咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 967 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,560 篇 工学
    • 1,009 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 169 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 779 篇 理学
    • 436 篇 数学
    • 150 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 59 篇 医学
    • 45 篇 临床医学
    • 39 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 42 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 33 篇 changjun jiang
  • 33 篇 hai jin
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,215 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2401 条 记 录,以下是2051-2060 订阅
排序:
Study of Semantic-based Ontology Mapping technology
Study of Semantic-based Ontology Mapping Technology
收藏 引用
Workshop on Intelligent systems and Applications
作者: Wen-jie Li Qiu-xiang Xia Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Key Laboratory of Computer Vision and System (Tianjin University of Technology)
To implement the interoperation of different ontologies in medical informatics domain and achieve the goal of the sharing and multiplexing of domain knowledge, the heterogeneous problem between ontologies must be solv... 详细信息
来源: 评论
A kind of service-aware computing method for Web-based mobile application with uncertainty
A kind of service-aware computing method for Web-based mobil...
收藏 引用
2010 IEEE 5th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2010
作者: Zhang, De-Gan Kang, Xue-Jing Dai, Wen-Bo Chen, Ying Fayek, Moaty Tianjin Key Lab. of Lntelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 Tiajin China Department of Computer Science California State University Chico CA 95929 United States
As we know, service-aware computing is an important part of pervasive computing for Web-based mobile application with uncertainty. We modified the fusion method of evidence information after considering context's ... 详细信息
来源: 评论
Identification of image-spam based on SIFT image matching algorithm
收藏 引用
Journal of Information and Computational Science 2010年 第14期7卷 3153-3160页
作者: Wang, Chundong Yang, Hua Chen, Yinghui Sun, Li Zhou, Yan Wang, Huaibin Key Laboratory of Computer Vision and System Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China
In the paper, a method is proposed for efficient identification of Image-spam using the simplified Scale Invariant Feature Transform (SIFT) algorithm. It firstly strengthens the feature of image-spam email picture by ... 详细信息
来源: 评论
Biped robot walking using central pattern generator and genetic algorithm
Biped robot walking using central pattern generator and gene...
收藏 引用
IASTED International Conference on Robotics, Robo 2010
作者: Liu, Chengju Chen, Qijun Wang, Danwei School of Electronics and Information Engineering Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China School of Electrical and Electronic Engineering Nanyang Technological University Singapore Singapore
Central pattern generator (CPG) plays an important role in rhythmic activities of animals and this mechanism is an important inspiration source for the motion control of legged robots. In this paper, by using CPGs and... 详细信息
来源: 评论
A new approach for 3D motion estimation of a planar object
收藏 引用
Journal of Computational Information systems 2010年 第5期6卷 1517-1524页
作者: Wang, Chundong Ning, Shukun Wen, Xianbin Zhang, Hua Key Laboratory of Computer Vision and System Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China
This paper proposes a new nonlinear approach for 3D motion estimation of a planar object. Based on the premise that the object is a plane or a kind of similar plane, we use LSM (Least Squares Method) to estimate the 3... 详细信息
来源: 评论
DMA cache: Using on-chip storage to architecturally separate I/O data from CPU data for improving I/O performance
DMA cache: Using on-chip storage to architecturally separate...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Dan Tang Yungang Bao Weiwu Hu Mingyu Chen Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy and Sciences China
As technology advances both in increasing bandwidth and in reducing latency for I/O buses and devices, moving I/O data in/out memory has become critical. In this paper, we have observed the different characteristics o... 详细信息
来源: 评论
Application of a novel 6-DOF parallel robot with redundant actuation for earthquake simulation
Application of a novel 6-DOF parallel robot with redundant a...
收藏 引用
2010 IEEE International Conference on Robotics and Biomimetics, ROBIO 2010
作者: Zhang, Jianzheng Yu, Hongnian Gao, Feng Zhao, Xianchao Ma, Chunxiang Huang, Xu State Key Laboratory of Mechanical System and Vibration Shanghai Jiao Tong University Shanghai 200240 China Faculty of Computing Engineering and Technology Staffordshire University Stafford ST18 0DG United Kingdom
In this paper a novel orthogonal 6-DOF (Degree Of Freedom) parallel robot with redundant actuation is studied as an earthquake motion simulator. Taking the practical simulation of earthquake waves into consideration, ... 详细信息
来源: 评论
Network-worm-control technology based on the front buffer two-stage leaky bucket algorithm
Network-worm-control technology based on the front buffer tw...
收藏 引用
International Conference on Intelligent Control and Information Processing (ICICIP)
作者: Chundong Wang Qing Chang Quancai Deng Huaibin Wang Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology and Key Laboratory of Computer Vision and System Ministry of Education TianJin University of Technology Tianjin China
A new network-worm-control technology is proposed after having fully analyzed the differences between worm and normal connection requests. Considering the worm characteristic of attacking unique port and dispersing IP... 详细信息
来源: 评论
A new watermarking approach based on BP network in wavelet domain
A new watermarking approach based on BP network in wavelet d...
收藏 引用
Congress on Image and Signal Processing, CISP
作者: Fenglian Liu Lili Liu Key Laboratory of Computer Vision and System Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin China
This paper proposes a novel digital watermarking technique based on BP neural networks in wavelet domain. Firstly, the original image is decomposed by DTCWT, and then the watermark bits are added to the selected coeff... 详细信息
来源: 评论
Improved asymptotic multicast throughput for random extended networks
收藏 引用
Computer Communications 2010年 第18期33卷 2195-2202页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Jiujun Cheng Department of Computer Science and Technology Tongji University Shanghai China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science Illinois Institute of Technology Chicago IL 60616 USA
We study the asymptotic throughput for random extended networks , where n ad hoc nodes are randomly deployed in a square region R ( n ) = 0 , n 2 . We directly consider the multicast throughput to unify the unicast an...
来源: 评论