咨询与建议

限定检索结果

文献类型

  • 1,106 篇 会议
  • 733 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,842 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,172 篇 工学
    • 768 篇 计算机科学与技术...
    • 556 篇 软件工程
    • 217 篇 信息与通信工程
    • 171 篇 控制科学与工程
    • 141 篇 电子科学与技术(可...
    • 125 篇 电气工程
    • 106 篇 机械工程
    • 89 篇 生物工程
    • 52 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 45 篇 生物医学工程(可授...
    • 44 篇 交通运输工程
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 565 篇 理学
    • 314 篇 数学
    • 120 篇 物理学
    • 109 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 305 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 64 篇 工商管理
  • 50 篇 医学
    • 43 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 23 篇 经济学
    • 23 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 50 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 50 篇 national enginee...
  • 46 篇 the key laborato...
  • 42 篇 school of comput...
  • 41 篇 key laboratory o...
  • 41 篇 institute of com...
  • 40 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 33 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 national enginee...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 28 篇 hubei key labora...

作者

  • 127 篇 hai jin
  • 46 篇 xiaowei li
  • 46 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 23 篇 xiaofei liao
  • 23 篇 shen linlin
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 hu shengshan
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 17 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,661 篇 英文
  • 104 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1842 条 记 录,以下是1021-1030 订阅
排序:
Human behavior recognition based on axonometric projections and PHOG feature
收藏 引用
Journal of Computational Information systems 2014年 第8期10卷 3455-3463页
作者: Shen, Xiaoxia Zhang, Hua Gao, Zan Xue, Yanbin Xu, Guangping Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China
Human behavior recognition has become a hot research topic in computer vision. In this paper, we propose an effective method to recognize human behaviors from sequences of depth maps, which provide additional body sha... 详细信息
来源: 评论
Collaborative filtering recommendation algorithm based on weighed grade
收藏 引用
Journal of Computational Information systems 2014年 第23期10卷 9995-10001页
作者: Wang, Huaibin Guo, Jingze Wang, Chundong Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Ministry of Education Tianjin China
In traditional collaborative filtering recommendation algorithms, users' grades are used to calculate the similarity between different items, which is used to predict the result of recommendation further. Same gra... 详细信息
来源: 评论
Null space based discriminant sparse representation large margin for face recognition
Null space based discriminant sparse representation large ma...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Ying Wen Lili Hou Lianghua He Department of Computer Science and Technology East China Normal University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
In this paper, we propose a novel subspace learning algorithm, termed as null space based discriminant sparse representation large margin (NDSLM). There are two contributions in the paper. First, we propose a new expe... 详细信息
来源: 评论
Data Secure Transmission Model Based on Compressed Sensing and Digital Watermarking technology
收藏 引用
Wuhan University Journal of Natural Sciences 2014年 第6期19卷 505-511页
作者: WANG Chundong BAI Yi MO Xiuliang Key Laboratory of Computer Vision and System Ministry of Education/Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly,... 详细信息
来源: 评论
Methods for Reliability Assessment under Irregular Time-Varying-Stress Degradation Testing
收藏 引用
Journal of Donghua University(English Edition) 2014年 第6期31卷 793-795页
作者: 刘天宇 孙权 潘正强 冯静 College of Information System and Management National University of Defense Technology State Key Laboratory of High Performance Computing National University of Defense Technology
Degradation tests are often used to assess the reliability of products with long failure-time or few test units. Much of the previous work on reliability assessment methods has focused on constant-stress degradation t... 详细信息
来源: 评论
An efficient algorithm of information recommendation between groups in social networks
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2015年 第6期43卷 1090-1093页
作者: Huang, Zhen-Hua Zhang, Bo Fang, Qiang Xiang, Yang Department of Computer and Technology Tongji University Shanghai201804 China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China College of Information Mechanical and Electrical Engineering Shanghai Normal University Shanghai200234 China
Information recommendation between groups is one of the most important ways for information sharing and transmitting in social networks. However, it needs exponential time cost to achieve the exact optimal recommendat... 详细信息
来源: 评论
A distributed higher-order pi calculus: Dho-pi-beam
收藏 引用
ICIC Express Letters 2015年 第9期9卷 2615-2621页
作者: Li, Desheng College of Mathematics Physics and Information Engineering Anhui Science and Technology University No. 9 Donghua Road Chuzhou China Key Laboratory of Cloud Computing and Complex System Guilin University of Electronic Technology No. 1 Jinji Road Guilin China
Pi Calculus, a kind of process algebra has been widely used to describe distributed computation system currently, such as Web service and cloud platform. A variant of Pi Calculus, Pi-beam, is proposed with some import... 详细信息
来源: 评论
Research on BP imaging algorithm parallelization using C6678 DSPS
Research on BP imaging algorithm parallelization using C6678...
收藏 引用
IET International Radar Conference 2015
作者: Jiayun Zhao Yuan Yuan Jinghua Wang Ye Jin Beijing Key Laboratory of Embedded Real-time Information Processing Technology Beijing China North China Institute of Computing Technology Beijing China Beijing institute of spacecraft system engineering China academy of space technology Beijing China
Compared to the traditional SAR imaging algorithm, Back Projection(BP) algorithm is an accurate point-by-point imaging radar algorithm based on time-domain, with simple principle and without any approximation error in... 详细信息
来源: 评论
Network Security Situation Evaluation Based on Modified D-S Evidence Theory
收藏 引用
Wuhan University Journal of Natural Sciences 2014年 第5期19卷 409-416页
作者: WANG Chundong ZHANG Yukey Laboratory of Computer Vision and System Ministry of Education/Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
With the rapid development of global information and the increasing dependence on network for people, network security problems are becoming more and more serious. By analyzing the existing security assessment methods... 详细信息
来源: 评论
Response Policies to Process Module Failure in Single-Arm Cluster Tools Subject to Wafer Residency Time Constraints
Response Policies to Process Module Failure in Single-Arm Cl...
收藏 引用
作者: Qiao, Yan Pan, Chun-Rong Wu, Nai-Qi Zhou, Mengchu Department of Industrial Engineering School of Electro-Mechanical Engineering Guangdong University of Technology Guangzhou510006 China School of Mechatronics and Electrical Engineering Jiangxi University of Science and Technology Ganzhou341000 China Institute of Systems Engineering Macau University of Science and Technology Taipa China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102-1982 United States
In semiconductor manufacturing, wafer residency time constraints make the scheduling problem of cluster tools complicated. A process module (PM) in cluster tools is prone to failure. It is crucial to deal with any suc... 详细信息
来源: 评论