咨询与建议

限定检索结果

文献类型

  • 2,370 篇 会议
  • 1,960 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,346 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,847 篇 工学
    • 1,942 篇 计算机科学与技术...
    • 1,522 篇 软件工程
    • 588 篇 信息与通信工程
    • 353 篇 电气工程
    • 351 篇 控制科学与工程
    • 312 篇 电子科学与技术(可...
    • 256 篇 生物工程
    • 219 篇 机械工程
    • 208 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 142 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 90 篇 网络空间安全
    • 88 篇 材料科学与工程(可...
    • 81 篇 土木工程
    • 81 篇 安全科学与工程
    • 77 篇 建筑学
  • 1,446 篇 理学
    • 714 篇 数学
    • 384 篇 物理学
    • 313 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 152 篇 化学
    • 146 篇 系统科学
  • 758 篇 管理学
    • 506 篇 管理科学与工程(可...
    • 282 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 116 篇 法学
  • 73 篇 经济学
  • 57 篇 农学
  • 25 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 99 篇 feature extracti...
  • 90 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 69 篇 deep learning
  • 67 篇 training
  • 62 篇 computer archite...
  • 59 篇 cloud computing
  • 56 篇 laboratories
  • 54 篇 optimization
  • 54 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 50 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 predictive model...
  • 48 篇 accuracy
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 128 篇 school of comput...
  • 101 篇 national enginee...
  • 93 篇 hubei province k...
  • 88 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 national enginee...
  • 43 篇 state key labora...
  • 42 篇 school of cyber ...
  • 38 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 34 篇 key laboratory o...
  • 33 篇 university of ch...

作者

  • 234 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 22 篇 li peng
  • 21 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,944 篇 英文
  • 268 篇 其他
  • 141 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4346 条 记 录,以下是3501-3510 订阅
排序:
Topic correlation analysis for cross-domain text classification
Topic correlation analysis for cross-domain text classificat...
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Li, Anghao Jin, Xiaoming Long, Mingsheng Key Laboratory for Information System Security School of Software Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Cross-domain text classification aims to automatically train a precise text classifier for a target domain by using labeled text data from a related source domain. To this end, the distribution gap between different d... 详细信息
来源: 评论
Security Analysis of an Electronic Commerce Protocol Using Casper/FDR2
收藏 引用
Wuhan University Journal of Natural sciences 2012年 第6期17卷 499-503页
作者: CHANG Yinlong HU Huaping Department of Mathematics and Computer Science/Key Laboratory of Information Security of Network System Fuzhou UniversityFuzhou 350108FujianChina School of Computer Science National University of Defense TechnologyChangsha 410073HunanChina
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an... 详细信息
来源: 评论
Processing time analysis of cloud services with retrying fault-tolerance technique
Processing time analysis of cloud services with retrying fau...
收藏 引用
2012 1st IEEE International Conference on Communications in China, ICCC 2012
作者: Wang, Chaonan Xing, Liudong Wang, Honggang Zhang, Zhaoyang Dai, Yuanshun Electrical and Computer Engineering Department University of Massachusetts Dartmouth MA 02747 United States Collaborative Autonomic Computing Laboratory School of Computer Science University of Electronic Science and Technology of China Chengdu 610054 China
This paper studies the processing time of cloud services using the retrying technique for fault tolerance. Specifically, the processing time of a cloud service is modeled and the probability distribution of the proces... 详细信息
来源: 评论
Probabilistic Critical Path Identification for Cost-Effective Monitoring of Service-Based systems
Probabilistic Critical Path Identification for Cost-Effectiv...
收藏 引用
IEEE International Conference on services computing (SCC)
作者: Qiang He Jun Han Yun Yang Jean-Guy Schneider Hai Jin Steve Versteeg Faculty of Information and Communication Technologies Swinburne University of Technology Melbourne Australia Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China CA Laboratories Melbourne Australia
When operating in volatile environments, service-based systems (SBSs) that are built through dynamic composition of component services must be monitored in order to guarantee the response times of the SBSs. In particu... 详细信息
来源: 评论
Towards the traffic hole problem in VANETs
Towards the traffic hole problem in VANETs
收藏 引用
9th ACM International Workshop on VehiculAr Inter-NETworking, systems, and Applications, VANET'12
作者: Song, Chao Liu, Ming Wen, Yonggang Chen, Guihai Cao, Jiannong School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Engineering Nanyang Technological University Singapore Singapore School of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Internet and Mobile Computing Laboratory Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
The data delivery in Vehicular Ad-hoc Networks which is based on the infrastructure-less vehicle-to-vehicle (V2V) communications, is sensitive to the traffic flows along the roads. However, the traffic flow may be int... 详细信息
来源: 评论
A cloud-based watermarking method for health data security
A cloud-based watermarking method for health data security
收藏 引用
2012 10th Annual International Conference on High Performance computing and Simulation, HPCS 2012
作者: Yu, Zhiwei Thomborson, Clark Wang, Chaokun Wang, Jianmin Li, Rui Department of Computer Science and Technology Tsinghua University Beijing China Department of Computer Science University of Auckland New Zealand School of Software Tsinghua University Key Laboratory for Information System Security Beijing China
Private health information once confined to local medical institutions is migrating onto the Internet as an Electronic Health Record (EHR) that is accessed by cloud computing. No matter where it is hosted, health data... 详细信息
来源: 评论
The relation on prefix hijacking and the internet hierarchy
The relation on prefix hijacking and the internet hierarchy
收藏 引用
6th International Conference on Innovative Mobile and Internet services in Ubiquitous computing, IMIS 2012
作者: Zhao, Jinjing Wen, Yan Li, Xiang Peng, Wei Zhao, Feng Beijing Institute of System Engineering Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China Beijing Aerospace Control Center Beijing China National University of Defense Technology Computer School Changsha China
Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disr... 详细信息
来源: 评论
Propagation-based social-aware replication for social video contents
Propagation-based social-aware replication for social video ...
收藏 引用
20th ACM International Conference on Multimedia, MM 2012
作者: Wang, Zhi Sun, Lifeng Chen, Xiangwen Zhu, Wenwu Liu, Jiangchuan Chen, Minghua Yang, Shiqiang Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing China Department of Information Engineering Chinese University of Hong Kong Hong Kong School of Computing Science Simon Fraser University Vancouver BC Canada
Online social network has reshaped the way how video contents are generated, distributed and consumed on today's Internet. Given the massive number of videos generated and shared in online social networks, it has ... 详细信息
来源: 评论
QoS-Driven Service Selection for Multi-tenant SaaS
QoS-Driven Service Selection for Multi-tenant SaaS
收藏 引用
IEEE International Conference on Cloud computing, CLOUD
作者: Qiang He Jun Han Yun Yang John Grundy Hai Jin Faulty of Information and Communication Technologies Swinburne University of Technology Melbourne Australia Services Computing Technology and Systems Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Cloud-based software applications (Software as a Service - SaaS) for multi-tenant provisioning have become a major development paradigm in Web engineering. Instead of serving a single end-user, a multi-tenant SaaS pro... 详细信息
来源: 评论
Research on hardware security of embedded system in cloud environment
Research on hardware security of embedded system in cloud en...
收藏 引用
2012 2nd International Conference on Key Engineering Materials, ICKEM 2012
作者: Li, Jing Zhang, Huanguo Zhao, Bo Guo, Xi He, Fan School of Computer Wuhan University Wuhan 430072 Hubei China Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education Wuhan University Wuhan 430072 Hubei China School of Computer Science and Technology Wuhan University of Technology 1040 Heping Road Wuhan 430063 China
Cloud computing is an important innovation of current computing models. At present, the research on the security of cloud computing is mainly concentrated on PCs and servers. The security of embedded system in cloud e... 详细信息
来源: 评论