咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 967 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,560 篇 工学
    • 1,009 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 169 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 779 篇 理学
    • 436 篇 数学
    • 150 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 59 篇 医学
    • 45 篇 临床医学
    • 39 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 42 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 33 篇 changjun jiang
  • 33 篇 hai jin
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,215 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2401 条 记 录,以下是501-510 订阅
排序:
An Efficient Threshold key-Insulated Signature Scheme
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第6期16卷 658-662页
作者: 陈剑洪 龙宇 陈克非 王永涛 李祥学 Department of Computer Science and Engineering Shanghai Jiaotong University School of Computer Engineering Huaiyin Institute of Technology Shanghai Key Laboratory of Scalable Computing and System Shanghai Jiaotong University Department of Computer Science and Technology East China Normal University
To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS *** a TKIS system,at least k out ... 详细信息
来源: 评论
Extended selective encoding of scan slices for reducing test data and test power
Extended selective encoding of scan slices for reducing test...
收藏 引用
作者: Liu, Jun Han, Yinhe Li, Xiaowei Key Laboratory of Computer System and Architecture Institute of Computing Technology Graduate University of Chinese Academy of Sciences China School of Computer and Information Hefei University of Technology China
Test data volume and test power are two major concerns when testing modern large circuits. Recently, selective encoding of scan slices is proposed to compress test data. This encoding technique, unlike many other comp... 详细信息
来源: 评论
Monitor-based Liveness-enforcing Petri Net Supervisors for Flexible Manufacturing systems  33
Monitor-based Liveness-enforcing Petri Net Supervisors for F...
收藏 引用
第三十三届中国控制会议
作者: YOU Dan WANG Shouguang ZHOU MengChu WU Wenhui School of Information & Electronic Engineering Zhejiang Gongshang University IEEE State Key Laboratory for Manufacturing Systems Engineering Xi’ an Jiaotong University The Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji University Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102USA
Deadlocks are a rather undesirable phenomenon in flexible manufacturing systems(FMSs).This work,by adding monitors,develops a deadlock prevention policy for FMSs that can be modeled by a class of Petri nets called-S3 ... 详细信息
来源: 评论
On the Security of Smart Home systems:A Survey
收藏 引用
Journal of Computer Science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
An ultrasound system for tumor detection in soft tissues using low transient pulse
An ultrasound system for tumor detection in soft tissues usi...
收藏 引用
2011 7th IEEE International Conference on Automation Science and Engineering, CASE 2011
作者: Ratnakar, Ashish R. Zhou, MengChu Dept. of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102-1982 United States MoE Key Laboratory of Embedded System and Service Computing Tongji University Shanghai 200092 China
This work presents a method to detect the size and location of tumor in soft tissues using ultrasound. Quantitative ultrasound is utilized to allow an ultrasound signal to be sent from a transmitter to multiple receiv... 详细信息
来源: 评论
A framework of video coding for compressing near-duplicate videos
A framework of video coding for compressing near-duplicate v...
收藏 引用
20th Anniversary International Conference on MultiMedia Modeling, MMM 2014
作者: Wang, Hanli Ma, Ming Jiang, Yu-Gang Wei, Zhihua Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China School of Computer Science Fudan University Shanghai China
With the development of multimedia technique and social network, the amount of videos has grown rapidly, which brings about an increasingly substantial percentage of Near-Duplicate Videos (NDVs). It has been a hot res... 详细信息
来源: 评论
Evolutionary behavior verification to the trustworthy banking software
Evolutionary behavior verification to the trustworthy bankin...
收藏 引用
International Conference on Computer Engineering and technology
作者: Jiang, Zuo-Wen Tang, Xian-Fei Ding, Zhi-Jun Jiang, Chang-Jun Electronics and Information Engineering School Tongji University 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University 200092 China College of Science and Technology NingBo University 315211 China
Oriented to the goal of high-quality banking softwares, trustworthiness is emerging to be important property. This paper studies how to apply formal methods into the trustworthy property preservation of evolutionary c... 详细信息
来源: 评论
Towards Planning Package Delivery Paths by Exploiting the Crowd of Private Cars  24
Towards Planning Package Delivery Paths by Exploiting the Cr...
收藏 引用
24th IEEE International Conference on High Performance computing and Communications, 8th IEEE International Conference on Data Science and systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Nie, Hejing Wen, Yiping Li, Tiancai Ouyang, Sipeng Tian, Muyang School of Computer Science and Engineering Hunan University of Science and Technology China Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology China
Crowdsourced delivery can provide cost-effective deliveries and it is becoming increasingly important in practice. This paper considers a package delivery problem which exploits relays of private cars to transport pac... 详细信息
来源: 评论
Disk based pay-as-you-go record linkage
收藏 引用
Frontiers of Computer Science 2022年 第4期16卷 227-229页
作者: Chenchen Sun Derong Shen Key Laboratory of Computer Vision and System(Ministry of Education) Tianjin University of TechnologyTianjin300384China College of Intelligence and Computing Tianjin UniversityTianjin300350China School of Computer Science and Engineering Northeastern UniversityShenyang110189China
1Introduction Record linkage(RL)groups_records corresponding to the same entities in datasets,and is a long-standing topic in data management and mining communities[1-2].In big data era,real-time data applications bec... 详细信息
来源: 评论
Incorporate Personas and Emotions into Dialog Generation  5
Incorporate Personas and Emotions into Dialog Generation
收藏 引用
5th International Academic Exchange Conference on Science and technology Innovation, IAECST 2023
作者: Wu, Yufeng Liu, Chengyu Guo, Wenjian Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing China
Since the Turing test, creating believable open-domain dialogues has been a basic problem in the study of artificial intelligence. Achieving success with dialogue models can greatly improve natural human-computer inte... 详细信息
来源: 评论