咨询与建议

限定检索结果

文献类型

  • 1,082 篇 会议
  • 721 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,806 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,147 篇 工学
    • 745 篇 计算机科学与技术...
    • 554 篇 软件工程
    • 214 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 140 篇 电子科学与技术(可...
    • 124 篇 电气工程
    • 106 篇 机械工程
    • 87 篇 生物工程
    • 51 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 44 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 564 篇 理学
    • 315 篇 数学
    • 120 篇 物理学
    • 108 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 305 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 50 篇 医学
    • 42 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 42 篇 法学
    • 33 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 41 篇 institute of com...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 36 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 32 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 126 篇 hai jin
  • 46 篇 xiaowei li
  • 44 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,667 篇 英文
  • 82 篇 中文
  • 62 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1806 条 记 录,以下是331-340 订阅
排序:
An efficient image processing method based on web services for mobile devices
An efficient image processing method based on web services f...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Yi, Liang Yingyuan, Xiao Jing, Huang Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
The resource limitation of mobile devices causes the problem that the existing image processing software based on the centralized computing mode had difficulty running in mobile devices. A solution is given in the pap... 详细信息
来源: 评论
A new method of image data fusion based on FNN
A new method of image data fusion based on FNN
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Zhang, De-Gan Li, Chao Wang, Dong Zhang, Xiao-Li Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 China
The image data are obtained by a variety of multimedia, information equipment, which include amount of information, extensive coverage, and redundancy in ubiquitous computing paradigm. In order to make use of these in... 详细信息
来源: 评论
An Efficient Threshold key-Insulated Signature Scheme
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第6期16卷 658-662页
作者: 陈剑洪 龙宇 陈克非 王永涛 李祥学 Department of Computer Science and Engineering Shanghai Jiaotong University School of Computer Engineering Huaiyin Institute of Technology Shanghai Key Laboratory of Scalable Computing and System Shanghai Jiaotong University Department of Computer Science and Technology East China Normal University
To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS *** a TKIS system,at least k out ... 详细信息
来源: 评论
Extended selective encoding of scan slices for reducing test data and test power
Extended selective encoding of scan slices for reducing test...
收藏 引用
作者: Liu, Jun Han, Yinhe Li, Xiaowei Key Laboratory of Computer System and Architecture Institute of Computing Technology Graduate University of Chinese Academy of Sciences China School of Computer and Information Hefei University of Technology China
Test data volume and test power are two major concerns when testing modern large circuits. Recently, selective encoding of scan slices is proposed to compress test data. This encoding technique, unlike many other comp... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Disk based pay-as-you-go record linkage
收藏 引用
Frontiers of Computer Science 2022年 第4期16卷 227-229页
作者: Chenchen Sun Derong Shen Key Laboratory of Computer Vision and System(Ministry of Education) Tianjin University of TechnologyTianjin300384China College of Intelligence and Computing Tianjin UniversityTianjin300350China School of Computer Science and Engineering Northeastern UniversityShenyang110189China
1Introduction Record linkage(RL)groups_records corresponding to the same entities in datasets,and is a long-standing topic in data management and mining communities[1-2].In big data era,real-time data applications bec... 详细信息
来源: 评论
Privacy Protection for Blockchains with Account and Multi-Asset Model
收藏 引用
China Communications 2019年 第6期16卷 69-79页
作者: Donghui Ding Kang Li Linpeng Jia Zhongcheng Li Jun Li Yi Sun Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China State key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China University of Chinese Academy of Sciences Beijing 100049China Ant Financial Services Group Hangzhou 310012China
The blockchain technology has been applied to wide ***,the open and transparent properties of the blockchains pose serious challenges to users’*** all the schemes for the privacy protection,the zero-knowledge proof a... 详细信息
来源: 评论
A Study of Prototypical Network Techniques for Cross-Subject EEG Analysis  27
A Study of Prototypical Network Techniques for Cross-Subject...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Liu, Wenchao Wang, Guagnyu He, Yuhong Bo, Hongjian Ma, Lin Li, Haifeng State Key Laboratory of Robotics and System Harbin Institute of Technology Harbin China Faculty of Computing Harbin Institute of Technology Harbin China Shenzhen Academy of Aerospace Technology Shenzhen China
Electroencephalography (EEG), a technique that uses electrodes on the scalp to record changes in cerebral electrical potentials, plays a key role in various brain-computer interface applications. However, due to the l... 详细信息
来源: 评论
Stacking monolayers at will:A scalable device optimization strategy for two-dimensional semiconductors
收藏 引用
Nano Research 2022年 第7期15卷 6620-6627页
作者: Xiaojiao Guo Honglei Chen Jihong Bian Fuyou Liao Jingyi Ma Simeng Zhang Xinzhi Zhang Junqiang Zhu Chen Luo Zijian Zhang Lingyi Zong Yin Xia Chuming Sheng Zihan Xu Saifei Gou Xinyu Wang Peng Gong Liwei Liu Xixi Jiang Zhenghua An Chunxiao Cong Zhijun Qiu Xing Wu Peng Zhou Xinyu Chen Ling Tong Wenzhong Bao State Key Laboratory of ASIC and System School of MicroelectronicsZhangjiang Fudan International Innovation CenterFudan UniversityShanghai 200433China The Hong Kong Polytechnic University Shenzhen Research Institute Shenzhen 518057China Department of Physics State Key Laboratory of Surface PhysicsInstitute of Nanoelectronic Devices and Quantum Computing and Key Laboratory of MicroFudan UniversityShanghai 200433China State Key Laboratory of ASIC and System School of Information Science and EngineeringFudan UniversityShanghai 200433China Shanghai Key Laboratory of Multidimensional Information Processing Department of Electronic Engineering East China Normal UniversityShanghai 200241China Shenzhen Six Carbon Technology Shenzhen 518055China Department of Chemistry and Shanghai Key Laboratory of Molecular Catalysis and Innovative Materials Fudan UniversityShanghai 200433China
In comparison to monolayer(1L),multilayer(ML)two-dimensional(2D)semiconducting transition metal dichalcogenides(TMDs)exhibit more application potential for electronic and optoelectronic devices due to their improved c... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论