咨询与建议

限定检索结果

文献类型

  • 140 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 201 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 151 篇 工学
    • 108 篇 计算机科学与技术...
    • 85 篇 软件工程
    • 36 篇 信息与通信工程
    • 23 篇 电子科学与技术(可...
    • 22 篇 控制科学与工程
    • 19 篇 电气工程
    • 13 篇 生物工程
    • 10 篇 光学工程
    • 10 篇 动力工程及工程热...
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 机械工程
    • 7 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 冶金工程
    • 5 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 土木工程
    • 4 篇 轻工技术与工程
  • 96 篇 理学
    • 63 篇 数学
    • 22 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 13 篇 化学
    • 13 篇 生物学
    • 10 篇 系统科学
  • 56 篇 管理学
    • 30 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 5 篇 法学
    • 4 篇 社会学
  • 4 篇 医学

主题

  • 5 篇 computer archite...
  • 5 篇 quality of servi...
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 mathematical mod...
  • 4 篇 web services
  • 3 篇 reinforcement le...
  • 3 篇 simulation
  • 3 篇 markov processes
  • 3 篇 bandwidth
  • 3 篇 monitoring
  • 3 篇 algorithm design...
  • 3 篇 software design
  • 3 篇 mobile communica...
  • 3 篇 hardware
  • 3 篇 network-on-chip
  • 3 篇 data models
  • 2 篇 sensor nodes
  • 2 篇 internet of thin...
  • 2 篇 information syst...

机构

  • 13 篇 tianjin key lab....
  • 11 篇 key laboratory o...
  • 9 篇 state key lab. o...
  • 6 篇 state key lab. o...
  • 6 篇 university of ch...
  • 5 篇 department of co...
  • 5 篇 beijing key lab....
  • 5 篇 state key labora...
  • 4 篇 beijing key lab....
  • 4 篇 school of comput...
  • 3 篇 state key lab. o...
  • 3 篇 college of elect...
  • 3 篇 state key lab. o...
  • 3 篇 school of comput...
  • 3 篇 department of el...
  • 3 篇 state key lab. o...
  • 3 篇 state key lab. o...
  • 3 篇 beijing key labo...
  • 3 篇 college of infor...
  • 3 篇 shanghai jiao to...

作者

  • 7 篇 hongyan cui
  • 5 篇 zhang degan
  • 5 篇 wang dong
  • 4 篇 zhan naijun
  • 4 篇 xiaochun ye
  • 4 篇 zhou xiaofang
  • 4 篇 dongrui fan
  • 4 篇 zhang bo
  • 4 篇 li deng
  • 4 篇 sobelman gerald ...
  • 4 篇 liu yongshan
  • 4 篇 li jianmin
  • 4 篇 yunjie liu
  • 4 篇 xiong xiong
  • 3 篇 lin gan
  • 3 篇 liu jun
  • 3 篇 guangwen yang
  • 3 篇 yang yang
  • 3 篇 weijun hong
  • 3 篇 haohuan fu

语言

  • 188 篇 英文
  • 13 篇 中文
检索条件"机构=Key Lab. of Computer System and Architecture"
201 条 记 录,以下是31-40 订阅
排序:
Sub-sentence division for tree-based machine translation
Sub-sentence division for tree-based machine translation
收藏 引用
Joint Conference of the 47th Annual Meeting of the Association for Computational Linguistics and 4th International Joint Conference on Natural Language Processing of the AFNLP, ACL-IJCNLP 2009
作者: Xiong, Hao Xu, Wenwen Mi, Haitao Liu, Yang Liu, Qun Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences P.O. Box 2704 Beijing 100190 China Key Lab. of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences P.O. Box 2704 Beijing 100190 China
Tree-based statistical machine translation models have made significant progress in recent years, especially when replacing 1-best trees with packed forests. However, as the parsing accuracy usually goes down dramatic... 详细信息
来源: 评论
TACS: A transparent application bandwidth management system
TACS: A transparent application bandwidth management system
收藏 引用
IEEE 9th International Conference on computer and Information Technology, CIT 2009
作者: Chen, Xianqin Long, Xiang Gao, Xiaopeng Ma, Junjie State Key Lab. of Virtual Reality Technology and System School of Computer Science and Technology Beijing University of Aeronautics and Astronautics Beijing 100191 China
With the rapid advance of computer and network technology, more and more applications are deployed in the customer-side network. These applications require different quality of service (QoS), but have to share a few b... 详细信息
来源: 评论
Collosion detection research based on capsule bounding volume
收藏 引用
Journal of Computational Information systems 2014年 第7期10卷 2743-2750页
作者: Kong, Dehan Liu, Yongshan Cui, Na Department of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China The Data Industry Research Lab. Qinhuangdao 066004 China
A collision detection algorithm based on capsule bounding volume (CBV for short) is presented improve the efficiency of Collision detection in three-dimensional scene. This algorithm use CBV to encircle roles and achi... 详细信息
来源: 评论
Improved cryptanalysis of the VMPC stream cipher
收藏 引用
Journal of Computational Information systems 2012年 第2期8卷 831-838页
作者: Li, Shunbo Hu, Yupu Zhao, Yongbin Wang, Yan Department of Mathematics Xidian University Xi'an 710071 China Key Lab. of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Science Xi'an University of Architecture and Technology Xi'an 710055 China
VMPC is a modified RC4 stream cipher proposed in FSE 2004, which is designed especially to resist distinguishing attacks. In this paper, we present a heuristic distinguishing attack against VMPC. By finding the weakne... 详细信息
来源: 评论
An Efficient Scheme for Parallelizing Fast Search Algorithm on SIMD architecture in H.264/AVC  20
An Efficient Scheme for Parallelizing Fast Search Algorithm ...
收藏 引用
20th International Conference on Parallel and Distributed Computing systems, PDCS 2007
作者: Park, Jung-Min Park, Jung-Wook Kim, Cheong-Ghil Park, Gi-Ho Kim, Shin-Dug Department of Computer Science Yonsei University Seoul Korea Republic of Processor Architecture Lab. System LSI Division Samsung Electronics Co. Ltd Giheung Korea Republic of
As the video CODECs become complex increasingly according to the convergence of digital equipments designed for different kinds of specific purposes, the demand of higher performance for video processing is continuous... 详细信息
来源: 评论
A Learning Evasive Email-Based P2P-Like Botnet
收藏 引用
China Communications 2018年 第2期15卷 15-24页
作者: Zhi Wang Meilin Qin Mengqi Chen Chunfu Jia Yong Ma College of Computer and Control Engineering Nankai University Tianjin 300350 China Information Security Evaluation Center of Civil Aviation Civil Aviation University of China Tianjin 300300 China Key Lab. on High Trusted Information System in Hebei Province Baoding 071002 China
Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution... 详细信息
来源: 评论
Standard Analysis for Transfer Delay in CTCS-3
收藏 引用
Chinese Journal of Electronics 2017年 第5期26卷 1057-1063页
作者: CAO Yuan MA Lianchuan XIAO Shuo ZHANG Xia XU Wei National Engineering Research Center of Rail Transportation Operation and Control System Beijing Jiaotong University State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University School of Computer Sciences and Technology China University of Mining & Technology National Mobile Communications Research Lab. Southeast University
According to the standard for the GSM for railway(GSM-R) wireless systems in China train control system level 3(CTCS-3),the control data transfer delay should be no larger than 500 ms with greater than99% *** of both ... 详细信息
来源: 评论
TAX-B2BREC: Multi-Stage Cascade Downstream Company Recommender system Based on Taxation Data  7
TAX-B2BREC: Multi-Stage Cascade Downstream Company Recommend...
收藏 引用
7th IEEE International Conference on Network Intelligence and Digital Content, IC-NIDC 2021
作者: Wang, Shengmin Chu, Yi Qiao, Zhenhao Ma, Lan Zhang, Hao Wang, Zehao Qiao, Yuanyuan Beijing University of Posts and Telecommunications Beijing Lab. of Adv. Info. Networks Beijing Key Lab. of Network System Architecture and Convergence Beijing100876 China The Technology Research Institute Aisino Corporation Beijing100195 China
The public crisis triggered by the COVID-19 pandemic has disastrous effects for B2B markets. With the supply chain and trade disrupted, the benefits of the company have been affected to varying degrees. In order to he... 详细信息
来源: 评论
A collab.rative method for business process oriented requirements acquisition and refining
A collaborative method for business process oriented require...
收藏 引用
2014 International Conference on Software and systems Process, ICSSP 2014
作者: Lai, Han Peng, Rong Ni, Yuze State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China Chongqing Key Lab. of Electronic Commerce and Supply Chain System Chongqing Technology and Business University Chongqing China School of Computer Science and Information Engineering Chongqing Technology and Business University Chongqing China
Requirements Elicitation (RE) is a critical process in system/software engineering. Its goal is to capture the stakeholders expectations, needs and constraints, which can be elicited, analyzed and specified as require... 详细信息
来源: 评论
A scalab.e parallel ray tracing algorithm for satellite imagery
A scalable parallel ray tracing algorithm for satellite imag...
收藏 引用
IEEE International Conference on computer Research and Development
作者: Li, Yu-Gang Zhao, Kun Huang, Yu-Qing Qiu, Zhen-Ge Liu, Zhi-Yong Beijing Lab. of Intelligent Information Technology School of Computer Science BIT Beijing 100081 China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100081 China Institute of Computing Technology Chinese Academy Sciences Beijing China
Ray-tracing, can produce high-quality images, however, the use of ray-tracing has been limited due to its high demands on computational power and memory bandwidth, especially in the case of satellite imagery. In this ... 详细信息
来源: 评论