咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 961 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 2,394 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,557 篇 工学
    • 1,006 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 169 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 779 篇 理学
    • 436 篇 数学
    • 150 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 59 篇 医学
    • 45 篇 临床医学
    • 39 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 30 篇 hardware
  • 30 篇 federated learni...
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 42 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 33 篇 changjun jiang
  • 33 篇 hai jin
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,208 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2394 条 记 录,以下是2041-2050 订阅
排序:
Reduction criteria for probabilistic models with spatial restrictions on states
Reduction criteria for probabilistic models with spatial res...
收藏 引用
2nd International Conference on Networks Security, Wireless Communications and Trusted computing, NSWCTC 2010
作者: Jun, Niu Zeng, Guosun Department of Computer Science and Technology Tongji University Shanghai China College of Information Engineering Zhejiang Business Technology Institute Ningbo China Embedded System and Service Computing Key Lab. of Ministry of Education Shanghai China
Partial order reduction techniques have been used to combat the state explosion problem in model checking procedures for concurrent systems with probabilistic behaviors. There are some results that give criteria on ap... 详细信息
来源: 评论
A generalized model with spatial resources labels
A generalized model with spatial resources labels
收藏 引用
2010 International Conference on Biomedical Engineering and Computer Science, ICBECS 2010
作者: Jun, Niu Zeng, Guosun Department of Computer Science and Technology Tongji University Shanghai China College of Information Engineering Zhejiang Business Technology Institute Ningbo China Embedded System and Service Computing Key Lab. Ministry of Education Shanghai China
This paper proposes a generalized model by extending Markov chain with spatial resources labels, which can describe the functional and performance properties and some basic characteristics such as nondeterminacy and r... 详细信息
来源: 评论
Study and implementation of agent-based grid resource monitoring model
Study and implementation of agent-based grid resource monito...
收藏 引用
International Conference on Information Science and Engineering (ICISE)
作者: Liu Ming Junqi Zhang Yu Wang Jie Li Department of Computer Science and Technology The Key Laboratory of Embedded System and Service Computing Ministry of Education University of Tongji Shanghai China
Grid is a promising infrastructure which enables scientists and engineers to access geographically distributed resources. Grid computing is a new technology which focuses on aggregating various kinds of resource (e.g.... 详细信息
来源: 评论
Information system security function validating using model checking
Information system security function validating using model ...
收藏 引用
2010 2nd International Conference on Computer Engineering and technology, ICCET 2010
作者: Ma, Jianli Xu, Guoai Yang, Yixian Ji, Yong Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing China China Electronics System Engineering Computing station Beijing China
Information systems will be encountered more and more security threats due to the development of computer attack method and technology. Generally, different security policies are used to protect the sensitive informat... 详细信息
来源: 评论
Virtualizing modern high-speed interconnection networks with performance and scalability
Virtualizing modern high-speed interconnection networks with...
收藏 引用
作者: Li, Bo Huo, Zhigang Zhang, Panyong Meng, Dan National Research Center for Intelligent Computing Systems Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Beijing China Graduate University of Chinese Academy of Sciences Beijing China
As one of the most important enabling technologies of cloud computing, virtualization brings to HPC good manageability, online system maintenance, performance isolation and fault isolation. Furthermore, previous study... 详细信息
来源: 评论
VMGuard: An integrity monitoring system for management virtual machines
VMGuard: An integrity monitoring system for management virtu...
收藏 引用
16th IEEE International Conference on Parallel and Distributed systems, ICPADS 2010
作者: Fang, Haifeng Zhao, Yiqiang Zang, Hongyong Huang, H. Howie Song, Ying Sun, Yuzhong Liu, Zhiyong Graduate University of Chinese Academy of Sciences Beijing China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences China George Washington University WA United States
A cloud computing provider can dynamically allocate virtual machines (VM) based on the needs of the customers, while maintaining the privileged access to the Management Virtual Machine that directly manages the hardwa... 详细信息
来源: 评论
Constructing Prioritized Interaction Test Suite with Interaction Relationship
Constructing Prioritized Interaction Test Suite with Interac...
收藏 引用
International Workshop on Education technology and Computer Science, ETCS
作者: Jianjun Yuan Zuowen Jiang The Key Laboratory of Embedded System and Service Department of Computer Science and Technology Computing Ministry of Education of China University of Tongji Shanghai China
Interaction testing has addressed some issues on how to select a small subset of test cases. In many systems where interaction testing is needed, the entire test suite is not executed because of time or budget constra... 详细信息
来源: 评论
Study and implementation of agent-based grid resource monitoring model
Study and implementation of agent-based grid resource monito...
收藏 引用
2nd International Conference on Information Science and Engineering, ICISE2010
作者: Ming, Liu Zhang, Junqi Wang, Yu Li, Jie Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China
Grid is a promising infrastructure which enables scientists and engineers to access geographically distributed resources. Grid computing is a new technology which focuses on aggregating various kinds of resource (e.g.... 详细信息
来源: 评论
Reliable Web services Selection Using a Heuristic Algorithm
Reliable Web Services Selection Using a Heuristic Algorithm
收藏 引用
The Ninth International Conference on Grid and Cloud computing(第九届网格与云计算国际学术会议 GCC 2010)
作者: Hongjie Shen Zhijun Ding Hongzhong Chen The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China
Web services composition (WSC) is the key techniques in its application. Dynamically selecting reliable Web services (WSs) becomes crucial to users. In fact, most works regard a Web service (WS) as the basic unit and ... 详细信息
来源: 评论
Formula-Oriented Compositional Minimization in Model Checking
Formula-Oriented Compositional Minimization in Model Checkin...
收藏 引用
2010 19th IEEE Asian Test Symposium(第19届IEEE亚洲测试技术学术会议 ATS 2010)
作者: Bowen Chen Haihua Shen Wenhui Zhang Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Acade Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Acade State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijin
This paper presents a new approach to reduce finite state machines with respect to a CTL formula to alleviate state explosion problem. Reduction is achieved by removing parts useless to the formula of original machine... 详细信息
来源: 评论