咨询与建议

限定检索结果

文献类型

  • 2,380 篇 会议
  • 1,974 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,868 篇 工学
    • 1,961 篇 计算机科学与技术...
    • 1,517 篇 软件工程
    • 590 篇 信息与通信工程
    • 372 篇 控制科学与工程
    • 356 篇 电气工程
    • 318 篇 电子科学与技术(可...
    • 258 篇 生物工程
    • 220 篇 机械工程
    • 204 篇 光学工程
    • 168 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 141 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 90 篇 材料科学与工程(可...
    • 90 篇 网络空间安全
    • 82 篇 安全科学与工程
    • 81 篇 土木工程
    • 77 篇 建筑学
  • 1,444 篇 理学
    • 711 篇 数学
    • 382 篇 物理学
    • 313 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 153 篇 化学
    • 148 篇 系统科学
  • 760 篇 管理学
    • 506 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 198 篇 工商管理
  • 184 篇 医学
    • 150 篇 临床医学
    • 119 篇 基础医学(可授医学...
  • 116 篇 法学
  • 72 篇 经济学
  • 57 篇 农学
  • 22 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 100 篇 feature extracti...
  • 90 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 70 篇 deep learning
  • 67 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 55 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 50 篇 protocols
  • 49 篇 accuracy
  • 48 篇 bandwidth
  • 48 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 128 篇 school of comput...
  • 102 篇 national enginee...
  • 93 篇 hubei province k...
  • 88 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 national enginee...
  • 43 篇 state key labora...
  • 43 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 34 篇 key laboratory o...
  • 34 篇 university of ch...

作者

  • 234 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 25 篇 wang wei
  • 22 篇 li peng
  • 20 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,938 篇 英文
  • 299 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4370 条 记 录,以下是3641-3650 订阅
排序:
An architecture description language based on dynamic description logics for self-healing systems
收藏 引用
International Journal of Advancements in computing technology 2012年 第18期4卷 89-96页
作者: Wang, Zhuxiao Peng, Hui Guo, Jing Wu, Kehe Cui, Wenchao Wang, Xiaofeng School of Control and Computer Engineering State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources North China Electric Power University Beijing 102206 China Education Technology Center Beijing International Studies University Beijing 100024 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China School of Control and Computer Engineering Institute of Electric Information Security Engineering Research Center of Power Information North China Electric Power University Beijing 102206 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
As biological systems exhibit adaptation, healing and robustness in the face of changing environmental behavior, this paradigm has actuated research dealing with the concept of self-healing systems, which attempt to h... 详细信息
来源: 评论
Network-based humanoid robot remote interaction with the actual situation Fusion technology
Network-based humanoid robot remote interaction with the act...
收藏 引用
The 2011 International Conference on Advanced Materials and Information technology Processing(AMITP 2011)
作者: YU Guochen WANG Zhiliang XIE Lun XU Jiaming State Key Laboratory of Robotics and System Harbin Institute of Technology School of Computer and Communication Engineering University of Science and Technology Beijing
With the rapid development of network technology, network-based humanoid robot technology will also be open to the development of gradual and orderly progress. This article is based on the C / S architecture, the serv... 详细信息
来源: 评论
Analysis of DRM game control
收藏 引用
Tongxin Xuebao/Journal on Communications 2012年 第SUPPL.1期33卷 282-286页
作者: Ma, Guo-Jun Pei, Qing-Qi Jiang, Xiao-Hong School of Computer Science and Technology Xidian University Xi'an 710071 China The State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710071 China
To overcome the limitations of individual rationality, a game control model was proposed. The controller of game is global rational. To achieve global optimization, the controller chooses strategies according to the c... 详细信息
来源: 评论
Extending CSP to detect motor imagery in a four-class BCI
收藏 引用
Journal of Information and Computational science 2012年 第1期9卷 143-151页
作者: Fang, Yonghui Chen, Minyou Zheng, Xufei Harrison, R.F. State Key Laboratory of Power Transmission Equipment and System Security New Technology Chongqing University Chongqing 400044 China School of Electronic and Information Engineering Southwest University Chongqing 400715 China College of Computer Science Sichuan University Chengdu 610065 China Department of Automatic Control and Systems Engineering University of Sheffield United Kingdom
Brain computer Interface (BCI) provides a direct communication channel from brain to peripheral equipment. Common Spatial Patterns (CSP) is wildly used to extract features for electroencephalogram (EEG). However, basi... 详细信息
来源: 评论
Integrating Hard and Soft Information Sources for D2D Using Controlled Natural Language
Integrating Hard and Soft Information Sources for D2D Using ...
收藏 引用
International Conference on Information Fusion
作者: Alun Preece Diego Pizzocaro Dave Braines David Mott Geeth de Mel Tien Pham School of Computer Science and Informatics Cardiff University Cardiff UK contact Emerging Technology Services IBM United Kingdom Ltd Hursley Park Winchester UK IBM TJ Watson Research Center Hawthorne NY USA US Army Research Laboratory Adelphi MD USA
We introduce an approach to integrating access to hard and soft information sources to provide better exploitation of all available sources in the context of coalition data-todecision (D2D) chains. In terms of hard (s... 详细信息
来源: 评论
Cross-layer detection for black hole attack in wireless network
收藏 引用
Journal of Computational Information systems 2012年 第10期8卷 4101-4109页
作者: Yi, Ping Zhu, Ting Liu, Ning Wu, Yue Li, Jianhua State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing 400044 China School of Information Security Engineering Shanghai Jiao Tong University Shanghai 200240 China School of Mechanical Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Binghamton University Binghamton NY 13905 United States
Mobile ad hoc networks (MANETs) are especially vulnerable to attacks for lacking infrastructure and data transfer using wireless communication, especial for denial of service (DoS) attacks. Black hole and gray hole at... 详细信息
来源: 评论
Fuzzy tracking control design for hypersonic vehicles via T-S model
收藏 引用
science China(Information sciences) 2011年 第3期54卷 521-528页
作者: GAO DaoXiang 1 & SUN ZengQi 2 1 school of technology, Beijing Forestry University, Beijing 100083, China 2 State Key laboratory of Intelligent technology and system, Department of computer science and technology, Tsinghua University, Beijing 100084, China 1. School of Technology Beijing Forestry University Beijing 100083 China2. State Key Laboratory of Intelligent Technology and System Department of Computer Science and Technology Tsinghua University Beijing 100084 China
The main focus of this paper is on designing a T-S fuzzy controller for the hypersonic vehicle. The longitudinal dynamics of the vehicle are studied using time-scale decomposition to reduce the complexity of T-S model... 详细信息
来源: 评论
Feature extraction of motor imagery in BCI with approximate entropy
收藏 引用
Journal of Computational Information systems 2012年 第6期8卷 2485-2491页
作者: Fang, Yonghui Chen, Minyou Zheng, Xufei Harrison, Robert F State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing 400044 China School of Electronic and Information Engineering Southwest University Chongqing 400715 China College of Computer Science Sichuan University Chengdu 610065 China Department of Automatic Control and Systems Engineering University of Sheffield Sheffield United Kingdom
Approximate Entropy (ApEn) is a regularity statistic that quantifies the unpredictability of fluctuations in a time series and can classify complex systems. This study, ApEn is used to extract features from motor imag... 详细信息
来源: 评论
Content-Based Design Patent Image Retrieval Using Structured Features and Multiple Feature Fusion
Content-Based Design Patent Image Retrieval Using Structured...
收藏 引用
International Conference on Image and Graphics (ICIG)
作者: Lei Zhu Hai Jin Ran Zheng Qin Zhang Xia Xie Mingrui Guo Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Traditional design patent verification based on manual comparison is too labor-intensive, time-consuming and subjective to be applied efficiently in practice. Design patent image retrieval system is designed to retrie... 详细信息
来源: 评论
A non-blocking programming framework for pipeline application on multi-core platform
A non-blocking programming framework for pipeline applicatio...
收藏 引用
9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011
作者: Li, Xiaoqiang An, Hong Liu, Gu Han, Wenting Xu, Mu Zhou, Wei Li, Qi School of Computer Science and Technology University of Science and Technology of China Hefei China Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Beijing China
Many applications meet certain programming patterns like pipeline, fork-join, do-all etc. While tools such as OS threads and OpenMP allow programmers only to express task or data parallelism, special support for progr... 详细信息
来源: 评论