咨询与建议

限定检索结果

文献类型

  • 1,441 篇 会议
  • 972 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,415 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,564 篇 工学
    • 1,013 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 170 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 782 篇 理学
    • 436 篇 数学
    • 152 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 61 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 37 篇 school of cyber ...
  • 36 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,229 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2415 条 记 录,以下是2121-2130 订阅
排序:
Intelligent and cooperative manufacturing planning
收藏 引用
International Journal of Manufacturing Research 2010年 第1期5卷 39-57页
作者: Li, Wei Dong Gao, Liang Faculty of Engineering and Computing Coventry University Coventry United Kingdom State Key Laboratory of Digital Manufacturing Equipment and Technology School of Mechanical Science and Engineering Huazhong University of Science and Technology Wuhan Hubei China Department of Industrial and Manufacturing System Engineering Huazhong University of Science and Technology China
In this research, several intelligent strategies have been developed to build up cooperative Process Planning and Scheduling (CPPS). Three game theory-based strategies have been introduced to analyse the cooperative i... 详细信息
来源: 评论
A modified wind vector retrieval algorithm for polarimetric scatterometer
A modified wind vector retrieval algorithm for polarimetric ...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Xuetong Xie Mingsen Lin Zhou Huang Juhong Zou Dongxuan Tian Lixia Liu Xiaoning Wang Shiwei Dong ATR State Key Laboratory National University of Defense Technology Changsha China National Satellite Ocean Application Service Beijing China Institute of Remote Sensing and Geographic Information System Peking University Beijing China Institute of Space Radio Technology National Key Laboratory of Space Microwave Technology Xi'an China
Experiments and theoretical analysis demonstrate that the polarimetric scatterometer has the potential in enhancing the accuracy of the wind vector retrieval. However, currently, there is no special wind vector retrie... 详细信息
来源: 评论
High performance comparison-based sorting algorithm on many-core GPUs
High performance comparison-based sorting algorithm on many-...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Xiaochun Ye Dongrui Fan Wei Lin Nan Yuan Paolo Ienne Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy and Sciences Beijing China School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne Lausanne Switzerland
Sorting is a kernel algorithm for a wide range of applications. In this paper, we present a new algorithm, GPU-Warpsort, to perform comparison-based parallel sort on Graphics Processing Units (GPUs). It mainly consist... 详细信息
来源: 评论
P2CLRAF: An Pre-and Post-silicon Cooperated Circuit Lifetime Reliability Analysis Framework
P2CLRAF: An Pre-and Post-silicon Cooperated Circuit Lifetime...
收藏 引用
2010 19th IEEE Asian Test Symposium(第19届IEEE亚洲测试技术学术会议 ATS 2010)
作者: Song Jin Yinhe Han Huawei Li Xiaowei Li Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing P.R. China Graduate University of Chinese Academy of Sciences Beijing P.R. China
Statistical static timing analysis (SSTA) considering process variation and aging effects is usually used to analyze circuit lifetime reliability at design phase. A key challenge for statistical lifetime reliability a... 详细信息
来源: 评论
Convergence analysis for combinatorial optimization problems based on Ito process
收藏 引用
Journal of Computational Information systems 2010年 第10期6卷 3147-3154页
作者: Yu, Ruiguo Dong, Wenyong Lei, Ming School of Computer Science and Technology Tianjin University Tianjin 300072 China Computer School Wuhan University Wuhan 430079 China Institute of Automation Chinese Acad. of Sci. Beijing 100086 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin 300191 China
The paper provided some theoretical results about the convergence of ITO algorithm for combinatorial optimization problems. The transform probability of wave operator and move operator studied in detail. The almost su... 详细信息
来源: 评论
Design and implementation of a kind of EUPS for mobile service
收藏 引用
Journal of Information and Computational Science 2010年 第11期7卷 2248-2257页
作者: Zhang, Xiaodan Zhang, Degan Qiao, Xiaodong Liang, Bing Peng, Hongtao Institute of Scientific and Technical Information of China Beijing 100038 China Tianjin Key Lab. of Intelligent Computing and Novel software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China Beijing Petroleum Managers Training Institute Beijing 100096 China
In order to support mobile service of long-distance monitoring and controlling UPS based on Web, a kind of design and implementation solution of embedded UPS (EUPS) system is brought forward in this paper. The design ... 详细信息
来源: 评论
Hybrid uniform distribution of particle swarm optimizer
收藏 引用
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2010年 第10期E93-A卷 1782-1791页
作者: Zhang, Junqi Tan, Ying Ni, Lina Xie, Chen Tang, Zheng Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Qingdao China Tongji University Shanghai 200092 China Key Laboratory of Machine Perception Ministry of Education Qingdao China Department of Machine Intelligence School of Electronics Engineering and Computer Science Peking University Beijing 100871 China College of Info Sci and Engi Shandong University of Science and Technology Qingdao China Department of Intellectual Information Systems Engineering University of Toyama Toyama-shi 930-8555 Japan
Particle swarm optimizer (PSO) is a stochastic global optimization technique based on a social interaction metaphor. Because of the complexity, dynamics and randomness involved in PSO, it is hard to theoretically anal... 详细信息
来源: 评论
SimK:A Large-Scale Parallel Simulation Engine
收藏 引用
Journal of Computer Science & technology 2009年 第6期24卷 1048-1060页
作者: 许建卫 陈明宇 郑规 曹政 吕慧伟 孙凝晖 Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Graduate University of Chinese Academy of Sciences Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Simulation is an important method to evaluate future computer systems. Currently microprocessor architecture has switched to parallel, but almost all simulators remained at sequential stage, and the advantages brought... 详细信息
来源: 评论
VMGuard: An Integrity Monitoring system for Management Virtual Machines
VMGuard: An Integrity Monitoring System for Management Virtu...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Haifeng Fang Yiqiang Zhao Hongyong Zang H. Howie Huang Ying Song Yuzhong Sun Zhiyong Liu University of the Chinese Academy of Sciences Beijing Beijing CN Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy and Sciences China George Washington University Washington D.C. DC USA
A cloud computing provider can dynamically allocate virtual machines (VM) based on the needs of the customers, while maintaining the privileged access to the Management Virtual Machine that directly manages the hardwa... 详细信息
来源: 评论
Information system security function validating using model checking
Information system security function validating using model ...
收藏 引用
International Conference on Computer Engineering and technology, ICCET
作者: Jianli Ma Guoai Xu Yixian Yang Yong Ji Key Laboratory of Network and Information Attack & Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Beijing Beijing CN China Electronics System Engineering Computing Station Beijing China
Information systems will be encountered more and more security threats due to the development of computer attack method and technology. Generally, different security policies are used to protect the sensitive informat... 详细信息
来源: 评论