咨询与建议

限定检索结果

文献类型

  • 1,082 篇 会议
  • 738 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,823 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,164 篇 工学
    • 758 篇 计算机科学与技术...
    • 563 篇 软件工程
    • 219 篇 信息与通信工程
    • 160 篇 控制科学与工程
    • 144 篇 电子科学与技术(可...
    • 135 篇 电气工程
    • 110 篇 机械工程
    • 87 篇 生物工程
    • 52 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 45 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 26 篇 安全科学与工程
  • 570 篇 理学
    • 318 篇 数学
    • 121 篇 物理学
    • 110 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 39 篇 化学
  • 315 篇 管理学
    • 210 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 69 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 43 篇 法学
    • 33 篇 社会学
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 17 篇 农学
  • 11 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 40 篇 institute of com...
  • 36 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 33 篇 university of ch...
  • 31 篇 graduate univers...
  • 29 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 131 篇 hai jin
  • 46 篇 xiaowei li
  • 45 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 22 篇 deqing zou
  • 22 篇 li xiaowei
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 yu hu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,681 篇 英文
  • 82 篇 中文
  • 65 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1823 条 记 录,以下是241-250 订阅
排序:
Using index in the MapReduce framework
Using index in the MapReduce framework
收藏 引用
12th International Asia Pacific Web Conference, APWeb 2010
作者: An, Mingyuan Wang, Yang Wang, Weiping Key Laboratory of Computer System and Architecture Graduate University of Chinese Academy of Sciences Beijing China Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Institute of Computing Technology Beijing China
MapReduce is a programming framework introduced by Google for large-scale data processing. It is usually used in a scan-centric fashion where all the data are split into blocks and Maps are generated for each block to... 详细信息
来源: 评论
N-Docker: A NVM-HDD Hybrid Docker Storage Framework to Improve Docker Performance  16th
N-Docker: A NVM-HDD Hybrid Docker Storage Framework to Impro...
收藏 引用
16th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2019
作者: Gu, Lin Tang, Qizhi Wu, Song Jin, Hai Zhang, Yingxi Shi, Guoqiang Lin, Tingyu Rao, Jia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China State Key Laboratory of Intelligent Manufacturing System Technology Beijing100854 China The University of Texas at Arlington ArlingtonTX76019 United States
Docker has been widely adopted in production environment, but unfortunately deployment and cold-start of container are limited by the low speed of disk. The emerging non-volatile memory (NVM) technology, which has hig... 详细信息
来源: 评论
Identity-Preserving Adversarial Training for Robust Network Embedding
收藏 引用
Journal of Computer Science & technology 2024年 第1期39卷 177-191页
作者: 岑科廷 沈华伟 曹婍 徐冰冰 程学旗 Data Intelligence System Research Center Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China University of Chinese Academy of Sciences Beijing 101480China Beijing Academy of Artificial Intelligence Beijing 100000China Chinese Academy of Sciences Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
Network embedding,as an approach to learning low-dimensional representations of nodes,has been proved extremely useful in many applications,e.g.,node classification and link ***,existing network embed-ding models are ... 详细信息
来源: 评论
Efficient location-dependent skyline retrieval with peer-to-peer sharing
Efficient location-dependent skyline retrieval with peer-to-...
收藏 引用
15th Asia-Pacific Web Conference on Web Technologies and Applications, APWeb 2013
作者: Xiao, Yingyuan Shen, Yan Wang, Hongya Wang, Xiaoye Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Key Laboratory of Computer Vision and System Tianjin University of Technology 300384 China Donghua University 201620 Shanghai China
Motivated by the fact that a great deal of information is closely related to spatial location, a new type of skyline queries, location-dependent skyline query (LDSQ), was recently presented. Different from the convent... 详细信息
来源: 评论
Column-based RLE in row-oriented database
Column-based RLE in row-oriented database
收藏 引用
2009 International Conference on Cyber-Enabled Distributed computing and Knowledge Discovery, CyberC '09
作者: An, Mingyuan Key Laboratory of Computer System and Architecture Institute of Computing Technology Graduate University of Chinese Academy of Sciences Beijing China
In database systems, disk I/O performance is usually the bottleneck of the whole query processing. Among many techniques, compression is one of the most important ones to reduce disk accesses so to improve system perf... 详细信息
来源: 评论
Rule-chain incremental mining algorithm based on directed graph
Rule-chain incremental mining algorithm based on directed gr...
收藏 引用
6th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2009
作者: Ning, Hongyun Zhang, Zhiying Zhang, Degan Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin China
Aiming to discover the rule-chains directly, a novel graph-based online incremental mining algorithm (RIOMining) is proposed. Firstly, an interrelated bitmap based on a directed graph (PAGraph) is designed to compress... 详细信息
来源: 评论
Security analysis and improvement for kerberos based on dynamic password and diffie-hellman algorithm
Security analysis and improvement for kerberos based on dyna...
收藏 引用
4th International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2013
作者: Wang, Chundong Feng, Chaoran Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
This paper analyses the process of Kerberos authentication protocol, and finds the existing security problems of the protocol referring to some Kerberos improvement projects proposed in some papers at home and abroad,... 详细信息
来源: 评论
Identification based on PRT gravity tunnel of continuous electrocardiogram  14
Identification based on PRT gravity tunnel of continuous ele...
收藏 引用
14th International Conference on Natural Computation, Fuzzy systems and Knowledge Discovery, ICNC-FSKD 2018
作者: Dai, Min Meng, Danyang Jia, Feng Ma, Miaoling Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
An electrocardiogram (ECG)identification method is proposed based on PRT triangle gravity tunnel of continuous electrocardiogram. The PRT center of gravity is defined by the P, R, T fiducial points in ECG signal, and ... 详细信息
来源: 评论
Collaborative wi-fi fingerprinting indoor positioning using near relation  24
Collaborative wi-fi fingerprinting indoor positioning using ...
收藏 引用
2020 24th ISPRS Congress - Technical Commission IV on Spatial Information Science
作者: Wang, Y. Wang, W. Li, X. Zhang, W. Guo, R. National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Urban Informatics Shenzhen Key Laboratory of Spatial Smart Sensing and Services Research Institute for Smart Cities School of Architecture and Urban Planning Shenzhen University Shenzhen China
Indoor positioning is of great importance to the era of mobile computing. Currently, much attention has been paid to RSS-based location for that it can provide position information without additional equipment. Howeve... 详细信息
来源: 评论
Data protection and provenance in cloud of things environment: Research challenges
收藏 引用
International Journal of Information and Computer Security 2020年 第4期12卷 416-435页
作者: Wang, Chundong Yang, Lei Guo, Hao Wan, Fujin Key Laboratory of Computer Vision and System Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin China Global Energy Internet Research Institute Beijing University of Technology Tianjin China Department of College of Computer and Control Engineering Nankai University Tianjin China
Internet of things are increasingly being deployed over the cloud (also referred to as cloud of things) to provide a broader range of services. However, there are serious challenges of CoT in the data protection and s... 详细信息
来源: 评论