咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,589 篇 工学
    • 1,028 篇 计算机科学与技术...
    • 783 篇 软件工程
    • 332 篇 信息与通信工程
    • 226 篇 控制科学与工程
    • 189 篇 电气工程
    • 179 篇 电子科学与技术(可...
    • 150 篇 机械工程
    • 127 篇 生物工程
    • 82 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 69 篇 光学工程
    • 68 篇 化学工程与技术
    • 66 篇 材料科学与工程(可...
    • 64 篇 动力工程及工程热...
    • 64 篇 生物医学工程(可授...
    • 56 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 792 篇 理学
    • 441 篇 数学
    • 153 篇 生物学
    • 146 篇 物理学
    • 133 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 67 篇 化学
    • 33 篇 大气科学
  • 430 篇 管理学
    • 272 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 63 篇 医学
    • 48 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 59 篇 法学
    • 48 篇 社会学
  • 31 篇 经济学
  • 22 篇 农学
  • 14 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 university of ch...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 zhou mengchu
  • 33 篇 changjun jiang
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,238 篇 英文
  • 100 篇 中文
  • 99 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2431 条 记 录,以下是411-420 订阅
排序:
Non-intrusive load disaggregation using semi-supervised learning method
Non-intrusive load disaggregation using semi-supervised lear...
收藏 引用
2019 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2019
作者: Miao, Nan Zhao, Shengjie Shi, Qingjiang Zhang, Rongqing Tongji University Key Laboratory of Embedded System and Service Computing of Ministry of Education Shanghai China Tongji University Sch. of Software Eng. the Key Lab. of Embedded System and Service Computing of Ministry of Education Shanghai China Tongji University School of Software Engineering Shanghai China
With the emerging of smart metering around the world, there is a growing demand to analyse the residential energy usage. In this paper, we propose a Deep Neural Network (DNN)-based approach for non-intrusive load moni... 详细信息
来源: 评论
Object recognition using a Bayesian network imitating human neocortex
Object recognition using a Bayesian network imitating human ...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Lei, Wang Xianbin, Wen Xu, Jiao Jianguang, Zhang Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin 300191 China
After Mountcastle proposed the theory that all parts of mammalian neocortex are uniform [1], more and more evidences were found to prove that no matter what function the field of neocortex provide, the organizing of c... 详细信息
来源: 评论
Low-rate non-intrusive appliance load monitoring based on graph signal processing
Low-rate non-intrusive appliance load monitoring based on gr...
收藏 引用
2019 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2019
作者: Zhang, Bing Zhao, Shengjie Shi, Qingjiang Zhang, Rongqing Tongji University Key Laboratory of Embedded System and Service Computing of Ministry of Education Shanghai China Tongji University Sch. of Software Eng. the Key Lab. of Embedded System and Service Computing of Ministry of Education Shanghai China Tongji University School of Software Engineering Shanghai China
Thanks to the large-scale smart meters deployments around the world, non-intrusive appliance load monitoring (NILM) is receiving popularity. It aims to disaggregate the total electricity load of a home into individual... 详细信息
来源: 评论
Software and hardware co-designed multi-level TLBs for chip multiprocessors
Software and hardware co-designed multi-level TLBs for chip ...
收藏 引用
11th IEEE International Conference on Computer and Information technology, CIT 2011 and 11th IEEE International Conference on Scalable computing and Communications, SCALCOM 2011
作者: Zhang, Xiaohui Cong, Ming Chen, Guangqiang Key Laboratory of Computer System and Architecture Institute of Computing Technology Graduate University Beijing China National University of Defense Technology Changsha China
Translation Lookaside Buffers ( TLBs ) have a significant impact on system performance. Numerous prior studies focus on TLBs design for uniprocessors. With the advent of chip multiprocessors (CMPs), we need a shift to... 详细信息
来源: 评论
Flex memory: Exploiting and managing abundant off-chip optical bandwidth
Flex memory: Exploiting and managing abundant off-chip optic...
收藏 引用
作者: Wang, Ying Zhang, Lei Han, Yinhe Li, Huawei Li, Xiaowei Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
The emerging nanophotonic technology can avoid the limitation of I/O pin count, and provide abundant memory bandwidth. However, current DRAM organization has mainly been optimized for a higher storage capacity and pac... 详细信息
来源: 评论
An efficient confidentiality protection solution for pub/sub system
收藏 引用
Cybersecurity 2023年 第4期6卷 14-25页
作者: Jinglei Pei Yuyang Shi Qingling Feng Ruisheng Shi Lina Lan Shui Yu Jinqiao Shi Zhaofeng Ma Beijing University of Posts and Telecommunications Beijing100876China Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijingChina School of Computer Science University of Technology SydneySydneyNSWAustralia
Publish/subscribe(pub/sub)systems are widely used in large-scale messaging systems due to their asynchronous and decoupled *** the population of pub/sub cloud services,the privacy protection problem of pub/sub systems... 详细信息
来源: 评论
Locality and parallelism optimization for dynamic programming algorithm in bioinformatics
Locality and parallelism optimization for dynamic programmin...
收藏 引用
2006 ACM/IEEE Conference on Supercomputing, SC'06
作者: Tan, Guangming Feng, Shengzhong Sun, Ninghui Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Graduate School Chinese Academy of Sciences
Dynamic programming has been one of the most efficient approaches to sequence analysis and structure prediction in biology. However, their performance is limited due to the drastic increase in both the number of biolo... 详细信息
来源: 评论
Cooperative differential games guidance laws for multiple attackers against an active defense target
收藏 引用
Chinese Journal of Aeronautics 2022年 第5期35卷 374-389页
作者: Fei LIU Xiwang DONG Qingdong LI Zhang REN School of Automation Science and Electrical Engineering Science and Technology on Aircraft Control LaboratoryBeihang UniversityBeijing 100083China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang UniversityBeijing 100083China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education of ChinaChongqing UniversityChongqing 400044China
This paper is concerned with a scenario of multiple attackers trying to intercept a target with active *** types of agents are considered in the guidance:The multiple attackers,the target and the defender,where the at... 详细信息
来源: 评论
High-efficient architecture of Godson-T many-core processor  23
High-efficient architecture of Godson-T many-core processor
收藏 引用
23rd IEEE Hot Chips Symposium, HCS 2011
作者: Fan, Dongrui Zhang, Hao Wang, Da Ye, Xiaochun Song, Fenglong Zhang, Junchao Fan, Lingjun Advanced Micro-System Group National Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China
This article consists of a collection of slides from the author's conference presentation on the special features, system design, processing capabilities, and targeted markets for AMS's Godson-T microprocessor...
来源: 评论
Protein structure prediction based on a domain clustering database
Protein structure prediction based on a domain clustering da...
收藏 引用
2007 1st International Conference on Bioinformatics and Biomedical Engineering, ICBBE
作者: Ma, Zhaoyun Zhang, Fa Xu, Lin Feng, Shengzhong Liu, Zhiyong Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Institute of Computing Technology Graduate School Chinese Academy of Sciences
Homology modeling, as a successful protein structure prediction method, has two major deficiencies, i.e., the lack of the templates (known structures), and the accuracy of alignment between the query (unknown structur... 详细信息
来源: 评论