咨询与建议

限定检索结果

文献类型

  • 631 篇 会议
  • 377 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 688 篇 工学
    • 507 篇 计算机科学与技术...
    • 308 篇 软件工程
    • 116 篇 电子科学与技术(可...
    • 100 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 57 篇 电气工程
    • 54 篇 机械工程
    • 48 篇 动力工程及工程热...
    • 46 篇 生物工程
    • 23 篇 光学工程
    • 23 篇 化学工程与技术
    • 23 篇 生物医学工程(可授...
    • 20 篇 材料科学与工程(可...
    • 18 篇 建筑学
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 15 篇 环境科学与工程(可...
    • 14 篇 土木工程
    • 14 篇 交通运输工程
  • 254 篇 理学
    • 140 篇 数学
    • 52 篇 生物学
    • 45 篇 物理学
    • 41 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 27 篇 化学
  • 150 篇 管理学
    • 123 篇 管理科学与工程(可...
    • 39 篇 工商管理
    • 32 篇 图书情报与档案管...
  • 28 篇 医学
    • 24 篇 临床医学
    • 22 篇 基础医学(可授医学...
  • 12 篇 经济学
  • 8 篇 法学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 73 篇 computer archite...
  • 38 篇 laboratories
  • 35 篇 hardware
  • 33 篇 delay
  • 30 篇 circuit faults
  • 26 篇 computational mo...
  • 24 篇 bandwidth
  • 21 篇 costs
  • 20 篇 circuit testing
  • 20 篇 protocols
  • 20 篇 clocks
  • 19 篇 throughput
  • 19 篇 wireless sensor ...
  • 19 篇 training
  • 18 篇 optimization
  • 18 篇 microprocessors
  • 17 篇 benchmarking
  • 16 篇 routing
  • 16 篇 deep learning
  • 16 篇 fault tolerance

机构

  • 272 篇 state key labora...
  • 164 篇 university of ch...
  • 94 篇 key laboratory o...
  • 82 篇 key laboratory o...
  • 54 篇 institute of com...
  • 41 篇 graduate univers...
  • 33 篇 chinese academy ...
  • 31 篇 key laboratory o...
  • 27 篇 national enginee...
  • 26 篇 state key labora...
  • 24 篇 graduate univers...
  • 22 篇 key laboratory o...
  • 19 篇 school of comput...
  • 19 篇 loongson technol...
  • 19 篇 state key labora...
  • 17 篇 chinese academy ...
  • 17 篇 department of el...
  • 16 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 graduate school ...

作者

  • 89 篇 xiaowei li
  • 48 篇 li xiaowei
  • 43 篇 huawei li
  • 33 篇 yu hu
  • 33 篇 yinhe han
  • 30 篇 zhou mengchu
  • 29 篇 wang lei
  • 29 篇 zhan jianfeng
  • 27 篇 fan dongrui
  • 25 篇 hu yu
  • 24 篇 dongrui fan
  • 24 篇 li huawei
  • 24 篇 sun ninghui
  • 22 篇 tan guangming
  • 22 篇 chen mingyu
  • 22 篇 ye xiaochun
  • 21 篇 gao wanling
  • 19 篇 shen linlin
  • 18 篇 han yinhe
  • 17 篇 ninghui sun

语言

  • 930 篇 英文
  • 61 篇 中文
  • 21 篇 其他
检索条件"机构=Key Laboratory of Computer System and Architecture Institute of Computing Technology"
1010 条 记 录,以下是181-190 订阅
排序:
CREA: A Checkpoint Based Reliable Micro-architecture for Superscalar Processors
CREA: A Checkpoint Based Reliable Micro-architecture for Sup...
收藏 引用
The 16th Asian Test Symposium(第十六届亚洲测试学术会议)
作者: Shijian Zhang Weiwu Hu Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Acade Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Acade
Conventional temporal redundant techniques to detect transient faults have resulted in considerable performance loss. One major reason for this problem is the reclamation of some critical resources, such as the in... 详细信息
来源: 评论
A new dynamic method of machine learning from transition examples
Journal of Software
收藏 引用
Journal of Software 2011年 第10期6卷 2064-2067页
作者: Zhang, Xiao-Dan Zhang, De-Gan Zhao, De-Xin Kang, Xue-Jing Qiao, Xiao-Dong Institute of Scientific and Technical Information of China Beijing 100038 China Tianjin Key Lab of Intelligent Computing and Novel software Technology Tianjin University of Technology China Key Laboratory of Computer Vision and System Tianjin University of Technology China
It's well known machine learning from examples is an effective method to solve non-linear classification problem. A new dynamic method of machine learning from transition example is given in this paper. This metho... 详细信息
来源: 评论
An Efficient Threshold key-Insulated Signature Scheme
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第6期16卷 658-662页
作者: 陈剑洪 龙宇 陈克非 王永涛 李祥学 Department of Computer Science and Engineering Shanghai Jiaotong University School of Computer Engineering Huaiyin Institute of Technology Shanghai Key Laboratory of Scalable Computing and System Shanghai Jiaotong University Department of Computer Science and Technology East China Normal University
To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS *** a TKIS system,at least k out ... 详细信息
来源: 评论
Exploiting idle register classes for fast spill destination
Exploiting idle register classes for fast spill destination
收藏 引用
22nd ACM International Conference on Supercomputing, ICS'08
作者: Lu, Fang Wang, Lei Feng, Xiaobing Li, Zhiyuan Zhang, Zhaoqing Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100191 China Department of Computer Sciences Purdue University West Lafayette IN 47906 United States
On today's microprocessors, there often exist several different types of registers, e.g. general purpose registers and floating point registers. A given program may use one type of registers much more frequently t... 详细信息
来源: 评论
Extendable pattern-oriented optimization directives
Extendable pattern-oriented optimization directives
收藏 引用
作者: Cui, Huimin Xue, Jingling Wang, Lei Yang, Yang Feng, Xiaobing Fan, Dongrui Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Institute of Computing Technology Beijing China School of Computer Science and Engineering University of New South Wales Sydney NSW Australia
Algorithm-specific, that is, semantic-specific optimizations have been observed to bring significant performance gains, especially for a diverse set of multi/many-core architectures. However, current programming model... 详细信息
来源: 评论
Data protection and provenance in cloud of things environment: Research challenges
收藏 引用
International Journal of Information and computer Security 2020年 第4期12卷 416-435页
作者: Wang, Chundong Yang, Lei Guo, Hao Wan, Fujin Key Laboratory of Computer Vision and System Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin China Global Energy Internet Research Institute Beijing University of Technology Tianjin China Department of College of Computer and Control Engineering Nankai University Tianjin China
Internet of things are increasingly being deployed over the cloud (also referred to as cloud of things) to provide a broader range of services. However, there are serious challenges of CoT in the data protection and s... 详细信息
来源: 评论
Deceptive answer prediction with user preference graph
Deceptive answer prediction with user preference graph
收藏 引用
51st Annual Meeting of the Association for Computational Linguistics, ACL 2013
作者: Li, Fangtao Gao, Yang Zhou, Shuchang Si, Xiance Dai, Decheng Google Research Mountain View Institute of Computing Technology CAS China State Key Laboratory of Computer Architecture Institute of Computing Technology CAS China Department of Computer Science and Technology Tsinghua University China
In Community question answering (QA) sites, malicious users may provide deceptive answers to promote their products or services. It is important to identify and filter out these deceptive answers. In this paper, we fi... 详细信息
来源: 评论
Memory bandwidth optimization of SpMV on GPGPUs
收藏 引用
Frontiers of computer Science 2015年 第3期9卷 431-441页
作者: Chenggang Clarence YAN Hui YU Weizhi XU Yingping ZHANG Bochuan CHEN Zhu TIAN Yuxuan WANG Jian YIN Key Lab of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Institute of Microelectronics Tsinghua University Beijing 100084 China Automation Department Tsinghua University Beijing 100084 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China State Grid Information & Communication Company of Hunan EPC Changsha 410007 China Department of Computer Shandong University Weihai 250101 China
It is an important task to improve performance for sparse matrix vector multiplication (SpMV), and it is a difficult task because of its irregular memory access. Gen- eral purpose GPU (GPGPU) provides high computi... 详细信息
来源: 评论
Reducing Synchronization Cost for Single-Level Store in Mobile systems
收藏 引用
Journal of computer Science & technology 2016年 第4期31卷 836-848页
作者: Yuan-Chao Xu Hu Wan Ke-Ni Qiu Tao Li Wei-Gong Zhang College of Information Engineering Capital Normal University Beijing 100048 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Department of Electrical and Computer Engineering University of Florida Gainesville FL 32611 U.S.A.
Emerging byte-addressable non-volatile memory technologies, such as phase change memory (PCM) and spin- transfer torque RAM (STT-RAM), offer both the byte-addressability of memory and the durability of storage, th... 详细信息
来源: 评论
An efficient and flexible task management for many cores
An efficient and flexible task management for many cores
收藏 引用
作者: Yuan, Nan Yu, Lei Fan, Dong-Rui Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Graduate University of Chinese Academy of Sciences Beijing 100039 China
This paper presents the design and implementation of a runtime system (named "GodRunner") on Godson-T many-core processor to support task-level parallelism efficiently and flexibly. GodRunner abstracts under... 详细信息
来源: 评论