咨询与建议

限定检索结果

文献类型

  • 1,082 篇 会议
  • 721 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,806 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,147 篇 工学
    • 745 篇 计算机科学与技术...
    • 554 篇 软件工程
    • 214 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 140 篇 电子科学与技术(可...
    • 124 篇 电气工程
    • 106 篇 机械工程
    • 87 篇 生物工程
    • 51 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 44 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 564 篇 理学
    • 315 篇 数学
    • 120 篇 物理学
    • 108 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 305 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 50 篇 医学
    • 42 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 42 篇 法学
    • 33 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 41 篇 institute of com...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 36 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 32 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 126 篇 hai jin
  • 46 篇 xiaowei li
  • 44 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,667 篇 英文
  • 82 篇 中文
  • 62 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1806 条 记 录,以下是251-260 订阅
排序:
High-efficient architecture of Godson-T many-core processor  23
High-efficient architecture of Godson-T many-core processor
收藏 引用
23rd IEEE Hot Chips Symposium, HCS 2011
作者: Fan, Dongrui Zhang, Hao Wang, Da Ye, Xiaochun Song, Fenglong Zhang, Junchao Fan, Lingjun Advanced Micro-System Group National Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China
This article consists of a collection of slides from the author's conference presentation on the special features, system design, processing capabilities, and targeted markets for AMS's Godson-T microprocessor...
来源: 评论
Protein structure prediction based on a domain clustering database
Protein structure prediction based on a domain clustering da...
收藏 引用
2007 1st International Conference on Bioinformatics and Biomedical Engineering, ICBBE
作者: Ma, Zhaoyun Zhang, Fa Xu, Lin Feng, Shengzhong Liu, Zhiyong Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Institute of Computing Technology Graduate School Chinese Academy of Sciences
Homology modeling, as a successful protein structure prediction method, has two major deficiencies, i.e., the lack of the templates (known structures), and the accuracy of alignment between the query (unknown structur... 详细信息
来源: 评论
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论
BTMD: A framework of binary translation based malcode detector
BTMD: A framework of binary translation based malcode detect...
收藏 引用
4th International Conference on Cyber-Enabled Distributed computing and Knowledge Discovery, CyberC 2012
作者: Shan, Zheng Guo, Haoran Pang, Jianmin Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China National Digital Switching System Engineering and Technology Research Center Zhengzhou China
Binary Translation technology is used to convert binary code of one Instruction Set Architecture (ISA) into another. This technology can solve the software-inheritance problem and ISA-compatibility between different c... 详细信息
来源: 评论
A clustering algorithm use SOM and K-Means in Intrusion Detection
A clustering algorithm use SOM and K-Means in Intrusion Dete...
收藏 引用
International Conference on E-Business and E-Government (ICEE)
作者: Wang, Huai-Bin Yang, Hong-Liang Xu, Zhi-Jian Yuan, Zheng Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China
Improving detection definition is a pivotal problem for intrusion detection. Many intelligent algorithms were used to improve the detection rate and reduce the false rate. Traditional SOM cannot provide the precise cl... 详细信息
来源: 评论
Coarray Tensor Train Decomposition for Bistatic MIMO Radar with Uniform Planar Array
收藏 引用
IEEE Transactions on Antennas and Propagation 2025年
作者: Xie, Qianpeng Wang, Zhanling Wen, Fangqing He, Jin Truong, Trieu-Kien National University of Defense Technology State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System Changsha410073 China Hubei University of Automotive Technology Institute of Vehicle Information Control and Network Technology Shiyan442002 China China Three Gorges University Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering Yichang443002 China Shanghai Jiao Tong University Shanghai Key Laboratory of Navigation and Location Based Services School of Electronic Information and Electrical Engineering Shanghai200240 China
Recently, tensor network decomposition has attracted increasing attention due to its high efficacy in modeling multi-dimensional correlations in high-order tensors. Considering this advantage, this study employs tenso... 详细信息
来源: 评论
License plate locating algorithm based on multi-feature in color image
License plate locating algorithm based on multi-feature in c...
收藏 引用
2010 International Conference on Educational and Information technology, ICEIT 2010
作者: Sun, Jing Xue, Yan-Bing Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China
A new method for license plate locating based on multi-feature is introduced in this paper. The method proposed can overcome the shortcoming of early methods based on single feature. At first, the algorithm employs HS... 详细信息
来源: 评论
A method of genetic algorithm optimized extended kalman particle filter for nonlinear system state estimation
A method of genetic algorithm optimized extended kalman part...
收藏 引用
5th International Conference on Natural Computation, ICNC 2009
作者: Yang, Shuying Huang, Wenjuan Ma, Qin Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
A new method of genetic algorithm (GA) optimized the extended kalman particle filter (EKPF) is proposed in this paper. The algorithm of extended kalman particle filter is a suboptimal filtering algorithm with good per... 详细信息
来源: 评论
Particle swarm optimized unscented particle filter for target tracking
Particle swarm optimized unscented particle filter for targe...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Shuying, Yang Ma, Qin Wenjuan, Huang Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
In this paper, a novel particle swarm optimized (PSO) unscented particle filter (PSO-UPF) algorithm is proposed for target tracking. Unscented particle filter (UPF) can obtain the better sequential importance sampling... 详细信息
来源: 评论
An improved RED congestion algorithm based on partition of network segment
An improved RED congestion algorithm based on partition of n...
收藏 引用
5th International Conference on Natural Computation, ICNC 2009
作者: CtandongWang Li, Ting Wang, Huaibin Tianjin Key Laboratory of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Aiming at the growing problem of network congestion, an improved random early detection algorithm is proposed for the internal network and applied on a TCP congestion control algorithm based on partition of network se... 详细信息
来源: 评论