咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,589 篇 工学
    • 1,028 篇 计算机科学与技术...
    • 783 篇 软件工程
    • 332 篇 信息与通信工程
    • 226 篇 控制科学与工程
    • 189 篇 电气工程
    • 179 篇 电子科学与技术(可...
    • 150 篇 机械工程
    • 127 篇 生物工程
    • 82 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 69 篇 光学工程
    • 68 篇 化学工程与技术
    • 66 篇 材料科学与工程(可...
    • 64 篇 动力工程及工程热...
    • 64 篇 生物医学工程(可授...
    • 56 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 792 篇 理学
    • 441 篇 数学
    • 153 篇 生物学
    • 146 篇 物理学
    • 133 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 67 篇 化学
    • 33 篇 大气科学
  • 430 篇 管理学
    • 272 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 63 篇 医学
    • 48 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 59 篇 法学
    • 48 篇 社会学
  • 31 篇 经济学
  • 22 篇 农学
  • 14 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 university of ch...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 zhou mengchu
  • 33 篇 changjun jiang
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,238 篇 英文
  • 100 篇 中文
  • 99 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2431 条 记 录,以下是511-520 订阅
排序:
TMemCanal: A VM-oblivious dynamic memory optimization scheme for virtual machines in cloud computing
TMemCanal: A VM-oblivious dynamic memory optimization scheme...
收藏 引用
10th IEEE International Conference on Computer and Information technology, CIT-2010, 7th IEEE International Conference on Embedded Software and systems, ICESS-2010, 10th IEEE Int. Conf. Scalable computing and Communications, ScalCom-2010
作者: Li, Yaqiong Huang, Yongbing Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences China Graduate University Chinese of Academy of Sciences China
In current virtualized cloud platforms, resource provisioning strategy is still a big challenge. Provisioning will gain low resource utilization based on peak workload, and provisioning based on average work loads wil... 详细信息
来源: 评论
Attribute recursive algorithms based on knowledge rough representation
Attribute recursive algorithms based on knowledge rough repr...
收藏 引用
International Conference on Information and Business Intelligence, IBI 2011
作者: Li, Dao-Guo Fan, Zhuo-Bin Chen, Yang School of Management Hangzhou Dianzi University Hangzhou 310018 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China
Existing representative research achievement of the relevant literatures focused on two *** is how to improve the efficiency of attribute reduction algorithms in all attributes including the added properties. Such as ... 详细信息
来源: 评论
WSHLA: Web services-based HLA collaborative simulation framework
WSHLA: Web services-based HLA collaborative simulation frame...
收藏 引用
4th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2007
作者: Hengye, Zhu Guangyao, Li Lulai, Yuan CAD Research Center Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China
Collaborative simulation technology is an important factor in improving the efficiency of complex product design. Although High Level Architecture (HLA)-based simulation technology can meet the needs for simulation in... 详细信息
来源: 评论
Redundant data composition of peers in p2p streaming systems using cauchy reed-solomon codes
Redundant data composition of peers in p2p streaming systems...
收藏 引用
6th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2009
作者: Xu, Guangping Wang, Fayu Zhang, Hua Li, Jingxing Key Lab of Intelligent Computing and New Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Erasure codes are used in many distributed applications. This paper applies Cauchy Reed-Solomon codes to P2P streaming systems which is different from classical Reed-Solomon codes. Due to churn in these systems, strea... 详细信息
来源: 评论
Cloud detection from visual band of satellite image based on variance of fractal dimension
收藏 引用
Journal of systems Engineering and Electronics 2019年 第3期30卷 485-491页
作者: TIAN Pingfang GUANG Qiang LIU Xing School of Computer Science and Technology Wuhan University of Science and Technology Wuhan 430065 China Key Laboratory of Intelligent Information Processing and Real-Time Industrial System in Hubei Province Wuhan 430065 China Institute of Big Data Science and Engineering Wuhan University of Science and Technology Wuhan 430065 China Key Laboratory of Rich-Media Knowledge Organization and Service of Digital Publishing Content National Press and Publication Administration Beijing 100038 China
Cover ratio of cloud is a very important factor which affects the quality of a satellite image, therefore cloud detection from satellite images is a necessary step in assessing the image quality. The study on cloud de... 详细信息
来源: 评论
Behavioral equivalence of security-oriented interactive systems
Behavioral equivalence of security-oriented interactive syst...
收藏 引用
作者: Liu, Guanjun Jiang, Changjun Department of Computer Science Tongji University Shanghai201804 China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Tongji University Shanghai201804 China
In the classical computation theory, the language of a system features the computational behavior of the system but it does not distinguish the determinism and nondeterminism of actions. However, Milner found that the... 详细信息
来源: 评论
Real-Time Communication Method for mHealth Base on Extended XMPP Protocol
收藏 引用
Communications and Network 2013年 第3期5卷 590-595页
作者: Chenjie Shi Yu Fang The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role ... 详细信息
来源: 评论
A new method of mobile Ad Hoc network routing based on improved GF strategy  3
A new method of mobile Ad Hoc network routing based on impro...
收藏 引用
3rd IEEE International Conference on Smart Internet of Things, SmartIoT 2019
作者: Li, Ke Zhang, De-Gan Qiu, Jian-Ning Chen, Lu Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin China
We propose a new mobile ad hoc network routing method based on improved GF (greedy forwarding) strategy in this paper. In the greedy forwarding phase, the reliable communication area is calculated, and then the qualit... 详细信息
来源: 评论
New Method of Traffic Flow Forecasting Based on QPSO Strategy for Internet of Vehicles  4
New Method of Traffic Flow Forecasting Based on QPSO Strateg...
收藏 引用
4th IEEE International Conference on Smart Internet of Things, SmartIoT 2020
作者: Zhang, De-Gan Du, Jing-Yu Zhang, Ting Fan, Hong-Rui Tianjin University of Technology Tianjin Key Lab of Intelligent Computing Novel Software Technology Tianjin300384 China Tianjin University of Technology Ministry of Education Key Laboratory of Computer Vision and System Tianjin China
We propose a new method of traffic flow forecasting based on quantum particle swarm optimization strategy (QPSO) for Internet of Vehicles (IOV). Establish a corresponding model based on the characteristics of the traf... 详细信息
来源: 评论
An enhanced two-factor user authentication in wireless sensor networks
收藏 引用
Telecommunication systems 2013年 第1期55卷 105-113页
作者: Yuan, Jian-Jun Key Laboratory of Embedded System and Service Computing of Ministry of Education Tongji University Shanghai China
Since wireless sensor networks (WSN) are often deployed in an unattended environment and sensor nodes are equipped with limited computing power modules, user authentication is a critical issue when a user wants to acc...
来源: 评论