咨询与建议

限定检索结果

文献类型

  • 757 篇 会议
  • 736 篇 期刊文献
  • 33 册 图书

馆藏范围

  • 1,526 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 977 篇 工学
    • 506 篇 计算机科学与技术...
    • 379 篇 软件工程
    • 139 篇 信息与通信工程
    • 127 篇 仪器科学与技术
    • 114 篇 电气工程
    • 91 篇 电子科学与技术(可...
    • 87 篇 控制科学与工程
    • 85 篇 生物工程
    • 84 篇 核科学与技术
    • 67 篇 土木工程
    • 66 篇 光学工程
    • 63 篇 机械工程
    • 63 篇 动力工程及工程热...
    • 61 篇 生物医学工程(可授...
    • 60 篇 化学工程与技术
    • 54 篇 建筑学
    • 47 篇 航空宇航科学与技...
  • 689 篇 理学
    • 315 篇 物理学
    • 219 篇 数学
    • 120 篇 地球物理学
    • 103 篇 生物学
    • 81 篇 化学
    • 77 篇 统计学(可授理学、...
    • 47 篇 系统科学
  • 203 篇 管理学
    • 149 篇 管理科学与工程(可...
    • 88 篇 工商管理
    • 58 篇 图书情报与档案管...
  • 57 篇 医学
    • 52 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 38 篇 法学
    • 35 篇 社会学
  • 31 篇 经济学
  • 18 篇 农学
  • 12 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 106 篇 hadron colliders
  • 50 篇 computer archite...
  • 44 篇 computer science
  • 35 篇 artificial intel...
  • 30 篇 neutrons
  • 28 篇 w & z bosons
  • 24 篇 higgs bosons
  • 22 篇 optimization
  • 21 篇 deep learning
  • 20 篇 wireless sensor ...
  • 20 篇 computational mo...
  • 18 篇 hardware
  • 17 篇 cms
  • 16 篇 machine learning
  • 15 篇 application soft...
  • 15 篇 top quark
  • 14 篇 resource managem...
  • 14 篇 cosmic rays
  • 14 篇 genetic algorith...
  • 14 篇 training

机构

  • 152 篇 centro brasileir...
  • 151 篇 national and kap...
  • 151 篇 istanbul technic...
  • 150 篇 university of sp...
  • 150 篇 yerevan physics ...
  • 149 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 brunel universit...
  • 147 篇 charles universi...
  • 145 篇 academy of scien...
  • 145 篇 university of de...
  • 143 篇 rwth aachen univ...
  • 142 篇 imperial college...
  • 140 篇 università di to...
  • 140 篇 department of ph...
  • 137 篇 infn sezione di ...
  • 137 篇 zhejiang univers...
  • 133 篇 department of ph...
  • 133 篇 université de st...
  • 132 篇 indian institute...

作者

  • 147 篇 ardid m.
  • 133 篇 ferrara g.
  • 116 篇 coleiro a.
  • 115 篇 kalekin o.
  • 115 篇 díaz a.f.
  • 111 篇 enzenhöfer a.
  • 110 篇 celli s.
  • 110 篇 brunner j.
  • 109 篇 g. tonelli
  • 109 篇 d. barney
  • 109 篇 l. valencia palo...
  • 109 篇 t. liu
  • 109 篇 c. hensel
  • 109 篇 a. garcia-bellid...
  • 109 篇 a. steen
  • 109 篇 n. cartiglia
  • 109 篇 n. colino
  • 109 篇 f. moortgat
  • 109 篇 b. clerbaux
  • 109 篇 coniglione r.

语言

  • 1,461 篇 英文
  • 43 篇 其他
  • 22 篇 中文
  • 1 篇 法文
检索条件"机构=Department of Computer Architecture and Technology ETSI Computer Science University of Seville"
1526 条 记 录,以下是121-130 订阅
排序:
NfvInsight:A Framework for Automatically Deploying and Benchmarking VNF Chains
收藏 引用
Journal of computer science & technology 2022年 第3期37卷 680-698页
作者: Tian-Ni Xu Hai-Feng Sun Di Zhang Xiao-Ming Zhou Xiu-Feng Sui Sa Wang Qun Huang Yun-Gang Bao State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China University of Chinese Academy of Sciences Beijing 100049China School of Information and Electronics Beijing Institute of TechnologyBeijing 100081China Peng Cheng Laboratory Shenzhen 518055China Department of Computer Science and Technology Peking UniversityBeijing 100871China
With the advent of virtualization techniques and software-defined networking(SDN),network function virtualization(NFV)shifts network functions(NFs)from hardware implementations to software appliances,between which exi... 详细信息
来源: 评论
CHMasters: A scalable and speed-efficient metadata service in distributed file system
CHMasters: A scalable and speed-efficient metadata service i...
收藏 引用
2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2011
作者: Xu, Min Zhou, Junrui Zhou, Wei An, Hong Department of Computer Science and Technology University of Science and Technology Hefei 230026 China Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Beijing 100080 China
Distributed file system (DFS) is playing important roles of supporting large distributed data-intensive applications to meet storage needs. Typically, the design of DFS, such as GFS in Google, DMS in Cisco and TFS in ... 详细信息
来源: 评论
Adaptive Marine Predator Optimization Algorithm(AOMA)-Deep Supervised Learning Classification(DSLC)based IDS framework for MANET security
收藏 引用
Intelligent and Converged Networks 2024年 第1期5卷 1-18页
作者: M.Sahaya Sheela A.Gnana Soundari Aditya Mudigonda C.Kalpana K.Suresh K.Somasundaram Yousef Farhaoui Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai 600069India Department of Computer Science and Engineering Saveetha School of EngineeringSIMATSChennai 602105India JNIAS School of Planning and Architecture Hyderabad 500034India Department of Computer Science and Engineering NPR College of Engineering and TechnologyNatham Dindigul 624401India Department of Computer Science and Engineering PSNA College of Engineering and TechnologyPoolangulathupatti 620009India Department of Computer Science and Engineering Sri Muthukumaran Institute of TechnologyChennai 600069India Department of Computer Science Moulay Ismail UniversityMeknes 5003Morocco
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i... 详细信息
来源: 评论
Using Mobile Sinks in WSN: Computational Complexity and a Theoretical Bound
收藏 引用
电子学报(英文版) 2011年 第1期20卷 147-150页
作者: GU Yu JI Yusheng CHEN Hongyang ZHAO Baohua Department of Computer Science University of Science and Technology of China Hefei China State Key Laboratory of Networking and Switching Technology Beijing China Information Systems Architecture Science Research Division NII Tokyo Japan Institute of Industrial Science University of Tokyo Tokyo Japan
In this paper, we study the lifetime op- timization problem in wireless sensor networks using mo- bile sink nodes. This problem is inherently difficult since we need to consider both sink scheduling and data rout- ing... 详细信息
来源: 评论
A study of secure communications between mobile objects
A study of secure communications between mobile objects
收藏 引用
10th IEEE International Conference on Engineering of Complex computer Systems, ICECCS 2005
作者: Zhigang, Liao Zengzhi, Li Yan, Chen Tao, Zhan Institute of Computer Architecture and Network Xi'an Jiaotong University Xi'an China Computer Science and Technology Department Northwest Polytechnical University Xi'an China
JASIAC (Java-based Active-network Secure Inter Active Application Communication) provides a mechanism to solve the security problem for Active Application communication for active networks. JASIAC can work against &qu... 详细信息
来源: 评论
A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第2期19卷 1683-1690页
作者: Zia, Maryam Obaidat, Mohammad S. Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Chaudhry, Shehzad Ashraf Comsats University Islamabad Department of Computer Science Sahiwal57000 Pakistan University of Jordan King Abdullah Ii School of Information Technology Amman11942 Jordan University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China Amity University UP Noida201301 India National Yunlin University of Science and Technology Future Technology Research Center Yunlin64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan Abu Dhabi University Department of Computer Science and Information Technology College of Engineering Abu Dhabi United Arab Emirates Nisantasi University Department of Computer Engineering Faculty of Engineering and Architecture Istanbul34398 Turkey
Wireless Body Area Network (WBAN) is a vital application of the Internet of Things (IoT) that plays a significant role in gathering a patient's healthcare information. This collected data helps special professiona... 详细信息
来源: 评论
Improving latency tolerance of network processors through simultaneous multithreading
收藏 引用
6th International Workshop on Advanced Parallel Processing Technologies, APPT 2005
作者: Liang, Bo An, Hong Lu, Fang Guo, Rui Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 China Computer Architecture Laboratory Institute of Computing Technology Chinese Academy of Sciences Beijing 100086 China
Existing multithreaded network processors architecture with multiple processing engines (PEs), aims at taking advantage of blocked multithreading technique which executes instructions of different user-defined threads... 详细信息
来源: 评论
Monitoring edge-to-edge traffic aggregates in differentiated services networks
收藏 引用
Journal of Network and Systems Management 2001年 第3期9.0卷 267-291页
作者: Kim, Jae-Young Hong, James Won-Ki Choi, Tae-Sang Department of Computer Science and Engineering Pohang University of Science and Technology Internet Architecture Team Internet Technology Department Electronics and Telecommunications Research Institute Dept. of Computer Science and Engineering POSTECH Pohang South Korea IEEE KICS KNOM
Differentiated Services (DiffServ), which are currently being standardized in the IETF DiffServ working group, is a solution that can provide different qualities of service to different network users. DiffServ aggrega... 详细信息
来源: 评论
A Non-Stop Double Buffering Mechanism for Dataflow architecture
收藏 引用
Journal of computer science & technology 2018年 第1期33卷 145-157页
作者: Xu Tan Xiao-Wei Shen Xiao-Chun Ye Da Wang Dong-Rui Fan Lunkai Zhang Wen-Ming Li Zhi-Min Zhang Zhi-Min Tang State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125 China Department of Computer Science The University of Chicago Chicago IL 60637 U.S.A.
Double buffering is an effective mechanism to hide the latency of data transfers between on-chip and off-chip memory. However, in dataflow architecture, the swapping of two buffers during the execution of many tiles d... 详细信息
来源: 评论
Opposites attract: Complementary phenotype selection for crossover in genetic programming  7th
收藏 引用
7th International Conference on Parallel Problem Solving from Nature, PPSN 2002
作者: Dolin, Brad Arenas, M.G. Merelo, J.J. Computer Science Department Stanford University StanfordCA94305 United States Department of Architecture and Computer Technology University of Granada GranadaCP 18071 Spain
Standard crossover in genetic programming (GP) selects two parents independently, based on fitness, and swaps randomly chosen portions of genetic material (subtrees). The mechanism by which the crossover operator achi... 详细信息
来源: 评论