咨询与建议

限定检索结果

文献类型

  • 1,082 篇 会议
  • 738 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,823 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,164 篇 工学
    • 758 篇 计算机科学与技术...
    • 563 篇 软件工程
    • 219 篇 信息与通信工程
    • 160 篇 控制科学与工程
    • 144 篇 电子科学与技术(可...
    • 135 篇 电气工程
    • 110 篇 机械工程
    • 87 篇 生物工程
    • 52 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 45 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 26 篇 安全科学与工程
  • 570 篇 理学
    • 318 篇 数学
    • 121 篇 物理学
    • 110 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 39 篇 化学
  • 315 篇 管理学
    • 210 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 69 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 43 篇 法学
    • 33 篇 社会学
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 17 篇 农学
  • 11 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 40 篇 institute of com...
  • 36 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 33 篇 university of ch...
  • 31 篇 graduate univers...
  • 29 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 131 篇 hai jin
  • 46 篇 xiaowei li
  • 45 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 22 篇 deqing zou
  • 22 篇 li xiaowei
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 yu hu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,681 篇 英文
  • 82 篇 中文
  • 65 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1823 条 记 录,以下是321-330 订阅
排序:
Multi-Perspective Data Fusion Framework Based on Hierarchical BERT: Provide Visual Predictions of Business Processes
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 1227-1252页
作者: Yongwang Yuan Xiangwei Liu Ke Lu School of Mathematics and Big Data Anhui University of Science and TechnologyHuainan232001China School of Economics and Management Anhui University of Science and TechnologyHuainan232001China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji UniversityShanghai201804China
Predictive Business Process Monitoring(PBPM)is a significant research area in Business Process Management(BPM)aimed at accurately forecasting future behavioral *** present,deep learning methods are widely cited in PBP... 详细信息
来源: 评论
An Automated Penetration Semantic Knowledge Mining Algorithm Based on Bayesian Inference
收藏 引用
Computers, Materials & Continua 2021年 第3期66卷 2573-2585页
作者: Yichao Zang Tairan Hu Tianyang Zhou Wanjiang Deng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000China National Engineering Technology Research Center of the Digital Switching System Zhengzhou450000China NUS Business School National University of SingaporeSingapore119077Singapore
Mining penetration testing semantic knowledge hidden in vast amounts of raw penetration testing data is of vital importance for automated penetration *** rule mining,a data mining technique,has been studied and explor... 详细信息
来源: 评论
AFaVS: Accurate Yet Fast Version Switching for Graph Processing systems  39
AFaVS: Accurate Yet Fast Version Switching for Graph Process...
收藏 引用
39th IEEE International Conference on Data Engineering, ICDE 2023
作者: Zheng, Long Ye, Xiangyu Liu, Haifeng Wang, Qinggang Huang, Yu Gui, Chuangyi Yao, Pengcheng Liao, Xiaofei Jin, Hai Xue, Jingling Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Laboratory Wuhan430074 China Zhejiang Lab Hangzhou311121 China Unsw School of Computer Science and Engineering Sydney Australia
Multi-version graph processing has been widely used to solve many real-world problems. The process of the multi-version graph processing typically includes: (1) a history graph version switching at a specific time and... 详细信息
来源: 评论
Average vector field methods for the coupled Schrdinger KdV equations
收藏 引用
Chinese Physics B 2014年 第7期23卷 242-250页
作者: 张弘 宋松和 陈绪栋 周炜恩 Department of Mathematics and System Science College of ScienceNational University of Defense Technology State Key Laboratory of High Performance Computing National University of Defense Technology
The energy preserving average vector field (AVF) method is applied to the coupled Schr6dinger-KdV equations. Two energy preserving schemes are constructed by using Fourier pseudospectral method in space direction di... 详细信息
来源: 评论
A new clustering classification approach based on FCR
A new clustering classification approach based on FCR
收藏 引用
2010 7th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2010
作者: Zhang, De-Gan Liu, Weiwei Kang, Xuejing Chen, Ying Dai, Wenbo Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 China
A new clustering classification approach based on fuzzy closeness relationship (FCR) is studied in this paper. As we know, fuzzy clustering classification is one of important and valid methods to knowledge discovery. ... 详细信息
来源: 评论
Multi-symplectic method for the coupled Schrdinger–KdV equations
收藏 引用
Chinese Physics B 2014年 第8期23卷 226-232页
作者: 张弘 宋松和 周炜恩 陈绪栋 Department of Mathematics and System Science College of Science National University of Defense Technology State Key Laboratory of High Performance Computing National University of Defense Technology
In this paper, we present a multi-symplectic Hamiltonian formulation of the coupled Schrtidinger-KdV equations (CS'KE) with periodic boundary conditions. Then we develop a novel multi-symplectic Fourier pseudospect... 详细信息
来源: 评论
Statistical static timing analysis for circuit aging prediction
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2021年 第2期28卷 14-23页
作者: Duan Shengyu Zhai Dongyao Lu Yue Shanghai Engineering Research Center of Intelligent Computing System Shanghai UniversityShanghai 200444China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China School of Electronics and Computer Science University of SouthamptonSouthamptonUK
Complementary metal oxide semiconductor(CMOS)aging mechanisms including bias temperature instability(BTI)pose growing concerns about circuit *** results in threshold voltage increases on CMOS transistors,causing delay... 详细信息
来源: 评论
Android Malware Detection Using Ensemble Learning on Sensitive APIs  1st
Android Malware Detection Using Ensemble Learning on Sensiti...
收藏 引用
1st EAI International Conference on Edge computing and IoT: systems, Management and Security, ICECI 2020
作者: Yu, Junhui Zhao, Chunlei Zheng, Wenbai Li, Yunlong Zhang, Chunxiang Chen, Chao Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China
In recent years, with the quiet popularity of mobile payment methods, mobile terminal equipment also have potential security problems while facilitating people’s lives. Behavior-based Android malware detection is mos... 详细信息
来源: 评论
Android Malware Detection Based on Sensitive Permissions and APIs  2nd
Android Malware Detection Based on Sensitive Permissions and...
收藏 引用
2nd EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2019
作者: Zhao, Chunhui Wang, Chundong Zheng, Wenbai Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China
With the widespread use of the Android operating system, the number of applications based on the Android platform is growing. How to effectively identify malware is critical to the security of phones. This paper propo... 详细信息
来源: 评论
BCE-PPDS: Blockchain-based cloud–edge collaborative privacy-preserving data sharing scheme for IoT
收藏 引用
Future Generation Computer systems 2026年 174卷
作者: Guijuan Wang Qi Liu Zhongyuan Yu Hongliang Zhang Anming Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong 250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong 250353 China China University of Petroleum Qingdao Shandong 266000 China
Internet of Things (IoT) devices generate large amounts of data every day that can be combined with intelligent platforms for predictive analytics and scientific research. However, concerns about privacy and security ...
来源: 评论