咨询与建议

限定检索结果

文献类型

  • 1,810 篇 期刊文献
  • 1,625 篇 会议
  • 3 册 图书

馆藏范围

  • 3,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,291 篇 工学
    • 1,564 篇 计算机科学与技术...
    • 1,177 篇 软件工程
    • 438 篇 信息与通信工程
    • 274 篇 电子科学与技术(可...
    • 234 篇 控制科学与工程
    • 232 篇 电气工程
    • 227 篇 生物工程
    • 175 篇 光学工程
    • 151 篇 机械工程
    • 116 篇 生物医学工程(可授...
    • 96 篇 动力工程及工程热...
    • 91 篇 化学工程与技术
    • 89 篇 核科学与技术
    • 79 篇 仪器科学与技术
    • 76 篇 材料科学与工程(可...
    • 67 篇 建筑学
    • 66 篇 土木工程
    • 59 篇 交通运输工程
    • 53 篇 网络空间安全
  • 1,364 篇 理学
    • 589 篇 数学
    • 574 篇 物理学
    • 257 篇 生物学
    • 153 篇 统计学(可授理学、...
    • 104 篇 化学
    • 103 篇 系统科学
  • 518 篇 管理学
    • 318 篇 管理科学与工程(可...
    • 224 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 107 篇 医学
    • 93 篇 临床医学
    • 80 篇 基础医学(可授医学...
  • 54 篇 法学
  • 27 篇 农学
  • 25 篇 经济学
  • 17 篇 教育学
  • 10 篇 艺术学
  • 9 篇 军事学
  • 6 篇 文学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 hadron colliders
  • 91 篇 computer archite...
  • 80 篇 training
  • 79 篇 semantics
  • 79 篇 feature extracti...
  • 76 篇 computational mo...
  • 64 篇 deep learning
  • 58 篇 laboratories
  • 46 篇 hardware
  • 42 篇 accuracy
  • 42 篇 data models
  • 41 篇 machine learning
  • 39 篇 neural networks
  • 36 篇 delay
  • 34 篇 convolution
  • 34 篇 predictive model...
  • 32 篇 optimization
  • 31 篇 higgs bosons
  • 31 篇 costs
  • 30 篇 wireless sensor ...

机构

  • 240 篇 university of ch...
  • 208 篇 state key labora...
  • 191 篇 yerevan physics ...
  • 151 篇 centro brasileir...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 148 篇 universidad iber...
  • 147 篇 indian institute...
  • 146 篇 brunel universit...
  • 146 篇 academy of scien...
  • 143 篇 charles universi...
  • 139 篇 università di to...
  • 136 篇 infn sezione di ...
  • 135 篇 key laboratory o...
  • 134 篇 university of de...
  • 133 篇 imperial college...
  • 133 篇 rwth aachen univ...
  • 131 篇 infn sezione di ...
  • 131 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 111 篇 a. babaev
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 107 篇 v. karjavine
  • 105 篇 n. colino
  • 105 篇 f. moortgat
  • 104 篇 b. clerbaux
  • 104 篇 g. sultanov
  • 103 篇 m. a. ciocci
  • 103 篇 k. lamichhane
  • 103 篇 s. maselli
  • 102 篇 e. migliore
  • 102 篇 p. avery
  • 102 篇 l. silvestris

语言

  • 3,203 篇 英文
  • 128 篇 其他
  • 114 篇 中文
检索条件"机构=Key Laboratory of Computer Architecture Institute of Computing Technology"
3438 条 记 录,以下是3381-3390 订阅
排序:
Generating different realistic humanoid motion
收藏 引用
16th International Conference on Artificial Reality and Telexistence, ICAT 2006
作者: Li, Zhenbo Deng, Yu Li, Hua Key Lab. of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China National Research Center for Intelligent Computing Systems Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Graduate University of Chinese Academy of Sciences Beijing 100039 China
Different realistic humanoid motion can be used in vary situations in animation. It also plays an important role in virtual reality. In this paper, we propose a novel method to generate different realistic humanoid mo... 详细信息
来源: 评论
NXG05-4: Fast Packet Classification using Group Bit Vector
NXG05-4: Fast Packet Classification using Group Bit Vector
收藏 引用
IEEE Globecom 2006
作者: Tong Liu Huawei Li Xiaowei Li Yinhe Han Advanced Test Technology Laboratory Key Laboratory of Computer System anChinesed Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Packet classification is important in fulfilling the requirements of new services such as policy-based routing in next generation networks. In this paper, we propose a novel bit vector based two-dimensional packet cla... 详细信息
来源: 评论
Network anomalous intrusion detection using Fuzzy-Bayes
Network anomalous intrusion detection using Fuzzy-Bayes
收藏 引用
4th IFIP TCI2 International Conference on Intelligent Information Processing, IIP 2006
作者: Adetunmbi, Adebayo O. Shi, Zhiwei Shi, Zhongzhi Adewale, Oiumide S. Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing 100080 China Department of Computer Science Federal University of Technology Ondo State Nigeria
Security of networking systems has been an issue since computer networl
来源: 评论
A framework for automated test generation in intelligent tutoring systems
收藏 引用
1st International Conference on Knowledge Science, Engineering and Management, KSEM 2006
作者: Suqin, Tang Cungen, Cao College of Computer Science and Information Technology Guangxi Normal University Guilin 541004 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
Intelligent tutoring systems have being extensively researched, and are viewed as cost-effective alternatives to traditional education. However, it has been long recognized that development of such systems is labor-in... 详细信息
来源: 评论
Description of fuzzy first-order modal logic based on constant domain semantics
Description of fuzzy first-order modal logic based on consta...
收藏 引用
High-Power Diode Laser technology and Applications IV
作者: Zhang, Zaiyue Sui, Yuefei Cao, Cungen Department of Computer Science Jiangsu University of Science and Technology Zhenjiang Jiangsu 212003 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
As an extension of the traditional modal logic, the fuzzy first-order modal logic is discussed in this paper. A description of fuzzy first-order modal logic based on constant domain semantics is given, and a formal sy... 详细信息
来源: 评论
Virtual machine-based invasion detection system for the virtual computing environment
收藏 引用
High technology Letters 2006年 第4期12卷 379-384页
作者: Zeng, Yu Wang, Jie Sun, Ninghui Li, Jun Nie, Hua Research and Development Center for National Intelligence Computing System Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
Under visualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in trad... 详细信息
来源: 评论
The graph-theoretical properties of partitions and information entropy
The graph-theoretical properties of partitions and informati...
收藏 引用
High-Power Diode Laser technology and Applications IV
作者: Cao, Cungen Sui, Yuefei Xia, Youming Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Department of Computer Science Yunnan Normal University Kunming 650092 Yunnan China
The information entropy, as a measurement of the average amount of information contained in an information system, is used in the classification of objects and the analysis of information systems. The information entr... 详细信息
来源: 评论
A virtual machine-based invasion detection system for the virtual computing environment
收藏 引用
High technology Letters 2006年 第4期12卷 379-384页
作者: 曾宇 Wang Jie Sun Ninghui Li Jun Nie Hua Research and Development Center for National Intelligence Computing System Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 P.R. China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 P.R. China
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra... 详细信息
来源: 评论
Locality and Parallelism Optimization for Dynamic Programming Algorithm in Bioinformatics
Locality and Parallelism Optimization for Dynamic Programmin...
收藏 引用
Supercomputing Conference
作者: Guangming Tan Shengzhong Feng Ninghui Sun Graduate School of Chinese Academy of Sciences China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy and Sciences China
Dynamic programming has been one of the most efficient approaches to sequence analysis and structure prediction in biology. However, their performance is limited due to the drastic increase in both the number of biolo... 详细信息
来源: 评论
A Tamper-resistance key Pre-distribution Scheme for Wireless Sensor Networks
A Tamper-resistance Key Pre-distribution Scheme for Wireless...
收藏 引用
International Conference on Grid and Cooperative computing Workshops (GCCW)
作者: Lei Xie Hongsong Zhu Yongjun Xu Yuefei Zhu Institute of Information Engineering Information and Engineering University Zhengzhou China Advanced Test Technology Laboratory Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy and Sciences Beijing China
Wireless sensor network (WSN), which is integrated with many technologies such as sensor, embedded computing, wireless communication and distributed information processing etc., is becoming an important branch of ubiq... 详细信息
来源: 评论