咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,589 篇 工学
    • 1,028 篇 计算机科学与技术...
    • 783 篇 软件工程
    • 332 篇 信息与通信工程
    • 226 篇 控制科学与工程
    • 189 篇 电气工程
    • 179 篇 电子科学与技术(可...
    • 150 篇 机械工程
    • 127 篇 生物工程
    • 82 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 69 篇 光学工程
    • 68 篇 化学工程与技术
    • 66 篇 材料科学与工程(可...
    • 64 篇 动力工程及工程热...
    • 64 篇 生物医学工程(可授...
    • 56 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 792 篇 理学
    • 441 篇 数学
    • 153 篇 生物学
    • 146 篇 物理学
    • 133 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 67 篇 化学
    • 33 篇 大气科学
  • 430 篇 管理学
    • 272 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 63 篇 医学
    • 48 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 59 篇 法学
    • 48 篇 社会学
  • 31 篇 经济学
  • 22 篇 农学
  • 14 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 university of ch...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 zhou mengchu
  • 33 篇 changjun jiang
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,238 篇 英文
  • 100 篇 中文
  • 99 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2431 条 记 录,以下是491-500 订阅
排序:
Petri net-based scheduling analysis of dual-arm cluster tools with wafer revisiting
Petri net-based scheduling analysis of dual-arm cluster tool...
收藏 引用
2012 IEEE International Conference on Automation Science and Engineering: Green Automation Toward a Sustainable Society, CASE 2012
作者: Qiao, Yan Wu, Naiqi Zhou, Mengchu Department of Industrial Engineering School of Electro-Mechanical Engineering Guangdong University of Technology Guangzhou 510006 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China
With wafer revisit, it is complicated to schedule cluster tools in semiconductor fabrication. In wafer fabrication processes, such as atomic layer deposition (ALD), the wafers need to visit some process modules for a ... 详细信息
来源: 评论
Multi-symplectic method for the coupled Schrdinger–KdV equations
收藏 引用
Chinese Physics B 2014年 第8期23卷 226-232页
作者: 张弘 宋松和 周炜恩 陈绪栋 Department of Mathematics and System Science College of Science National University of Defense Technology State Key Laboratory of High Performance Computing National University of Defense Technology
In this paper, we present a multi-symplectic Hamiltonian formulation of the coupled Schrtidinger-KdV equations (CS'KE) with periodic boundary conditions. Then we develop a novel multi-symplectic Fourier pseudospect... 详细信息
来源: 评论
Statistical static timing analysis for circuit aging prediction
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2021年 第2期28卷 14-23页
作者: Duan Shengyu Zhai Dongyao Lu Yue Shanghai Engineering Research Center of Intelligent Computing System Shanghai UniversityShanghai 200444China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China School of Electronics and Computer Science University of SouthamptonSouthamptonUK
Complementary metal oxide semiconductor(CMOS)aging mechanisms including bias temperature instability(BTI)pose growing concerns about circuit *** results in threshold voltage increases on CMOS transistors,causing delay... 详细信息
来源: 评论
Android Malware Detection Using Ensemble Learning on Sensitive APIs  1st
Android Malware Detection Using Ensemble Learning on Sensiti...
收藏 引用
1st EAI International Conference on Edge computing and IoT: systems, Management and Security, ICECI 2020
作者: Yu, Junhui Zhao, Chunlei Zheng, Wenbai Li, Yunlong Zhang, Chunxiang Chen, Chao Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China
In recent years, with the quiet popularity of mobile payment methods, mobile terminal equipment also have potential security problems while facilitating people’s lives. Behavior-based Android malware detection is mos... 详细信息
来源: 评论
Android Malware Detection Based on Sensitive Permissions and APIs  2nd
Android Malware Detection Based on Sensitive Permissions and...
收藏 引用
2nd EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2019
作者: Zhao, Chunhui Wang, Chundong Zheng, Wenbai Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China
With the widespread use of the Android operating system, the number of applications based on the Android platform is growing. How to effectively identify malware is critical to the security of phones. This paper propo... 详细信息
来源: 评论
A new routing and connectivity availability metric of low duty cycle random sleep scheduled multi-hop wireless sensor networks
收藏 引用
Journal of China Universities of Posts and Telecommunications 2011年 第SUPPL.2期18卷 101-108页
作者: Zhang, Tian-Le Yuan, Yu-Yu Wu, Xu Luo, Zong-Wei Wang, Chun-Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China E-Business Technology Institute University of Hong Kong Hong Kong Hong Kong
Wireless sensor network (WSN) is attracting intensive interests in many application areas. In some scenarios such as monitoring of the coal-mining area or remote area, nodes seldom move and may switch from sleeping to... 详细信息
来源: 评论
Web service composition techniques in a health care service platform
Web service composition techniques in a health care service ...
收藏 引用
2011 IEEE 9th International Conference on Web services, ICWS 2011
作者: Wang, Pengwei Ding, Zhijun Jiang, Changjun Zhou, Mengchu Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102 United States
The information technology has been recognized as one of the most important means to improve health care and curb its ever-increasing cost. However, existing efforts mainly focus on informatization of hospitals or med... 详细信息
来源: 评论
Design issues in ZigBee-based sensor network for healthcare applications
Design issues in ZigBee-based sensor network for healthcare ...
收藏 引用
2012 9th IEEE International Conference on Networking, Sensing and Control, ICNSC 2012
作者: Choi, Jin Soo Zhou, MengChu Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102 United States Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China
IEEE 802.15.4/ZigBee sensor networks support small power consumption and node expansion compared to other network standards for WSN. Body sensor networks (BSN) require a number of sensors for sensing medical informati... 详细信息
来源: 评论
BCE-PPDS: Blockchain-based cloud–edge collaborative privacy-preserving data sharing scheme for IoT
收藏 引用
Future Generation Computer systems 2026年 174卷
作者: Guijuan Wang Qi Liu Zhongyuan Yu Hongliang Zhang Anming Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong 250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong 250353 China China University of Petroleum Qingdao Shandong 266000 China
Internet of Things (IoT) devices generate large amounts of data every day that can be combined with intelligent platforms for predictive analytics and scientific research. However, concerns about privacy and security ...
来源: 评论
Dynamic target tracking based on corner enhancement with Markov decision process
Dynamic target tracking based on corner enhancement with Mar...
收藏 引用
作者: Zuo, Guoyu Du, Tingting Ma, Lei Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Computing Intelligence and Intelligent System Beijing China
The tracking–learning–detection (TLD) algorithm applied in the home environment can effectively improve the tracking robustness. However, it has the problems of single target tracking and poor selection of feature p... 详细信息
来源: 评论