咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 967 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,560 篇 工学
    • 1,009 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 169 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 779 篇 理学
    • 436 篇 数学
    • 150 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 59 篇 医学
    • 45 篇 临床医学
    • 39 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 42 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 33 篇 changjun jiang
  • 33 篇 hai jin
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,215 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2401 条 记 录,以下是2031-2040 订阅
排序:
On Selection of Testable Paths with Specified Lengths for Faster-Than-At-Speed Testing
On Selection of Testable Paths with Specified Lengths for Fa...
收藏 引用
2010 19th IEEE Asian Test Symposium(第19届IEEE亚洲测试技术学术会议 ATS 2010)
作者: Xiang Fu Xiaowei Li Huawei Li Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Acade Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Acade
Faster than at-speed testing provides an effective way to detect small delay defects (SDDs). It requires test patterns to be delicately classified into groups according to the delay of sensitized paths. Each group of ... 详细信息
来源: 评论
Vehicle to Vehicle and Roadside Sensor Communication for Intelligent Navigation
Vehicle to Vehicle and Roadside Sensor Communication for Int...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Rongyan Xia Chen Ye Dongdong Zhang Key Laboratory of Embedded System and Service Computing University of Tongji Shanghai China
Hybrid sensor network technology is a key component of future ITS applications. In this paper, we propose a hybrid architecture that combined VANETs and roadside WSNs for intelligent navigation. Different from traditi... 详细信息
来源: 评论
An Efficient Algorithm for Finding a Universal Set of Testable Long Paths
An Efficient Algorithm for Finding a Universal Set of Testab...
收藏 引用
2010 19th IEEE Asian Test Symposium(第19届IEEE亚洲测试技术学术会议 ATS 2010)
作者: Zijian He Tao Lv Xiaowei Li Huawei Li Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academ Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academ
In this paper, we focus on generation of a universal path candidate set V that contains testable long paths for delay testing. Some strategies are presented to speed up the depth first search procedure of U generation... 详细信息
来源: 评论
On-the-fly Reduction of Stimuli for Functional Verification
On-the-fly Reduction of Stimuli for Functional Verification
收藏 引用
2010 19th IEEE Asian Test Symposium(第19届IEEE亚洲测试技术学术会议 ATS 2010)
作者: Qi Guo Weiwu Hu Tianshi Chen Haihua Shen Yunji Chen Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Acade Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Acade
As a primary method for functional verification of microprocessors, simulation-based verification has received extensive studies over the last decade. Most investigations have been dedicated to the generation of stimu... 详细信息
来源: 评论
Local-directed network coding in vehicular ad-hoc networks
Local-directed network coding in vehicular ad-hoc networks
收藏 引用
IEEE International Symposium on Intelligent Signal Processing and Communication systems (ISPACS)
作者: Haojie Luo Dongdong Zhang Chen Ye The Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
In this paper, we proposed a novel network coding method called local-directed network coding to improve the throughput of the vehicular ad-hoc network. Different from other vehicular network coding methods, we consid... 详细信息
来源: 评论
An Improved Foreground Object Detection Method Based on Gaussian Mixture Models
An Improved Foreground Object Detection Method Based on Gaus...
收藏 引用
International Conference on Multimedia Communications (Mediacom)
作者: Xiayi Zhang Fuqiang Liu Zhipeng Li Key Laboratory of Embedded System and Service Computing University of Tongji Shanghai China
Statistical background subtraction has proved to be a robust and effective approach for segmenting and extracting objects without any prior information of the foreground objects. This paper presents two contributions ... 详细信息
来源: 评论
Incremental Sensor Node Deployment for Low Cost and Highly Available WSNs
Incremental Sensor Node Deployment for Low Cost and Highly A...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Safwan Al-Omari Weisong Shi Jordan University of Science and Technology Jordan Key Laboratory of Embedded System and Service Computing University of Tongji China
We attack the sensor network deployment problem. We define the deployment problem as the problem of deciding how many sensor nodes should be deployed in the sensor field over how many phases during its lifetime. We ta... 详细信息
来源: 评论
Multicast capacity scaling for cognitive networks: General extended primary network
Multicast capacity scaling for cognitive networks: General e...
收藏 引用
2010 IEEE 7th International Conference on Mobile Adhoc and Sensor systems, MASS 2010
作者: Wang, Cheng Li, Xiang-Yang Tang, Shaojie Jiang, Changjun Department of Computer Science Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Department of Computer Science Illinois Institute of Technology Chicago IL 60616 United States
We study the capacity scaling laws for the cognitive network that consists of the primary hybrid network (PhN) and secondary ad hoc network (SaN). PhN is further comprised of an ad hoc network and a base station based... 详细信息
来源: 评论
Testable critical path selection considering process variation
Testable critical path selection considering process variati...
收藏 引用
作者: Fu, Xiang Li, Huawei Li, Xiaowei Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academic of Science Beijing 100190 China Graduate University of Chinese Academic of Sciences Beijing 100039 China
Critical path selection is very important in delay testing. Critical paths found by conventional static timing analysis (STA) tools are inadequate to represent the real timing of the circuit, since neither the testabi... 详细信息
来源: 评论
A new watermarking algorithm based on DCT and DWT fusion
A new watermarking algorithm based on DCT and DWT fusion
收藏 引用
International Conference on Electrical and Control Engineering, ICECE 2010
作者: Wang, Huai-Bin Yang, Hong-Liang Wang, Chun-Dong Wang, Shao-Ming Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China College of Information Sciences Beijing Language and Culture 100083 Beijing China
In this paper a new blind watermarking algorithm based on DCT (discrete cosine transform) and DWT (discrete wavelet transform) was proposed. In order to enhance the security of watermarking, Arnold transform is carrie... 详细信息
来源: 评论