咨询与建议

限定检索结果

文献类型

  • 1,082 篇 会议
  • 738 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,823 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,164 篇 工学
    • 758 篇 计算机科学与技术...
    • 563 篇 软件工程
    • 219 篇 信息与通信工程
    • 160 篇 控制科学与工程
    • 144 篇 电子科学与技术(可...
    • 135 篇 电气工程
    • 110 篇 机械工程
    • 87 篇 生物工程
    • 52 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 45 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 26 篇 安全科学与工程
  • 570 篇 理学
    • 318 篇 数学
    • 121 篇 物理学
    • 110 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 39 篇 化学
  • 315 篇 管理学
    • 210 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 69 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 43 篇 法学
    • 33 篇 社会学
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 17 篇 农学
  • 11 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 40 篇 institute of com...
  • 36 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 33 篇 university of ch...
  • 31 篇 graduate univers...
  • 29 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 131 篇 hai jin
  • 46 篇 xiaowei li
  • 45 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 22 篇 deqing zou
  • 22 篇 li xiaowei
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 yu hu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,681 篇 英文
  • 82 篇 中文
  • 65 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1823 条 记 录,以下是371-380 订阅
排序:
Audio-on-demand over wireless sensor networks
Audio-on-demand over wireless sensor networks
收藏 引用
2012 IEEE 20th International Workshop on Quality of Service, IWQoS 2012
作者: Chen, Hanhua Jin, Hai Guo, Lingchao Wu, Shaoliang Gu, Tao Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China Department of Mathematics and Computer Science University of Southern Denmark Odense M 5230 Denmark
Audio represents one of the most appealing yet least exploited modalities in wireless sensor networks, due to the potentially extremely large data volumes and limited wireless capacity. Therefore, how to effectively c... 详细信息
来源: 评论
Enhancement of oxygen evolution reaction activity and durability of Ba0.5Sr0.5Co0.8Fe0.2O3-δ by CO2 thermal treatment
收藏 引用
Journal of Materials Science & technology 2019年 第6期35卷 1184-1191页
作者: Fengli Liang Ziqiong Yang Haipeng Deng Jaka Sunarso Lili Yang Junkui Mao College of Energy and Power Engineering.Jiangsu Province Key Laboratory of Aerospace Power System Nanjing University of Aeronautics and Astronautics Nanjing 210016 China Research Centre for Sustainable Technologies Faculty of Engineering Computing and Science Swinburne University of Technology Jalan Simpang Tiga93350 Kuching Sarawak Malaysia
This work demonstrates that in situ formation of carbonate layer on the surface of Ba0.5Sr0.5Co0.8Fe0.2O3-δ(BSCF)obtained by exposure to CO2 during heating between 500℃ and 700℃ can provide enhanced oxygen evolutio... 详细信息
来源: 评论
Knowledge discovery approach based on closeness relationship of FC
Knowledge discovery approach based on closeness relationship...
收藏 引用
6th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2009
作者: Zhang, Degan Li, Miao Zhang, Xiaoli Wang, Jinhui Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
A fuzzy clustering is one of important and valid methods to knowledge discovery. One of problems in fuzzy clustering is to determine a certain fuzzy sample classification in given limited sample space. Another is its ... 详细信息
来源: 评论
An efficient web service composition approach based on improved particle swarm optimization model
An efficient web service composition approach based on impro...
收藏 引用
International Conference on Management and Service Science, MASS 2009
作者: Yi, Liang Yingyuan, Xiao Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Along with the rapid growth of the number of the available web services over the internet, the quality of services (Qos) becomes an imperative concern for service consumers and providers. How to differentiate their qu... 详细信息
来源: 评论
Regular Paper: A Study of Architectural Optimization Methods in Bioinformatics Applications
收藏 引用
The International Journal of High Performance computing Applications 2007年 第3期21卷 371 - 384页
作者: G. Tan L. Xu Z. Dai S. Feng N. Sun KEY LABORATORY OF COMPUTER SYSTEM AND ARCHITECTURE INSTITUTE OF COMPUTING TECHNOLOGY CHINESE ACADEMY OF SCIENCES BEIJING CHINA KEY LABORATORY OF COMPUTER SYSTEM AND ARCHITECTURE INSTITUTE OF COMPUTING TECHNOLOGY CHINESE ACADEMY OF SCIENCES BEIJING CHINA
Studies in the optimization of sequence alignment have been carried out in bioinformatics. In this paper, we have focused on two aspects: memory usage and execution time. Our study suggests that cache memory does not ... 详细信息
来源: 评论
A hybrid efficient short-term traffic flow forecast technology
A hybrid efficient short-term traffic flow forecast technolo...
收藏 引用
6th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2009
作者: Lin, Xin Wang, Xiaoye Xiao, Yingyuan Zhang, Degan Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
This paper presents a hybrid short-term traffic flow forecast technology. For the uncertainty, the short-term traffic flow forecast is complicated, and the accuracy is not high. This strategy combines the RBF neural n... 详细信息
来源: 评论
Research on multi-dimensional association rules mining in distributed environments based on advanced SQL query
Research on multi-dimensional association rules mining in di...
收藏 引用
6th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2009
作者: Zhang, Lei Qiao, Mei Zhang, Degan Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
This paper proposes the MDMA (Multi-dimensional Distributed Mining Association rules) algorithm based on advanced SQL query. The algorithm works on star-style structure networks. It uses CUBE operator in new standard ... 详细信息
来源: 评论
A novel two-step-deformation active contour with application to facial features extraction
A novel two-step-deformation active contour with application...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Hua, Zhang Yuanquan, Wang Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
In allusion to the boundary leaking problem of traditional active contours when used to extract facial features, two kinds of local information are introduced to enhance the weak boundary, then to build new external f... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Quantized robust H-two filtering for Markovian jump linear systems over networks with nonaccessible mode information
收藏 引用
控制理论与应用(英文版) 2011年 第4期9卷 505-512页
作者: Tao LIU Qijun CHEN Hao ZHANG Iko MIYAZAWA Department of Electronics and Information Engineering Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Tongji University Ministry of Education Shanghai 201804 China Department of Machine Control Technology Kanagawa Industrial Technology Center Kanagawa 243-0435 Japan
This paper is concerned with the problems of H-two filtering for discrete-time Markovian jump linear systems subject to logarithmic quantization. We assume that only the output of the system is available, and therefor... 详细信息
来源: 评论