咨询与建议

限定检索结果

文献类型

  • 1,461 篇 会议
  • 992 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,594 篇 工学
    • 1,036 篇 计算机科学与技术...
    • 787 篇 软件工程
    • 322 篇 信息与通信工程
    • 228 篇 控制科学与工程
    • 175 篇 电子科学与技术(可...
    • 172 篇 电气工程
    • 144 篇 机械工程
    • 127 篇 生物工程
    • 76 篇 仪器科学与技术
    • 76 篇 交通运输工程
    • 71 篇 光学工程
    • 68 篇 材料科学与工程(可...
    • 67 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 795 篇 理学
    • 440 篇 数学
    • 153 篇 生物学
    • 145 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 65 篇 化学
    • 32 篇 大气科学
  • 425 篇 管理学
    • 269 篇 管理科学与工程(可...
    • 177 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 61 篇 医学
    • 46 篇 临床医学
    • 41 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 15 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 85 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 41 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 federated learni...
  • 34 篇 delay
  • 33 篇 web services
  • 30 篇 hardware
  • 29 篇 deep learning
  • 29 篇 bandwidth
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 88 篇 department of co...
  • 81 篇 key laboratory o...
  • 71 篇 the key laborato...
  • 56 篇 key laboratory o...
  • 51 篇 national enginee...
  • 45 篇 key laboratory o...
  • 41 篇 school of comput...
  • 39 篇 shandong provinc...
  • 39 篇 school of cyber ...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 33 篇 university of ch...
  • 30 篇 national enginee...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 24 篇 shen linlin
  • 23 篇 li xiaowei
  • 22 篇 cheng wang
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 20 篇 hu shengshan
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 miao duoqian
  • 18 篇 yinhe han

语言

  • 2,236 篇 英文
  • 124 篇 其他
  • 102 篇 中文
检索条件"机构=Service Computing Technology and System Key Laboratory"
2455 条 记 录,以下是1501-1510 订阅
排序:
Back Cover: Amorphous Ni0.75Fe0.25(OH)2-Decorated Layered Double Perovskite Pr0.5Ba0.5CoO3-δfor Highly Efficient and Stable Water Oxidation (ChemElectroChem 3/2017)
收藏 引用
ChemElectroChem 2017年 第3期4卷 747-747页
作者: Prof. Fengli Liang Prof. Jaka Sunarso Prof. Junkui Mao Ziqiong Yang Prof. Wei Zhou College of Energy and Power Engineering Jiangsu Province Key Laboratory of Aerospace Power System Nanjing University of Aeronautics and Astronautics Nanjing 210016 P.R. China Faculty of Engineering Computing and Science Swinburne University of Technology Jalan Simpang Tiga 93350 Kuching Sarawak Malaysia Jiangsu National Synergetic Innovation Center for Advanced Materials (SICAM) State Key Laboratory of Materials-Oriented Chemical Engineering College of Chemical Engineering Nanjing Tech University Nanjing 210009 P.R. China
来源: 评论
A co-evolutionary particle swarm optimization with dynamic topology for solving multi-objective optimization problems
Advances in Modelling and Analysis A
收藏 引用
Advances in Modelling and Analysis A 2016年 第1期53卷 145-159页
作者: Wu, Daqing Tang, Lixiang Li, Haiyan Ouyang, LiJun Computer Science and Technology Institute University of South China HangyangHunan China Antai College of Economics and Management Shanghai Jiao Tong University Shanghai200240 China Zigong643000 China Key Laboratory of Guangxi High Schools for Complex System and Computational Intelligence Guangxi University for Nationalities Nanning530006 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University HefeiAnhui Province230039 China Department of Business Administration Hunan University of Finance and Economics Hunan410205 China
This paper proposes a multi-objective with dynamic topology particle swarm optimization (PSO) algorithm for solving multi-objective problems, named DTPSO. One of the main drawbacks of classical multi-objective particl... 详细信息
来源: 评论
Author Correction: The power of genetic diversity in genome-wide association studies of lipids
收藏 引用
Nature 2023年 第7965期618卷 E19-E20页
作者: Sarah E Graham Shoa L Clarke Kuan-Han H Wu Stavroula Kanoni Greg J M Zajac Shweta Ramdas Ida Surakka Ioanna Ntalla Sailaja Vedantam Thomas W Winkler Adam E Locke Eirini Marouli Mi Yeong Hwang Sohee Han Akira Narita Ananyo Choudhury Amy R Bentley Kenneth Ekoru Anurag Verma Bhavi Trivedi Hilary C Martin Karen A Hunt Qin Hui Derek Klarin Xiang Zhu Gudmar Thorleifsson Anna Helgadottir Daniel F Gudbjartsson Hilma Holm Isleifur Olafsson Masato Akiyama Saori Sakaue Chikashi Terao Masahiro Kanai Wei Zhou Ben M Brumpton Humaira Rasheed Sanni E Ruotsalainen Aki S Havulinna Yogasudha Veturi QiPing Feng Elisabeth A Rosenthal Todd Lingren Jennifer Allen Pacheco Sarah A Pendergrass Jeffrey Haessler Franco Giulianini Yuki Bradford Jason E Miller Archie Campbell Kuang Lin Iona Y Millwood George Hindy Asif Rasheed Jessica D Faul Wei Zhao David R Weir Constance Turman Hongyan Huang Mariaelisa Graff Anubha Mahajan Michael R Brown Weihua Zhang Ketian Yu Ellen M Schmidt Anita Pandit Stefan Gustafsson Xianyong Yin Jian'an Luan Jing-Hua Zhao Fumihiko Matsuda Hye-Mi Jang Kyungheon Yoon Carolina Medina-Gomez Achilleas Pitsillides Jouke Jan Hottenga Gonneke Willemsen Andrew R Wood Yingji Ji Zishan Gao Simon Haworth Ruth E Mitchell Jin Fang Chai Mette Aadahl Jie Yao Ani Manichaikul Helen R Warren Julia Ramirez Jette Bork-Jensen Line L Kårhus Anuj Goel Maria Sabater-Lleal Raymond Noordam Carlo Sidore Edoardo Fiorillo Aaron F McDaid Pedro Marques-Vidal Matthias Wielscher Stella Trompet Naveed Sattar Line T Møllehave Betina H Thuesen Matthias Munz Lingyao Zeng Jianfeng Huang Bin Yang Alaitz Poveda Azra Kurbasic Claudia Lamina Lukas Forer Markus Scholz Tessel E Galesloot Jonathan P Bradfield E Warwick Daw Joseph M Zmuda Jonathan S Mitchell Christian Fuchsberger Henry Christensen Jennifer A Brody Mary F Feitosa Mary K Wojczynski Michael Preuss Massimo Mangino Paraskevi Christofidou Niek Verweij Jan W Benjamins Jorgen Engmann Rachel L Kember Roderick C Slieker Ken Sin Lo Nuno R Zilhao Phuong Le Marcus E Kleber Graciela E Delgado Shaofeng Huo Dai Department of Internal Medicine Division of Cardiology University of Michigan Ann Arbor MI USA. VA Palo Alto Health Care System Palo Alto CA USA. Department of Medicine Division of Cardiovascular Medicine Stanford University School of Medicine Stanford CA USA. Department of Computational Medicine and Bioinformatics University of Michigan Ann Arbor MI USA. William Harvey Research Institute Barts and the London School of Medicine and Dentistry Queen Mary University of London London UK. Department of Biostatistics and Center for Statistics Genetics University of Michigan Ann Arbor MI USA. Department of Genetics Perelman School of Medicine University of Pennsylvania Philadelphia PA USA. Clinical Pharmacology William Harvey Research Institute Barts and The London School of Medicine and Dentistry Queen Mary University of London London UK. Endocrinology Boston Children's Hospital Boston MA USA. Medical and Population Genetics Broad Institute Cambridge MA USA. Department of Genetic Epidemiology University of Regensburg Regensburg Germany. McDonnell Genome Institute and Department of Medicine Washington University St Louis MO USA. Department of Precision Medicine Division of Genome Science National Institute of Health Cheongju-si South Korea. Tohoku Medical Megabank Organization Tohoku University Sendai Japan. Sydney Brenner Institute for Molecular Bioscience Faculty of Health Sciences University of the Witwatersrand Johannesburg South Africa. Center for Research on Genomics and Global Health National Human Genome Research Institute National Institutes of Health Bethesda MD USA. Blizard Institute Barts and the London School of Medicine and Dentistry Queen Mary University of London London UK. Wellcome Sanger Institute Hinxton UK. Department of Epidemiology Emory University Rollins School of Public Health Atlanta GA USA. Atlanta VA Health Care System Decatur GA USA. Malcolm Randall VA Medical Center Gainesville FL USA. Division of Vascular Sur
来源: 评论
The Design and Reform of “Comprehensive Experiment of Information Security” Based on the Outstanding Talent Cultivating Practical Ability
The Design and Reform of “Comprehensive Experiment of Infor...
收藏 引用
2nd International Conference on Information and Communication technology for Education(ICTE 2015)
作者: Chun-dong Wang Li Yue Shu-gang Tang Hong Yang Key Laboratory of Computer Vision and System Ministry of EducationTianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
This paper analyzed some problems in the current information security experiment teaching, and then proposed a teaching method taking students as the main body, the teacher as the auxiliary heuristic, in order to cult... 详细信息
来源: 评论
Information Security Brand of Professional Courses Teaching system of Personnel Training for Excellence
Information Security Brand of Professional Courses Teaching ...
收藏 引用
2nd International Conference on Information and Communication technology for Education(ICTE 2015)
作者: Huai-Bin Wang Yan-Fa Ma Key Laboratory of Computer Vision and System Ministry of EducationTianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
With the deepening of educational reform and the changing of talent training model, the past teaching methods of information security courses have been exposed many drawbacks. This paper focuses on the information sec... 详细信息
来源: 评论
Characteristic Course Reform of Computer system Security
Characteristic Course Reform of Computer System Security
收藏 引用
2nd International Conference on Information and Communication technology for Education(ICTE 2015)
作者: Chun-Dong Wang Xi-Jie Sun Shu-Gang Tang Zhao-Dong Tang Key Laboratory of Computer Vision and System Ministry of Education Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
With the rapid development of Internet and constant improvement of informationization degree, all kinds of security problems become increasingly prominent. Especially Computer system security is faced with serious cha... 详细信息
来源: 评论
Structured Teaching Design Based on Heuristic Teaching Theory
Structured Teaching Design Based on Heuristic Teaching Theor...
收藏 引用
2nd International Conference on Information and Communication technology for Education(ICTE 2015)
作者: Chunlei Zhao Hong Yang Ping Liu Key Laboratory of Computer Vision and System Ministry of Education Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
According to the characteristics of computer virus course, the paper explores some methods and the experience of teaching this course from a practical perspective. Based on the file virus analysis and the detailed cur... 详细信息
来源: 评论
Effectively compressing Near-Duplicate Videos in a joint way
Effectively compressing Near-Duplicate Videos in a joint way
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Hanli Wang Ming Ma Tao Tian Key Laboratory of Embedded System and Service Computing Tongji University Shanghai P. R. China
With the increasing popularity of social network, more and more people tend to store and transmit information in visual format, such as image and video. However, the cost of this convenience brings about a shock to tr... 详细信息
来源: 评论
Optimizing Parallel Kinetic Monte Carlo Simulation by Communication Aggregation and Scheduling
Optimizing Parallel Kinetic Monte Carlo Simulation by Commun...
收藏 引用
2015大数据技术及应用论坛
作者: Baodong Wu Shigang Li Yunquan Zhang State Key Laboratory of Computer System and Architecture Institute of Computing TechnologyChinese Academy of Sciences
Kinetic Monte Carlo(KMC) algorithm has been widely applied for simulation of radiation damage, grain growth and chemical reactions. To simulate at a large temporal and spatial scale, domain decomposition is commonly u... 详细信息
来源: 评论
Situation assessment of network security based on T-S fuzzy neural network
收藏 引用
Journal of Computational Information systems 2015年 第16期11卷 5999-6006页
作者: Wang, Chundong Yue, Li Du, Chenyang Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
A network security situation assessment model based on T-S fuzzy neural network was proposed in this paper. In the model the whole situation of the network has four child situations: threat situation, fragile situatio... 详细信息
来源: 评论