咨询与建议

限定检索结果

文献类型

  • 2,380 篇 会议
  • 1,974 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,868 篇 工学
    • 1,961 篇 计算机科学与技术...
    • 1,517 篇 软件工程
    • 590 篇 信息与通信工程
    • 372 篇 控制科学与工程
    • 356 篇 电气工程
    • 318 篇 电子科学与技术(可...
    • 258 篇 生物工程
    • 220 篇 机械工程
    • 204 篇 光学工程
    • 168 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 141 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 90 篇 材料科学与工程(可...
    • 90 篇 网络空间安全
    • 82 篇 安全科学与工程
    • 81 篇 土木工程
    • 77 篇 建筑学
  • 1,444 篇 理学
    • 711 篇 数学
    • 382 篇 物理学
    • 313 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 153 篇 化学
    • 148 篇 系统科学
  • 760 篇 管理学
    • 506 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 198 篇 工商管理
  • 184 篇 医学
    • 150 篇 临床医学
    • 119 篇 基础医学(可授医学...
  • 116 篇 法学
  • 72 篇 经济学
  • 57 篇 农学
  • 22 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 100 篇 feature extracti...
  • 90 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 70 篇 deep learning
  • 67 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 55 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 50 篇 protocols
  • 49 篇 accuracy
  • 48 篇 bandwidth
  • 48 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 128 篇 school of comput...
  • 102 篇 national enginee...
  • 93 篇 hubei province k...
  • 88 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 national enginee...
  • 43 篇 state key labora...
  • 43 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 34 篇 key laboratory o...
  • 34 篇 university of ch...

作者

  • 234 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 25 篇 wang wei
  • 22 篇 li peng
  • 20 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,938 篇 英文
  • 299 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4370 条 记 录,以下是3671-3680 订阅
排序:
On modeling MapReduce with granular computing
On modeling MapReduce with granular computing
收藏 引用
2011 IEEE International Conference on Granular computing, GrC 2011
作者: Zhang, Bo Shi, Zhongzhi Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology China University of Mining and Technology Xuzhou China
Cloud computing focuses on supporting high scalable and high available parallel and distributed computing, based on the infrastructure built on top of large scale clusters which contain a large number of cheap PC serv... 详细信息
来源: 评论
Analyzing and Improving MPI Communication Performance in Overcommitted Virtualized systems
Analyzing and Improving MPI Communication Performance in Ove...
收藏 引用
International Symposium on Modeling, Analysis and Simulation of computer and Telecommunication systems (MASCOTS)
作者: Zhiyuan Shao Qiang Wang Xuejiao Xie Hai Jin Ligang He Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Warwick Coventry UK
Nowadays, it is an important trend in the system domain to use the software-based virtualization technology to build the execution environments (e.g., Clouds) and serve high performance computing (HPC) applications. H... 详细信息
来源: 评论
Network penetration testing scheme description language
Network penetration testing scheme description language
收藏 引用
2011 International Conference on Computational and Information sciences, ICCIS 2011
作者: Dai, Zhiyong Lv, Liangshuang Liang, Xiaoyan Bo, Yang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Penetration testing is widely used to help ensure the security of the network. Traditional penetration testings were manually performed by tester according to scheme, the process is usually complex resulting in that i... 详细信息
来源: 评论
Conflict detection model of access control policy in collaborative environment
Conflict detection model of access control policy in collabo...
收藏 引用
2011 International Conference on Computational and Information sciences, ICCIS 2011
作者: Fan, Beibei Liang, Xiaoyan Luo, Yang Bo, Yang Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Cross-domain interoperation based on role-mapping increasingly becomes a representative research field of collaborative environment. However, in this collaborative environment, there would still be more permission or ... 详细信息
来源: 评论
GPU accelerating for rapid multi-core cache simulation
GPU accelerating for rapid multi-core cache simulation
收藏 引用
25th IEEE International Parallel and Distributed Processing Symposium, Workshops and Phd Forum, IPDPSW 2011
作者: Han, Wan Xiang, Long Gao, Xiaopeng Yi, Li State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
To find the best memory system for emerging workloads, traces are obtained during application's execution, then caches with different configurations are simulated using these traces. Since program traces can be se... 详细信息
来源: 评论
Tissue P systems with cell separation: attacking the partition problem
收藏 引用
science China(Information sciences) 2011年 第2期54卷 293-304页
作者: ZHANG XingYi1, WANG Shuo2, NIU YunYun2 & PAN LinQiang2 1Key Lab of Intelligent computing and Signal Processing of Ministry of Education, school of computer science and technology, Anhui University, Hefei 230039, China 2Image Processing and Intelligent Control Key laboratory of Education Ministry of China, Department of Control science and Engineering, Huazhong University of science and technology, Wuhan 430074, China 1. Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei 230039 China2. Image Processing and Intelligent Control Key Laboratory of Education Ministry of China Department of Control Science and Engineering Huazhong University of Science and Technology Wuhan 430074 China
Tissue P systems are distributed parallel and non-deterministic computing models in the framework of membrane computing, which are inspired by intercellular communication and cooperation between neurons. Recently, cel... 详细信息
来源: 评论
Automatic generation for penetration testing scheme analysis model for network
Automatic generation for penetration testing scheme analysis...
收藏 引用
2011 International Conference on Computational and Information sciences, ICCIS 2011
作者: Shen, Lu Liang, Xiaoyan Bo, Yang Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
The existing penetration testing systems need to rely on the professional skills in the testing process, so they increase the penetration testing of human resources and costs. While it also reduces the efficiency of t... 详细信息
来源: 评论
MUSIZ: A generic framework for music resizing with stretching and cropping  11
MUSIZ: A generic framework for music resizing with stretchin...
收藏 引用
19th ACM International Conference on Multimedia ACM Multimedia 2011, MM'11
作者: Zhang, Liu Wang, Chaokun Ba, Yiyuan Wang, Hao Wang, Jianmin Department of Computer Science and Technology Tsinghua University China School of Software Tsinghua University Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security Ministry of Education China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS China
Content-aware music adaption, i.e. music resizing, in temporal constraints starts drawing attention from multimedia communities because of the need of real-world scenarios, e.g. animation production and radio advertis... 详细信息
来源: 评论
Local shape control of a bivariate rational interpolating surface with mixing conditions
Local shape control of a bivariate rational interpolating su...
收藏 引用
International Symposium on Voronoi Diagrams in science and Engineering
作者: Zhang, Yunfeng Bao, Fangxun Zhang, Caiming Qi, Duan School of Computer Science and Technology Shandong Economic University Shandong Provincial Key Laboratory of Digital Media Technology Jinan China School of Mathematics and System Science Shandong University Jinan China
A bivariate rational interpolation method with parameters was created which was based on function values and partial derivatives, it is called the bivariate rational interpolation with mixing conditions. This paper wi... 详细信息
来源: 评论
Eliminating data invalidation in debugging multiple-clock chips
Eliminating data invalidation in debugging multiple-clock ch...
收藏 引用
作者: Gao, Jianliang Han, Yinhe Li, Xiaowei Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences China School of Information Science and Engineering Central South University China
A critical concern for post-silicon debug is the need to control the chip at clock cycle level. In a single clock chip, run-stop control can be implemented by gating the clock signal using a stop signal. However, data... 详细信息
来源: 评论