咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,589 篇 工学
    • 1,028 篇 计算机科学与技术...
    • 783 篇 软件工程
    • 332 篇 信息与通信工程
    • 226 篇 控制科学与工程
    • 189 篇 电气工程
    • 179 篇 电子科学与技术(可...
    • 150 篇 机械工程
    • 127 篇 生物工程
    • 82 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 69 篇 光学工程
    • 68 篇 化学工程与技术
    • 66 篇 材料科学与工程(可...
    • 64 篇 动力工程及工程热...
    • 64 篇 生物医学工程(可授...
    • 56 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 792 篇 理学
    • 441 篇 数学
    • 153 篇 生物学
    • 146 篇 物理学
    • 133 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 67 篇 化学
    • 33 篇 大气科学
  • 430 篇 管理学
    • 272 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 63 篇 医学
    • 48 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 59 篇 法学
    • 48 篇 社会学
  • 31 篇 经济学
  • 22 篇 农学
  • 14 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 university of ch...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 zhou mengchu
  • 33 篇 changjun jiang
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,238 篇 英文
  • 100 篇 中文
  • 99 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2431 条 记 录,以下是241-250 订阅
排序:
Helix Scan:A Scan Design for Diagnosis
收藏 引用
Tsinghua Science and technology 2007年 第S1期12卷 83-88页
作者: 王飞 胡瑜 李晓维 Graduate School of Chinese Academy of Sciences Key Laboratory of Computer System and Architecture Institute of Computing TechnologyChinese Academy of Sciences
Scan design is a widely used design-for-testability technique to improve test quality and efficiency. For the scan-designed circuit, test and diagnosis of the scan chain and the circuit is an important process for sil... 详细信息
来源: 评论
Correcting Pronoun Homophones with Subtle Semantics in Chinese Speech Recognition  30
Correcting Pronoun Homophones with Subtle Semantics in Chine...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Zhang, Zhaobo Gan, Rui Yuan, Pingpeng Jin, Hai National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Laboratory Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China
Speech recognition is becoming prevalent in daily life. However, due to the similar semantic context of the entities and the overlap of Chinese pronunciation, the pronoun homophone, especially "他/她/它 (he/she/i... 详细信息
来源: 评论
Robust Learning to Rank Based on Portfolio Theory and AMOSA Algorithm
收藏 引用
IEEE Transactions on systems, Man, and Cybernetics: systems 2017年 第6期47卷 1007-1018页
作者: Li, Jinzhong Liu, Guanjun Yan, Chungang Jiang, Changjun Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science and Technology Tongji University Shanghai201804 China Key Laboratory of Watershed Ecology and Geographical Environment Monitoring NASG Department of Computer Science and Technology Jinggangshan University Ji'an343009 China
Effectiveness is the most important factor considered in the ranking models yielded by algorithms of learning to rank (LTR). Most of the related ranking models only focus on improving the average effectiveness but ign... 详细信息
来源: 评论
SIS model of epidemic spreading on dynamical networks with community
收藏 引用
中国高等学校学术文摘·计算机科学 2009年 第3期3卷 361-365页
作者: Chengyi XIA Shiwen SUN Feng RAO Junqing SUN Jinsong WANG Zengqiang CHEN Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System of Ministry of Education Tianjin University of Technology Tianjin 300191 Department of Automation Nankai University Tianjin 300071 China
We present a new epidemic Susceptible-Infected-Susceptible (SIS) model to investigate the spreading behav-ior on networks with dynamical topology and community structure. Individuals in the model are mobile agents who... 详细信息
来源: 评论
Observable liveness of Petri nets with controllable and observable transitions
收藏 引用
Science China(Information Sciences) 2017年 第11期60卷 256-264页
作者: Guanjun LIU Changjun JIANG Department of Computer Science Tongji University Key Laboratory of Embedded System and Service Computing of Ministry of Education Tongji University E-commerce Transactions and Information Services Collaborative Innovation Center of Shanghai University Knowledge Service Platform Tongji University
Observability and/or controllability are paid much attention to by researchers not only from the control science field[1–3]but also from the computer science field[4–9].Recently,Desel and Kilinc[4]proposed the notio... 详细信息
来源: 评论
Human behavior recognition based on axonometric projections and PHOG feature
收藏 引用
Journal of Computational Information systems 2014年 第8期10卷 3455-3463页
作者: Shen, Xiaoxia Zhang, Hua Gao, Zan Xue, Yanbin Xu, Guangping Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China
Human behavior recognition has become a hot research topic in computer vision. In this paper, we propose an effective method to recognize human behaviors from sequences of depth maps, which provide additional body sha... 详细信息
来源: 评论
Data Secure Transmission Model Based on Compressed Sensing and Digital Watermarking technology
收藏 引用
Wuhan University Journal of Natural Sciences 2014年 第6期19卷 505-511页
作者: WANG Chundong BAI Yi MO Xiuliang Key Laboratory of Computer Vision and System Ministry of Education/Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly,... 详细信息
来源: 评论
DGAN: Flight data anomaly detection based on dual-view graph attention network
收藏 引用
IEEE Sensors Journal 2025年 第11期25卷 20956-20969页
作者: Yan, Wenlong Li, Xu Zheng, Linjiang Shang, Jiaxing Wu, Lin Liu, Hongtao Li, Xiuyi Qian, Yu Chongqing University College of Computer Science Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing400044 China Zhuhai Xiangyi Aviation Technology Co. Ltd Zhuhai519030 China Shanghai Jiaotong University School of Aeronautics and Astronautics Minhang District Shanghai200240 China Civil Aviation Flight University of China School of Flight Technology Guanghan618307 China
A large number of flight data is collected by various sensors during flight, including altitude, speed, pitch, etc. Flight unsafe events, such as hard landings, can be reflected in flight anomaly data. Thus, flight da... 详细信息
来源: 评论
Predictability assessment of marine heatwaves in the Northeast Pacific based on SEAS5
收藏 引用
Weather and Climate Extremes 2025年 48卷
作者: Liu, Zhouhong Wang, Boni Shan, Haixia State Key Laboratory of Climate System Prediction and Risk Management Nanjing University of Information Science & Technology Nanjing 210044 China International Geophysical Fluid Research Center Nanjing University of Information Science & Technology Nanjing 210044 China Changwang School of Honors Nanjing University of Information Science & Technology Nanjing 210044 China School of Marine Sciences Nanjing University of Information Science & Technology Nanjing 210044 China Ocean College Zhejiang University Zhoushan 316021 China Southern Ocean Science and Engineering Guangdong Laboratory (Zhuhai) Zhuhai 519000 China Jiangsu Meteorological Service Center Nanjing 210008 China
Marine Heatwaves (MHWs), extreme ocean warming events, have attracted global attention. This research utilizes forecast data from SEAS5 (Seasonal Forecasting system 5) and OISST (Optimum Interpolation Sea Surface Temp... 详细信息
来源: 评论
On complementary effect of blended behavioral analysis for identity theft detection in mobile social networks  1
收藏 引用
13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017
作者: Wang, Cheng Luo, Jing Yang, Bo Jiang, Changjun Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science and Technology Tongji University Shanghai China
User behavioral analysis is expected to act as a promising technique for identity theft detection in the Internet. The performance of this paradigm extremely depends on a good individual-level user behavioral model. S... 详细信息
来源: 评论