咨询与建议

限定检索结果

文献类型

  • 612 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 841 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 640 篇 工学
    • 540 篇 计算机科学与技术...
    • 448 篇 软件工程
    • 123 篇 信息与通信工程
    • 93 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 215 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 111 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 13 篇 web services
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 accuracy
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy

机构

  • 91 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 school of comput...
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 791 篇 英文
  • 32 篇 中文
  • 19 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
841 条 记 录,以下是471-480 订阅
排序:
HERO: Heterogeneity-aware erasure coded redundancy optimal allocation for reliable storage in distributed networks
HERO: Heterogeneity-aware erasure coded redundancy optimal a...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Guangping Xu Sheng Lin Gang Wang Xiaoguang Liu Kai Shi Hua Zhang Tianjin Key Lab. of Intelligence Computing and New Software Technology Tianjin China College of Information Tech. and Science Nankai University Tianjin China School of Computer and Communication Tianjin University of Technology Tianjin China
Heterogeneity is the natural feature in distributed networks. Different from the traditional disk array, the amount of data allocated on heterogenous peers may be not the same. To maximize the reliability of stored da... 详细信息
来源: 评论
Cluster-based superseding nearest neighbor queries on uncertain data
收藏 引用
Journal of Convergence Information Technology 2012年 第17期7卷 392-401页
作者: Liu, Wenyuan Li, Wei Du, Ying Chen, Zijun He, Yourui College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China College of Economics and Management Yanshan University Qinhuangdao Hebei 066004 China The Key Lab. for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao Hebei 066004 China
Recently, query processing based on uncertain data is becoming research focuses. Cluster-based superseding nearest neighbor (CSNN) query algorithm on uncertain data is proposed in this paper. We divide the instances o... 详细信息
来源: 评论
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher (extended abstract)
The higher-order meet-in-the-middle attack and its applicati...
收藏 引用
13th International Conference on Cryptology in India, INDOCRYPT 2012
作者: Lu, Jiqiang Wei, Yongzhuang Kim, Jongsung Pasalic, Enes Institute for Infocomm Research Agency for Science Technology and Research 1 Fusionopolis Way #19-01 Connexis Singapore 138632 Singapore Guilin University of Electronic Technology Guilin City Guangxi Province 541004 China State Key Lab. of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China Department of E-Business Kyungnam University 449 Wolyoung-dong Masan Kyungnam Korea Republic of University of Primorska FAMNIT Koper Slovenia
The meet-in-the-middle (MitM) attack is a technique for analysing the security of a block cipher. In this paper, we propose an extension of the MitM attack, which we call the higher-order meet-in-the-middle (HO-MitM) ... 详细信息
来源: 评论
Wide Area Control Framework Design Considering Different Feedback Time Delays
Wide Area Control Framework Design Considering Different Fee...
收藏 引用
IEEE Power and Energy Society General Meeting
作者: Gang Chen Yuanzhang Sun Vaithianathan "Mani" Venkatasubramanian Lin Cheng Jin Lin Anjan Bose Weixing Zhao Cheng Lin State Key Lab. of Power Systems Dept. of Electrical Engineering Tsinghua University Beijing 100084 China School of Electrical Engineering and Computer Science Washington State University Pullman WA 99164-2752 USA Guizhou Electric Power Grid Dispatching and Control Center Guiyang Guizhou 550002 China
In this paper, a framework for a real-time wide area controller is established for damping small-signal instability related events in interconnected power systems. Offline designing is performed to design the centrali... 详细信息
来源: 评论
Optimizing SpMV for diagonal sparse matrices on GPU
Optimizing SpMV for diagonal sparse matrices on GPU
收藏 引用
40th International Conference on Parallel Processing, ICPP 2011
作者: Sun, Xiangzheng Zhang, Yunquan Wang, Ting Zhang, Xianyi Yuan, Liang Rao, Li Lab. of Parallel Software and Computational Science Institute of Software Chinese Academy of Sciences Beijing China State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Graduate University of Chinese Academy of Sciences Beijing China
Sparse Matrix-Vector multiplication (SpMV) is an important computational kernel in scientific applications. Its performance highly depends on the nonzero distribution of sparse matrices. In this paper, we propose a ne... 详细信息
来源: 评论
Collab.ratively modeling buildings from large-scale street-side and remote sensing images
Collaboratively modeling buildings from large-scale street-s...
收藏 引用
2nd International Conference on Multimedia Technology, ICMT 2011
作者: Hua, Wei Zhang, Wei State Key Lab. of CAD and CG College of Computer Science Zhejiang University Hangzhou China
This paper proposed an approach to rapidly generate 3D models for street-side buildings from street-side images, remote sensing images, and GPS information. Traditional modeling methods usually require a single user t... 详细信息
来源: 评论
Self-healing optical access networks (SHOAN) operated by optical switching technologies
收藏 引用
IEEE Transactions on Network and Service Management 2011年 第3期8卷 234-244页
作者: Huang, Anpeng Liu, Siyu Xie, Linzhen Chen, Zhangyuan Mukherjee, Biswanath State Key Lab. of Advanced Optical Communication Systems and Networks China Wireless Communications Lab. PKU-UCLA Joint Research Institute Peking University Beijing 100871 China Department of Computer Science University of California Davis United States
An optical access network should offer low-cost reliable services to its end users. To address this problem, an optimal solution is needed which can turn an optical access architecture into a self-healing system. Henc... 详细信息
来源: 评论
A model of malware passive propagation on the WWW
收藏 引用
Journal of Computational Information systems 2011年 第7期7卷 2593-2600页
作者: Liu, Chunbo Wang, Zhi Jia, Chunfu College of Information Technical Science Nankai University Tianjin 300071 China College of Computer Science and Technology Civil Aviation University of China Tianjin 300300 China State Key Lab. for Novel Software Technology Nanjing University China
Web-based malwares host in websites fixedly and are downloaded onto user's computers automatically while users browse. This passive propagation pattern is different from that of traditional viruses and worms. A pr... 详细信息
来源: 评论
Empirical studies of pen tilting performance in pen-based user interfaces  11
Empirical studies of pen tilting performance in pen-based us...
收藏 引用
Proceedings of the 2011 Visual Information Communication - International Symposium
作者: Tian, Feng Cao, Xiang Lu, Fei Dai, Guozhong Zhang, Xiaolong Wang, Hongan Intelligence Engineering Lab. Institute of Software Chinese Academy of Sciences China Microsoft Research Asia China State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences China Pennsylvania State University United States
Recently, pen tilting has been explored in pen-based user interfaces and has shown potential to improve user interaction in various tasks (e.g., menu selection, modeless object manipulation). However, some basic quest... 详细信息
来源: 评论
Energy conservation using network coding in grid wireless sensor networks
Energy conservation using network coding in grid wireless se...
收藏 引用
International Workshop on Intelligent systems and Applications
作者: Kasireddy, Bharat Wang, Yun Liu, Jin Department of Computer Science Southern Illinois University Edwardsville IL United States State Key Lab. of Software Engineering Wuhan University China
This work investigates the energy consumption rate of an energy-constrained wireless sensor network and demonstrates that sensor energy dissipation can be reduced by employing network coding in terms of routing the sa... 详细信息
来源: 评论