咨询与建议

限定检索结果

文献类型

  • 616 篇 会议
  • 353 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 988 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 442 篇 计算机科学与技术...
    • 365 篇 软件工程
    • 140 篇 信息与通信工程
    • 80 篇 控制科学与工程
    • 64 篇 电气工程
    • 63 篇 生物工程
    • 62 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 42 篇 生物医学工程(可授...
    • 39 篇 机械工程
    • 37 篇 化学工程与技术
    • 34 篇 仪器科学与技术
    • 25 篇 交通运输工程
    • 24 篇 航空宇航科学与技...
    • 22 篇 动力工程及工程热...
    • 20 篇 土木工程
  • 314 篇 理学
    • 147 篇 数学
    • 101 篇 物理学
    • 77 篇 生物学
    • 41 篇 化学
    • 41 篇 统计学(可授理学、...
    • 28 篇 系统科学
  • 186 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 79 篇 图书情报与档案管...
    • 47 篇 工商管理
  • 60 篇 医学
    • 53 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 20 篇 药学(可授医学、理...
    • 19 篇 公共卫生与预防医...
  • 34 篇 法学
    • 32 篇 社会学
  • 21 篇 教育学
  • 12 篇 经济学
  • 7 篇 农学
  • 3 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 software enginee...
  • 20 篇 semantics
  • 20 篇 training
  • 17 篇 feature extracti...
  • 17 篇 software
  • 16 篇 web services
  • 13 篇 deep learning
  • 13 篇 information tech...
  • 13 篇 machine learning
  • 12 篇 informatics
  • 12 篇 data mining
  • 12 篇 testing
  • 12 篇 accuracy
  • 11 篇 computational mo...
  • 10 篇 educational inst...
  • 10 篇 quality of servi...
  • 10 篇 optimization
  • 10 篇 predictive model...
  • 10 篇 analytical model...
  • 10 篇 convolutional ne...

机构

  • 27 篇 national enginee...
  • 23 篇 university of ch...
  • 19 篇 key laboratory o...
  • 19 篇 institute of inf...
  • 13 篇 college of compu...
  • 12 篇 school of electr...
  • 12 篇 guangdong provin...
  • 12 篇 institute of sof...
  • 10 篇 shenzhen institu...
  • 9 篇 cas center for e...
  • 9 篇 health managemen...
  • 9 篇 health systems a...
  • 9 篇 science & techno...
  • 9 篇 julius centre fo...
  • 9 篇 national key lab...
  • 9 篇 department of co...
  • 9 篇 guangdong key la...
  • 9 篇 laboratory for i...
  • 9 篇 science and tech...
  • 8 篇 centre for heart...

作者

  • 29 篇 bieliková mária
  • 21 篇 shen linlin
  • 13 篇 valentino vranić
  • 12 篇 vranic valentino
  • 10 篇 zheng changwen
  • 10 篇 vranić valentino
  • 9 篇 wang qing
  • 9 篇 qiang wenwen
  • 9 篇 linlin shen
  • 7 篇 barla michal
  • 7 篇 wang jinbao
  • 7 篇 tao dacheng
  • 7 篇 yunhao liu
  • 7 篇 gao can
  • 7 篇 si lingyu
  • 6 篇 chen zhong
  • 6 篇 bin hu
  • 6 篇 li jiangmeng
  • 6 篇 dakić pavle
  • 6 篇 shi lin

语言

  • 932 篇 英文
  • 34 篇 其他
  • 23 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Institute of System and Software Engineering and Information Technologies"
988 条 记 录,以下是931-940 订阅
排序:
Novel BCD adders and their reversible logic implementation for IEEE 754r format
Novel BCD adders and their reversible logic implementation f...
收藏 引用
19th International Conference on VLSI Design held jointly with 5th International Conference on Embedded systems Design
作者: Thapliyal, Himanshu Kotiyal, Saurabh Srinivas, M.B. Center for VLSI and Embedded System Technologies International Institute of Information Technology Hyderabad-500019 India Department of Computer Engineering SIT Kukas Jaipur India
IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and a major enhancement to the standard is the addition of decimal format. This paper proposes two novel BCD adders called carry skip and carry... 详细信息
来源: 评论
Modified montgomery modular multiplication using 4:2 Compressor and CSA adder
Modified montgomery modular multiplication using 4:2 Compres...
收藏 引用
Third IEEE International Workshop on Electronic Design, Test and Applications, DELTA 2006
作者: Thapliyal, Himanshu Ramasahayam, Anvesh Kotha, Vivek Reddy Gottimukkula, Kunul Srinivas, M.B. Centre for VLSI and Embedded System Technologies International Institute of Information Technology Hyderabad 500019 India Department of Electronics and Communication Engineering S.R. Engineering College Warangal India
The efficiency of the Public Key encryption systems like RSA and ECC can be improved with the adoption of a faster multiplication scheme. In this paper, Modified Montgomery multiplications and circuit architectures ar... 详细信息
来源: 评论
Towards the Diversity of Sensitive Attributes in k-Anonymity
Towards the Diversity of Sensitive Attributes in k-Anonymity
收藏 引用
Web Intelligence and Intelligent Agent Technology Workshops (WI-IAT)
作者: Min Wu Xiaojun Ye Institute of Information System and Engineering School of Software Tsinghua University Beijing China
Privacy preservation is an important and challenging problem in microdata release. As a de-identification model, k-anonymity has gained much attention recently. While focusing on identity disclosures, k-anonymity does... 详细信息
来源: 评论
The consistent data replication service for distributed computing environments
The consistent data replication service for distributed comp...
收藏 引用
16th International Symposium on Methodologies for Intelligent systems, ISMIS 2006
作者: No, Jaechun Chang, Won Park Sung, Soon Park Dept. of Computer Software College of Electronics and Information Engineering Sejong University Seoul Korea Republic of Intelligent IT System Research Center Korea Electronics Technology Institute Bundang-gu Seongnam-si Korea Republic of Dept. of Computer Science and Engineering College of Science and Engineering Anyang University Anyang Korea Republic of
This paper describes a data replication service for large-scale, data intensive applications whose results can be shared among geographically distributed scientists. We introduce two kinds of data replication techniqu... 详细信息
来源: 评论
A UML Simulator for Behavioral Validation of systems Based on SOA
A UML Simulator for Behavioral Validation of Systems Based o...
收藏 引用
International Conference on Next Generation Web Services Practices (NWeSP)
作者: Hiroyuki Kurahata Taku Fuji Toshiyuki Miyamoto Sadatoshi Kumagai Department of Ele. Electrical and Information Engineering Osaka University Osaka Japan Software Engineering Center Osaka Gas Information System Research Institute Company Limited Osaka Japan
Recently SOA (service oriented architecture) attracts attention as a technique for effective software development. SOA based systems are commonly implemented with the combination of BPEL4WS and Web services. BPEL4WS i... 详细信息
来源: 评论
Adaptive Call Admission Control Based on Enhanced Genetic Algorithm in Wireless/Mobile Network
Adaptive Call Admission Control Based on Enhanced Genetic Al...
收藏 引用
18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006)
作者: Sheng-Ling Wang Yi-Bin Hou Jian-Hui Huang Zhang-Qin Huang School of Electronics and Information Engineering Xi''an Jiaotong University Xi'an China Embedded Software and System Institute Beijing University of technology Beijing China
An adaptive threshold-based Call Admission Control (CAC) scheme used in wireless/mobile network for multi-class services is proposed. In the scheme, each class's CAC thresholds are solved through establishing a re... 详细信息
来源: 评论
Energy Efficient Spatial Coding Technique for Low Power VLSI Applications
Energy Efficient Spatial Coding Technique for Low Power VLSI...
收藏 引用
IEEE International Workshop on system-on-Chip for Real-Time Applications
作者: J.V.R. Ravindra Navya Chittarvu M.B. Srinivas Center for VLSI and Embedded System Technologies (CVEST) International Institute of Information Technology Hyderabad Andhra Pradesh India Gurunanak Engineering College Hyderabad India
In deep-submicron technology (DSM), minimizing the propagation delay and power dissipation on buses is the most important design objective in system-on-chip (SOC) design. In particular, the coupling effects between wi... 详细信息
来源: 评论
General-Service Ballistic Computer Programming Based on B-Method
收藏 引用
Defence Technology(防务技术) 2006年 第3期2卷 178-183页
作者: 郑宇军 张子丘 王金全 薛锦云 Institute of Software Chinese Academy of Sciences Beijing 100080 China Armament Demonstration and Research Center Beijing 100034 China System Engineering Research Institute of Engineer Equipment Beijing 100093 China College of Computer Information Engineering Jiangxi Normal University Nanchang 330027 Jiangxi China
Formal methods offer the promise of significant improvement on quality and reliability of critical embedded software. B-Method is employed to develop general-service ballistic computer programs in the paper, each of w... 详细信息
来源: 评论
Priority mapping problem in static real-time middleware
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2006年 第4期43卷 722-728页
作者: Wang, Baojin Li, Mingshu Wang, Zhigang Institute of Information and Engineering PLA Information and Engineering University Zhengzhou 450002 China Laboratory for Internet Software Technologies Institute of Software Chinese Academy of Sciences Beijing 100080 China
The deadline monotonic (DM) priority assignment scheme and distributed priority ceiling resource access protocol (DPCP) work well with real-time CORBA. In practice, a potentially large number of global unique prioriti... 详细信息
来源: 评论
Priority mapping algorithm without affecting the schedulability of tasks set
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2006年 第6期43卷 1083-1089页
作者: Wang, Baojin Li, Mingshu Institute of Information and Engineering PLA Information and Engineering University Zhengzhou 450002 China Laboratory for Internet Software Technologies Institute of Software Chinese Academy of Sciences Beijing 100080 China Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
In practice, the schedulability of static priority scheduling may be reduced if priority levels of the system are insufficient. When the priority levels that a task set requires are more than the system can support, m... 详细信息
来源: 评论