咨询与建议

限定检索结果

文献类型

  • 1,106 篇 会议
  • 733 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,842 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,172 篇 工学
    • 768 篇 计算机科学与技术...
    • 556 篇 软件工程
    • 217 篇 信息与通信工程
    • 171 篇 控制科学与工程
    • 141 篇 电子科学与技术(可...
    • 125 篇 电气工程
    • 106 篇 机械工程
    • 89 篇 生物工程
    • 52 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 45 篇 生物医学工程(可授...
    • 44 篇 交通运输工程
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 565 篇 理学
    • 314 篇 数学
    • 120 篇 物理学
    • 109 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 305 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 64 篇 工商管理
  • 50 篇 医学
    • 43 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 23 篇 经济学
    • 23 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 50 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 50 篇 national enginee...
  • 46 篇 the key laborato...
  • 42 篇 school of comput...
  • 41 篇 key laboratory o...
  • 41 篇 institute of com...
  • 40 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 33 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 national enginee...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 28 篇 hubei key labora...

作者

  • 127 篇 hai jin
  • 46 篇 xiaowei li
  • 46 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 23 篇 xiaofei liao
  • 23 篇 shen linlin
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 hu shengshan
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 17 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,661 篇 英文
  • 104 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1842 条 记 录,以下是1141-1150 订阅
排序:
Research of UAV cooperative reconnaissance with selforganization path planning
Research of UAV cooperative reconnaissance with selforganiza...
收藏 引用
2013 International Conference on Computer,Networks and Communication Engineering(ICCNCE 2013)
作者: Liu Minjia Lin Jie Yuan Yuyu School of Computer Science and Technology Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Services Ministry of Education Beijing University of Posts and Telecommunications
Unmanned aerial vehicle (UAV) builds cognitive map for the enemy important targets and anti-aircraft fire threats in the unknown environment. Then UAV tries to avoid the threats and head to important targets where the... 详细信息
来源: 评论
Research of contour extraction for mountain tunnel entrance images
Research of contour extraction for mountain tunnel entrance ...
收藏 引用
2013 International Conference on Computer,Networks and Communication Engineering(ICCNCE 2013)
作者: Liu Minjia Lin Jie Yuan Yuyu School of Computer Science and Technology Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Services Ministry of Education Beijing University of Posts and Telecommunications
Unmanned aerial vehicle (UAV) needs unmanned ground vehicle (UGV) searching the areas, such as tunnel inside the mountain. The technology of UGV extraction image features of mountain tunnel portal is very important. T... 详细信息
来源: 评论
Use the core clusters for the initialization of the clustering based on one-class support vector machine
Use the core clusters for the initialization of the clusteri...
收藏 引用
4th International Conference on Advances in Swarm Intelligence, ICSI 2013
作者: Gu, Lei Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210023 China
The clustering method based on one-class support vector machine has been presented recently. Although this approach can improve the clustering accuracies, it often gains the unstable clustering results because some ra... 详细信息
来源: 评论
An evolutionary semi-supervised subtractive clustering method by seeding
An evolutionary semi-supervised subtractive clustering metho...
收藏 引用
2012 International Conference on Information technology and Software Engineering, ITSE 2012
作者: Gu, Lei Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China School of Computer Science and Technology Nanjing University of Posts and Telecommunication Nanjing 210046 China
A semi-supervised subtractive clustering has been proposed recently. However, it performance depends greatly on the choice of the parameters of the mountain function and only proper parameters enable the clustering me... 详细信息
来源: 评论
Two-dimensional color uncorrelated principal component analysis for feature extraction with application to face recognition
收藏 引用
2012 International Conference on Service-Oriented computing, ICSOC 2012
作者: Zhao, Cairong Miao, Duoqian Department of Computer Science and Technology Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai 7201804 China Ministry of Education Nanjing 210094 China
This paper proposes a two-dimensional color uncorrelated principal component analysis algorithm(2DCUPCA) for unsupervised subspace learning directly from color face images. The 2DCUPCA can be used to explore uncorrela... 详细信息
来源: 评论
A Cooperative Game Based Allocation for Sharing Data Center Networks
A Cooperative Game Based Allocation for Sharing Data Center ...
收藏 引用
IEEE INFOCOM Conference
作者: Jian Guo Fangming Liu Dan Zeng John C. S. Lui Hai Jin Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology China The Chinese University of Hong Kong
In current IaaS datacenters, tenants are suffering unfairness since the network bandwidth is shared in a best-effort manner. To achieve predictable network performance for rented virtual machines (VMs), cloud provider... 详细信息
来源: 评论
Model predictive control for HVAC systems - A review
Model predictive control for HVAC systems - A review
收藏 引用
2013 IEEE International Conference on Automation Science and Engineering, CASE 2013
作者: Kwadzogah, Roger Zhou, Mengchu Li, Sisi Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07013 United States Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China
The world faces an energy problem. Oil supply is gradually running out. Its use is polluting the planet with greenhouse gas. Most alternative energy sources also pose some environmental problems. Hence the efficient u... 详细信息
来源: 评论
A novel unconstrained criterion for blind equalization based on the property of vector norm
A novel unconstrained criterion for blind equalization based...
收藏 引用
3rd International Conference on Materials Science and Information technology, MSIT 2013
作者: Wang, Da Lei Yang, Bin Wu, Ying Wang, Xiu Xiu National Digital Switching System Engineering and Technology Research Center Zhengzhou Henan Province 450002 China National Key Laboratory of Integrated Services Networks Xidian University Xi'an ShaanXi Province 710071 China
This paper proposes a novel unconstrained criterion of blind equalization, which is based on minimizing the difference between two norms of the joint channel-equalizer impulse response. There is no need to impose any ... 详细信息
来源: 评论
Abnormal network traffic detection approach based on alive entropy
收藏 引用
Tongxin Xuebao/Journal on Communications 2013年 第SUPPL.2期34卷 51-57页
作者: Mu, Xiang-Kun Wang, Jin-Song Xue, Yu-Feng Huang, Wei Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China
A novel alive entropy-based detection approach was proposed, which detects the abnormal network traffic based on the values of alive entropies. The alive entropies calculated based on the NetFlow data coming from the ... 详细信息
来源: 评论
Research of deep packet inspection system based on the MapReduce
收藏 引用
Journal of Computational Information systems 2013年 第7期9卷 2587-2594页
作者: Wang, Jinsong Wei, Jun Lin, Sheng Huang, Wei Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China
In this paper, we propose a deep packet inspection system based on the MapReduce. The MapReduce which is a parallel distributed programming model developed by Google applies the technology of deep packet inspection. N... 详细信息
来源: 评论