咨询与建议

限定检索结果

文献类型

  • 4,011 篇 会议
  • 2,590 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 6,648 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,192 篇 工学
    • 2,766 篇 计算机科学与技术...
    • 2,216 篇 软件工程
    • 809 篇 信息与通信工程
    • 631 篇 控制科学与工程
    • 540 篇 电气工程
    • 458 篇 电子科学与技术(可...
    • 344 篇 生物工程
    • 337 篇 机械工程
    • 298 篇 光学工程
    • 283 篇 生物医学工程(可授...
    • 218 篇 动力工程及工程热...
    • 212 篇 仪器科学与技术
    • 163 篇 化学工程与技术
    • 138 篇 材料科学与工程(可...
    • 134 篇 交通运输工程
    • 124 篇 土木工程
    • 108 篇 建筑学
  • 2,052 篇 理学
    • 1,136 篇 数学
    • 512 篇 物理学
    • 420 篇 生物学
    • 300 篇 统计学(可授理学、...
    • 274 篇 系统科学
    • 180 篇 化学
  • 1,092 篇 管理学
    • 683 篇 管理科学与工程(可...
    • 443 篇 图书情报与档案管...
    • 292 篇 工商管理
  • 257 篇 医学
    • 219 篇 临床医学
    • 173 篇 基础医学(可授医学...
    • 113 篇 药学(可授医学、理...
  • 137 篇 法学
    • 100 篇 社会学
  • 98 篇 经济学
  • 54 篇 农学
  • 44 篇 教育学
  • 21 篇 文学
  • 20 篇 军事学
  • 14 篇 艺术学

主题

  • 303 篇 laboratories
  • 301 篇 computer science
  • 234 篇 software enginee...
  • 140 篇 application soft...
  • 133 篇 data mining
  • 114 篇 computational mo...
  • 106 篇 feature extracti...
  • 96 篇 costs
  • 94 篇 quality of servi...
  • 93 篇 semantics
  • 86 篇 computer archite...
  • 84 篇 wireless sensor ...
  • 83 篇 algorithm design...
  • 81 篇 deep learning
  • 80 篇 software
  • 78 篇 software systems
  • 78 篇 optimization
  • 78 篇 software testing
  • 78 篇 protocols
  • 78 篇 testing

机构

  • 231 篇 state key labora...
  • 159 篇 college of compu...
  • 118 篇 department of co...
  • 98 篇 national enginee...
  • 67 篇 department of co...
  • 67 篇 school of softwa...
  • 65 篇 state key labora...
  • 64 篇 department of co...
  • 54 篇 department of co...
  • 53 篇 state key labora...
  • 47 篇 national key lab...
  • 46 篇 peng cheng labor...
  • 46 篇 shanghai key lab...
  • 44 篇 university of ch...
  • 43 篇 key laboratory o...
  • 40 篇 tsinghua nationa...
  • 34 篇 school of comput...
  • 31 篇 department of el...
  • 30 篇 department of co...
  • 30 篇 beijing key labo...

作者

  • 52 篇 rajkumar buyya
  • 46 篇 shen linlin
  • 41 篇 junping du
  • 33 篇 mei-ling shyu
  • 33 篇 yu huiqun
  • 32 篇 shu-ching chen
  • 30 篇 fan guisheng
  • 29 篇 shen furao
  • 28 篇 zhao jian
  • 25 篇 chen shu-ching
  • 25 篇 baowen xu
  • 24 篇 zhou mengchu
  • 23 篇 yang yang
  • 22 篇 hamid soltanian-...
  • 22 篇 zongli lin
  • 22 篇 buyya rajkumar
  • 21 篇 mengchu zhou
  • 21 篇 sylvain martel
  • 21 篇 xu baowen
  • 20 篇 ji zhen

语言

  • 6,225 篇 英文
  • 296 篇 其他
  • 124 篇 中文
  • 2 篇 德文
  • 2 篇 日文
检索条件"机构=Department of Computer Engineering System Software Laboratory"
6648 条 记 录,以下是4991-5000 订阅
排序:
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA
Reliability-Driven Reputation Based Scheduling for Public-Re...
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Xiaofeng Wang Chee Shin Yeo Rajkumar Buyya Jinshu Su College of Computer National University of Defense Technology Hunan China Department of Computer Science and Software Engineering GRIDS Laboratory University of Melbourne VIC Australia
For an application in public-resource computing environments, providing reliable scheduling based on resource reliability evaluation is becoming increasingly important. Most existing reputation models used for reliabi... 详细信息
来源: 评论
On the mobile wireless access via MIMO relays
On the mobile wireless access via MIMO relays
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Tae Hyun Kim Nitin H. Vaidya Young-Bae Ko Department of Electrical and Computer Engineering Coordinated Science Laboratory University of Illinois Urbana-Champaign IL USA Ubiquitous Networked System Laboratory School of Information and Computer Engineering Ajou University Suwon South Korea
While a network with stationary nodes can provide large capacity in many current wireless systems, a network with mobile users suffers from severe performance degradation. This happens due to quick channel variation a... 详细信息
来源: 评论
A customizable pattern-based software process simulation model: Design, calibration and application
收藏 引用
software Process Improvement and Practice 2009年 第3期14卷 165-180页
作者: Garousi, Vahid Khosrovian, Keyvan Pfahl, Dietmar Department of Electrical and Computer Engineering Schulich School of Engineering University of Calgary Canada Simula Research Laboratory Software Engineering Department P.O.Box 134 1325 Lysaker Norway Department of Informatics University of Oslo Norway
software process analysis and improvement relies heavily on empirical research. Empirical research requires measurement, experimentation, and modeling. However, whatever evidence is gained via empirical research is st... 详细信息
来源: 评论
A utility model for peering of multi-provider content delivery services
A utility model for peering of multi-provider content delive...
收藏 引用
Conference on Local computer Networks (LCN)
作者: Mukaddim Pathan Rajkumar Buyya Grid Computing and Distributed Systems GRIDS Laboratory Department of Computer Science and Software Engineering University of Melbourne Parkville VIC Australia
Peering of Content Delivery Networks (CDNs) allow providers to rapidly scale-out to meet both flash crowds and anticipated increases in demand. Recent trends foster the need for a utility model for content delivery se... 详细信息
来源: 评论
Ideal perfect multilevel threshold secret sharing scheme
Ideal perfect multilevel threshold secret sharing scheme
收藏 引用
5th International Conference on Information Assurance and Security, IAS 2009
作者: Lin, Changlu Harn, Lein Ye, Dingfeng Key Laboratory of Network Security and Cryptology Fujian Normal University China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences China Key Laboratory of Communication and Information System Beijing Jiaotong University Beijing Municipal Commission of Education China Department of Computer Science Electrical Engineering University of Missouri-Kansas City United States
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,... 详细信息
来源: 评论
Exposure-path prevention in directional sensor networks using sector model based percolation
Exposure-path prevention in directional sensor networks usin...
收藏 引用
2009 IEEE International Conference on Communications, ICC 2009
作者: Liang, Liu Xi, Zhang Huadong, Ma Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX 77843 United States Beijing Key Lab. of Intelligent Telecomm. Software and Multimedia Beijing University of Posts and Telecomm. Beijing 100876 China
In wireless sensor networks, most existing works on region coverage mainly concentrate on the omnidirectional sensor based full coverage, which ensures that all points in the sensor-deployed region are covered. In con... 详细信息
来源: 评论
A 54GOPS 51.8mW analog-digital mixed mode Neural Perception Engine for fast object detection
A 54GOPS 51.8mW analog-digital mixed mode Neural Perception ...
收藏 引用
Custom Integrated Circuits Conference (CICC)
作者: Minsu Kim Joo-Young Kim Seungjin Lee Jinwook Oh Hoi-Jun Yoo Semiconductor System Laboratory Department of Electronic Engineering and Computer Science Korea Advanced Institute of Science and Technology Daejeon South Korea
A mixed mode Neural Perception Engine (NPE) is proposed as the pre-processing accelerator of multi-object recognition processor to reduce the computational complexity and increase its efficiency. It consists of Motion... 详细信息
来源: 评论
Minimal exposure path algorithms for directional sensor networks
Minimal exposure path algorithms for directional sensor netw...
收藏 引用
2009 IEEE Global Telecommunications Conference, GLOBECOM 2009
作者: Liu, Liang Zhang, Xi Ma, Huadong Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX 77843 United States Beijing Key Lab. of Intelligent Telecomm. Software and Multimedia Beijing University of Posts and Telecomm. Beijing 100876 China
As a fundamental problem of wireless sensor networks, the minimal exposure path problem corresponding to the sensor network's worst-case coverage plays an important role in the applications for detecting intrusion... 详细信息
来源: 评论
Swarm Robots Long Term Autonomy Using Moveable Charger
Swarm Robots Long Term Autonomy Using Moveable Charger
收藏 引用
International Conference on Future computer and Communication, ICFCC
作者: Farshad Arvin Khairulmizam Samsudin Abdul Rahman Ramli Computer Systems Research Group Department of Computer System Engineering University of Putra Malaysia Serdang Malaysia Intelligent System and Robotic Laboratory Institute on Advanced Technology University of Putra Malaysia Serdang Malaysia
This paper proposes an alternative docking charger station for mobile robots. One crucial task in swarm robots scenario is to find low battery robots and recover them. Overcoming this problem requires a versatile mobi... 详细信息
来源: 评论
A new vertical handover mechanism for convergence of wired and wireless access networks
A new vertical handover mechanism for convergence of wired a...
收藏 引用
International Conference on Information Networking
作者: Soohong Park Pyung-Soo Kim Application Software Laboratory Digital Media Research and Development Center Samsung Electronics Company Limited Suwon South Korea System Software Solution Laboratory Department of Electronics Engineering Korea Polytechnic University Siheung South Korea
This paper proposes a vertical handover mechanism for mobile devices to keep connection with the Internet in wired and wireless coexistence networks. To support vertical handover between two heterogeneous access netwo... 详细信息
来源: 评论