咨询与建议

限定检索结果

文献类型

  • 1,506 篇 会议
  • 988 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,593 篇 工学
    • 1,035 篇 计算机科学与技术...
    • 785 篇 软件工程
    • 324 篇 信息与通信工程
    • 224 篇 控制科学与工程
    • 171 篇 电子科学与技术(可...
    • 170 篇 电气工程
    • 145 篇 机械工程
    • 129 篇 生物工程
    • 76 篇 仪器科学与技术
    • 76 篇 交通运输工程
    • 71 篇 光学工程
    • 68 篇 化学工程与技术
    • 67 篇 材料科学与工程(可...
    • 65 篇 生物医学工程(可授...
    • 63 篇 动力工程及工程热...
    • 53 篇 网络空间安全
    • 46 篇 安全科学与工程
  • 795 篇 理学
    • 444 篇 数学
    • 153 篇 生物学
    • 146 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 105 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 429 篇 管理学
    • 268 篇 管理科学与工程(可...
    • 182 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
  • 59 篇 法学
    • 49 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 15 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 99 篇 feature extracti...
  • 71 篇 computer archite...
  • 66 篇 training
  • 62 篇 accuracy
  • 61 篇 computational mo...
  • 56 篇 laboratories
  • 56 篇 federated learni...
  • 46 篇 semantics
  • 45 篇 optimization
  • 39 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 32 篇 data mining
  • 32 篇 data models
  • 31 篇 hardware
  • 31 篇 robustness
  • 29 篇 deep learning
  • 29 篇 bandwidth
  • 28 篇 throughput
  • 27 篇 petri nets

机构

  • 115 篇 key laboratory o...
  • 108 篇 tianjin key labo...
  • 90 篇 key laboratory o...
  • 86 篇 department of co...
  • 85 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 71 篇 the key laborato...
  • 57 篇 key laboratory o...
  • 55 篇 shandong provinc...
  • 51 篇 shandong provinc...
  • 50 篇 national enginee...
  • 41 篇 school of comput...
  • 39 篇 institute of com...
  • 39 篇 school of cyber ...
  • 36 篇 key laboratory o...
  • 34 篇 university of ch...
  • 31 篇 key laboratory o...
  • 30 篇 national enginee...
  • 30 篇 chinese academy ...

作者

  • 49 篇 xiaowei li
  • 36 篇 jin hai
  • 34 篇 zhang hua
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 shen linlin
  • 23 篇 li xiaowei
  • 22 篇 cheng wang
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 mengchu zhou
  • 20 篇 hu shengshan
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 17 篇 yinhe han
  • 16 篇 wang cheng

语言

  • 2,199 篇 英文
  • 198 篇 其他
  • 108 篇 中文
检索条件"机构=Service Computing Technology and System Key Laboratory"
2496 条 记 录,以下是1891-1900 订阅
排序:
An architecture description language based on dynamic description logics  1
收藏 引用
7th IFIP International Conference on Intelligent Information Processing, IIP 2012
作者: Wang, Zhuxiao Peng, Hui Guo, Jing Zhang, Ying Wu, Kehe Xu, Huan Wang, Xiaofeng School of Control and Computer Engineering State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources North China Electric Power University Beijing 102206 China Education Technology Center Beijing International Studies University Beijing 100024 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
ADML is an architectural description language based on Dynamic Description Logic for defining and simulating the behavior of system architecture. ADML is being developed as a new formal language and/or conceptual mode... 详细信息
来源: 评论
A novel image compression encoding algorithm
收藏 引用
Guangdianzi Jiguang/Journal of Optoelectronics Laser 2012年 第6期23卷 1173-1180页
作者: Zhang, De-Gan Kang, Xue-Jing Wang, Jing-Hui Key Laboratory of Computer Vision and System Ministry of Education Tianjin Key Laboratory of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China
In this paper, the image compression encoding algorithm is improved. The first, the high-frequency coefficients are transformed to the spherical domain to reduce the correlation in the same scale. Then, based on two p... 详细信息
来源: 评论
Software services protection security protocol based on software watermarking in cloud environment
收藏 引用
Tongxin Xuebao/Journal on Communications 2012年 第SUPPL.2期33卷 176-181页
作者: Xu, Jin-Chao Zeng, Guo-Sun Wang, Wei Department of Computer Science and Technology Tongji University Shanghai 201804 China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China
Aimed to resist the infringement of software services in cloud environment, a software services protection security protocol based on software watermarking in cloud environment was presented. On the consideration of a... 详细信息
来源: 评论
Design for Testability Features of Godson-3 Multicore Microprocessor
收藏 引用
Journal of Computer Science & technology 2011年 第2期26卷 302-313页
作者: 齐子初 刘慧 李向库 胡伟武 Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Institute of Computing Technology Chinese Academy of Sciences Loongson Technologies Corporation Limited
This paper describes the design for testability (DFT) challenges and techniques of Godson-3 microprocessor, which is a scalable multicore processor based on the scalable mesh of crossbar (SMOC) on-chip network and... 详细信息
来源: 评论
Scaling Laws of Multicast Capacity for Power-Constrained Wireless Networks under Gaussian Channel Model
收藏 引用
IEEE Transactions on Computers 2012年 第5期61卷 713-725页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Shaojie Tang Yuan He Xufei Mao Yunhao Liu Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science and Engineering Building of Electronics and Information Engineering University of Tongji Shanghai China Department of Computer Science Illinois Institute of Technology Chicago IL USA Tsinghua National Laboratory for Information Science and Technology (TNLIST) Tsinghua University Beijing China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Hong Kong University of Science and Technology Kowloon Hong Kong China Tsinghua National Laboratory for Information Science and Technology (TNLIST) School of Software Tsinghua University Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing China
We study the asymptotic networking-theoretic multicast capacity bounds for random extended networks (REN) under Gaussian channel model, in which all wireless nodes are individually power-constrained. During the transm... 详细信息
来源: 评论
Evolution of Cooperation in Public Goods Games
收藏 引用
Communications in Theoretical Physics 2011年 第10期56卷 638-644页
作者: 夏承遗 张娟娟 王祎玲 王劲松 Key Laboratory of Computer Vision and System(Tianjin University of Technology) Ministry of Education Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology College of Life Science Shanxi Normal University
We investigate the evolution of cooperation with evolutionary public goods games based on finite populations, where four pure strategies: cooperators, defectors, punishers and loners who are unwilling to participate ... 详细信息
来源: 评论
A WIND DIRECTION EXTENSION BASED ALGORITHM FOR SCATTEROMETER WIND VECTOR RETRIEVAL
A WIND DIRECTION EXTENSION BASED ALGORITHM FOR SCATTEROMETER...
收藏 引用
IEEE International Geoscience and Remote Sensing Symposium
作者: Xuetong Xie Mingsen Lin Kehai Chen Zhou Huang Lixia Liu Dongxuan Tian Xiaoning Wang Wenxin Chen Rongrong He Juhong Zou Earthquake Engineering Research Test Center Guangzhou University National Satellite Ocean Application Service Institute of Remote Sensing and Geographic Information System Peking University National Key Laboratory of Space Microwave Technology Institute of Space Radio Technology
According to the lower efficiency and larger wind direction errors in the nadir region of the swath, a new combined wind retrieval algorithm is proposed for conically scanning scatterometer in this paper. The presente... 详细信息
来源: 评论
Maximally permissive control of flexible manufacturing systems with fewest disjunctive constraints
Maximally permissive control of flexible manufacturing syste...
收藏 引用
International Conference on Advanced Mechatronic systems (ICAMechS)
作者: YuFeng Chen MengChu Zhou XiaoOu Li School of Electro-Mechanical Engineering Xidian University Xi'an China Key Laboratory of Embedded System and Service Computing Ministry of Education University of Tongji Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA Departamento de Computacion CINVESTAVIPN Mexico Distrito Federal Mexico
For Petri net models whose legal reachability spaces are non-convex, one cannot optimally control them by the conjunctions of linear constraints. This work proposes a method to find a set of linear constraints such th... 详细信息
来源: 评论
Infrared human image segmentation using two-dimensional fuzzy tsallis entropy
收藏 引用
ICIC Express Letters 2012年 第7期6卷 1733-1739页
作者: Yang, Shuhong Liu, Weining Sun, Dihua Zhao, Min Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing University No. 174 Shazhengjie Shapingba Chongqing 400030 China Department of Computer Engineering Guangxi University of Technology No. 268 Donghuan Road Liuzhou 545006 China
Infrared images are by nature fuzzy and thus the segmentation of human targets from them is a challenging task. To handle this ambiguity, a new kind of thresholding method using both the spatial information and fuzzin... 详细信息
来源: 评论
A cross-layers service discovery protocol for MANET
收藏 引用
Journal of Computational Information systems 2012年 第12期8卷 5085-5092页
作者: Zhong, Jiang Geng, Shenghua Weng, Luosheng Li, Xue College of Computer Science Chongqing University Chongqing 400044 China School of Information Technology and Electrical Engineering Queensland University Queensland QLD 4072 Australia Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing 400044 China
With the rapid development of Internet, MANET is becoming a popular network organization. Automatic service discovery plays an important role in the appliance of auto-finding and using the resource in the dynamic netw... 详细信息
来源: 评论