咨询与建议

限定检索结果

文献类型

  • 22,321 篇 会议
  • 12,286 篇 期刊文献
  • 454 册 图书

馆藏范围

  • 35,061 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 21,896 篇 工学
    • 17,277 篇 计算机科学与技术...
    • 14,323 篇 软件工程
    • 5,096 篇 信息与通信工程
    • 3,156 篇 控制科学与工程
    • 2,875 篇 生物工程
    • 2,249 篇 电气工程
    • 1,971 篇 生物医学工程(可授...
    • 1,667 篇 光学工程
    • 1,595 篇 电子科学与技术(可...
    • 1,241 篇 机械工程
    • 1,076 篇 网络空间安全
    • 900 篇 安全科学与工程
    • 870 篇 动力工程及工程热...
    • 856 篇 化学工程与技术
    • 818 篇 仪器科学与技术
    • 793 篇 交通运输工程
  • 11,307 篇 理学
    • 6,188 篇 数学
    • 3,167 篇 生物学
    • 2,709 篇 物理学
    • 1,946 篇 统计学(可授理学、...
    • 1,202 篇 系统科学
    • 997 篇 化学
  • 6,539 篇 管理学
    • 3,778 篇 管理科学与工程(可...
    • 3,046 篇 图书情报与档案管...
    • 1,713 篇 工商管理
  • 2,060 篇 医学
    • 1,643 篇 临床医学
    • 1,477 篇 基础医学(可授医学...
    • 1,009 篇 公共卫生与预防医...
    • 882 篇 药学(可授医学、理...
  • 1,318 篇 法学
    • 1,101 篇 社会学
  • 601 篇 经济学
  • 490 篇 农学
  • 447 篇 教育学
  • 230 篇 文学
  • 65 篇 艺术学
  • 58 篇 军事学
  • 13 篇 哲学
  • 5 篇 历史学

主题

  • 1,094 篇 deep learning
  • 1,060 篇 accuracy
  • 885 篇 computer science
  • 792 篇 computational mo...
  • 747 篇 feature extracti...
  • 721 篇 machine learning
  • 718 篇 training
  • 539 篇 semantics
  • 515 篇 predictive model...
  • 461 篇 internet of thin...
  • 450 篇 data models
  • 423 篇 support vector m...
  • 394 篇 real-time system...
  • 394 篇 convolutional ne...
  • 352 篇 artificial intel...
  • 297 篇 optimization
  • 296 篇 scalability
  • 296 篇 computer archite...
  • 275 篇 data mining
  • 268 篇 reliability

机构

  • 579 篇 school of comput...
  • 216 篇 institute of com...
  • 190 篇 department of co...
  • 171 篇 school of comput...
  • 161 篇 department of co...
  • 152 篇 department of co...
  • 142 篇 department of co...
  • 132 篇 school of comput...
  • 132 篇 school of comput...
  • 129 篇 school of comput...
  • 123 篇 school of comput...
  • 119 篇 school of comput...
  • 110 篇 school of comput...
  • 109 篇 school of comput...
  • 108 篇 school of comput...
  • 106 篇 department of co...
  • 103 篇 national enginee...
  • 102 篇 college of intel...
  • 99 篇 college of compu...
  • 99 篇 department of co...

作者

  • 136 篇 hai jin
  • 129 篇 jin hai
  • 122 篇 niyato dusit
  • 107 篇 zheng wei-shi
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 calvo d.
  • 93 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 83 篇 díaz a.f.
  • 81 篇 anjali t.
  • 74 篇 boumaaza j.
  • 73 篇 kalekin o.
  • 65 篇 coleiro a.
  • 61 篇 huang f.
  • 57 篇 gozzini s.r.
  • 56 篇 kulikovskiy v.
  • 55 篇 zhang lei
  • 54 篇 eddymaoui a.

语言

  • 33,106 篇 英文
  • 1,736 篇 其他
  • 262 篇 中文
  • 11 篇 法文
  • 10 篇 德文
  • 5 篇 日文
  • 3 篇 荷兰文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Computing Science"
35061 条 记 录,以下是4981-4990 订阅
排序:
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
science China(Information sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
High-quality sound device virtualization in Xen para-virtualized environment  1
收藏 引用
4th International Conference on Human-Centric computing, HumanCom'11 and the 6th International Conference on Embedded and Multimedia computing, EMC'11
作者: Hu, Kan Zhou, Wenbo Jin, Hai Shao, Zhiyuan Chen, Huacai Services Computing Technology and System Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
I/O virtualization plays an important role in client virtualization, and audio performance directly impacts user experience. Solutions for I/O virtualization includes full device emulation, split driver model and dire... 详细信息
来源: 评论
Visualizing and simulating semantic web services ontologies
收藏 引用
7th International Conference on Formal Engineering Methods, ICFEM 2005
作者: Sun, Jun Li, Yuan Fang Wang, Hai Sun, Jing School of Computing National University of Singapore Singapore Department of Computer Science University of Manchester United Kingdom Department of Computer Science University of Auckland New Zealand
The development of Web Services has transformed the World Wide Web into a more application-aware information portal. The various standards ensure that Web Services are interpretable and extensible, opening up possibil... 详细信息
来源: 评论
Dynamic processor resource configuration in virtualized environments
Dynamic processor resource configuration in virtualized envi...
收藏 引用
International Conference on Services computing
作者: Jin, Hai Deng, Li Wu, Song Shi, Xuanhua Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Virtualization can provide significant benefits in data centers, such as dynamic resource configuration, live virtual machine migration. Services are deployed in virtual machines (VMs) and resource utilization can be ... 详细信息
来源: 评论
Compliance checking for usage-constrained credentials in trust negotiation systems
Compliance checking for usage-constrained credentials in tru...
收藏 引用
15th International Conference on Information Security, ISC 2012
作者: Hu, Jinwei Khan, Khaled M. Bai, Yun Zhang, Yan Department of Computer Science TU Darmstadt Germany Department of Computer Science and Engineering Qatar University Qatar School of Computing and Mathematics University of Western Sydney Australia
We propose an approach to placing usage-constraints on RT credentials;issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of pract... 详细信息
来源: 评论
Secure watermark detection schemes
Secure watermark detection schemes
收藏 引用
2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceedings, APCC/MDMC'04
作者: Yongliang, Liu Gao, Wen Liu, Shaohui School of Computer Science Harbin Institute of Technology Harbin China Institute of Computing Technology Chinese Academy of Science Beijing China
In traditional watermark detection scheme, a prover exposed a watermark to be present in a digital data to the possible dishonest verifier. However, a potential attacker is able to destroy or remove the watermark enti... 详细信息
来源: 评论
An efficient distributed transactional memory system
An efficient distributed transactional memory system
收藏 引用
11th IEEE International Conference on Trust, Security and Privacy in computing and Communications, TrustCom-2012
作者: Peng, Xin Liao, Xiaofei Jin, Hai Fan, Xuepeng Tu, Xuping Yu, Linchen Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Transactional memory (TM) is a parallel programming concept which reduces challenges in parallel programming. Existing distributed transactional memory system consumes too much bandwidth and brings high latency. In th... 详细信息
来源: 评论
Encrypted remote user authentication scheme by using smart card
Encrypted remote user authentication scheme by using smart c...
收藏 引用
2012 International Conference on Web Information Systems and Mining, WISM 2012
作者: Yassin, Ali A. Jin, Hai Ibrahim, Ayad Zou, Deqing Services Computing Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Smart card-based authentication is considered as one of the most excessively used and applied solutions for remote user authentication. In this paper, we display Wang et al.'s scheme and indicate many shortcomings... 详细信息
来源: 评论
Exploiting dataflow to extract Java instruction level parallelism on a tag-based multi-issue semi in-order (TMSI) processor  20
Exploiting dataflow to extract Java instruction level parall...
收藏 引用
20th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2006
作者: Wang, Hai-Chen Yuen, Chung-Kwong Dept. of Computer Science School of Computing National University of Singapore 3 Science Drive 2 Singapore 117543 Singapore
To design a Java processor with traditional modern processor architecture, the Instruction Level Parallelism (ILP) is not readily exploitable due to stack operands dependencies. This paper presents a dataflow-based in... 详细信息
来源: 评论
Architecting Dependable Systems II  1
收藏 引用
丛书名: Lecture Notes in computer science
1000年
作者: Rogério Lemos Cristina Gacek Alexander Romanovsky
来源: 评论