咨询与建议

限定检索结果

文献类型

  • 4,901 篇 会议
  • 3,521 篇 期刊文献
  • 104 册 图书

馆藏范围

  • 8,526 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,002 篇 工学
    • 3,009 篇 计算机科学与技术...
    • 2,409 篇 软件工程
    • 994 篇 控制科学与工程
    • 977 篇 信息与通信工程
    • 692 篇 电气工程
    • 566 篇 电子科学与技术(可...
    • 448 篇 机械工程
    • 443 篇 生物工程
    • 356 篇 光学工程
    • 347 篇 生物医学工程(可授...
    • 255 篇 仪器科学与技术
    • 225 篇 动力工程及工程热...
    • 220 篇 化学工程与技术
    • 171 篇 材料科学与工程(可...
    • 161 篇 交通运输工程
    • 125 篇 安全科学与工程
    • 124 篇 航空宇航科学与技...
  • 2,929 篇 理学
    • 1,489 篇 数学
    • 813 篇 物理学
    • 563 篇 生物学
    • 472 篇 统计学(可授理学、...
    • 464 篇 系统科学
    • 258 篇 化学
  • 1,120 篇 管理学
    • 719 篇 管理科学与工程(可...
    • 418 篇 图书情报与档案管...
    • 327 篇 工商管理
  • 380 篇 医学
    • 297 篇 临床医学
    • 236 篇 基础医学(可授医学...
    • 148 篇 药学(可授医学、理...
  • 160 篇 法学
    • 138 篇 社会学
  • 110 篇 经济学
  • 103 篇 农学
  • 62 篇 教育学
  • 26 篇 文学
  • 14 篇 艺术学
  • 11 篇 军事学
  • 8 篇 哲学
  • 2 篇 历史学

主题

  • 549 篇 laboratories
  • 500 篇 computer science
  • 161 篇 control systems
  • 155 篇 application soft...
  • 145 篇 computational mo...
  • 140 篇 computer archite...
  • 134 篇 artificial intel...
  • 121 篇 neural networks
  • 105 篇 costs
  • 103 篇 feature extracti...
  • 100 篇 data mining
  • 95 篇 optimization
  • 92 篇 real time system...
  • 92 篇 semantics
  • 90 篇 robot sensing sy...
  • 89 篇 algorithm design...
  • 87 篇 testing
  • 84 篇 bandwidth
  • 83 篇 deep learning
  • 81 篇 mobile robots

机构

  • 150 篇 state key labora...
  • 65 篇 department of co...
  • 58 篇 shanghai key lab...
  • 42 篇 state key labora...
  • 40 篇 state key labora...
  • 34 篇 department of el...
  • 34 篇 peng cheng labor...
  • 33 篇 ieee
  • 29 篇 beijing key labo...
  • 25 篇 jet propulsion l...
  • 25 篇 department of co...
  • 24 篇 school of artifi...
  • 24 篇 university of ch...
  • 22 篇 grid computing a...
  • 22 篇 department of co...
  • 21 篇 school of electr...
  • 21 篇 state key labora...
  • 20 篇 software enginee...
  • 18 篇 department of co...
  • 17 篇 department of el...

作者

  • 57 篇 rajkumar buyya
  • 43 篇 fuchun sun
  • 41 篇 m. zahn
  • 32 篇 sun fuchun
  • 27 篇 sun maosong
  • 26 篇 zengqi sun
  • 25 篇 zhang min
  • 25 篇 wei li
  • 24 篇 niyato dusit
  • 24 篇 zhang bo
  • 23 篇 peifa jia
  • 23 篇 j.h. lang
  • 22 篇 junping du
  • 21 篇 liu yang
  • 21 篇 hu xiaolin
  • 20 篇 hong qin
  • 20 篇 mingsheng ying
  • 20 篇 runyao duan
  • 20 篇 pearl judea
  • 19 篇 guan haibing

语言

  • 7,568 篇 英文
  • 840 篇 其他
  • 120 篇 中文
  • 6 篇 法文
  • 5 篇 德文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 芬兰文
  • 1 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science and EngineeringComputer Systems Laboratory"
8526 条 记 录,以下是4991-5000 订阅
排序:
Private cloud system based on BOINC with support for parallel and distributed simulation
Private cloud system based on BOINC with support for paralle...
收藏 引用
9th IEEE Int. Conf. on Dependable, Autonomic and Secure Comput., DASC 2011, incl. 9th Int. Conf. on Pervasive Intelligence and Computing, PICom 2011, 9th Int. Symp. on Embedded Computing, EmbeddedCom 2011, 1st Int. Conf. on Cloud and Green Comput.CGC
作者: Wu, Yihua Cao, Jian Li, Minglu Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
Cloud computing provides an efficient way to expose computing capabilities as sophisticated services that can be accessed remotely. It eliminates the need for organizations to maintain extensive infrastructures. Paral... 详细信息
来源: 评论
Controlling selection bias in causal inference  25
Controlling selection bias in causal inference
收藏 引用
25th AAAI Conference on Artificial Intelligence and the 23rd Innovative Applications of Artificial Intelligence Conference, AAAI-11 / IAAI-11
作者: Bareinboim, Elias Pearl, Judea Cognitive Systems Laboratory Department of Computer Science University of California Los Angeles Los Angeles CA 90095 United States
Selection bias, caused by preferential exclusion of units (or samples) from the data, is a major obstacle to valid causal inferences, for it cannot be removed or even detected by randomized experiments. This paper hig... 详细信息
来源: 评论
Extract Chinese Unknown Words from a Large-scale Corpus Using Morphological and Distributional Evidences  5
Extract Chinese Unknown Words from a Large-scale Corpus Usin...
收藏 引用
5th International Joint Conference on Natural Language Processing, IJCNLP 2011
作者: Zhang, Kaixu Wang, Ruining Xue, Ping Sun, Maosong State Key Laboratory on Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing100084 China The Boeing Company
The representative method of using morphological evidence for Chinese unknown word (UW) extraction is Chinese word segmentation (CWS) model, and the method of using distributional evidence for UW extraction is accesso... 详细信息
来源: 评论
Modeling Photovoltaic Optimized Charging of Electric Vehicles
Modeling Photovoltaic Optimized Charging of Electric Vehicle...
收藏 引用
IEEE PES Innovative Smart Grid Technologies Europe
作者: Lena-Marie Ritte Stefan Mischinger Kai Strunz Johannes Eckstein ILF Consulting Engineers Power Systems Industrial Plants Prof. Dr. K. Strunz are with SENSE Laboratory Department of Electrical Engineering and Computer Science EON Encrgic AG
When charged with renewable energy, electric vehicles can reduce the CO_2 emissions of the transportation sector. As a result, the German government has set the target of one million electric vehicles by 2020. At the ... 详细信息
来源: 评论
Generalized latent factor models for social network analysis
Generalized latent factor models for social network analysis
收藏 引用
22nd International Joint Conference on Artificial Intelligence, IJCAI 2011
作者: Li, Wu-Jun Yeung, Dit-Yan Zhang, Zhihua Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Hong Kong College of Computer Science and Technology Zhejiang University China
Homophily and stochastic equivalence are two primary features of interest in social networks. Recently, the multiplicative latent factor model (MLFM) is proposed to model social networks with directed links. Although ... 详细信息
来源: 评论
R&D toward a compact high-brilliance X-ray source based on channeling radiation
收藏 引用
AIP Conference Proceedings 2012年 第1期1507卷 734-739页
作者: P. Piot C. A. Brau W. E. Gabella B. K. Choi J. D. Jarvis J. W. Lewellen M. H. Mendenhall D. Mihalcea Northern Illinois Center for Accelerator & Detector Development and Department of Physics Northern Illinois University DeKalb IL 60115 USA and Accelerator Physics Center Fermi National Accelerator Laboratory Batavia IL 60510 USA Department of Physics and Astronomy Vanderbilt University Nashville TN 37235 USA Dept. of Electrical Engineering and Computer Science Vanderbilt University Nashville TN 37235 USA and Vanderbilt Institute of Nanoscale Science and Engineering Vanderbilt University Nashville TN 37235 USA Physics Department & Combat Systems Naval Postgraduate School Monterey CA 93943 USA Northern Illinois Center for Accelerator & Detector Development and Department of Physics Northern Illinois University DeKalb IL 60115 USA
X-rays have been valuable to a large number of fields including science, Medicine, and Security. Yet, the availability of a compact high-spectral brilliance X-ray sources is limited. A technique to produce X-rays with...
来源: 评论
Should security researchers experiment more and draw more inferences?  4
Should security researchers experiment more and draw more in...
收藏 引用
4th Workshop on Cyber Security Experimentation and Test, CSET 2011
作者: Killourhy, Kevin S. Maxion, Roy A. Dependable Systems Laboratory Computer Science Department Carnegie Mellon University 5000 Forbes Ave PittsburghPA15213 United States
Two methodological practices are well established in other scientific disciplines yet remain rare in computer-security research: comparative experiments and statistical inferences. Comparative experiments offer the on... 详细信息
来源: 评论
Interference is not noise
Interference is not noise
收藏 引用
2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011
作者: Bodas, Shreeshankar Shah, Devavrat Wischik, Damon Laboratory for Information and Decision Systems Massachusetts Institute of Technology United States Department of Computer Science University College London United Kingdom
This paper looks at the problem of designing wireless medium access algorithms. Inter-user interference at the receivers is an important characteristic of wireless networks. We show that decoding (or canceling) this i... 详细信息
来源: 评论
SOLARE: Self-organizing latency-aware resource ensemble
SOLARE: Self-organizing latency-aware resource ensemble
收藏 引用
13th IEEE International Workshop on FTDCS 2011, the 8th International Conference on ATC 2011, the 8th International Conference on UIC 2011 and the 13th IEEE International Conference on HPCC 2011
作者: Eom, Heungsik Wolinsky, David Isaac Figueiredo, Renato J. Advanced Computing and Information Systems Laboratory Department of Electrical and Computer Engineering University of Florida Gainesville FL United States Department of Computer Science Yale University New Haven United States
This paper proposes and evaluates Self-Organizing Latency-Aware Resource Ensemble (SOLARE), a peer-to-peer self-organizing and self-managing cluster system based upon network coordinates and utility functions. In cont... 详细信息
来源: 评论
Designing for compliance: Norms and goals
Designing for compliance: Norms and goals
收藏 引用
5th International Symposium on Rules: Research-Based and Industry-Focused, RuleML 2011, Collocated with the International Business Rules Forum, BRF
作者: Governatori, Guido Olivieri, Francesco Scannapieco, Simone Cristani, Matteo Department of Computer Science University of Verona Italy NICTA Queensland Research Laboratory Australia Institute for Integrated and Intelligent Systems Griffith University Australia
We address the problem of define a modal defeasible theory able to capture intuitions as "being compliant" with a set of norms and a set of goals. We will treat norms and goals as modalised literals. From th... 详细信息
来源: 评论