咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 223 篇 期刊文献

馆藏范围

  • 831 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 635 篇 工学
    • 536 篇 计算机科学与技术...
    • 447 篇 软件工程
    • 123 篇 信息与通信工程
    • 90 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 356 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 87 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 university of ch...
  • 27 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 789 篇 英文
  • 31 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
831 条 记 录,以下是391-400 订阅
排序:
MCVP-NoC: Many-Core Virtual Platform with Networks-on-Chip support
MCVP-NoC: Many-Core Virtual Platform with Networks-on-Chip s...
收藏 引用
International Conference on ASIC
作者: Dexue Zhang Xiaoyang Zeng Zongyan Wang Weike Wang Xinhua Chen State Key Lab. of ASIC & System Fudan University Shanghai China College of Information Science and Engineering Shandong University of Science and Technology Qingdao China Qingdao ShanHai Microelectronics Co. Ltd. Qingdao China
Many-core SoC (MCSoC) design is one of chip design trends and challenges. Modeling and simulation for large scale MCSoC design is the key to get it right the first time. NoC is the most important component of future M... 详细信息
来源: 评论
Motion image sequence space-time super resolution reconstruction based on Zernike-moment
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (science and Technology) 2013年 第SUPPL.2期44卷 294-299页
作者: Liu, Honggang Du, Junping Liang, Meiyu Wang, Chao Cao, Shouxin Beijing Key Lab. of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
A method of spatial super-resolution was proposed based on the fuzzy registration. Firstly, the compensated frame that is blurred was obtained using optical flow and motion compensation methods. Then, pixels were divi... 详细信息
来源: 评论
Multi-source image fusion algorithm based on SCDPT
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (science and Technology) 2013年 第SUPPL.2期44卷 289-293页
作者: Song, Fuzhao Du, Junping Hou, Lisha Wang, Qian Bai, Erwei Lu, Cheng Beijing Key Lab. of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
An image fusion algorithm based on SCDPT was proposed, which is under the background of the space docking. The image fusion rule was proposed based on matching degrees-integrated energy region, and applied to the meth... 详细信息
来源: 评论
A novel discrete differential evolution based cost aware data redundancy scheme for cloud providers
收藏 引用
Journal of Computational Information systems 2013年 第22期9卷 8879-8888页
作者: Zhong, Ruiming Liu, Chuanyi Wang, Chunlu Fang, Binxing Xiang, Fei School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China School of Software Engineering Beijing University of Posts and Telecommunications Beijing 100876 China Key Lab. of Trustworthy Distributed Computing and Service of the Ministry of Education of China Beijing University of Posts and Telecommunications Beijing 100876 China
Data availab.lity is a desirable feature for all cloud providers. However, data reliability and disaster recovery cost are always two incompatible goals because adoption of data redundancy will bring incremental cost.... 详细信息
来源: 评论
A high-performance algorithm for frequent itemset mining
A high-performance algorithm for frequent itemset mining
收藏 引用
13th International Conference on Web-Age Information Management, WAIM 2012
作者: Qu, Jun-Feng Liu, Mengchi State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan 430072 China
Frequent itemsets, also called frequent patterns, are important information about databases, and mining efficiently frequent itemsets is a core problem in data mining area. Pattern growth approaches, such as the class... 详细信息
来源: 评论
Usability analysis of Web Service behavior based on interface automata
Usability analysis of Web Service behavior based on interfac...
收藏 引用
2012 IEEE 3rd International Conference on software Engineering and Service science, ICSESS 2012
作者: Zhang, Yan Yu, Xiaofeng Zhang, Tian Department of Computer Science and Technology Beijing Electronic Science and Technology Institute Beijing 100070 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China School of Business State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
In the Web Service world, it is an important technique that taking the usable behaviors in the existed web services provides some value-added functions by the service composition. Therefore, the usability analysis of ... 详细信息
来源: 评论
Discriminant graph based linear embedding
Discriminant graph based linear embedding
收藏 引用
8th International Conference on Intelligent Computing Technology, ICIC 2012
作者: Li, Bo Liu, Jin Dong, Wen-Yong Zhang, Wen-Sheng School of Computer Science and Technology Wuhan University of Science and Technology 430081 Wuhan China State Key Lab. for Novel Software Technology Nanjing China State Key Lab. of Software Engineering Wuhan China Institute of Automation Chinese Academy of Science Beijing China
LLE is a nonlinear dimensionality reduction method, which has been successfully applied to data visualization. Based on the assumption of local linearity, LLE can compute the weights between the KNN nodes using the lo... 详细信息
来源: 评论
Research of deep packet inspection system based on the MapReduce
收藏 引用
Journal of Computational Information systems 2013年 第7期9卷 2587-2594页
作者: Wang, Jinsong Wei, Jun Lin, Sheng Huang, Wei Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China
In this paper, we propose a deep packet inspection system based on the MapReduce. The MapReduce which is a parallel distributed programming model developed by Google applies the technology of deep packet inspection. N... 详细信息
来源: 评论
Abnormal network traffic detection approach based on alive entropy
收藏 引用
Tongxin Xuebao/Journal on Communications 2013年 第SUPPL.2期34卷 51-57页
作者: Mu, Xiang-Kun Wang, Jin-Song Xue, Yu-Feng Huang, Wei Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China
A novel alive entropy-based detection approach was proposed, which detects the abnormal network traffic based on the values of alive entropies. The alive entropies calculated based on the NetFlow data coming from the ... 详细信息
来源: 评论
Unistroke gestures on multi-touch interaction: Supporting flexible touches with key stroke extraction  12
Unistroke gestures on multi-touch interaction: Supporting fl...
收藏 引用
2012 17th ACM International Conference on Intelligent User Interfaces, IUI'12
作者: Jiang, Yingying Tian, Feng Zhang, Xiaolong Liu, Wei Dai, Guozhong Wang, Hongan Intelligence Engineering Lab. Institute of Software Chinese Academy of Sciences Beijing China Pennsylvania State University United States State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
Gesture inputs on multi-touch tabletops usually involve multiple fingers (more than two) and casual touchdowns or liftoffs of fingers. This flexibility of touch gestures allows more natural user interaction, but also ... 详细信息
来源: 评论