咨询与建议

限定检索结果

文献类型

  • 631 篇 会议
  • 377 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 688 篇 工学
    • 507 篇 计算机科学与技术...
    • 308 篇 软件工程
    • 116 篇 电子科学与技术(可...
    • 100 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 57 篇 电气工程
    • 54 篇 机械工程
    • 48 篇 动力工程及工程热...
    • 46 篇 生物工程
    • 23 篇 光学工程
    • 23 篇 化学工程与技术
    • 23 篇 生物医学工程(可授...
    • 20 篇 材料科学与工程(可...
    • 18 篇 建筑学
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 15 篇 环境科学与工程(可...
    • 14 篇 土木工程
    • 14 篇 交通运输工程
  • 254 篇 理学
    • 140 篇 数学
    • 52 篇 生物学
    • 45 篇 物理学
    • 41 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 27 篇 化学
  • 150 篇 管理学
    • 123 篇 管理科学与工程(可...
    • 39 篇 工商管理
    • 32 篇 图书情报与档案管...
  • 28 篇 医学
    • 24 篇 临床医学
    • 22 篇 基础医学(可授医学...
  • 12 篇 经济学
  • 8 篇 法学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 73 篇 computer archite...
  • 38 篇 laboratories
  • 35 篇 hardware
  • 33 篇 delay
  • 30 篇 circuit faults
  • 26 篇 computational mo...
  • 24 篇 bandwidth
  • 21 篇 costs
  • 20 篇 circuit testing
  • 20 篇 protocols
  • 20 篇 clocks
  • 19 篇 throughput
  • 19 篇 wireless sensor ...
  • 19 篇 training
  • 18 篇 optimization
  • 18 篇 microprocessors
  • 17 篇 benchmarking
  • 16 篇 routing
  • 16 篇 deep learning
  • 16 篇 fault tolerance

机构

  • 272 篇 state key labora...
  • 164 篇 university of ch...
  • 94 篇 key laboratory o...
  • 82 篇 key laboratory o...
  • 54 篇 institute of com...
  • 41 篇 graduate univers...
  • 33 篇 chinese academy ...
  • 31 篇 key laboratory o...
  • 27 篇 national enginee...
  • 26 篇 state key labora...
  • 24 篇 graduate univers...
  • 22 篇 key laboratory o...
  • 19 篇 school of comput...
  • 19 篇 loongson technol...
  • 19 篇 state key labora...
  • 17 篇 chinese academy ...
  • 17 篇 department of el...
  • 16 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 graduate school ...

作者

  • 89 篇 xiaowei li
  • 48 篇 li xiaowei
  • 43 篇 huawei li
  • 33 篇 yu hu
  • 33 篇 yinhe han
  • 30 篇 zhou mengchu
  • 29 篇 wang lei
  • 29 篇 zhan jianfeng
  • 27 篇 fan dongrui
  • 25 篇 hu yu
  • 24 篇 dongrui fan
  • 24 篇 li huawei
  • 24 篇 sun ninghui
  • 22 篇 tan guangming
  • 22 篇 chen mingyu
  • 22 篇 ye xiaochun
  • 21 篇 gao wanling
  • 19 篇 shen linlin
  • 18 篇 han yinhe
  • 17 篇 ninghui sun

语言

  • 930 篇 英文
  • 61 篇 中文
  • 21 篇 其他
检索条件"机构=Key Laboratory of Computer System and Architecture Institute of Computing Technology"
1010 条 记 录,以下是911-920 订阅
排序:
An optimal multicast-based testing algorithm for hotspot avoidance in NoC-based many-core chips
收藏 引用
Harbin Gongye Daxue Xuebao/Journal of Harbin institute of technology 2009年 第SUPPL. 1期41卷 166-171页
作者: Fang, Fang Wang, Wei Han, Yin-He Li, Xiao-Wei Hefei University of Technology Hefei 230009 China System Architecture Key Laboratory Chinese Academy of Sciences Beijing 100190 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
When many-core chips based on Network-on-chip (NoC) are under test, test time can be much reduced by using multicasting communication as data transmission technology and achieving parallel testing of many identical co... 详细信息
来源: 评论
BugListener: Identifying and Synthesizing Bug Reports from Collaborative Live Chats
BugListener: Identifying and Synthesizing Bug Reports from C...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Lin Shi Fangwen Mu Yumin Zhang Ye Yang Junjie Chen Xiao Chen Hanzhi Jiang Ziyou Jiang Qing Wang Laboratory for Internet Software Technologies Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China School of Systems and Enterprises Stevens Institute of Technology Hoboken NJ USA College of Intelligence and Computing Tianjin University Tianjin China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Science &#x0026 Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Beijing China
In community-based software development, developers frequently rely on live-chatting to discuss emergent bugs/errors they encounter in daily development tasks. However, it remains a challenging task to accurately reco... 详细信息
来源: 评论
BugListener: Identifying and Synthesizing Bug Reports from Collaborative Live Chats
arXiv
收藏 引用
arXiv 2022年
作者: Shi, Lin Mu, Fangwen Zhang, Yumin Yang, Ye Chen, Junjie Chen, Xiao Jiang, Hanzhi Jiang, Ziyou Wang, Qing Laboratory for Internet Software Technologies Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Beijing China School of Systems and Enterprises Stevens Institute of Technology HobokenNJ United States Tianjin University College of Intelligence and Computing Tianjin China
In community-based software development, developers frequently rely on live-chatting to discuss emergent bugs/errors they encounter in daily development tasks. However, it remains a challenging task to accurately reco... 详细信息
来源: 评论
SPECBOX: A label-based transparent speculation scheme against transient execution attacks
arXiv
收藏 引用
arXiv 2021年
作者: Tang, Bowen Wu, Chenggang Wang, Zhe Jia, Lichen Yew, Pen-Chung Cheng, Yueqiang Zhang, Yinqian Wang, Chenxi Xu, Guoqing Harry State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China University of the Chinese Academy of Sciences China University of Minnesota Twin Cities United States NIO Security Research United States Southern University of Science and Technology China University of California Los Angeles United States
Speculative execution techniques have been a cornerstone of modern processors to improve instruction-level parallelism. However, recent studies showed that this kind of techniques could be exploited by attackers to le... 详细信息
来源: 评论
Implementation and performance analysis of SDN controller
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2014年 35卷 313-318页
作者: Jiang, Guo-Long Wu, Jie Liu, Ke Fu, Bin-Zhang Chen, Ming-Yu State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100190 China
Based on the Beacon controller, this article first analyzed the implementation of the core functions of Beacon, including the switches connection, topology discovery and routing path calculation. Second, we evaluated ... 详细信息
来源: 评论
Incorporation of Ordinal Optimization into Learning Automata for High Learning Efficiency
Incorporation of Ordinal Optimization into Learning Automata...
收藏 引用
IEEE International Conference on Automation Science and Engineering
作者: JunQi Zhang Cheng Wang Di Zang MengChu Zhou Department of Computer Science and Technology the Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Department of Electrical and Computer Engineering New Jersey Institute of Technology
Learning automata (LA) represent important leaning mechanisms with applications in automated system design, biological system modeling, computer vision, and transportation. They play the critical roles in modeling a p... 详细信息
来源: 评论
CFDIL: A context-aware feature deep interaction learning for app recommendation
Research Square
收藏 引用
Research Square 2021年
作者: Hao, Qingbo Zhu, Ke Wang, Chundong Wang, Peng Mo, Xiuliang Liu, Zhen Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China School of Computer Science and Engineering Tianjin University of Technology Tianjin China Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin China Graduate School of Engineering Nagasaki Institute of Applied Science Nagasaki Japan
The rapid development of Mobile Internet has spawned various mobile applications (apps). A large number of apps make it difficult for users to choose apps conveniently, causing the app overload problem. As the most ef... 详细信息
来源: 评论
Preface
收藏 引用
Journal of computer Science & technology 2021年 第5期36卷 1087-1088页
作者: Hua-Wei Li State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing
In line with the development needs of China’s integrated circuit design field,the China computer Federation(CCF)established the CCF Task Force on Integrated Circuit Design(TFICD)in October *** mission of TFICD includ... 详细信息
来源: 评论
An Ultra-Low Power 3-T Chaotic Map based True Random Number Generator
An Ultra-Low Power 3-T Chaotic Map based True Random Number ...
收藏 引用
IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)
作者: Lijuan Han Yuan Cao Lei Qian Haodong Xie Chip-Hong Chang College of Internet of Tings Engineering Hohai University Chang Zhou China Changzhou Galaxy Century Microelectronics Co. Ltd. State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences School of Electrical and Electronic Engineering Nanyang Technological University Singapore
In this paper, discrete-time chaos generator is exploited for lightweight and energy-efficient true random number generator (TRNG) implementation. The chaos generator is realized with a two-stage tent map circuit with... 详细信息
来源: 评论
Aggregation capacity of wireless sensor networks: Extended network case
Aggregation capacity of wireless sensor networks: Extended n...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Cheng Wang Changjun Jiang Yunhao Liu Xiang-Yang Li Shaojie Tang Huadong Ma Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science University of Tongji Shanghai China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China TNLIST School of Software Tsinghua University China Department of Computer Science Illinois Institute of Technology Chicago IL USA Department of Computer Science Beijing University of Posts and Telecommunications Beijing China
A critical function of wireless sensor networks (WSNs) is data gathering. While, one is often only interested in collecting a relevant function of the sensor measurements at a sink node, rather than downloading all th... 详细信息
来源: 评论