咨询与建议

限定检索结果

文献类型

  • 1,464 篇 会议
  • 910 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 2,414 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,477 篇 工学
    • 846 篇 计算机科学与技术...
    • 639 篇 软件工程
    • 236 篇 信息与通信工程
    • 177 篇 控制科学与工程
    • 156 篇 电气工程
    • 146 篇 仪器科学与技术
    • 140 篇 电子科学与技术(可...
    • 133 篇 生物工程
    • 113 篇 动力工程及工程热...
    • 104 篇 土木工程
    • 103 篇 机械工程
    • 102 篇 生物医学工程(可授...
    • 85 篇 建筑学
    • 85 篇 核科学与技术
    • 84 篇 光学工程
    • 76 篇 化学工程与技术
    • 54 篇 航空宇航科学与技...
  • 947 篇 理学
    • 365 篇 数学
    • 359 篇 物理学
    • 158 篇 生物学
    • 125 篇 地球物理学
    • 119 篇 统计学(可授理学、...
    • 94 篇 化学
    • 79 篇 系统科学
  • 331 篇 管理学
    • 227 篇 管理科学与工程(可...
    • 134 篇 工商管理
    • 113 篇 图书情报与档案管...
  • 101 篇 医学
    • 93 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 58 篇 法学
    • 51 篇 社会学
  • 50 篇 经济学
  • 30 篇 教育学
  • 30 篇 农学
  • 8 篇 艺术学
  • 5 篇 军事学
  • 3 篇 文学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 151 篇 computer archite...
  • 106 篇 hadron colliders
  • 55 篇 hardware
  • 46 篇 artificial intel...
  • 44 篇 computer science
  • 44 篇 computational mo...
  • 43 篇 application soft...
  • 32 篇 deep learning
  • 32 篇 optimization
  • 31 篇 neutrons
  • 31 篇 delay
  • 29 篇 laboratories
  • 28 篇 w & z bosons
  • 27 篇 parallel process...
  • 27 篇 genetic algorith...
  • 27 篇 machine learning
  • 26 篇 electronic mail
  • 26 篇 neural networks
  • 26 篇 feature extracti...
  • 25 篇 internet of thin...

机构

  • 154 篇 centro brasileir...
  • 153 篇 national and kap...
  • 153 篇 istanbul technic...
  • 152 篇 university of sp...
  • 152 篇 yerevan physics ...
  • 151 篇 universidad iber...
  • 150 篇 indian institute...
  • 150 篇 charles universi...
  • 149 篇 brunel universit...
  • 147 篇 academy of scien...
  • 146 篇 university of de...
  • 145 篇 rwth aachen univ...
  • 144 篇 imperial college...
  • 142 篇 università di to...
  • 142 篇 department of ph...
  • 139 篇 infn sezione di ...
  • 139 篇 zhejiang univers...
  • 136 篇 indian institute...
  • 135 篇 department of ph...
  • 133 篇 università di ca...

作者

  • 147 篇 ardid m.
  • 133 篇 ferrara g.
  • 116 篇 coleiro a.
  • 115 篇 kalekin o.
  • 115 篇 díaz a.f.
  • 111 篇 enzenhöfer a.
  • 110 篇 celli s.
  • 110 篇 brunner j.
  • 110 篇 coniglione r.
  • 109 篇 g. tonelli
  • 109 篇 d. barney
  • 109 篇 l. valencia palo...
  • 109 篇 t. liu
  • 109 篇 c. hensel
  • 109 篇 a. garcia-bellid...
  • 109 篇 a. steen
  • 109 篇 n. cartiglia
  • 109 篇 n. colino
  • 109 篇 f. moortgat
  • 109 篇 b. clerbaux

语言

  • 2,323 篇 英文
  • 55 篇 其他
  • 35 篇 中文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Architecture and Computer Technology"
2414 条 记 录,以下是261-270 订阅
排序:
An audio zero-watermarking algorithm based on FFT
An audio zero-watermarking algorithm based on FFT
收藏 引用
2nd International Conference on Networking and Digital Society, lCNDS 2010
作者: Gao, Liting Zhao, Wei Wen, Xiumei Wang, Lixia Computer Science and Technology Department Hebei Institute of Architecture Civil Engineering Zhang Jia Kou China
This paper proposes an audio zero-watermarking algorithm based on Fast Fourier Transform (FFT).This algorithm does not change any contents about the audio signals. It proposes a solution about the contradictions about... 详细信息
来源: 评论
Wikipedia articles representation with matrix'u
Wikipedia articles representation with matrix'u
收藏 引用
9th International Conference on Distributed Computing and Internet technology, ICDCIT 2013
作者: Szymański, Julian Department of Computer Systems Architecture Faculty of Electronics Telecommunications and Informatics Gdańsk University of Technology Poland
In the article we evaluate different text representation methods used for a task of Wikipedia articles categorization. We present the Matrix'u application used for creating computational datasets of Wikipedia arti... 详细信息
来源: 评论
A Wire delay scalable stream processor architecture
A Wire delay scalable stream processor architecture
收藏 引用
13th IEEE Asia-Pacific computer Systems architecture Conference, ACSAC 2008
作者: Guang, Xu Hong, An Ming, Cong Fang, Wang Yongqing, Ren Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 China Key Laboratory of Computer System and Architecture Chinese Academy of Science Beijing 100080 China
Growing on-chip wire delays will cause many future microarchitecture to be distributed. The centralized control and data transmission of the conventional stream processor need to be improved, the hardware resources wi... 详细信息
来源: 评论
Modeling the failures of power-aware data centers by leveraging heat recirculation
Modeling the failures of power-aware data centers by leverag...
收藏 引用
作者: Feng, Hao Deng, Yuhui Yu, Liang Department of Computer Science Jinan University Guangzhou China Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
With the explosive growth of data, hundreds of thousands of servers may be contained in a single data center. Hence, node failures are unavoidable and generally negatively effects the performance of the whole data cen... 详细信息
来源: 评论
Profile guided optimization for dataflow predication
Profile guided optimization for dataflow predication
收藏 引用
13th IEEE Asia-Pacific computer Systems architecture Conference, ACSAC 2008
作者: Li, Wang Hong, An Yongqing, Ren Yaobin, Wang Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 China Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Beijing 100080 China
Dataflow predication provides a lightweight full support for predicated execution in dataflow-like architectures. One of its major overhead is the large amounts of fanout trees for distributing predicates to all depen... 详细信息
来源: 评论
Achieving full functional coverage for the forwarding unit of pipelined processors
Achieving full functional coverage for the forwarding unit o...
收藏 引用
2017 IEEE East-West Design and Test Symposium, EWDTS 2017
作者: Vineesh, V.S. Hage, Nihar Karthik, B Singh, Virendra Computer Architecture and Dependable Systems Lab Department of Electrical Engineering Indian Institute of Technology Bombay India
Generic instruction based testing methods do not always give good fault coverage for the complex units like Forwarding unit. Hence it becomes important to carefully craft the test which are best for different parts of... 详细信息
来源: 评论
A Novel FPGA-Based High Throughput Accelerator for Binary Search Trees
A Novel FPGA-Based High Throughput Accelerator for Binary Se...
收藏 引用
2019 International Conference on High Performance Computing and Simulation, HPCS 2019
作者: Melikoglu, Oyku Ergin, Oguz Salami, Behzad Pavon, Julian Unsal, Osman Cristal, Adrian TOBB University of Economics and Technology Department of Computer Engineering Ankara Turkey Barcelona Supercomputing Center Computer Architecture for Parallel Paradigms Group Barcelona Spain
This paper presents a deeply pipelined and massively parallel Binary Search Tree (BST) accelerator for Field Programmable Gate Arrays (FPGAs). Our design relies on the extremely parallel on-chip memory, or Block RAMs ... 详细信息
来源: 评论
Exergames for elderly: Social exergames to persuade seniors to increase physical activity
Exergames for elderly: Social exergames to persuade seniors ...
收藏 引用
2011 5th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, PervasiveHealth 2011
作者: Brox, Ellen Luque, Luis Fernandez Evertsen, Gunn Judith Hernandez, Juan Emilio González Northern Research Institute TromsØ Norway Department of Computer Architecture and Technology University of Seville Seville Spain
Games with remote controls and motion sensors that require the players to move, so-called exergames, have become very popular. Many of these games are also being played by the senior population. Participating in regul... 详细信息
来源: 评论
Improved atomicity to prevent HCCA on NIST curves  3
Improved atomicity to prevent HCCA on NIST curves
收藏 引用
3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC 2016
作者: Das, Poulami Roy, Debapriya Basu Mukhopadhyay, Debdeep Secured Embedded Architecture Laboratory Department of Computer Science and Engineering Indian Institute of Technology Kharagpur India
The Big Mac attack showed that an RSA implementation, protected with conventional side-channel countermeasures can be exploited on the basis of an operand sharing property of field multiplications with a single trace ... 详细信息
来源: 评论
Access control based on trust policy in open grid environment
Access control based on trust policy in open grid environmen...
收藏 引用
3rd International Conference on Materials Science and Information technology, MSIT 2013
作者: Gao, Li Ting Wang, Zhen Yan Computer Science and Technology Department Hebei Institute of Architecture Civil Engineering Zhang Jia Kou China
This paper proposed a model for user security management. This model can establish the blacklist and white list to achieve the control of the user subsequent actions through monitoring the changing of user trust level... 详细信息
来源: 评论