咨询与建议

限定检索结果

文献类型

  • 1,088 篇 会议
  • 722 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,813 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,152 篇 工学
    • 749 篇 计算机科学与技术...
    • 554 篇 软件工程
    • 214 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 140 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 106 篇 机械工程
    • 87 篇 生物工程
    • 51 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 44 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 564 篇 理学
    • 315 篇 数学
    • 120 篇 物理学
    • 108 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 305 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 50 篇 医学
    • 42 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 42 篇 法学
    • 33 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 36 篇 training
  • 35 篇 bandwidth
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 41 篇 institute of com...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 37 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 32 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 128 篇 hai jin
  • 46 篇 xiaowei li
  • 44 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,674 篇 英文
  • 82 篇 中文
  • 62 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1813 条 记 录,以下是1781-1790 订阅
排序:
Cache adaptive write allocate policy
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2007年 第2期44卷 348-354页
作者: Huan, Dandan Li, Zusong Hu, Weiwu Liu, Zhiyong Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Graduate University Chinese Academy of Sciences Beijing 100049 China
The bandwidth becomes the major bottleneck of the performance improvement for modern microprocessors. A cache adaptive write allocate policy that improves the bandwidth of microprocessor significantly is proposed by i... 详细信息
来源: 评论
Innovative architecture-level power estimation methodology for godson processor
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2007年 第5期44卷 782-789页
作者: Huang, Kun Zhang, Longbing Hu, Weiwu Zhang, Ge Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Graduate University Chinese Academy of Sciences Beijing 100049 China
Now the research of computer architecture focuses on how to utilize the energy of CPU to attain high performance as much as possible. Obviously the architecture-level power estimation tool is important. Existing archi... 详细信息
来源: 评论
Fault tolerant communication algorithm for network on chip
收藏 引用
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics 2007年 第4期19卷 508-514页
作者: Zhang, Lei Li, Huawei Li, Xiaowei Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Beijing 100080 China Advanced Test Technology Laboratory Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Graduate University Chinese Academy of Sciences Beijing 100049 China
This paper proposes a random routing algorithm with end-to-end feedback. Random routing has the capability of handling random transmission errors efficiently with high forwarding speed. End-to-end feedback promises th... 详细信息
来源: 评论
High Performance General-Purpose Microprocessors: Past and Future
收藏 引用
Journal of Computer Science & technology 2006年 第5期21卷 631-640页
作者: 胡伟武 侯锐 肖俊华 章隆宾 Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 P.R. China
It can be observed from looking backward that processor architecture is improved through spirally shifting from simple to complex and from complex to simple. Nowadays we are facing another shifting from complex to sim... 详细信息
来源: 评论
Improved adaptive buffer replacement algorithm used for second level buffer
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2007年 第8期44卷 1331-1338页
作者: Sun, Guozhong Yuan, Qingbo Chen, Mingyu Fan, Jianping National Research Center for Intelligent Computing Systems Institute of Computing Technology Chinese Acad. of Sci. Beijing 100080 China Graduate University Chinese Acad. of Sci. Beijing 100049 China Key Laboratory of Computer System and Architecture Chinese Acad. of Sci. Beijing 100080 China Institute of Computing Technology Chinese Acad. of Sci. Beijing 100080 China
In a cluster or a database server system, the performance of some data intensive applications will be degraded much because of the limited local memory and large amount of interactions with slow disk. In high speed ne... 详细信息
来源: 评论
Locality and parallelism optimization for dynamic programming algorithm in bioinformatics
Locality and parallelism optimization for dynamic programmin...
收藏 引用
2006 ACM/IEEE Conference on Supercomputing, SC'06
作者: Tan, Guangming Feng, Shengzhong Sun, Ninghui Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Graduate School Chinese Academy of Sciences
Dynamic programming has been one of the most efficient approaches to sequence analysis and structure prediction in biology. However, their performance is limited due to the drastic increase in both the number of biolo... 详细信息
来源: 评论
A Component Based Design Tool for Networked Embedded Software Supporting Non-Functional Analysis
A Component Based Design Tool for Networked Embedded Softwar...
收藏 引用
International Conference on Grid and Cooperative computing Workshops (GCCW)
作者: Ke Shi Services Computing Technology and System Laboratory School of Computer Science & Technology Huazhong University of Science and Technology Wuhan China
In this paper a new approach for building networked embedded software is presented. The approach is based on the composition of reusable components with the addition of a perspective contract principle for modeling no... 详细信息
来源: 评论
Virtual storage image implementation in a SAN system to improve storage capacity, fault tolerance and bandwidth
Virtual storage image implementation in a SAN system to impr...
收藏 引用
INTERMAG 2006 - IEEE International Magnetics Conference
作者: Deng, Y. Wang, F. Zhou, K. Wu, S. Center for Grid Computing Cambridge-Cranfteld High Performance Computing Facilities Cranfield University Campus Bedfordshire MK430AL United Kingdom Key Laboratory of Data Storage System Ministry of Education Huazhong University of Science and Technology Wuhan 430074 China
No abstract available
来源: 评论
Virtual machine-based invasion detection system for the virtual computing environment
收藏 引用
High technology Letters 2006年 第4期12卷 379-384页
作者: Zeng, Yu Wang, Jie Sun, Ninghui Li, Jun Nie, Hua Research and Development Center for National Intelligence Computing System Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
Under visualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in trad... 详细信息
来源: 评论
A virtual machine-based invasion detection system for the virtual computing environment
收藏 引用
High technology Letters 2006年 第4期12卷 379-384页
作者: 曾宇 Wang Jie Sun Ninghui Li Jun Nie Hua Research and Development Center for National Intelligence Computing System Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 P.R. China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 P.R. China
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra... 详细信息
来源: 评论