咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,589 篇 工学
    • 1,028 篇 计算机科学与技术...
    • 783 篇 软件工程
    • 332 篇 信息与通信工程
    • 226 篇 控制科学与工程
    • 189 篇 电气工程
    • 179 篇 电子科学与技术(可...
    • 150 篇 机械工程
    • 127 篇 生物工程
    • 82 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 69 篇 光学工程
    • 68 篇 化学工程与技术
    • 66 篇 材料科学与工程(可...
    • 64 篇 动力工程及工程热...
    • 64 篇 生物医学工程(可授...
    • 56 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 792 篇 理学
    • 441 篇 数学
    • 153 篇 生物学
    • 146 篇 物理学
    • 133 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 67 篇 化学
    • 33 篇 大气科学
  • 430 篇 管理学
    • 272 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 63 篇 医学
    • 48 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 59 篇 法学
    • 48 篇 社会学
  • 31 篇 经济学
  • 22 篇 农学
  • 14 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 university of ch...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 zhou mengchu
  • 33 篇 changjun jiang
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,238 篇 英文
  • 100 篇 中文
  • 99 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2431 条 记 录,以下是351-360 订阅
排序:
An Event Timeline Extraction Method Based on News Corpus  2
An Event Timeline Extraction Method Based on News Corpus
收藏 引用
2017 IEEE 2nd International Conference on Big Data Analysis(ICBDA 2017)
作者: Yaguang Wu Haichun Sun Chungang Yan Department of Computer Science and Technology Tongji University The Key Laboratory of Embedded System and Service Computing Tongji University College of Police Information Engineering People's Public Security University of China
Event extraction is an important research point in information extraction area, and news event extraction has a greater practical significance. The existing methods of extracting news event, which starts from the time... 详细信息
来源: 评论
A theoretical study of the multigrid three-dimensional variational data assimilation scheme using a simple bilinear interpolation algorithm
收藏 引用
Acta Oceanologica Sinica 2013年 第3期32卷 80-87页
作者: LI Wei XIE Yuanfu HAN Guijun Key Laboratory of State Oceanic Administration for Marine Environmental Information Technology National Marine Data and Information ServiceState Oceanic Administration NOAA Earth System Research Laboratory BoulderCO 80305-3337USA
In order to solve the so-called "bull-eye" problem caused by using a simple bilinear interpolation as an observational mapping operator in the cost function in the multigrid three-dimensional variational (3DVAR) d... 详细信息
来源: 评论
Delay-Sensitive Goods Delivery and In-Situ Sensing Using A Multi-Task Drone
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Liu, Bin Ni, Wei Liu, Ren Ping Guo, Y. Jay Zhu, Hongbo Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Wireless Communications Nanjing 210003 China Nanjing University of Posts and Telecommunications Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks Ministry of Education Nanjing 210003 China University of Technology Sydney Global Big Data Technologies Centre Ultimo NSW Australia Barkhausen Institut Technische Universität Dresden Dresden Germany DATA61 CSIRO Marsfield 2122 NSW Australia
Drones are evolving into highly capable and adaptable devices, prompting the development of advanced control frameworks. This paper introduces a novel online control framework tailored for a multi-task drone, explicit... 详细信息
来源: 评论
Improved structural modeling based on conserved domain clusters and structure-anchored alignments
Proceedings of the ACM Symposium on Applied Computing
收藏 引用
Proceedings of the ACM Symposium on Applied computing 2007年 128-132页
作者: Zhang, Fa Xu, Lin Liu, Zhiyong Yuan, Bo Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Science Graduate School Chinese Academy of Science Institute of Computing Technology Chinese Academy of Science Department of Computer Science and Engineering Shanghai Jiaotong University
In this paper, we presented a method to improve structural modeling based on conserved domain clusters and structure-anchored alignments. We first constructed a template library of structural clusters for all conserve... 详细信息
来源: 评论
Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology
收藏 引用
Journal of Computer Science & technology 2007年 第1期22卷 1-14页
作者: 胡伟武 赵继业 钟石强 杨旭 Elio Guidetti 吴永强 Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China ST Microelectronics 39 Chemin du Camp-des-Filles 1228 Plan Les Ouates Geneva Switzerland
This paper introduces the microarchitecture and physical implementation of the Godson-2E processor, which is a four-issue superscalar RISC processor that supports the 64-bit MIPS instruction set. The adoption of the a... 详细信息
来源: 评论
Network-worm-control technology based on the front buffer two-stage leaky bucket algorithm
Network-worm-control technology based on the front buffer tw...
收藏 引用
2010 International Conference on Intelligent Control and Information Processing, ICICIP 2010
作者: Wang, Chundong Chang, Qing Deng, Quancai Wang, Huaibin Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 Tianjin China
A new network-worm-control technology is proposed after having fully analyzed the differences between worm and normal connection requests. Considering the worm characteristic of attacking unique port and dispersing IP... 详细信息
来源: 评论
Review of GAN-Based Research on Chinese Character Font Generation
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 584-600页
作者: Xuanhong WANG Cong LI Zengguo SUN Luying HUI Xi'an University of Posts and Telecommunications School of Computer Science Shaanxi Normal University Key Laboratory of Intelligent Computing and Service Technology for Folk Song Ministry of Culture and Tourism
With the rapid development of deep learning,generative adversarial network(GAN) has become a research hotspot in the field of computer *** has a wide range of applications in image *** by GAN,a series of models of Chi... 详细信息
来源: 评论
Searching desktop files based on access logs
Searching desktop files based on access logs
收藏 引用
18th International Conference on Database systems for Advanced Applications, DASFAA 2013
作者: Li, Yukun Zhao, Xiyan Xiao, Yingyuan Wang, Xiaoye Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300384 Tianjin China
People often meet trouble in searching a desktop file when they can not remember exact words of its filename. In this paper, we firstly propose an algorithm to generate access logs by monitoring desktop operations and... 详细信息
来源: 评论
Exploring implicit influence for social recommendation based on GNN
收藏 引用
Soft computing 2024年 第19期28卷 11001-11014页
作者: Liu, Zhewei Yang, Peilin Hao, Qingbo Zheng, Wenguang Xiao, Yingyuan Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
In recent years, the method of using graph neural networks (GNN) to learn users’ social influence has been widely applied to social recommendation and has shown effectiveness, but several important challenges have no... 详细信息
来源: 评论
Effcient Distributed Skyline Queries for Mobile Applications
收藏 引用
Journal of Computer Science & technology 2010年 第3期25卷 523-536页
作者: 肖迎元 陈跃国 Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Key Laboratory of Computer Vision and System Tianjin University of Technology School of Computing National University of Singapore Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China
In this paper, we consider skyline queries in a mobile and distributed environment, where data objects are distributed in some sites (database servers) which are interconnected through a high-speed wired network, an... 详细信息
来源: 评论