咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 967 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,560 篇 工学
    • 1,009 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 169 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 779 篇 理学
    • 436 篇 数学
    • 150 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 59 篇 医学
    • 45 篇 临床医学
    • 39 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 42 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 33 篇 changjun jiang
  • 33 篇 hai jin
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,215 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2401 条 记 录,以下是2011-2020 订阅
排序:
P-GAS: Parallelizing a cycle-accurate event-driven many-core processor simulator using parallel discrete event simulation  10
P-GAS: Parallelizing a cycle-accurate event-driven many-core...
收藏 引用
24th Annual Workshop on Principles of Advanced and Distributed Simulation, PADS 2010
作者: Lv, Huiwei Cheng, Yuan Bai, Lu Chen, Mingyu Fan, Dongrui Sun, Ninghui Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences China Graduate School Chinese Academy of Sciences China
Multi-core processors are commonly available now, but most traditional computer architectural simulators still use single-thread execution. In this paper we use parallel discrete event simulation (PDES) to speedup a c... 详细信息
来源: 评论
A novel post-silicon debug mechanism based on Suspect Window
A novel post-silicon debug mechanism based on Suspect Window
收藏 引用
作者: Gao, Jianliang Han, Yinhe Li, Xiaowei Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Graduate University of Chinese Academy of Sciences Beijing China
Bugs are becoming unavoidable in complex integrated circuit design. It is imperative to identify the bugs as soon as possible through post-silicon debug. For post-silicon debug, observability is one of the biggest cha... 详细信息
来源: 评论
TMemCanal: A VM-oblivious dynamic memory optimization scheme for virtual machines in cloud computing
TMemCanal: A VM-oblivious dynamic memory optimization scheme...
收藏 引用
10th IEEE International Conference on Computer and Information technology, CIT-2010, 7th IEEE International Conference on Embedded Software and systems, ICESS-2010, 10th IEEE Int. Conf. Scalable computing and Communications, ScalCom-2010
作者: Li, Yaqiong Huang, Yongbing Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences China Graduate University Chinese of Academy of Sciences China
In current virtualized cloud platforms, resource provisioning strategy is still a big challenge. Provisioning will gain low resource utilization based on peak workload, and provisioning based on average work loads wil... 详细信息
来源: 评论
A new method of image data fusion based on FNN
A new method of image data fusion based on FNN
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Zhang, De-Gan Li, Chao Wang, Dong Zhang, Xiao-Li Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 China
The image data are obtained by a variety of multimedia, information equipment, which include amount of information, extensive coverage, and redundancy in ubiquitous computing paradigm. In order to make use of these in... 详细信息
来源: 评论
Extended selective encoding of scan slices for reducing test data and test power
Extended selective encoding of scan slices for reducing test...
收藏 引用
作者: Liu, Jun Han, Yinhe Li, Xiaowei Key Laboratory of Computer System and Architecture Institute of Computing Technology Graduate University of Chinese Academy of Sciences China School of Computer and Information Hefei University of Technology China
Test data volume and test power are two major concerns when testing modern large circuits. Recently, selective encoding of scan slices is proposed to compress test data. This encoding technique, unlike many other comp... 详细信息
来源: 评论
Evolutionary behavior verification to the trustworthy banking software
Evolutionary behavior verification to the trustworthy bankin...
收藏 引用
International Conference on Computer Engineering and technology
作者: Jiang, Zuo-Wen Tang, Xian-Fei Ding, Zhi-Jun Jiang, Chang-Jun Electronics and Information Engineering School Tongji University 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University 200092 China College of Science and Technology NingBo University 315211 China
Oriented to the goal of high-quality banking softwares, trustworthiness is emerging to be important property. This paper studies how to apply formal methods into the trustworthy property preservation of evolutionary c... 详细信息
来源: 评论
Outlier detection for learning-based optimizing compiler
Outlier detection for learning-based optimizing compiler
收藏 引用
International Conference on Frontier of Computer Science and technology
作者: Long, Shun Zhu, Weiheng Department Ofcomputer Science JiNan University Guangzhou China Key-Laboratory Ofcomputer System and Architecture Institute of Computing Technology Chinese Academy of Sciences China
Modern compilers use machine learning to find from their prior experience useful heuristics for new programs encountered in order to accelerate the optimization process. However, prior experience might not be applicab... 详细信息
来源: 评论
The detection of IRC botnet based on abnormal behavior
The detection of IRC botnet based on abnormal behavior
收藏 引用
2010 2nd International Conference on MultiMedia and Information technology, MMIT 2010
作者: Zilong, Wang Jinsong, Wang Wenyi, Huang Chengyi, Xia Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Botnet is one of the major security threats to Internet. In this paper, botnet communication and attack patterns were introduced, and the discovery method of botnet based on abnormal behavior was studied. For the curr... 详细信息
来源: 评论
Spike sorting based on radial basis function network with overlap decomposition
Spike sorting based on radial basis function network with ov...
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Dai, Min Hu, Su-Rui Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 Tianjin China
Spike sorting is the essential step in analyzing recording spike signals for studying information processing mechanisms within the nervous system. Overlapping is one of the serious problems in the spike sorting of mul... 详细信息
来源: 评论
KNOB particle swarm optimizer  1
收藏 引用
1st International Conference on Advances in Swarm Intelligence, ICSI 2010
作者: Zhang, Junqi Liu, Kun Tan, Ying Key Laboratory of Embedded System and Service Computing Department of Computer Science and Technology Tongji University Shanghai 200092 China Department of Machine Intelligence School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
It is not trivial to tune the swarm behavior just by parameter setting because of the randomness, complexity and dynamic involved in particle swarm optimizer (PSO). Hundreds of variants in the literature of last decad... 详细信息
来源: 评论