咨询与建议

限定检索结果

文献类型

  • 1,082 篇 会议
  • 738 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,823 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,164 篇 工学
    • 758 篇 计算机科学与技术...
    • 563 篇 软件工程
    • 219 篇 信息与通信工程
    • 160 篇 控制科学与工程
    • 144 篇 电子科学与技术(可...
    • 135 篇 电气工程
    • 110 篇 机械工程
    • 87 篇 生物工程
    • 52 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 45 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 26 篇 安全科学与工程
  • 570 篇 理学
    • 318 篇 数学
    • 121 篇 物理学
    • 110 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 39 篇 化学
  • 315 篇 管理学
    • 210 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 69 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 43 篇 法学
    • 33 篇 社会学
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 17 篇 农学
  • 11 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 40 篇 institute of com...
  • 36 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 33 篇 university of ch...
  • 31 篇 graduate univers...
  • 29 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 131 篇 hai jin
  • 46 篇 xiaowei li
  • 45 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 22 篇 deqing zou
  • 22 篇 li xiaowei
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 yu hu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,681 篇 英文
  • 82 篇 中文
  • 65 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1823 条 记 录,以下是221-230 订阅
排序:
Container lifecycle-aware scheduling for serverless computing
Container lifecycle-aware scheduling for serverless computin...
收藏 引用
作者: Wu, Song Tao, Zhiheng Fan, Hao Huang, Zhuo Zhang, Xinmin Jin, Hai Yu, Chen Cao, Chun National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Elastic scaling in response to changes on demand is a main benefit of serverless computing. When bursty workloads arrive, a serverless platform launches many new containers and initializes function environments (known... 详细信息
来源: 评论
Research on association rule algorithm based on distributed and weighted FP-growth
Research on association rule algorithm based on distributed ...
收藏 引用
作者: Wang, Huaibin Liu, Yuanchao Wang, Chundong Key Laboratory of Computer Vision and System Tianjin University of Technology China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China
In this paper a distributed weight mining algorithm is proposed based on FP-growth. As an important part of network fault management, the association rule takes effect on eliminating redundant alarms and preventing al... 详细信息
来源: 评论
Research on context-aware computing with uncertainty for proactive service
收藏 引用
International Journal of Modelling, Identification and Control 2009年 第3期8卷 248-255页
作者: Zhang, De-Gan Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin 300191 China Key Lab of Industrial Controlling Technology Zhejiang University Hangzhou 310027 China
It is known to all that context-aware computing with uncertainty is an important part of pervasive computing for proactive service. Because multi-source evidence context-aware information with uncertainty is dynamic a... 详细信息
来源: 评论
New methodologies for parallel architecture
New methodologies for parallel architecture
收藏 引用
作者: Fan, Dong-Rui Li, Xiao-Wei Li, Guo-Jie Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Moore's law continues to grant computer architects ever more transistors in the foreseeable future, and para-llelism is the key to continued performance scaling in modern microprocessors. In this paper, the achiev... 详细信息
来源: 评论
The design methodology of phoenix cluster system software stack
The design methodology of phoenix cluster system software st...
收藏 引用
2007 Asian technology Information Program's (ATIP's) 3rd Workshop on High Performance computing in China - Solution Approaches to Impediments for High Performance computing, CHINA HPC'07
作者: Zhan, Jianfeng Wang, Lei Tu, Bibo Wang, Hui Zhang, Zhihong Jin, Yi Wen, Yu Chen, Yuansheng Wang, Peng Qiu, Bizhu Meng, Dan Sun, Ninghui Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
Though many research groups have explored the design methodology of cluster system software stack, few works discuss what constitutes a good one. In this paper, we choose four criteria throughout the lifecycle of clus... 详细信息
来源: 评论
Robust Learning to Rank Based on Portfolio Theory and AMOSA Algorithm
收藏 引用
IEEE Transactions on systems, Man, and Cybernetics: systems 2017年 第6期47卷 1007-1018页
作者: Li, Jinzhong Liu, Guanjun Yan, Chungang Jiang, Changjun Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science and Technology Tongji University Shanghai201804 China Key Laboratory of Watershed Ecology and Geographical Environment Monitoring NASG Department of Computer Science and Technology Jinggangshan University Ji'an343009 China
Effectiveness is the most important factor considered in the ranking models yielded by algorithms of learning to rank (LTR). Most of the related ranking models only focus on improving the average effectiveness but ign... 详细信息
来源: 评论
Autonomic Performance and Power Control on Virtualized Servers:Survey, Practices, and Trends
收藏 引用
Journal of Computer Science & technology 2014年 第4期29卷 631-645页
作者: 周笑波 蒋昌俊 IEEE ACM Department of Computer Science University of Colorado Colorado Springs U.S.A. The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University CCF Department of Computer Science and Technology Tongji University
Modern datacenter servers hosting popular Internet services face significant and multi-facet challenges in performance and power control. The user-perceived performance is the result of a complex interaction of comple... 详细信息
来源: 评论
A Hierarchical Control Scheme for Active Power-assist Lower-limb Exoskeletons
收藏 引用
Journal of Bionic Engineering 2024年 第5期21卷 2184-2198页
作者: Jing Deng Wenzheng Jiang Haibo Gao Yapeng Shi Mantian Li State Key Laboratory of Robotics and System Harbin Institute of TechnologyHarbin150001HeilongjiangChina Shenzhen Academy of Aerospace Technology Shenzhen518063China Faculty of Computing Harbin Institute of TechnologyHarbin150001HeilongjiangChina Institute of Intelligent Manufacturing Technology Shenzhen Polytechnic UniversityShenzhen518055China
Effectively controlling active power-assist lower-limb exoskeletons in a human-in-the-loop manner poses a substantial chal-lenge,demanding an approach that ensures wearer autonomy while seamlessly adapting to diverse ... 详细信息
来源: 评论
Towards accountable authority attribute-based encryption
收藏 引用
High technology Letters 2013年 第1期19卷 82-87页
作者: 王永涛 Chen Kefei Long Yu Department of Computer Science and Engineering Shanghai Jiao Tong University China Information Technology Security Evaluation Center Shanghai Key Laboratory of Scalable Computing and System Shanghai JiaoTong University
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It ... 详细信息
来源: 评论
A framework towards task-based query in personal dataspace
A framework towards task-based query in personal dataspace
收藏 引用
7th International Conference on Semantics, Knowledge, and Grids, SKG 2011
作者: Li, Yukun Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300384 Tianjin China
With increment of personal data amount, how to allow users to efficiently re-find personal data items becomes an important research issue. According to general experience of persons, task is taken as a popular way to ... 详细信息
来源: 评论