咨询与建议

限定检索结果

文献类型

  • 140 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 201 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 151 篇 工学
    • 108 篇 计算机科学与技术...
    • 85 篇 软件工程
    • 36 篇 信息与通信工程
    • 23 篇 电子科学与技术(可...
    • 22 篇 控制科学与工程
    • 19 篇 电气工程
    • 13 篇 生物工程
    • 10 篇 光学工程
    • 10 篇 动力工程及工程热...
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 机械工程
    • 7 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 冶金工程
    • 5 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 土木工程
    • 4 篇 轻工技术与工程
  • 96 篇 理学
    • 63 篇 数学
    • 22 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 13 篇 化学
    • 13 篇 生物学
    • 10 篇 系统科学
  • 56 篇 管理学
    • 30 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 5 篇 法学
    • 4 篇 社会学
  • 4 篇 医学

主题

  • 5 篇 computer archite...
  • 5 篇 quality of servi...
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 mathematical mod...
  • 4 篇 web services
  • 3 篇 reinforcement le...
  • 3 篇 simulation
  • 3 篇 markov processes
  • 3 篇 bandwidth
  • 3 篇 monitoring
  • 3 篇 algorithm design...
  • 3 篇 software design
  • 3 篇 mobile communica...
  • 3 篇 hardware
  • 3 篇 network-on-chip
  • 3 篇 data models
  • 2 篇 sensor nodes
  • 2 篇 internet of thin...
  • 2 篇 information syst...

机构

  • 13 篇 tianjin key lab....
  • 11 篇 key laboratory o...
  • 9 篇 state key lab. o...
  • 6 篇 state key lab. o...
  • 6 篇 university of ch...
  • 5 篇 department of co...
  • 5 篇 beijing key lab....
  • 5 篇 state key labora...
  • 4 篇 beijing key lab....
  • 4 篇 school of comput...
  • 3 篇 state key lab. o...
  • 3 篇 college of elect...
  • 3 篇 state key lab. o...
  • 3 篇 school of comput...
  • 3 篇 department of el...
  • 3 篇 state key lab. o...
  • 3 篇 state key lab. o...
  • 3 篇 beijing key labo...
  • 3 篇 college of infor...
  • 3 篇 shanghai jiao to...

作者

  • 7 篇 hongyan cui
  • 5 篇 zhang degan
  • 5 篇 wang dong
  • 4 篇 zhan naijun
  • 4 篇 xiaochun ye
  • 4 篇 zhou xiaofang
  • 4 篇 dongrui fan
  • 4 篇 zhang bo
  • 4 篇 li deng
  • 4 篇 sobelman gerald ...
  • 4 篇 liu yongshan
  • 4 篇 li jianmin
  • 4 篇 yunjie liu
  • 4 篇 xiong xiong
  • 3 篇 lin gan
  • 3 篇 liu jun
  • 3 篇 guangwen yang
  • 3 篇 yang yang
  • 3 篇 weijun hong
  • 3 篇 haohuan fu

语言

  • 188 篇 英文
  • 13 篇 中文
检索条件"机构=Key Lab. of Computer System and Architecture"
201 条 记 录,以下是101-110 订阅
排序:
Memetic three-dimensional gabor feature extraction for hyperspectral imagery classification
Memetic three-dimensional gabor feature extraction for hyper...
收藏 引用
3rd International Conference on Swarm Intelligence, ICSI 2012
作者: Zhu, Zexuan Shen, Linlin Sun, Yiwen He, Shan Ji, Zhen City Key Laboratory of Embedded System Design College of Computer Science and Software Engineering Shenzhen University Shenzhen 518060 China Shenzhen Key Lab. of Biomedical Engineering School of Medicine Shenzhen University 518060 China School of Computer Science University of Birmingham Edgbaston Birmingham B15 2TT United Kingdom
This paper proposes a three-dimensional Gabor feature extraction for pixel-based hyperspectral imagery classification using a memetic algorithm. The proposed algorithm named MGFE combines 3-D Gabor wavelet feature gen... 详细信息
来源: 评论
Energy and thermal aware mapping for mesh-based NoC architectures using multi-objective ant colony algorithm
Energy and thermal aware mapping for mesh-based NoC architec...
收藏 引用
IEEE International Conference on computer Research and Development
作者: Liu, Yanhua Ruan, Ying Lai, Zongsheng Jing, Weiping Dept. of Electronic Computer and Software Systems Institute of Microelectronics Circuit and System East China Normal University Shanghai China Dept. of Electronic Engineering Jiangsu Provincial Key Lab. of ASIC Design Nantong University Nantong China
Where IP cores to be mapped must be carefully solved for any given application in order to optimize different performance metrics in Network-on-Chip (NoC) design flow. The optimization of different performance metrics... 详细信息
来源: 评论
A novel clustering algorithm based on multi-sampling max-min distance and dynamic tunneling method
收藏 引用
Journal of Information and Computational Science 2009年 第2期6卷 637-642页
作者: Lv, Jia Chongqing Key Lab. of Operations Research and System Engineering College of Mathematics and Computer Science Chongqing Normal University Chongqing 400047 China
In view of the limitations that k-means clustering algorithm is sensitive to the initial points and liable to fall into local minimum point, a clustering algorithm based on multi-sampling max-min distance and dynamic ... 详细信息
来源: 评论
A differential public PUF design for lightweight authentication  16
A differential public PUF design for lightweight authenticat...
收藏 引用
2021 International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design, SMACD 2021 and 16th Conference on PhD Research in Microelectronics and Electronics, PRIME 2021
作者: Duan, Shengyu Sai, Gaole School of Computer Engineering and Science Shanghai University Shanghai200444 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China Guangdong Provincial Key Lab of Robotics and Intelligent System Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institutes of Advanced Technology China
Physical Unclonable Functions (PUFs) have emerged as a promising primitive to provide a hardware keyless security mechanism for integrated circuit applications. Public PUFs (PPUFs) address the crucial PUF vulnerabilit... 详细信息
来源: 评论
Anomaly Detection for User Behavior in Wireless Network Based on Cross Entropy
Anomaly Detection for User Behavior in Wireless Network Base...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Chunxiao Zhang Yihong Hu Xinning Zhu Zhigang Guo Junfei Huang Beijing Key Lab. of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
Wi-Fi technology is becoming more and more popular and anomaly detection for user behavior is much required in many fields such as public security, therefore anomaly detection for offline user behavior based on Wi-Fi ... 详细信息
来源: 评论
Research of deep packet inspection system based on the MapReduce
收藏 引用
Journal of Computational Information systems 2013年 第7期9卷 2587-2594页
作者: Wang, Jinsong Wei, Jun Lin, Sheng Huang, Wei Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China
In this paper, we propose a deep packet inspection system based on the MapReduce. The MapReduce which is a parallel distributed programming model developed by Google applies the technology of deep packet inspection. N... 详细信息
来源: 评论
Construct pairwise test suites based on the Bak-Sneppen model of biological evolution
收藏 引用
World Academy of Science, Engineering and Technology 2009年 35卷 224-229页
作者: Yuan, Jianjun Jiang, Changjun Department of Computer Science and Technology The Key Lab. of 'Embedded System and Service Computing' Ministry of Education of China Tongji University Shanghai 201804 China
Pairwise testing, which requires that every combination of valid values of each pair of system factors be covered by at lease one test case, plays an important role in software testing since many faults are caused by ... 详细信息
来源: 评论
A watermark-aware trusted running environment for software clouds
A watermark-aware trusted running environment for software c...
收藏 引用
5th Annual ChinaGrid Conference, ChinaGrid 2010
作者: Fu, Junning Wang, Chaokun Yu, Zhiwei Wang, Jianmin Sun, Jia-Guang School of Software Tsinghua University Beijing 100084 China Tsinghua University Key Lab. for Information System Security School of Software TNLIST Beijing 100084 China Dept. of Computer Sci. and Tech. Tsinghua University Beijing 100084 China
A software cloud is ready-made for software delivery or Software as a Service (SaaS). As it becomes more and more popular, security problems of software running in the cloud also become an important issue. The threats... 详细信息
来源: 评论
Improved continuation power flow method for AC/DC power system
Improved continuation power flow method for AC/DC power syst...
收藏 引用
2011 IEEE Electrical Power and Energy Conference, EPEC 2011
作者: Liu, Chongru Bose, Anjan Han, Minxiao Chen, Xiuyu School of Electrical and Electronic Engineering North China Electric Power University Beijing China State Key Lab. of Power System Tsinghua University Beijing China School of Electrical Engineering and Computer Science Washington State University Pullman WA United States
An improved continuation power flow method for the AC/DC system is proposed in this paper. The three level control strategies and the coordination of the control modes for DC systems are presented. Firstly, the load-t... 详细信息
来源: 评论
Dynamics of a congestion control model in a wireless access network
收藏 引用
Nonlinear Analysis: Real World Applications 2013年 第1期14卷 671-683页
作者: Dong, Tao Liao, Xiaofeng Huang, Tingwen State Key Lab. of Power Transmission Equipment and System Security College of Computer Science Chongqing University Chongqing 400044 China College of Software and Engineering Chongqing University of Posts and Telecommunications Chongqing 400065 China Texas AandM University at Qatar Doha P.O. Box 23874 Qatar
In this paper, a congestion control algorithm with heterogeneous delays in a wireless access network is considered. We regard the communication time delay as a bifurcating parameter to study the dynamical behaviors, i... 详细信息
来源: 评论