咨询与建议

限定检索结果

文献类型

  • 68 篇 会议
  • 22 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 93 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 73 篇 工学
    • 64 篇 计算机科学与技术...
    • 56 篇 软件工程
    • 18 篇 信息与通信工程
    • 11 篇 光学工程
    • 9 篇 控制科学与工程
    • 7 篇 机械工程
    • 7 篇 建筑学
    • 5 篇 电气工程
    • 5 篇 生物工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 2 篇 冶金工程
    • 2 篇 土木工程
    • 1 篇 仪器科学与技术
  • 35 篇 理学
    • 22 篇 数学
    • 8 篇 物理学
    • 6 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 4 篇 化学
    • 3 篇 系统科学
  • 23 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 9 篇 工商管理
    • 8 篇 图书情报与档案管...
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学

主题

  • 6 篇 computer graphic...
  • 4 篇 animation
  • 3 篇 wireless sensor ...
  • 3 篇 biological syste...
  • 3 篇 cloud computing
  • 3 篇 augmented realit...
  • 2 篇 support vector m...
  • 2 篇 rendering (compu...
  • 2 篇 big data
  • 2 篇 virtual environm...
  • 2 篇 quality of servi...
  • 2 篇 authentication
  • 2 篇 visualization
  • 2 篇 semantics
  • 2 篇 humans
  • 2 篇 context
  • 2 篇 virtual reality
  • 1 篇 object oriented ...
  • 1 篇 decision-making
  • 1 篇 fuzzy sets

机构

  • 6 篇 service computin...
  • 5 篇 department of co...
  • 5 篇 grid and service...
  • 4 篇 institute of com...
  • 3 篇 computer graphic...
  • 3 篇 department of el...
  • 3 篇 school of comput...
  • 3 篇 institute for co...
  • 3 篇 state key labora...
  • 3 篇 computer graphic...
  • 3 篇 key lab. of embe...
  • 2 篇 comput. graphics...
  • 2 篇 guangxi cooperat...
  • 2 篇 computing servic...
  • 2 篇 hit lab. nz univ...
  • 2 篇 national key lab...
  • 2 篇 school of comput...
  • 2 篇 algorithm innova...
  • 2 篇 college of infor...
  • 2 篇 school of comput...

作者

  • 7 篇 jin hai
  • 5 篇 li yunfa
  • 4 篇 daniel thalmann
  • 3 篇 schmalstieg diet...
  • 3 篇 wan jian
  • 3 篇 thalmann daniel
  • 3 篇 yu zhibin
  • 3 篇 li wanqing
  • 2 篇 bu shu-po
  • 2 篇 haxhimusa yll
  • 2 篇 sheng junjie
  • 2 篇 oakley ian
  • 2 篇 yan chungang
  • 2 篇 cha jongeun
  • 2 篇 li yunsong
  • 2 篇 yuan pingpeng
  • 2 篇 ding zhijun
  • 2 篇 su li
  • 2 篇 bruckner stefan
  • 2 篇 cui haochuan

语言

  • 90 篇 英文
  • 3 篇 中文
检索条件"机构=Service Computer Technology and Graphics Lab."
93 条 记 录,以下是31-40 订阅
排序:
Architectural style classification of building facade windows
Architectural style classification of building facade window...
收藏 引用
7th International Symposium on Visual Computing, ISVC 2011
作者: Shalunts, Gayane Haxhimusa, Yll Sablatnig, Robert Institute of Computer Aided Automation Computer Vision Lab. Vienna University of Technology Austria Institute of Computer Graphics and Algorithms Pattern Recongition and Image Processing Lab. Vienna University of Technology Austria
Building facade classification by architectural styles allows categorization of large databases of building images into semantic categories belonging to certain historic periods, regions and cultural influences. Image... 详细信息
来源: 评论
3D reconstruction of urban areas
3D reconstruction of urban areas
收藏 引用
International Conference on 3D Imaging, Modeling, Processing, Visualization and Transmission
作者: Poullis, Charalambos You, Suya Cyprus University of Technology Immersive and Creative Technologies Lab. Limassol Cyprus University of Southern California Computer Graphics and Immersive Technologies Lab. Los Angeles United States
Virtual representations of real world areas are increasingly being employed in a variety of different applications such as urban planning, personnel training, simulations, etc. Despite the increasing demand for such r... 详细信息
来源: 评论
An interactive augmented reality coloring book  11
An interactive augmented reality coloring book
收藏 引用
SIGGRAPH Asia 2011 Emerging Technologies, SA'11
作者: Clark, Adrian Dünser, Andreas Grasset, Raphaël HIT Lab. NZ University of Canterbury Christchurch New Zealand Institute for Computer Graphics and Vision Graz University of Technology Austria
Creating entertaining and educational books not only requires providing visually stimulating content but also means for students to interact, create, and express themselves.
来源: 评论
Importance-driven compositing window management  11
Importance-driven compositing window management
收藏 引用
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
作者: Waldner, Manuela Steinberger, Markus Grasset, Raphael Schmalstieg, Dieter Institute for Computer Graphics and Vision Graz University of Technology Graz Austria HIT Lab. NZ University of Canterbury Christchurch New Zealand
In this paper we present importance-driven compositing window management, which considers windows not only as basic rectangular shapes but also integrates the importance of the windows' content using a bottom-up v... 详细信息
来源: 评论
A behavior-geography based routing scheme in mobile ad hoc networks
A behavior-geography based routing scheme in mobile ad hoc n...
收藏 引用
2011 ACM Workshop on Ubiquitous Affective Awareness and Intelligent Interaction, UAAII'11, Co-located with UbiComp 2011
作者: Yu, Chen Li, Xi Liang, Chuanming Jin, Hai Service Computing Technology and System Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Multicast routing scheme seems so extravagant in resource respect in mobile ad hoc network (MANET), especially in delay tolerant network (DTN), that yields to high resource occupation rate, low submission rate, and lo... 详细信息
来源: 评论
MT-profiler: A parallel dynamic analysis framework based on two-stage sampling  1
收藏 引用
Lecture Notes in computer Science
作者: Yu, Zhibin Zhang, Weifu Tu, Xuping Service Computing Technology and System Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Dynamic instrumentation systems offer a valuable solution for program profiling and analysis, architectural simulation, and bug detection. However, the performance of target programs suffers great losses when they are... 详细信息
来源: 评论
EAPAC: An enhanced application placement framework for data centers
EAPAC: An enhanced application placement framework for data ...
收藏 引用
14th IEEE Int. Conf. on Computational Science and Engineering, CSE 2011, the 11th International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2011, and the 10th IEEE Int. Conf. on Ubiquitous Computing and Communications, IUCC 2011
作者: Shi, Xuanhua Jiang, Hongbo He, Ligang Jin, Hai Wang, Chonggang Yu, Bo Wang, Fei Service Computing Technology and System Lab./Cluster and Grid Computing Lab. School of Computer Huazhong University of Science and Technology China Department of Electronics and Information Engineering Huazhong University of Science and Technology China Department of Computer Science University of Warwick United Kingdom InterDigital Communications Corp. United States
Emerging data centers may host a large number of applications that consume CPU power, memory, and I/O resources. Previous studies focus on the allocation of resources in order to perfectly satisfy the demands seen in ... 详细信息
来源: 评论
An adaptive management mechanism for resource scheduling in multiple virtual machine system
An adaptive management mechanism for resource scheduling in ...
收藏 引用
Lecture Notes in computer Science
作者: Wan, Jian Yang, Laurence T. Li, Yunfa Xu, Xianghua Xiong, Naixue Grid and Service Computing Lab. School of Computer Science and Technology Hangzhou Dianzi University 310018 Hangzhou China Department of Computer Science St. Francis Xavier University Antigonish NS B2G 2W5 Canada Department of Computer Science IS and T on Virtual Computing Lab. Georgia State University GA 30303 United States
With the growth of hardware and software resources, the management of resource scheduling is becoming more and more difficult in multiple virtual machine system. It has become a very difficult problem that how to sche... 详细信息
来源: 评论
A security testing approach for WSN protocols based on object-oriented attack model
A security testing approach for WSN protocols based on objec...
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Qi, Yue Pei, Qingqi Zeng, Yong Yang, Chao Bu, Shu-Po State Key Laboratory of Integrated Service Networks Xidian University Xi'an China Key Lab. of Computer Networks and Information Security of Ministry of Education China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou 215104 China
In this paper, we propose an object-oriented attack model to represent a protocol attack in WSN detailedly. The model describes multiple attributes of an attack, including its principle, impact, interdependent relatio... 详细信息
来源: 评论
An automated black-box testing approach for WSN security protocols
An automated black-box testing approach for WSN security pro...
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Ji, Shirui Pei, Qingqi Zeng, Yong Yang, Chao Bu, Shu-Po State Key Laboratory of Integrated Service Networks Xidian University Xi'an China Key Lab. of Computer Networks and Information Security of Ministry of Education China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou 215104 China
Security protocols for wireless sensor network are designed to provide a variety of security services to secure communications in an unsafe network. It is demanded to verify whether an implementation of a security pro... 详细信息
来源: 评论