咨询与建议

限定检索结果

文献类型

  • 2,370 篇 会议
  • 1,960 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,346 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,847 篇 工学
    • 1,942 篇 计算机科学与技术...
    • 1,522 篇 软件工程
    • 588 篇 信息与通信工程
    • 353 篇 电气工程
    • 351 篇 控制科学与工程
    • 312 篇 电子科学与技术(可...
    • 256 篇 生物工程
    • 219 篇 机械工程
    • 208 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 142 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 90 篇 网络空间安全
    • 88 篇 材料科学与工程(可...
    • 81 篇 土木工程
    • 81 篇 安全科学与工程
    • 77 篇 建筑学
  • 1,446 篇 理学
    • 714 篇 数学
    • 384 篇 物理学
    • 313 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 152 篇 化学
    • 146 篇 系统科学
  • 758 篇 管理学
    • 506 篇 管理科学与工程(可...
    • 282 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 116 篇 法学
  • 73 篇 经济学
  • 57 篇 农学
  • 25 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 99 篇 feature extracti...
  • 90 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 69 篇 deep learning
  • 67 篇 training
  • 62 篇 computer archite...
  • 59 篇 cloud computing
  • 56 篇 laboratories
  • 54 篇 optimization
  • 54 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 50 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 predictive model...
  • 48 篇 accuracy
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 128 篇 school of comput...
  • 101 篇 national enginee...
  • 93 篇 hubei province k...
  • 88 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 national enginee...
  • 43 篇 state key labora...
  • 42 篇 school of cyber ...
  • 38 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 34 篇 key laboratory o...
  • 33 篇 university of ch...

作者

  • 234 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 22 篇 li peng
  • 21 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,944 篇 英文
  • 268 篇 其他
  • 141 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4346 条 记 录,以下是3561-3570 订阅
排序:
A partially reconfigurable architecture supporting hardware threads
A partially reconfigurable architecture supporting hardware ...
收藏 引用
IEEE International Conference on Field-Programmable technology (FPT)
作者: Ying Wang Jian Yan Xuegong Zhou Lingli Wang Wayne Luk Chenglian Peng Jiarong Tong State Key Laboratory of ASIC and System Fudan University Shanghai China Department of Computing Imperial College London London United Kingdom School of Computer Science and Technology Fudan University Shanghai China
As a promising computing platform for stream processing, partially reconfigurable systems have shown their hardware efficiency and reconfiguration flexibility. This paper presents a partially reconfigurable architectu... 详细信息
来源: 评论
VMStore: Distributed storage system for multiple virtual machines
收藏 引用
science China(Information sciences) 2011年 第6期54卷 1104-1118页
作者: LIAO XiaoFei, LI He, JIN Hai , HOU HaiXiang, JIANG Yue & LIU HaiKun services computing technology and system Lab, Cluster and Grid computing Lab, school of computer science and technology, Huazhong University of science and technology, Wuhan 430074, China 1. Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Desktop virtualization is a very hot concept in both industry and academic communities. Since virtualized desktop system is based on multiple virtual machines (VM), it is necessary to design a distributed storage syst... 详细信息
来源: 评论
A generalised diffusion-based file replication scheme for load balancing in P2P file-sharing networks
A generalised diffusion-based file replication scheme for lo...
收藏 引用
作者: Takaoka, Masanori Uchida, Masato Ohnishi, Kei Oie, Yuji NCOS Laboratory NEC Communication Systems 1753 Shimonumabe Nakahara-ku Kawasaki Kanagawa 211-8666 Japan Department of Electrical Electronics and Computer Engineering Faculty of Engineering Chiba Institute of Technology 2-17-1 Tsudanuma Narashino-shi Chiba 275-0016 Japan Graduate School of Computer Science and System Engineering Kyushu Institute of Technology 680-4 Kawazu Iizuka Fukuoka 820-8502 Japan
We propose a generalised diffusion-based file replication scheme for load balancing in unstructured P2P file-sharing networks. The generalised method is derived by replacing the replication probability of a peer used ... 详细信息
来源: 评论
Towards energy-fairness in asynchronous duty-cycling sensor networks
Towards energy-fairness in asynchronous duty-cycling sensor ...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Zhenjiang Li Mo Li Yunhao Liu Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China School of Computer Engineering Nanyang Technological University Singapore MOE Key Laboratory for Information System Security School of Software Tsinghua National Laboratory for Information Science and Technology Tsinghua University China
In this paper, we investigate the problem of controlling node sleep intervals so as to achieve the min-max energy fairness in asynchronous duty-cycling sensor networks. We propose a mathematical model to describe the ... 详细信息
来源: 评论
Sherlock is around: Detecting network failures with local evidence fusion
Sherlock is around: Detecting network failures with local ev...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Qiang Ma Kebin Liu Xin Miao Yunhao Liu Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China MOE Key Laboratory for Information System Security School of Software Tsinghua National Laboratory for Information Science and Technology Tsinghua University China
Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct centralized analysis at the powerful back-end. ... 详细信息
来源: 评论
Model checking cooperative multi-agent systems in BDI logic
收藏 引用
Journal of Information and Computational science 2012年 第5期9卷 1185-1194页
作者: Chen, Qingliang Su, Kaile Wu, Lijun Xu, Zhaocheng School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Department of Computer Science Jinan University Guangzhou 510632 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Institute for Integrated and Intelligent Systems Griffith University Brisbane Australia School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Traditional temporal logics such as LTL (Linear Temporal Logic) and CTL (Computation Tree Logic) have shown tremendous success in specifying and verifying hardware and software systems. However, this kind of logic can... 详细信息
来源: 评论
A cloud-based watermarking method for health data security
A cloud-based watermarking method for health data security
收藏 引用
International Conference on High Performance computing & Simulation (HPCS)
作者: Zhiwei Yu Clark Thomborson Chaokun Wang Jianmin Wang Rui Li Department of Computer Science and Technology Tsinghua University Beijing China Department of Computer Science University of Auckland New Zealand School of Software Key Laboratory for Information System Security Ministry of Education Tsinghua National Laboratory for Information Science and Technology(TNList) Tsinghua University Beijing China
Private health information once confined to local medical institutions is migrating onto the Internet as an Electronic Health Record (EHR) that is accessed by cloud computing. No matter where it is hosted, health data... 详细信息
来源: 评论
Generating Profiles for a Lurking User by its Followees' Social Context in Microblogs
Generating Profiles for a Lurking User by its Followees' Soc...
收藏 引用
Web Information systems and Applications Conference (WISA)
作者: Zhao Zhang Bin Zhao Weining Qian Aoying Zhou Institute of Massive Computing Software Engineering Institute Shanghai Key Laboratory of Trustworthy Computing East China Normal University China School of Computer Science and Technology Nanjing Normal University China
Microblogs, a mixture of new media and social networks, is a hotbed of lurking users. It is meaningful to capture profiles for a lurking user in customized applications because a lurking user can receive all messages ... 详细信息
来源: 评论
Integrating hard and soft information sources for D2D using controlled natural language
Integrating hard and soft information sources for D2D using ...
收藏 引用
15th International Conference on Information Fusion, FUSION 2012
作者: Preece, Alun Pizzocaro, Diego Braines, Dave Mott, David De Mel, Geeth Pham, Tien School of Computer Science and Informatics Cardiff University Cardiff United Kingdom Emerging Technology Services IBM United Kingdom Ltd. Hursley Park Winchester United Kingdom IBM TJ Watson Research Center Hawthorne NY United States US Army Research Laboratory Adelphi MD United States
We introduce an approach to integrating access to hard and soft information sources to provide better exploitation of all available sources in the context of coalition data-to-decision (D2D) chains. In terms of hard (... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed computing systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论