咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,589 篇 工学
    • 1,028 篇 计算机科学与技术...
    • 783 篇 软件工程
    • 332 篇 信息与通信工程
    • 226 篇 控制科学与工程
    • 189 篇 电气工程
    • 179 篇 电子科学与技术(可...
    • 150 篇 机械工程
    • 127 篇 生物工程
    • 82 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 69 篇 光学工程
    • 68 篇 化学工程与技术
    • 66 篇 材料科学与工程(可...
    • 64 篇 动力工程及工程热...
    • 64 篇 生物医学工程(可授...
    • 56 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 792 篇 理学
    • 441 篇 数学
    • 153 篇 生物学
    • 146 篇 物理学
    • 133 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 67 篇 化学
    • 33 篇 大气科学
  • 430 篇 管理学
    • 272 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 63 篇 医学
    • 48 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 59 篇 法学
    • 48 篇 社会学
  • 31 篇 经济学
  • 22 篇 农学
  • 14 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 university of ch...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 zhou mengchu
  • 33 篇 changjun jiang
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,238 篇 英文
  • 100 篇 中文
  • 99 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2431 条 记 录,以下是361-370 订阅
排序:
Identity-Based key-Insulated Proxy Signature Without Random Oracles
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第5期16卷 557-566页
作者: 陈剑洪 龙宇 陈克非 王永涛 Department of Computer Science and Engineering Shanghai Jiaotong University School of Computer Engineering Huaiyin Institute of Technology Shanghai Key Laboratory of Scalable Computing and System Shanghai Jiaotong University
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are ... 详细信息
来源: 评论
Finite-time and Fixed-time Stability and Synchronization  35
Finite-time and Fixed-time Stability and Synchronization
收藏 引用
第35届中国控制会议
作者: LIU Xiwei LU Wenlian CHEN Tianping Department of Computer Science and Technology Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education School of Mathematics Fudan University Centre for Computational System Biology Fudan University School of Computer Sciences Fudan University
Recently,finite-time and fixed-time stability has been a hot topic in the study of dynamical *** this paper,we will provide an insightful view on this issue and explore the intrinsic property by mathematical *** theor... 详细信息
来源: 评论
SPR sensor employing gold-coated photonic crystal fiber with three-layer air-holes
SPR sensor employing gold-coated photonic crystal fiber with...
收藏 引用
Asia Communications and Photonics Conference, ACPC_2019
作者: Guo, Yu Song, Binbin Li, Chenyuan Huang, Wei Wu, Xujie Xiong, Yue Chen, Shengyong Key Laboratory of Computer Vision and System of Ministry of Education Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin300071 China
A highly sensitive refractive index (RI) sensor was designed utilizing gold-coated PCF. The properties of modes coupling between fundamental mode and SPP were theoretically simulated. The maximum RI sensitivity of 840... 详细信息
来源: 评论
Solid-state green-light-emitting upconversion coherent random laser in macroporous LiNbO_3:Er
收藏 引用
Chinese Optics Letters 2018年 第1期16卷 62-65页
作者: 石凡 赵萌 贾晨 赵宇峰 陈胜勇 Key Laboratory of Computer Vision and System of Ministry of Education Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
A solid-state green-light-emitting upconversion coherent random laser was realized by pumping macroporous erbium-doped lithium niobate with a 980 nm laser. The lasing threshold was determined to be about 40 k W∕cm~**... 详细信息
来源: 评论
Framework for understanding intention-unbreakable malware
收藏 引用
Science China(Information Sciences) 2023年 第4期66卷 174-192页
作者: Tiantian JI Binxing FANG Xiang CUI Zhongru WANG Peng LIAO Shouyou SONG Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of Education Beijing University of Posts and Telecommunications Cyberspace Institute of Advanced Technology Guangzhou University Chinese Academy of Cyberspace Studies Beijing Dig Apis Technology Co. Ltd.
The anti-analysis technology of malware has always been the focus in the cyberspace security field. As malware analysis techniques evolve, malware writers continually employ sophisticated anti-reverse engineering tech... 详细信息
来源: 评论
Research on association rule algorithm based on distributed and weighted FP-growth
Research on association rule algorithm based on distributed ...
收藏 引用
作者: Wang, Huaibin Liu, Yuanchao Wang, Chundong Key Laboratory of Computer Vision and System Tianjin University of Technology China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China
In this paper a distributed weight mining algorithm is proposed based on FP-growth. As an important part of network fault management, the association rule takes effect on eliminating redundant alarms and preventing al... 详细信息
来源: 评论
Research on context-aware computing with uncertainty for proactive service
收藏 引用
International Journal of Modelling, Identification and Control 2009年 第3期8卷 248-255页
作者: Zhang, De-Gan Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin 300191 China Key Lab of Industrial Controlling Technology Zhejiang University Hangzhou 310027 China
It is known to all that context-aware computing with uncertainty is an important part of pervasive computing for proactive service. Because multi-source evidence context-aware information with uncertainty is dynamic a... 详细信息
来源: 评论
A hierarchical clustering strategy of processing class imbalance and its application in fraud detection  21
A hierarchical clustering strategy of processing class imbal...
收藏 引用
21st IEEE International Conference on High Performance computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and systems, HPCC/SmartCity/DSS 2019
作者: Zhang, Youjun Liu, Guanjun Zheng, Lutao Yan, Chungang Key Laboratory of the Ministry of Education for Embedded System and Service Computing Shanghai Electronic Transactions and Information Service Collaborative Innovation Center Tongji University Shanghai China
With the Internet and mobile communications becoming an indispensable part of people's daily lives, online transactions have become one of the most common payment methods. However, transaction fraud incidents also... 详细信息
来源: 评论
New methodologies for parallel architecture
New methodologies for parallel architecture
收藏 引用
作者: Fan, Dong-Rui Li, Xiao-Wei Li, Guo-Jie Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Moore's law continues to grant computer architects ever more transistors in the foreseeable future, and para-llelism is the key to continued performance scaling in modern microprocessors. In this paper, the achiev... 详细信息
来源: 评论
The design methodology of phoenix cluster system software stack
The design methodology of phoenix cluster system software st...
收藏 引用
2007 Asian technology Information Program's (ATIP's) 3rd Workshop on High Performance computing in China - Solution Approaches to Impediments for High Performance computing, CHINA HPC'07
作者: Zhan, Jianfeng Wang, Lei Tu, Bibo Wang, Hui Zhang, Zhihong Jin, Yi Wen, Yu Chen, Yuansheng Wang, Peng Qiu, Bizhu Meng, Dan Sun, Ninghui Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
Though many research groups have explored the design methodology of cluster system software stack, few works discuss what constitutes a good one. In this paper, we choose four criteria throughout the lifecycle of clus... 详细信息
来源: 评论