咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,589 篇 工学
    • 1,028 篇 计算机科学与技术...
    • 783 篇 软件工程
    • 332 篇 信息与通信工程
    • 226 篇 控制科学与工程
    • 189 篇 电气工程
    • 179 篇 电子科学与技术(可...
    • 150 篇 机械工程
    • 127 篇 生物工程
    • 82 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 69 篇 光学工程
    • 68 篇 化学工程与技术
    • 66 篇 材料科学与工程(可...
    • 64 篇 动力工程及工程热...
    • 64 篇 生物医学工程(可授...
    • 56 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 792 篇 理学
    • 441 篇 数学
    • 153 篇 生物学
    • 146 篇 物理学
    • 133 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 67 篇 化学
    • 33 篇 大气科学
  • 430 篇 管理学
    • 272 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 63 篇 医学
    • 48 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 59 篇 法学
    • 48 篇 社会学
  • 31 篇 经济学
  • 22 篇 农学
  • 14 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 university of ch...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 zhou mengchu
  • 33 篇 changjun jiang
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,238 篇 英文
  • 100 篇 中文
  • 99 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2431 条 记 录,以下是521-530 订阅
排序:
An efficient image processing method based on web services for mobile devices
An efficient image processing method based on web services f...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Yi, Liang Yingyuan, Xiao Jing, Huang Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
The resource limitation of mobile devices causes the problem that the existing image processing software based on the centralized computing mode had difficulty running in mobile devices. A solution is given in the pap... 详细信息
来源: 评论
A Short Review of Truck and Drone Collaborative Delivery Problem  10
A Short Review of Truck and Drone Collaborative Delivery Pro...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud computing and 9th IEEE International Conference on Edge computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Zhu, Yena Liu, Min Jin, Dongyao Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan China Hunan Key Laboratory for Service computing and Novel Software Technology Xiangtan China
With the emergence of efficient logistics models and the development of drone technology, the last-mile delivery problem has become a focus of attention for scholars in various fields. The advantages of drones, such a... 详细信息
来源: 评论
A new method of image data fusion based on FNN
A new method of image data fusion based on FNN
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Zhang, De-Gan Li, Chao Wang, Dong Zhang, Xiao-Li Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 China
The image data are obtained by a variety of multimedia, information equipment, which include amount of information, extensive coverage, and redundancy in ubiquitous computing paradigm. In order to make use of these in... 详细信息
来源: 评论
Research on global register allocation for code containing array-unit dual-usage register names
Research on global register allocation for code containing a...
收藏 引用
作者: Hu, Yonghua Zhang, Xin Wang, Shuying Liang, Wei Li, Kuan-Ching School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China
Array-unit dual-usage register is a kind of register resource that can be read or written as a whole or individually. It is mainly configured in processors with SIMD processing units and provides register-level speed ... 详细信息
来源: 评论
Low-Rank Subspace Representation from Optimal Coded-Aperture for Unsupervised Classification of Hypersepctral Imagery
Low-Rank Subspace Representation from Optimal Coded-Aperture...
收藏 引用
IEEE International Conference on Image Processing
作者: Jianchen Zhu Tong Zhang Shengjie Zhao Key Laboratory of Embedded System and Service Computing Ministry of Education
This paper aims at developing a clustering approach with spectral images directly from the compressive measurements of coded aperture snapshot spectral imager (CASSI). Assuming that compressed measurements often lie a... 详细信息
来源: 评论
Path Restoring Algorithm based on Vehicle Trajectory Mining
Path Restoring Algorithm based on Vehicle Trajectory Mining
收藏 引用
2016 IEEE International Conference on Big Data Analysis
作者: Yuanhui Sun Yaying Zhang Key Laboratory of Embedded System and Service Computing Tongji University
Path restoring is a path searching problem in the time-dependent road network with the time constraints of origin and destination. This paper proposes a path restoring algorithm to find the possible path that vehicles... 详细信息
来源: 评论
An Efficient Threshold key-Insulated Signature Scheme
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第6期16卷 658-662页
作者: 陈剑洪 龙宇 陈克非 王永涛 李祥学 Department of Computer Science and Engineering Shanghai Jiaotong University School of Computer Engineering Huaiyin Institute of Technology Shanghai Key Laboratory of Scalable Computing and System Shanghai Jiaotong University Department of Computer Science and Technology East China Normal University
To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS *** a TKIS system,at least k out ... 详细信息
来源: 评论
Extended selective encoding of scan slices for reducing test data and test power
Extended selective encoding of scan slices for reducing test...
收藏 引用
作者: Liu, Jun Han, Yinhe Li, Xiaowei Key Laboratory of Computer System and Architecture Institute of Computing Technology Graduate University of Chinese Academy of Sciences China School of Computer and Information Hefei University of Technology China
Test data volume and test power are two major concerns when testing modern large circuits. Recently, selective encoding of scan slices is proposed to compress test data. This encoding technique, unlike many other comp... 详细信息
来源: 评论
Monitor-based Liveness-enforcing Petri Net Supervisors for Flexible Manufacturing systems  33
Monitor-based Liveness-enforcing Petri Net Supervisors for F...
收藏 引用
第三十三届中国控制会议
作者: YOU Dan WANG Shouguang ZHOU MengChu WU Wenhui School of Information & Electronic Engineering Zhejiang Gongshang University IEEE State Key Laboratory for Manufacturing Systems Engineering Xi’ an Jiaotong University The Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji University Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102USA
Deadlocks are a rather undesirable phenomenon in flexible manufacturing systems(FMSs).This work,by adding monitors,develops a deadlock prevention policy for FMSs that can be modeled by a class of Petri nets called-S3 ... 详细信息
来源: 评论
On the Security of Smart Home systems:A Survey
收藏 引用
Journal of Computer Science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论