咨询与建议

限定检索结果

文献类型

  • 1,082 篇 会议
  • 721 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,806 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,147 篇 工学
    • 745 篇 计算机科学与技术...
    • 554 篇 软件工程
    • 214 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 140 篇 电子科学与技术(可...
    • 124 篇 电气工程
    • 106 篇 机械工程
    • 87 篇 生物工程
    • 51 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 44 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 564 篇 理学
    • 315 篇 数学
    • 120 篇 物理学
    • 108 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 305 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 50 篇 医学
    • 42 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 42 篇 法学
    • 33 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 41 篇 institute of com...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 36 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 32 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 126 篇 hai jin
  • 46 篇 xiaowei li
  • 44 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,667 篇 英文
  • 82 篇 中文
  • 62 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1806 条 记 录,以下是191-200 订阅
排序:
Explicit Multi-Symplectic Splitting Methods for the Nonlinear Dirac Equation
收藏 引用
Advances in Applied Mathematics and Mechanics 2014年 第4期6卷 494-514页
作者: Yaming Chen Songhe Song Huajun Zhu Department of Mathematics and System Science and State Key Laboratory of High Performance Computing National University of Defense TechnologyChangsha 410073China State Key Laboratory of Aerodynamics China Aerodynamics Research and Development CenterMianyang 621000China
In this paper,we propose two new explicit multi-symplectic splitting methods for the nonlinear Dirac(NLD)*** on its multi-symplectic formulation,the NLD equation is split into one linear multi-symplectic system and on... 详细信息
来源: 评论
A new watermarking approach based on BP network in wavelet domain
A new watermarking approach based on BP network in wavelet d...
收藏 引用
International Congress on Image and Signal Processing
作者: Liu, Fenglian Liu, Lili Key Laboratory of Computer Vision and System Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technolog Tianjin China
This paper proposes a novel digital watermarking technique based on BP neural networks in wavelet domain. Firstly, the original image is decomposed by DTCWT, and then the watermark bits are added to the selected coeff... 详细信息
来源: 评论
Automatic Web services composition algorithm based on optimal matching
收藏 引用
Journal of Central South University 2011年 第4期18卷 1169-1177页
作者: 王俊丽 丁志军 侯玉兵 Engineering Research Center for Enterprise Digital Technology Ministry of EducationTongji University Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji University Shanghai Branch China Information Technology Designing and Consulting Institute
A novel layered method was proposed to solve the problem of Web services *** this method,services composition problem was formally transformed into the optimal matching problem of every layer,then optimal matching pro... 详细信息
来源: 评论
Semi-Global Leaderless Consensus of Linear Multi-agent systems with Actuator and Communication Constraints
收藏 引用
Journal of systems Science & Complexity 2020年 第4期33卷 882-902页
作者: WANG Jian SHI Liangren GUAN Xinping Department of Automation and Key Laboratory of System Control and Information Processing of Ministry of EducationShanghai Jiao Tong UniversityShanghai 200240China Shanghai Key Laboratory of Navigation and Location-based Services and Academy of Information Technology and Electrical EngineeringShanghai Jiao Tong UniversityShanghai 200240China
This paper studies the leaderless consensus problems of multi-agent systems with input saturation and intermittent communication over directed networks. Both the state feedback and the output feedback consensus algori... 详细信息
来源: 评论
PARBLO:Page-Allocation-Based DRAM Row Buffer Locality Optimization
收藏 引用
Journal of Computer Science & technology 2009年 第6期24卷 1086-1097页
作者: 米伟 冯晓兵 贾耀仓 陈莉 薛京灵 Key Laboratory of Computer System and Architecture Institution of Computing Technology Chinese Academy of Sciences Graduate University of Chinese Academy of Sciences Programming Languages and Compilers Group School of Computer Science and Engineering University of New South Wales
DRAM row buffer conflicts can increase memory access latency significantly. This paper presents a new pageallocation-based optimization that works seamlessly together with some existing hardware and software optimizat... 详细信息
来源: 评论
Improved structural modeling based on conserved domain clusters and structure-anchored alignments
Proceedings of the ACM Symposium on Applied Computing
收藏 引用
Proceedings of the ACM Symposium on Applied computing 2007年 128-132页
作者: Zhang, Fa Xu, Lin Liu, Zhiyong Yuan, Bo Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Science Graduate School Chinese Academy of Science Institute of Computing Technology Chinese Academy of Science Department of Computer Science and Engineering Shanghai Jiaotong University
In this paper, we presented a method to improve structural modeling based on conserved domain clusters and structure-anchored alignments. We first constructed a template library of structural clusters for all conserve... 详细信息
来源: 评论
Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology
收藏 引用
Journal of Computer Science & technology 2007年 第1期22卷 1-14页
作者: 胡伟武 赵继业 钟石强 杨旭 Elio Guidetti 吴永强 Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China ST Microelectronics 39 Chemin du Camp-des-Filles 1228 Plan Les Ouates Geneva Switzerland
This paper introduces the microarchitecture and physical implementation of the Godson-2E processor, which is a four-issue superscalar RISC processor that supports the 64-bit MIPS instruction set. The adoption of the a... 详细信息
来源: 评论
Network-worm-control technology based on the front buffer two-stage leaky bucket algorithm
Network-worm-control technology based on the front buffer tw...
收藏 引用
2010 International Conference on Intelligent Control and Information Processing, ICICIP 2010
作者: Wang, Chundong Chang, Qing Deng, Quancai Wang, Huaibin Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 Tianjin China
A new network-worm-control technology is proposed after having fully analyzed the differences between worm and normal connection requests. Considering the worm characteristic of attacking unique port and dispersing IP... 详细信息
来源: 评论
Searching desktop files based on access logs
Searching desktop files based on access logs
收藏 引用
18th International Conference on Database systems for Advanced Applications, DASFAA 2013
作者: Li, Yukun Zhao, Xiyan Xiao, Yingyuan Wang, Xiaoye Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300384 Tianjin China
People often meet trouble in searching a desktop file when they can not remember exact words of its filename. In this paper, we firstly propose an algorithm to generate access logs by monitoring desktop operations and... 详细信息
来源: 评论
Exploring implicit influence for social recommendation based on GNN
收藏 引用
Soft computing 2024年 第19期28卷 11001-11014页
作者: Liu, Zhewei Yang, Peilin Hao, Qingbo Zheng, Wenguang Xiao, Yingyuan Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
In recent years, the method of using graph neural networks (GNN) to learn users’ social influence has been widely applied to social recommendation and has shown effectiveness, but several important challenges have no... 详细信息
来源: 评论