咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,589 篇 工学
    • 1,028 篇 计算机科学与技术...
    • 783 篇 软件工程
    • 332 篇 信息与通信工程
    • 226 篇 控制科学与工程
    • 189 篇 电气工程
    • 179 篇 电子科学与技术(可...
    • 150 篇 机械工程
    • 127 篇 生物工程
    • 82 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 69 篇 光学工程
    • 68 篇 化学工程与技术
    • 66 篇 材料科学与工程(可...
    • 64 篇 动力工程及工程热...
    • 64 篇 生物医学工程(可授...
    • 56 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 792 篇 理学
    • 441 篇 数学
    • 153 篇 生物学
    • 146 篇 物理学
    • 133 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 67 篇 化学
    • 33 篇 大气科学
  • 430 篇 管理学
    • 272 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 63 篇 医学
    • 48 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 59 篇 法学
    • 48 篇 社会学
  • 31 篇 经济学
  • 22 篇 农学
  • 14 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 university of ch...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 zhou mengchu
  • 33 篇 changjun jiang
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,238 篇 英文
  • 100 篇 中文
  • 99 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2431 条 记 录,以下是151-160 订阅
Adaptive walking control of quadruped robots based on central pattern generator (CPG) and reflex
收藏 引用
控制理论与应用(英文版) 2013年 第3期11卷 386-392页
作者: Chengju LIU Qijun CHEN Guoxing WANG Department of Electronics and Information Engineering and Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University
This paper presents a central pattern generator (CPG) and vestibular reflex combined control strategy for a quadruped robot. An oscillator network and a knee-to-hip mapping function are presented to realize the rhyt... 详细信息
来源: 评论
Geometric Algebra Multi-order Graph Neural Network for Traffic Prediction
收藏 引用
IEEE Transactions on Big Data 2024年 第3期11卷 1-15页
作者: Zang, Di Cui, Zhe Wang, Zengqiang Lei, Juntao Ding, Yongjie Wei, Chenguang Zhang, Junqi Department of Computer Science and Technology and the Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
Accurate traffic prediction is crucial for urban traffic management. Spatial-temporal graph neural networks, which combine graph neural networks with time series processing, have been extensively employed in traffic p... 详细信息
来源: 评论
Trainbow: a new trusted virtual machine based platform
收藏 引用
中国高等学校学术文摘·计算机科学 2010年 第1期4卷 47-64页
作者: Yuzhong SUN Yongbing HUANG Yunwei GAO Haifeng FANG Ying SONG Lei DU Kai ZHANG Hongyong ZANG Yaqiong LI Yajun YANG Ran AO Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049China Key Laboratory of Computer System and Architecture Institute of Computing TechnologyChinese Academy of Sciences Beijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing... 详细信息
来源: 评论
Modeling and Risk Analysis of Cooperative Adaptive Cruise Control systems Based on Petri Nets and Distributed Edge Intelligence
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Wangyang Cheng, Yumeng Fang, Xianwen Zhai, Xiaojun Wang, Yinglong Jing, Hongyuan Shaanxi Normal University Chang'an District Key Laboratory of Intelligent Computing and Service Technology for Folk Song Ministry of Culture and Tourism Xi'an710119 China Shaanxi Normal University School of Computer Science Chang'an District Xi'an710119 China Anhui University of Science and Technology Anhui Province Engineering Laboratory for Big Data Analysis and Early Warning Technology of Coal Mine Safety Anhui232001 China University of Essex School of Computer Science and Electronic Engineering Colchester United Kingdom Beijing Union University College of Robotics Beijing100101 China
Fueled by advancements in intelligent transportation systems, the Internet of Vehicles (IoV) seeks to connect smart vehicles, road infrastructure, and users into a unified network, enhancing traffic efficiency and red... 详细信息
来源: 评论
Few-Shot Photovoltaic Film Defect Detection with Contextual Ensemble Language-Image Multimodal Network
收藏 引用
IEEE Transactions on Industrial Informatics 2025年
作者: Wang, Huiyan Peng, Ruihao Zhu, Yiheng Li, Jiachen Zhou, Mengchu Ying, Ming Wang, Shouguang Zhejiang Gongshang University School of Computer Science and Technology Hangzhou 310018 China Qilu University of Technology (Shandong Academy of Sciences) Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Jinan 250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan 250353 China New Jersey Institute of Technology Helen and John C. Hartmann Department of Electrical and Computer Engineering Newark 07102 NJ United States Zhejiang Gongshang University School of Information and Electronic Engineering Hangzhou 310018 China
The automatic detection of defects in industrial photovoltaic film is crucial for ensuring the reliability of photovoltaic modules. key challenges include limited defect samples, interclass feature similarities, and i... 详细信息
来源: 评论
The influence of limited visual sensing on the Reynolds flocking algorithm  3
The influence of limited visual sensing on the Reynolds floc...
收藏 引用
3rd IEEE International Conference on Robotic computing (IRC)
作者: Soria, Enrica Schiano, Fabrizio Floreano, Dario Department of Computer Science and Technology the Key Laboratory of Embedded System Service Computing Shanghai China
The interest in multi-drone systems flourished in the last decade and their application is promising in many fields. We believe that in order to make drone swarms flying smoothly and reliably in real-world scenarios w... 详细信息
来源: 评论
Cramér-Rao Bound Minimization for a Passive Sensing Multi-ISAC system
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Chen, Jian Chen, Qikai Deng, Yansha Jia, Jie Yin, Baoxin Wang, Xingwei Northeastern University School of Computer Science and Engineering Shenyang110819 China Northeastern University Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China King's College London LondonWC2R 2LS United Kingdom
The integrated sensing and communication (ISAC) system can simultaneously provide communication and radar sensing, effectively improving spectrum utilization. However, existing research mainly focuses on the mono-stat... 详细信息
来源: 评论
The Mechanism of Mobile Communication technology Prompting Digital Transformation of Manufacturing Industry: From the Perspective of Data Factor Empowerment  24
The Mechanism of Mobile Communication Technology Prompting D...
收藏 引用
Proceedings of the 2024 10th International Conference on Communication and Information Processing
作者: Ran Li Muhua Wei Huili Liu Jiayin Qi Lina Liu Department of User and Market Research China Mobile Research Institute Beijing Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou Guangzhou China and Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing Beijing China School of Economics and Management Beijing University of Posts and Telecommunications Beijing Beijing China
Abstract: The digital transformation of manufacturing industry is a crucial measure for achieving high-quality development, and mobile communication technology plays a significant role in this process. This paper focu... 详细信息
来源: 评论
A Behavioral Authentication Method for Mobile Based on Browsing Behaviors
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2020年 第6期7卷 1528-1541页
作者: Dongxiang Chen Zhijun Ding Chungang Yan Mimi Wang Department of Computer Science and Technology Tongji UniversityShanghai 201804China Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji UniversityShanghai 201804China IEEE
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavio... 详细信息
来源: 评论
New Methodologies for Parallel Architecture
收藏 引用
Journal of Computer Science & technology 2011年 第4期26卷 578-587页
作者: 范东睿 李晓维 李国杰 Key Laboratory of Computer System and Architecture Institute of Computing TechnologyChinese Academy of Sciences
Moore's law continues to grant computer architects ever more transistors in the foreseeable future, and parallelism is the key to continued performance scaling in modern microprocessors. In this paper, the achievemen... 详细信息
来源: 评论