咨询与建议

限定检索结果

文献类型

  • 1,088 篇 会议
  • 722 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,813 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,152 篇 工学
    • 749 篇 计算机科学与技术...
    • 554 篇 软件工程
    • 214 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 140 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 106 篇 机械工程
    • 87 篇 生物工程
    • 51 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 44 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 564 篇 理学
    • 315 篇 数学
    • 120 篇 物理学
    • 108 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 305 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 50 篇 医学
    • 42 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 42 篇 法学
    • 33 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 36 篇 training
  • 35 篇 bandwidth
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 41 篇 institute of com...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 37 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 32 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 128 篇 hai jin
  • 46 篇 xiaowei li
  • 44 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 24 篇 xiaofei liao
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,674 篇 英文
  • 82 篇 中文
  • 62 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1813 条 记 录,以下是541-550 订阅
排序:
Finedge: A Dynamic Cost-Efficient Edge Resource Management Platform for NFV Network
Finedge: A Dynamic Cost-Efficient Edge Resource Management P...
收藏 引用
International Workshop on Quality of Service
作者: Miao Li Qixia Zhang Fangming Liu National Engineering Research Center for Big Data Technology and System Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology China
With the evolution of network function virtualization (NFV) and edge computing, software-based network functions (NFs) can be deployed on closer-to-end-user edge servers to support a broad range of new services with h... 详细信息
来源: 评论
Heat to Power: Thermal Energy Harvesting and Recycling for Warm Water-Cooled Datacenters
Heat to Power: Thermal Energy Harvesting and Recycling for W...
收藏 引用
Annual International Symposium on Computer Architecture, ISCA
作者: Xinhui Zhu Weixiang Jiang Fangming Liu Qixia Zhang Li Pan Qiong Chen Ziyang Jia National Engineering Research Center for Big Data Technology and System Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology China
Warm water cooling has been regarded as a promising method to improve the energy efficiency of water-cooled datacenters. In warm water-cooling systems, hot spots occur as a common problem where the hybrid cooling arch...
来源: 评论
Semi-supervised classification method of SAR images using spectral clustering in contourlet domain  4
Semi-supervised classification method of SAR images using sp...
收藏 引用
2019 4th International Seminar on Computer technology, Mechanical and Electrical Engineering, ISCME 2019
作者: Jiang, Kaiwen Zhang, Degan Xu, Haixia Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300384 China Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China School of Electronic and Information Engineering Tianjin Vocational Institute Tianjin300410 China
A new based on Semi-supervised classification theory for SAR images in contourlet domain is proposed, in this paper. Attempting to get better and faster performance, the PSO algorithm (Particle swarm optimization algo... 详细信息
来源: 评论
Detecting and Exploiting Unit Commitment Structures in MIPs
Detecting and Exploiting Unit Commitment Structures in MIPs
收藏 引用
International Conference on Power and Energy technology (ICPET)
作者: Zhao-Gang Su Sheng-Jie Chen Yu-Fei Li Liang Chen Caixia Kou Zhi Cai Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China Institute of Applied Mathematics Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China College of Sciences Beijing University of Posts and Telecommunications Beijing China Beijing Key Laboratory of Research and System Evaluation of Power Dispatching Automation Technology China Electric Power Research Institute Beijing China
The unit commitment (UC) problem has been extensively researched in the literature, which is typically formulated as a mixed integer programming (MIP) problem. However, current studies lack effective methods to identi... 详细信息
来源: 评论
How to respond to emerging threats of cyberspace security via social engineering? A novel paradigm to solve cyberspace security issues
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Lin, Hao Wang, Chun-Dong Gao, Hao-Yu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing Novel Software Technology Ministry of Education Tianjin China Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin China College of Data Science and Application Inner Mongolia University of Technology Hohhot China
Cybersecurity researchers always ignore the "people" behind the issues when dealing with cyberspace security issues. The human and technological aspects of cyberspace security must be simultaneously addresse... 详细信息
来源: 评论
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Hongze Xie, Guoyang Hou, Chengbin Dai, Tao Gao, Can Wang, Jinbao Shen, Linlin National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Department of Intelligent Manufacturing CATL Ningde China Fuzhou Fuyao Institute for Advanced Study Fuyao University of Science and Technology Fuzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ... 详细信息
来源: 评论
Algebraic analysis and control of networked opacity with bounded communication delays
Algebraic analysis and control of networked opacity with bou...
收藏 引用
第40届中国控制会议
作者: Qian Xu Zhipeng Zhang Chengyi Xia Zengqiang Chen Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Engineering Research Center of Learning-Based Intelligent System Ministry of Education College of Artificial Intelligence Nankai University
Networked finite state machine takes the delay factor into consideration, and its security has become an significant research topic. In this paper, we explore the impact of bounded communication delays on networked op... 详细信息
来源: 评论
The behavioral sign of account theft: Realizing online payment fraud alert  29
The behavioral sign of account theft: Realizing online payme...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Wang, Cheng Department of Computer Science Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Shanghai Institute of Intelligent Science and Technology Tongji University China
As a matter of fact, it is usually taken for granted that the occurrence of unauthorized behaviors is necessary for the fraud detection in online payment services. However, we seek to break this stereotype in this wor... 详细信息
来源: 评论
Neuromodulated Meta-Learning
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Jingyao Guo, Huijie Qiang, Wenwen Li, Jiangmeng Zheng, Changwen Xiong, Hui Hua, Gang University of Chinese Academy of Sciences Beijing China National Key Laboratory of Space Integrated Information System Institute of Software Chinese Academy of Sciences Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China Thrust of Artificial Intelligence Hong Kong University of Science and Technology Guangzhou China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong Wormpex AI Research LLC BellevueWA98004 United States
Humans excel at adapting perceptions and actions to diverse environments, enabling efficient interaction with the external world. This adaptive capability relies on the biological nervous system (BNS), which activates... 详细信息
来源: 评论
Single node injection attack against graph neural networks
arXiv
收藏 引用
arXiv 2021年
作者: Tao, Shuchang Cao, Qi Shen, Huawei Huang, Junjie Wu, Yunfan Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Node injection attack on Graph Neural Networks (GNNs) is an emerging and practical attack scenario that the attacker injects malicious nodes rather than modifying original nodes or edges to affect the performance of G... 详细信息
来源: 评论