咨询与建议

限定检索结果

文献类型

  • 1,106 篇 会议
  • 733 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,842 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,172 篇 工学
    • 768 篇 计算机科学与技术...
    • 556 篇 软件工程
    • 217 篇 信息与通信工程
    • 171 篇 控制科学与工程
    • 141 篇 电子科学与技术(可...
    • 125 篇 电气工程
    • 106 篇 机械工程
    • 89 篇 生物工程
    • 52 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 45 篇 生物医学工程(可授...
    • 44 篇 交通运输工程
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 565 篇 理学
    • 314 篇 数学
    • 120 篇 物理学
    • 109 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 305 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 64 篇 工商管理
  • 50 篇 医学
    • 43 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 23 篇 经济学
    • 23 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 50 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 50 篇 national enginee...
  • 46 篇 the key laborato...
  • 42 篇 school of comput...
  • 41 篇 key laboratory o...
  • 41 篇 institute of com...
  • 40 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 33 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 national enginee...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 28 篇 hubei key labora...

作者

  • 127 篇 hai jin
  • 46 篇 xiaowei li
  • 46 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 23 篇 xiaofei liao
  • 23 篇 shen linlin
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 hu shengshan
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 17 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,661 篇 英文
  • 104 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1842 条 记 录,以下是971-980 订阅
排序:
Gaze estimation driven solution for interacting children with ASD
Gaze estimation driven solution for interacting children wit...
收藏 引用
International Symposium on Micro-NanoMechatronics and Human Science, MHS 2015
作者: Cai, Haibin Zhou, Xiaolong Yu, Hui Liu, Honghai School of Computing University of Portsmouth United Kingdom State Key Laboratory of Mechanical System and Vibration Shanghai Jiao Tong University China College of Computer Science Zhejiang University of Technology China
This paper investigates gaze estimation solutions for interacting children with Autism Spectrum Disorders (ASD). Previous research shows that satisfactory accuracy of gaze estimation can be achieved in constrained set... 详细信息
来源: 评论
Back Cover: Amorphous Ni0.75Fe0.25(OH)2-Decorated Layered Double Perovskite Pr0.5Ba0.5CoO3-δfor Highly Efficient and Stable Water Oxidation (ChemElectroChem 3/2017)
收藏 引用
ChemElectroChem 2017年 第3期4卷 747-747页
作者: Prof. Fengli Liang Prof. Jaka Sunarso Prof. Junkui Mao Ziqiong Yang Prof. Wei Zhou College of Energy and Power Engineering Jiangsu Province Key Laboratory of Aerospace Power System Nanjing University of Aeronautics and Astronautics Nanjing 210016 P.R. China Faculty of Engineering Computing and Science Swinburne University of Technology Jalan Simpang Tiga 93350 Kuching Sarawak Malaysia Jiangsu National Synergetic Innovation Center for Advanced Materials (SICAM) State Key Laboratory of Materials-Oriented Chemical Engineering College of Chemical Engineering Nanjing Tech University Nanjing 210009 P.R. China
来源: 评论
An efficient MRF embedded level set method for image segmentation
收藏 引用
IEEE Transactions on Image Processing 2015年 第1期24卷 9-21页
作者: Yang, Xi Gao, Xinbo Tao, Dacheng Li, Xuelong Li, Jie State Key Laboratory of Integrated Services Networks School of Electronic Engineering Xidian University Xi'an710071 China Centre for Quantum Computation and Intelligent Systems Faculty of Engineering and Information Technology University of Technology Sydney 235 Jones Street UltimoNSW2007 Australia State Key Laboratory of Transient Optics and Photonics Xi'An Institute of Optics and Precision Mechanics Chinese Academy of Sciences Xi'an710119 China Video and Image Processing System Laboratory School of Electronic Engineering Xidian University Xi'an710071 China
This paper presents a fast and robust level set method for image segmentation. To enhance the robustness against noise, we embed a Markov random field (MRF) energy function to the conventional level set energy functio... 详细信息
来源: 评论
A co-evolutionary particle swarm optimization with dynamic topology for solving multi-objective optimization problems
Advances in Modelling and Analysis A
收藏 引用
Advances in Modelling and Analysis A 2016年 第1期53卷 145-159页
作者: Wu, Daqing Tang, Lixiang Li, Haiyan Ouyang, LiJun Computer Science and Technology Institute University of South China HangyangHunan China Antai College of Economics and Management Shanghai Jiao Tong University Shanghai200240 China Zigong643000 China Key Laboratory of Guangxi High Schools for Complex System and Computational Intelligence Guangxi University for Nationalities Nanning530006 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University HefeiAnhui Province230039 China Department of Business Administration Hunan University of Finance and Economics Hunan410205 China
This paper proposes a multi-objective with dynamic topology particle swarm optimization (PSO) algorithm for solving multi-objective problems, named DTPSO. One of the main drawbacks of classical multi-objective particl... 详细信息
来源: 评论
The Design and Reform of “Comprehensive Experiment of Information Security” Based on the Outstanding Talent Cultivating Practical Ability
The Design and Reform of “Comprehensive Experiment of Infor...
收藏 引用
2nd International Conference on Information and Communication technology for Education(ICTE 2015)
作者: Chun-dong Wang Li Yue Shu-gang Tang Hong Yang Key Laboratory of Computer Vision and System Ministry of EducationTianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
This paper analyzed some problems in the current information security experiment teaching, and then proposed a teaching method taking students as the main body, the teacher as the auxiliary heuristic, in order to cult... 详细信息
来源: 评论
Information Security Brand of Professional Courses Teaching system of Personnel Training for Excellence
Information Security Brand of Professional Courses Teaching ...
收藏 引用
2nd International Conference on Information and Communication technology for Education(ICTE 2015)
作者: Huai-Bin Wang Yan-Fa Ma Key Laboratory of Computer Vision and System Ministry of EducationTianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
With the deepening of educational reform and the changing of talent training model, the past teaching methods of information security courses have been exposed many drawbacks. This paper focuses on the information sec... 详细信息
来源: 评论
Characteristic Course Reform of Computer system Security
Characteristic Course Reform of Computer System Security
收藏 引用
2nd International Conference on Information and Communication technology for Education(ICTE 2015)
作者: Chun-Dong Wang Xi-Jie Sun Shu-Gang Tang Zhao-Dong Tang Key Laboratory of Computer Vision and System Ministry of Education Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
With the rapid development of Internet and constant improvement of informationization degree, all kinds of security problems become increasingly prominent. Especially Computer system security is faced with serious cha... 详细信息
来源: 评论
Structured Teaching Design Based on Heuristic Teaching Theory
Structured Teaching Design Based on Heuristic Teaching Theor...
收藏 引用
2nd International Conference on Information and Communication technology for Education(ICTE 2015)
作者: Chunlei Zhao Hong Yang Ping Liu Key Laboratory of Computer Vision and System Ministry of Education Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
According to the characteristics of computer virus course, the paper explores some methods and the experience of teaching this course from a practical perspective. Based on the file virus analysis and the detailed cur... 详细信息
来源: 评论
A polynomial algorithm to performance analysis of concurrent systems via petri nets and ordinary differential equations
A polynomial algorithm to performance analysis of concurrent...
收藏 引用
作者: Ding, Zuohua Zhou, Yuan Zhou, Meng Chu Laboratory of Intelligent Computing and Software Engineering Zhejiang Sci-Tech University Hangzhou310018 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai200092 China Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102-1982 United States
In this paper, a new method is proposed to evaluate the performance of concurrent systems. A concurrent system consisting of multiple processes that communicate via message passing mechanisms is modeled by a Petri net... 详细信息
来源: 评论
Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
收藏 引用
Chinese Science Bulletin 2014年 第32期59卷 4201-4209页
作者: Peng Xu Hongwu Chen Deqing Zou Hai Jin Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology
Cloud is an emerging computing *** has drawn extensive attention from both academia and *** its security issues have been considered as a critical obstacle in its rapid *** data owners store their data as plaintext in... 详细信息
来源: 评论