 computer science
  • 101 篇 computational mo...
  • 90 篇 semantics
  • 81 篇 training
  • 76 篇 optimization
  • 74 篇 accuracy
  • 71 篇 data mining
  • 70 篇 deep learning
  • 67 篇 bandwidth
  • 65 篇 hardware
  • 64 篇 protocols
  • 54 篇 clustering algor...
  • 54 篇 delay
  • 53 篇 neural networks
  • 53 篇 predictive model...
  • 51 篇 object detection
  • 47 篇 image segmentati...

机构

  • 183 篇 hubei province k...
  • 134 篇 school of comput...
  • 125 篇 department of co...
  • 117 篇 key laboratory o...
  • 115 篇 national enginee...
  • 103 篇 college of compu...
  • 99 篇 tianjin key labo...
  • 87 篇 key laboratory o...
  • 83 篇 college of compu...
  • 75 篇 department of co...
  • 72 篇 key laboratory o...
  • 67 篇 school of comput...
  • 61 篇 university of ch...
  • 60 篇 hubei province k...
  • 59 篇 key laboratory o...
  • 57 篇 college of infor...
  • 56 篇 shandong provinc...
  • 55 篇 school of softwa...
  • 50 篇 services computi...
  • 47 篇 key laboratory o...

作者

  • 107 篇 hai jin
  • 45 篇 xiaowei li
  • 40 篇 shen linlin
  • 36 篇 dan feng
  • 35 篇 zhang hua
  • 32 篇 jin hai
  • 28 篇 zhou mengchu
  • 28 篇 huawei li
  • 25 篇 ren jiadong
  • 24 篇 wang chundong
  • 22 篇 liu jun
  • 21 篇 li peng
  • 20 篇 changjun jiang
  • 20 篇 yu hu
  • 19 篇 wang lei
  • 19 篇 zhang xiaolong
  • 19 篇 cui zhihua
  • 19 篇 hu shengshan
  • 19 篇 wang wei
  • 18 篇 wei hu

语言

  • 4,500 篇 英文
  • 387 篇 其他
  • 233 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Technology Laboratory"
5106 条 记 录,以下是281-290 订阅
排序:
Container lifecycle-aware scheduling for serverless computing
Container lifecycle-aware scheduling for serverless computin...
收藏 引用
作者: Wu, Song Tao, Zhiheng Fan, Hao Huang, Zhuo Zhang, Xinmin Jin, Hai Yu, Chen Cao, Chun National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Elastic scaling in response to changes on demand is a main benefit of serverless computing. When bursty workloads arrive, a serverless platform launches many new containers and initializes function environments (known... 详细信息
来源: 评论
Research and Application of Speech Transmission Index in Acoustic Leakage Detection  17
Research and Application of Speech Transmission Index in Aco...
收藏 引用
17th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2024
作者: Hao, Qiuyun Wang, FuQiang Zhang, Peng Ma, XiaoFeng Zhang, Jianqiang Zhao, Wei Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Acoustic information in confidential premise can be leaked through channels such as walls, pipes, doors and windows. Acoustic leakage level needs to be measured through specific indicators. Acoustic leakage evaluation... 详细信息
来源: 评论
Prediction of Geopolymer Concrete Compressive Strength Using Convolutional Neural Networks
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第5期139卷 1455-1486页
作者: Kolli Ramujee Pooja Sadula Golla Madhu Sandeep Kautish Abdulaziz S.Almazyad Guojiang Xiong Ali Wagdy Mohamed Department of Civil Engineering VNR Vignana Jyothi Institute of Engineering and TechnologyHyderabadTelangana500090India Department of Information Technology VNR Vignana Jyothi Institute of Engineering and TechnologyHyderabadTelangana500090India Department of Computer Science LBEF Campus(Asia Pacific University of Technology&InnovationMalaysia)Kathmandu44600Nepal Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmmanJordan
Geopolymer concrete emerges as a promising avenue for sustainable development and offers an effective solution to environmental *** attributes as a non-toxic,low-carbon,and economical substitute for conventional cemen... 详细信息
来源: 评论
Large Model Collaborative Optimization Enhanced by Mobile Consumer Electronics Constructed Federated ML
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Bu, Chao Li, Jianlong Wang, Jinsong Tianjin University of Technology Key Laboratory of Computer Vision and System of Ministry of Education School of Computer Science and Engineering Tianjin300384 China Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology School of Computer Science and Engineering Tianjin300384 China
With the rapid development of internet of everything, current Mobile Consumer Electronics (MCEs) can support complex computing due to their specialized data-handling capacity. Thus, federated Machine Learning (ML) and... 详细信息
来源: 评论
NR-Isomap: An Incremental Approach with Gaussian Process Kernels for Denoising  6
NR-Isomap: An Incremental Approach with Gaussian Process Ker...
收藏 引用
6th International Conference on Big Data and Artificial Intelligence, BDAI 2023
作者: Yousaf, Mahwish Khan, Muhammad Saaadat Shakoor Ullah, Shamsher Wang, Shou Jing, Li University of Science and Technology of China School of Computer Science and Technology Hefei China Chinese Academy of Sciences Institute of Solid-State Physics Key Laboratory of Materials Physics Hefei China Unit of System and Technology University of Management and Technology Department Knowledge Sialkot Pakistan
The Isomap is a popular nonlinear dimensionality reduction method often used for low-dimensional embedding space. When the big data is noisy, Isomap often fails because of the graph structure' Short-Circuit Edges ... 详细信息
来源: 评论
Pricing Policy for a Dynamic Spectrum Allocation Scheme with Batch Requests and Impatient Packets in Cognitive Radio Networks
收藏 引用
Journal of systems Science and systems Engineering 2022年 第2期31卷 133-149页
作者: Haixing Wu Shunfu Jin Wuyi Yue School of Information Science and Engineering Yanshan UniversityQinhuangdao 066004China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan UniversityQinhuangdao 066004China Department of Intelligence and Informatics Konan UniversityKobe 658-8501Japan
In cognitive radio networks(CRNs),multiple secondary users may send out requests simultaneously and one secondary user may send out multiple requests at one time,i.e.,request arrivals usually show an aggregate ***,a s... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin  9
Dynamic detection technology of encryption algorithm based o...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Junpeng Du, Gaolei Sun, Yunge Fu, Yong Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
Structure design and analysis of a rigid-soft robotic hand with large load capacity  3
Structure design and analysis of a rigid-soft robotic hand w...
收藏 引用
3rd International Conference on Electrical, Electronics, and Information Engineering, EEIE 2024
作者: Wu, Peichen Lan, Fuming Hong, Wen Chen, Xiaoping Shuai, Wei Cui, Guowei Gao, Yang Institute of Intelligent Manufacturing Guangdong Academy of Sciences Guangdong Key Laboratory of Modern Control Technology Guangzhou510070 China Shanghai Institute of Aerospace System Engineering Shanghai201100 China Intelligent Manufacturing Institute of HFUT HeFei230041 China School of Computer Science and Technology University of Science and Technology of China Hefei230026 China
In recent years, soft grippers have gained significant attention due to their adaptability and safety. However, when performing horizontal object grasping, their limited structural stiffness prevents them from withsta... 详细信息
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution  9
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Sun, Yunge Du, Gaolei Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论
AISLE: Self-supervised Representation Learning for the Investigation of Advanced Persistent Threat  7
AISLE: Self-supervised Representation Learning for the Inves...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Jia, Zian Wang, Xiaosu Xiong, Yun Zhang, Yao Zhao, JinJing Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China National Key Laboratory of Science and Technology on Information System Security China
Advanced Persistent Threats (APT) are difficult to detect and defend due to their high variability and concealment. Current APT detection and investigation approaches suffer from two major problems. First, most recent... 详细信息
来源: 评论