咨询与建议

限定检索结果

文献类型

  • 1,506 篇 会议
  • 985 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,493 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,593 篇 工学
    • 1,034 篇 计算机科学与技术...
    • 785 篇 软件工程
    • 324 篇 信息与通信工程
    • 224 篇 控制科学与工程
    • 171 篇 电子科学与技术(可...
    • 170 篇 电气工程
    • 145 篇 机械工程
    • 129 篇 生物工程
    • 76 篇 仪器科学与技术
    • 76 篇 交通运输工程
    • 71 篇 光学工程
    • 68 篇 材料科学与工程(可...
    • 68 篇 化学工程与技术
    • 65 篇 生物医学工程(可授...
    • 63 篇 动力工程及工程热...
    • 53 篇 网络空间安全
    • 46 篇 安全科学与工程
  • 795 篇 理学
    • 444 篇 数学
    • 152 篇 生物学
    • 147 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 105 篇 系统科学
    • 65 篇 化学
    • 31 篇 大气科学
  • 428 篇 管理学
    • 267 篇 管理科学与工程(可...
    • 182 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 59 篇 法学
    • 49 篇 社会学
  • 59 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 29 篇 经济学
  • 24 篇 农学
  • 15 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 99 篇 feature extracti...
  • 71 篇 computer archite...
  • 66 篇 training
  • 62 篇 accuracy
  • 61 篇 computational mo...
  • 56 篇 laboratories
  • 56 篇 federated learni...
  • 46 篇 semantics
  • 45 篇 optimization
  • 39 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 32 篇 data mining
  • 32 篇 data models
  • 31 篇 hardware
  • 31 篇 robustness
  • 29 篇 deep learning
  • 29 篇 bandwidth
  • 28 篇 throughput
  • 27 篇 petri nets

机构

  • 116 篇 key laboratory o...
  • 108 篇 tianjin key labo...
  • 89 篇 key laboratory o...
  • 86 篇 department of co...
  • 85 篇 key laboratory o...
  • 77 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 71 篇 the key laborato...
  • 57 篇 key laboratory o...
  • 55 篇 shandong provinc...
  • 50 篇 national enginee...
  • 48 篇 shandong provinc...
  • 41 篇 school of comput...
  • 39 篇 institute of com...
  • 39 篇 school of cyber ...
  • 36 篇 key laboratory o...
  • 35 篇 university of ch...
  • 31 篇 key laboratory o...
  • 30 篇 national enginee...
  • 30 篇 chinese academy ...

作者

  • 48 篇 xiaowei li
  • 37 篇 jin hai
  • 34 篇 zhang hua
  • 34 篇 hai jin
  • 32 篇 zhou mengchu
  • 32 篇 changjun jiang
  • 30 篇 jiang changjun
  • 28 篇 huawei li
  • 25 篇 shen linlin
  • 22 篇 cheng wang
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 mengchu zhou
  • 21 篇 yu hu
  • 20 篇 hu shengshan
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 17 篇 yinhe han
  • 16 篇 wang cheng

语言

  • 2,197 篇 英文
  • 198 篇 其他
  • 107 篇 中文
检索条件"机构=Service Computing Technology and System Key Laboratory"
2493 条 记 录,以下是1761-1770 订阅
排序:
Auto-selected algorithm of the neighborhood size and intrinsic dimension for image feature extraction
收藏 引用
Guangdianzi Jiguang/Journal of Optoelectronics Laser 2013年 第12期24卷 2416-2420页
作者: Liu, Feng-Lian Wang, Ri-Wei Cheng, Jun Kang, Juan-Peng Key Laboratory on Computer Vision and System Ministry of Education of China Key Laboratory on Intelligence Computing and Novel Software Technology of the City of Tianjin Tianjin University of Technology Tianjin 300384 China
Dimensionality reduction algorithms have been applied widely in computer vision, medical image processing, video processing, face recognition, image retrieval etc. However, some problems need to be fixed. First of all... 详细信息
来源: 评论
LBRM algorithm for rule extraction based on rough membership
收藏 引用
2013 3rd International Symposium on Chemical Engineering and Material Properties, ISCEMP 2013
作者: Zhang, Xian Yong Miao, Duo Qian College of Mathematics and Software Science Sichuan Normal University Chengdu Sichuan 610068 China Department of Computer Science and Technology Tongji University Shanghai 201804 China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China
Rule extraction is a main goal for rough set theory. This paper mainly constructs a new algorithm (LBRM Algorithm) for rule extraction based on rough membership. The confidence principle is established based on rough ... 详细信息
来源: 评论
An Event-Driven service-Oriented Architecture for the Internet of Things
An Event-Driven Service-Oriented Architecture for the Intern...
收藏 引用
IEEE Asia-Pacific Conference on services computing (APSCC)
作者: Lina Lan Fei Li Bai Wang Lei Zhang Ruisheng Shi School of Network Education Beijing University of Posts and Telecommunications Beijing China Information Systems Institute Vienna University of Technology Vienna Austria Beijing University of Posts and Telecommunications Beijing Beijing CN School of Computer Beijing University of Posts and Telecommunications Beijing China Education Ministry Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
IoT (Internet of Things) bridges the physical world and information space. IoT services are environment sensitive and event-driven. The new IoT service architecture should adapt to these features. This paper analyses ... 详细信息
来源: 评论
Network intrusion detection based on artificial immune clustering
收藏 引用
Journal of Information and Computational Science 2013年 第10期10卷 3003-3012页
作者: Wang, Huadong Zhong, Jiang Li, Ang The 27th Research Institute of China Electronics Technology Group Corporation Zhengzhou 450015 China bCollege of Computer Science Chongqing University Chongqing 400044 China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing 400044 China
Traditional intrusion detection classification based methods could not tackle the abnormal events in a changing network environment, because those methods need lots of labeled data for training prediction. On the othe... 详细信息
来源: 评论
Sensor data quality assessment for building simulation model calibration based on automatic differentiation
Sensor data quality assessment for building simulation model...
收藏 引用
2013 IEEE International Conference on Automation Science and Engineering, CASE 2013
作者: Li, Sisi Song, Zhen Zhou, Mengchu Lu, Yan Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07013 United States Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China Department of Automation and Control Siemens Corporation Corporate Technology Princeton NJ 08540 United States
Building simulation models play a vital role in optimal building climate control, energy audit, fault detection and diagnosis, continuous commissioning, and planning. Real system parameters are often unknown or partia... 详细信息
来源: 评论
Sampled-data models and zero dynamics for nonlinear systems with relative degree two
Sampled-data models and zero dynamics for nonlinear systems ...
收藏 引用
第25届中国控制与决策会议
作者: Cheng Zeng Shan Liang Yingying Su Yangsheng Li College of Automation Chongqing University Department of Mathematics Guiyang university Key Laboratory of Dependable Service Computing in Cyber Physical SocietyMinistry of Education Chongqing University Department of Electric and Electronic Information Engineering Chongqing University of Science and Technology
This paper derives a more accurate sampled-data model than the Yuz and Goodwin type model for nonlinear systems in the case of the relative degree two, and analyzes the sampling zero dynamics of the sampled-data model... 详细信息
来源: 评论
Scheduling of time constrained dual-arm cluster tools with wafer revisiting
Scheduling of time constrained dual-arm cluster tools with w...
收藏 引用
2013 IEEE International Conference on Automation Science and Engineering, CASE 2013
作者: Qiao, Yan Wu, Naiqi Zhou, Mengchu Department of Industrial Engineering School of Electro-Mechanical Engineering Guangdong University of Technology Guangzhou 510006 China Macau University of Science and Technology China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102-1982 United States
This work intends to schedule a dual-arm cluster tool for the atomic layer deposition (ALD) process with wafer residency time constraints. ALD is a typical wafer revisiting process. Based on the analysis of system pro... 详细信息
来源: 评论
Abnormal network traffic detection approach based on alive entropy
收藏 引用
Tongxin Xuebao/Journal on Communications 2013年 第SUPPL.2期34卷 51-57页
作者: Mu, Xiang-Kun Wang, Jin-Song Xue, Yu-Feng Huang, Wei Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China
A novel alive entropy-based detection approach was proposed, which detects the abnormal network traffic based on the values of alive entropies. The alive entropies calculated based on the NetFlow data coming from the ... 详细信息
来源: 评论
Luminance and chrominance parallelization of H.264/AVC decoding on a multi-core processor
Luminance and chrominance parallelization of H.264/AVC decod...
收藏 引用
2013 IEEE 8th International Conference on Networking, Architecture and Storage, NAS 2013
作者: Meng, Xiaofu Gao, Xiang Yu, Qian Zhang, Shuangshuang Zhang, Xiaochun Huang, Jing Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China Graduate University of Chinese Academy of Sciences Beijing China Loongson Technology Corporation Limited Beijing China
This paper proposes a novel method to optimizing H.264 decoding on multi-core processors by exploiting color component level parallelism. Compared with sequential decoding and macro-block level parallelism, the propos... 详细信息
来源: 评论
Research of deep packet inspection system based on the MapReduce
收藏 引用
Journal of Computational Information systems 2013年 第7期9卷 2587-2594页
作者: Wang, Jinsong Wei, Jun Lin, Sheng Huang, Wei Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China
In this paper, we propose a deep packet inspection system based on the MapReduce. The MapReduce which is a parallel distributed programming model developed by Google applies the technology of deep packet inspection. N... 详细信息
来源: 评论