咨询与建议

限定检索结果

文献类型

  • 631 篇 会议
  • 377 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 688 篇 工学
    • 507 篇 计算机科学与技术...
    • 308 篇 软件工程
    • 116 篇 电子科学与技术(可...
    • 100 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 57 篇 电气工程
    • 54 篇 机械工程
    • 48 篇 动力工程及工程热...
    • 46 篇 生物工程
    • 23 篇 光学工程
    • 23 篇 化学工程与技术
    • 23 篇 生物医学工程(可授...
    • 20 篇 材料科学与工程(可...
    • 18 篇 建筑学
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 15 篇 环境科学与工程(可...
    • 14 篇 土木工程
    • 14 篇 交通运输工程
  • 254 篇 理学
    • 140 篇 数学
    • 52 篇 生物学
    • 45 篇 物理学
    • 41 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 27 篇 化学
  • 150 篇 管理学
    • 123 篇 管理科学与工程(可...
    • 39 篇 工商管理
    • 32 篇 图书情报与档案管...
  • 28 篇 医学
    • 24 篇 临床医学
    • 22 篇 基础医学(可授医学...
  • 12 篇 经济学
  • 8 篇 法学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 73 篇 computer archite...
  • 38 篇 laboratories
  • 35 篇 hardware
  • 33 篇 delay
  • 30 篇 circuit faults
  • 26 篇 computational mo...
  • 24 篇 bandwidth
  • 21 篇 costs
  • 20 篇 circuit testing
  • 20 篇 protocols
  • 20 篇 clocks
  • 19 篇 throughput
  • 19 篇 wireless sensor ...
  • 19 篇 training
  • 18 篇 optimization
  • 18 篇 microprocessors
  • 17 篇 benchmarking
  • 16 篇 routing
  • 16 篇 deep learning
  • 16 篇 fault tolerance

机构

  • 272 篇 state key labora...
  • 164 篇 university of ch...
  • 94 篇 key laboratory o...
  • 82 篇 key laboratory o...
  • 54 篇 institute of com...
  • 41 篇 graduate univers...
  • 33 篇 chinese academy ...
  • 31 篇 key laboratory o...
  • 27 篇 national enginee...
  • 26 篇 state key labora...
  • 24 篇 graduate univers...
  • 22 篇 key laboratory o...
  • 19 篇 school of comput...
  • 19 篇 loongson technol...
  • 19 篇 state key labora...
  • 17 篇 chinese academy ...
  • 17 篇 department of el...
  • 16 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 graduate school ...

作者

  • 89 篇 xiaowei li
  • 48 篇 li xiaowei
  • 43 篇 huawei li
  • 33 篇 yu hu
  • 33 篇 yinhe han
  • 30 篇 zhou mengchu
  • 29 篇 wang lei
  • 29 篇 zhan jianfeng
  • 27 篇 fan dongrui
  • 25 篇 hu yu
  • 24 篇 dongrui fan
  • 24 篇 li huawei
  • 24 篇 sun ninghui
  • 22 篇 tan guangming
  • 22 篇 chen mingyu
  • 22 篇 ye xiaochun
  • 21 篇 gao wanling
  • 19 篇 shen linlin
  • 18 篇 han yinhe
  • 17 篇 ninghui sun

语言

  • 930 篇 英文
  • 61 篇 中文
  • 21 篇 其他
检索条件"机构=Key Laboratory of Computer System and Architecture Institute of Computing Technology"
1010 条 记 录,以下是871-880 订阅
排序:
Extracting all minimal siphons from maximal unmarked siphons in manufacturing-oriented Petri nets
Extracting all minimal siphons from maximal unmarked siphons...
收藏 引用
IEEE International Conference on Automation Science and Engineering (CASE)
作者: ShouGuang Wang MengChu Zhou ChengYing Wang College of Information & Electronic Engineering Zhejiang Gongshang University Hangzhou China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA MoE Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
Deadlock control is an important research issue in automated manufacturing systems that have a high degree of resource sharing and concurrency. Since minimal siphons are closely tied with deadlocks in Petri net models... 详细信息
来源: 评论
A Relational Taxonomy of Services for Large Scale Service Repositories
A Relational Taxonomy of Services for Large Scale Service Re...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Yan Wu Chungang Yan Zhijun Ding Pengwei Wang Changjun Jiang Mengchu Zhou Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China School of Electronics and Information Engineering Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
With the rapid development of service-oriented computing (SOC) and service-oriented architecture (SOA), the number of services is rapidly increasing. How to organize and manage services effectively in repositories to ... 详细信息
来源: 评论
Energy Saving Strategy of Power system Cluster Based on Container Virtualization
Energy Saving Strategy of Power System Cluster Based on Cont...
收藏 引用
IEEE Asia Power and Energy Engineering Conference (APEEC)
作者: Ran Zheng Hao Wang Hai Jin Dechao Xu Yong Chen Xiaomeng Li Yufei Rao Zhenan Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory of Power Grid Safety and Energy Conservation China Electric Power Research Institute Haidian District Beijing China State Grid Henan Electric Power Company Electric Power Research Institute Zhengzhou China
With the continuous development of power grids, the scale of supercomputing clusters has also gradually increased to carry a large number of power system simulation calculations, and the problem of high energy consump...
来源: 评论
Auto-MatRegressor材料性能自动预测器:解放材料机器学习"调参师"
收藏 引用
Science Bulletin 2023年 第12期68卷 1259-1270,M0004页
作者: 刘悦 王双燕 杨正伟 Maxim Avdeev 施思齐 School of Computer Engineering and Science Shanghai UniversityShanghai 200444China Shanghai Engineering Research Center of Intelligent Computing System Shanghai 200444China State Key Laboratory of Advanced Special Steel School of Materials Science and EngineeringShanghai UniversityShanghai 200444China Materials Genome Institute Shanghai UniversityShanghai 200444China Zhejiang Laboratory Hangzhou 311100China Australian Nuclear Science and Technology Organisation Sydney 2232Australia School of Chemistry The University of SydneySydney 2006Australia
机器学习因其能够快速、精准拟合数据的潜在模式而被广泛应用于材料构效关系研究。然而,材料科学家往往需要进行繁琐的模型选择及参数寻优才能构建出高精度预测模型,为了解放材料机器学习"调参师",本文研发了基于元学习的材... 详细信息
来源: 评论
Fusion-Catalyzed Pruning for Optimizing Deep Learning on Intelligent Edge Devices
arXiv
收藏 引用
arXiv 2020年
作者: Li, Guangli Ma, Xiu Wang, Xueying Liu, Lei Xue, Jingling Feng, Xiaobing State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100190 China College of Computer Science and Technology Jilin University Changchun130012 China School of Computer Science and Engineering University of New South Wales SydneyNSW2052 Australia
The increasing computational cost of deep neural network models limits the applicability of intelligent applications on resource-constrained edge devices. While a number of neural network pruning methods have been pro... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Fast slide mark compact algorithm
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2008年 第10期36卷 1955-1960页
作者: Zou, Qiong Zhang, Long-Bing Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Allocation order is the best for locality, which slide mark compact algorithm is based on. But traditional design made the algorithm's overhead too large. We proposed a fast slide mark compact algorithm, which red... 详细信息
来源: 评论
Find Your Online Social Friends from Mobile Internet Traffic
Find Your Online Social Friends from Mobile Internet Traffic
收藏 引用
IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)
作者: Yi Zhang Yuanyuan Qiao Yanting Zhang Nanfei Shu Yizhe Song Jie Yang Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China Technology Research Institute Aisino Corporation Beijing China School of Electronic Engineering and Computer Science Queen Mary University of London London England
Increasingly more mobile Internet traffic is produced which contains ample personal information related to user mobility and website browsing behavior. Prior research has attempted to recommend friends based on Global... 详细信息
来源: 评论
Petri net-based scheduling analysis of dual-arm cluster tools with wafer revisiting
Petri net-based scheduling analysis of dual-arm cluster tool...
收藏 引用
IEEE International Conference on Automation Science and Engineering (CASE)
作者: Yan Qiao NaiQi Wu MengChu Zhou Department of Industrial Engineering School of Electro-Mechanical Engineering Guangdong University of Technology Guangzhou China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
With wafer revisit, it is complicated to schedule cluster tools in semiconductor fabrication. In wafer fabrication processes, such as atomic layer deposition (ALD), the wafers need to visit some process modules for a ... 详细信息
来源: 评论