咨询与建议

限定检索结果

文献类型

  • 1,082 篇 会议
  • 721 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,806 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,147 篇 工学
    • 745 篇 计算机科学与技术...
    • 554 篇 软件工程
    • 214 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 140 篇 电子科学与技术(可...
    • 124 篇 电气工程
    • 106 篇 机械工程
    • 87 篇 生物工程
    • 51 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 44 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 564 篇 理学
    • 315 篇 数学
    • 120 篇 物理学
    • 108 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 305 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 50 篇 医学
    • 42 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 42 篇 法学
    • 33 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 41 篇 institute of com...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 36 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 32 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 126 篇 hai jin
  • 46 篇 xiaowei li
  • 44 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,667 篇 英文
  • 82 篇 中文
  • 62 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1806 条 记 录,以下是231-240 订阅
排序:
Rule-chain incremental mining algorithm based on directed graph
Rule-chain incremental mining algorithm based on directed gr...
收藏 引用
6th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2009
作者: Ning, Hongyun Zhang, Zhiying Zhang, Degan Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin China
Aiming to discover the rule-chains directly, a novel graph-based online incremental mining algorithm (RIOMining) is proposed. Firstly, an interrelated bitmap based on a directed graph (PAGraph) is designed to compress... 详细信息
来源: 评论
Security analysis and improvement for kerberos based on dynamic password and diffie-hellman algorithm
Security analysis and improvement for kerberos based on dyna...
收藏 引用
4th International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2013
作者: Wang, Chundong Feng, Chaoran Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
This paper analyses the process of Kerberos authentication protocol, and finds the existing security problems of the protocol referring to some Kerberos improvement projects proposed in some papers at home and abroad,... 详细信息
来源: 评论
Identification based on PRT gravity tunnel of continuous electrocardiogram  14
Identification based on PRT gravity tunnel of continuous ele...
收藏 引用
14th International Conference on Natural Computation, Fuzzy systems and Knowledge Discovery, ICNC-FSKD 2018
作者: Dai, Min Meng, Danyang Jia, Feng Ma, Miaoling Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
An electrocardiogram (ECG)identification method is proposed based on PRT triangle gravity tunnel of continuous electrocardiogram. The PRT center of gravity is defined by the P, R, T fiducial points in ECG signal, and ... 详细信息
来源: 评论
Collaborative wi-fi fingerprinting indoor positioning using near relation  24
Collaborative wi-fi fingerprinting indoor positioning using ...
收藏 引用
2020 24th ISPRS Congress - Technical Commission IV on Spatial Information Science
作者: Wang, Y. Wang, W. Li, X. Zhang, W. Guo, R. National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Urban Informatics Shenzhen Key Laboratory of Spatial Smart Sensing and Services Research Institute for Smart Cities School of Architecture and Urban Planning Shenzhen University Shenzhen China
Indoor positioning is of great importance to the era of mobile computing. Currently, much attention has been paid to RSS-based location for that it can provide position information without additional equipment. Howeve... 详细信息
来源: 评论
Data protection and provenance in cloud of things environment: Research challenges
收藏 引用
International Journal of Information and Computer Security 2020年 第4期12卷 416-435页
作者: Wang, Chundong Yang, Lei Guo, Hao Wan, Fujin Key Laboratory of Computer Vision and System Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin China Global Energy Internet Research Institute Beijing University of Technology Tianjin China Department of College of Computer and Control Engineering Nankai University Tianjin China
Internet of things are increasingly being deployed over the cloud (also referred to as cloud of things) to provide a broader range of services. However, there are serious challenges of CoT in the data protection and s... 详细信息
来源: 评论
Design and implementation of authentication and authorization flow in ESCP system
Design and implementation of authentication and authorizatio...
收藏 引用
4th International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2013
作者: Wang, Chundong Bo, Guangming Zhang, Yaohui Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
ESCP is short for Enterprise Social collaboration Platform. The ESCP system, which is also known as enterprise social networking, is a platform which translates the basic elements of the social networking and twitter ... 详细信息
来源: 评论
JPEG-Compatibility Steganalysis that Distinguishes Embedding Changes from Recompression Artifacts
收藏 引用
China Communications 2014年 第9期11卷 173-182页
作者: MA Xiaojing LIU Jiaojiao ZOU Deqing JIN Hai Key Laboratory of Services Computing Technology and System Ministry of EducationSchool of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430000 Hubei Province P.R. China
JPEG-Compatibility steganalysis detects the presence of secret message embedded in the JPEG decompressed images and estimates the embedding rate. We propose a JPEG-Compatibility steganalysis algorithm that estimates t... 详细信息
来源: 评论
Structural controllability of optimized networks with onion-like topologies
Structural controllability of optimized networks with onion-...
收藏 引用
Chinese Intelligent systems Conference, CISC 2018
作者: Li, Manli Sun, Shiwen Wu, Yafang Xia, Chengyi Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China Key Laboratory of Computer Vision and System Tianjin University of Technology Tianjin300384 China
Recently, an optimization method has been proposed to increase the ability of complex networks to resist intentional attacks on hub nodes. The finally optimized networks exhibit a novel type of "onion-like" ... 详细信息
来源: 评论
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论
A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of Computer Science  20
A Multi-Dimensional Assessment Model and Its Application in ...
收藏 引用
21st Annual Conference of the Special Interest Group in Information technology Education, SIGITE 2020
作者: Luo, Jiwen Lu, Feng Wang, Tao Key Lab. of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Computer science is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su... 详细信息
来源: 评论