咨询与建议

限定检索结果

文献类型

  • 2,380 篇 会议
  • 1,974 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,868 篇 工学
    • 1,961 篇 计算机科学与技术...
    • 1,517 篇 软件工程
    • 590 篇 信息与通信工程
    • 372 篇 控制科学与工程
    • 356 篇 电气工程
    • 318 篇 电子科学与技术(可...
    • 258 篇 生物工程
    • 220 篇 机械工程
    • 204 篇 光学工程
    • 168 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 141 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 90 篇 材料科学与工程(可...
    • 90 篇 网络空间安全
    • 82 篇 安全科学与工程
    • 81 篇 土木工程
    • 77 篇 建筑学
  • 1,444 篇 理学
    • 711 篇 数学
    • 382 篇 物理学
    • 313 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 153 篇 化学
    • 148 篇 系统科学
  • 760 篇 管理学
    • 506 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 198 篇 工商管理
  • 184 篇 医学
    • 150 篇 临床医学
    • 119 篇 基础医学(可授医学...
  • 116 篇 法学
  • 72 篇 经济学
  • 57 篇 农学
  • 22 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 100 篇 feature extracti...
  • 90 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 70 篇 deep learning
  • 67 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 55 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 50 篇 protocols
  • 49 篇 accuracy
  • 48 篇 bandwidth
  • 48 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 128 篇 school of comput...
  • 102 篇 national enginee...
  • 93 篇 hubei province k...
  • 88 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 national enginee...
  • 43 篇 state key labora...
  • 43 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 34 篇 key laboratory o...
  • 34 篇 university of ch...

作者

  • 234 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 25 篇 wang wei
  • 22 篇 li peng
  • 20 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,938 篇 英文
  • 299 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4370 条 记 录,以下是3781-3790 订阅
排序:
Compatibility of photographed images with touch-based fingerprint verification software
Compatibility of photographed images with touch-based finger...
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Fengling Han Jiankun Hu Mohammed Alkhathami Kai Xi State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University China School of Computer Science & IT Royal Melbourne Institute of Technology Melbourne VIC Australia School of Engineering and Information Technology University of New South Wales Canberra ACT Australia
In this paper, the compatibility of fingerprint images captured with mobile cameras (touch-less) with existing touch-based commercial fingerprint verification software VeriFinger SDK is investigated. The touch-less fi... 详细信息
来源: 评论
Modeling and analysis of dual-arm cluster tools for wafer fabrication with revisiting
Modeling and analysis of dual-arm cluster tools for wafer fa...
收藏 引用
IEEE International Conference on Automation science and Engineering (CASE)
作者: Yan Qiao NaiQi Wu MengChu Zhou Department of Industrial Engineering School of Mechatronics Engineering Guangdong University of Technology Guangzhou China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
Some wafer fabrication processes are repeated processes, e.g. atomic layer deposition (ALD) process. For such processes, the wafers need to visit some processing modules for a number of times, which complicates the cy... 详细信息
来源: 评论
Case-based safety assessment of thermal power plants: A framework
Case-based safety assessment of thermal power plants: A fram...
收藏 引用
2011 International Conference on Business Management and Electronic Information, BMEI 2011 - 2011 International Conference on Supernetworks and system Management, ICSSM 2011
作者: Liang, Changyong Gu, Dongxiao Bichindaritz, Isabelle Zuo, Chunrong Cheng, Fei School of Management Hefei University of Technology Hefei Anhui 230009 China Key Laboratory of Process Optimization Intelligent Decision-making of Ministry of Education of China Hefei Anhui 230009 China Institute of Technology University of Washington Tacoma WA 98402 United States Department of Computer Science University of Illinois at Chicago Chicago IL 60607 United States Research Center of Intelligent Decision Making Information System Technologies of Ministry of Education of China Hefei Anhui 230009 China
Security assessment of Thermal Power Plants (TPPs) is one of the important means to guarantee the safety of production in thermal power production enterprises. Essentially, the evaluation of power plant systems relies... 详细信息
来源: 评论
PopCap: popularity oriented proxy caching for peer-assisted Internet video-on-demand streaming services
收藏 引用
中国计算机科学前沿 2010年 第4期4卷 500-515页
作者: Ye TIAN Bangchuan LIU Zhenhua HE Anhui Province Key Laboratory on High Performance Computing and Application School of Computer Science and TechnologyUniversity of Science and Technology of ChinaHefei 230027China
With the success of lnternet video-on-demand (VoD) streaming services, the bandwidth required and the financial cost incurred by the host of the video server becoming extremely large. Peer-to-peer (P2P) networks and p... 详细信息
来源: 评论
Fusion of multispectral palmprint images for automatic person identification
Fusion of multispectral palmprint images for automatic perso...
收藏 引用
Electronics, Communications and Photonics Conference (SIECPC), Saudi International
作者: Abdallah Meraoumia Salim Chitroub Ahmed Bouridane Signal and Image Processing Laboratory Electronics and Computer Science Faculty Telecommunication Department University of Science and Technology of Houari Boumedienne Algiers Algeria School of Computing Engineering and Information Sciences Northumbria University Newcastle-upon-Tyne UK
Reliability and accuracy in personal identification system is a dominant concern to the security world. Biometric has gained much attention in this subject recently. Many types of personal identification systems have ... 详细信息
来源: 评论
Design of a Robot Cloud Center
Design of a Robot Cloud Center
收藏 引用
International Symposium on Autonomous Decentralized systems (ISADAS)
作者: Zhihui Du Weiqiang Yang Yinong Chen Xin Sun Xiaoying Wang Chen Xu Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing China School of Software and Microelectronics Peking University Beijing China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ USA International School Beijing University of Posts and Telecommunications Beijing China
Service-oriented architecture and cloud computing have become the prevalent computing paradigm. In this paradigm, computing resources can be accessed like other utility services available in today's society. In th... 详细信息
来源: 评论
Trainbow: a new trusted virtual machine based platform
收藏 引用
中国高等学校学术文摘·计算机科学 2010年 第1期4卷 47-64页
作者: Yuzhong SUN Yongbing HUANG Yunwei GAO Haifeng FANG Ying SONG Lei DU Kai ZHANG Hongyong ZANG Yaqiong LI Yajun YANG Ran AO Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049China Key Laboratory of Computer System and Architecture Institute of Computing TechnologyChinese Academy of Sciences Beijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing... 详细信息
来源: 评论
A no-reference image quality evaluation based on power spectrum
A no-reference image quality evaluation based on power spect...
收藏 引用
3DTV Conference
作者: Yan Zhang Ping An Qiuwen Zhang Liquan Shen Zhaoyang Zhang School of Communication and Information Engineering Shanghai University China Department of Computer Science and Technology Anhui University of Finance and Economics China Key Laboratory of Advanced Displays and System Application Ministry of Education China
No-reference quality evaluation is more difficult because it does not refer to any image. However, in some cases, like virtual view images, can not find the reference image, no-reference method had to be used. With th... 详细信息
来源: 评论
Improved multi-view depth estimation for view synthesis in 3D video coding
Improved multi-view depth estimation for view synthesis in 3...
收藏 引用
3DTV Conference
作者: Qiuwen Zhang Ping An Yan Zhang Liquan Shen Zhaoyang Zhang School of Communication and Information Engineering Shanghai University China Key Laboratory of Advanced Displays and System Application Ministry of Education China Department of Computer Science and Technology Anhui University of Finance and Economics China
Multi-view depth estimation is an important part in the virtual view synthesis and depth map coding within the 3DV/FTV applications. However, existing depth estimation methods generally have difficulty to generate goo... 详细信息
来源: 评论
Efficient rendering distortion estimation for depth map compression
Efficient rendering distortion estimation for depth map comp...
收藏 引用
IEEE International Conference on Image Processing
作者: Qiuwen Zhang Ping An Yan Zhang Zhaoyang Zhang School of Communication and Information Engineering Shanghai University China Key Laboratory of Advanced Displays and System Application Ministry of Education China Department of Computer Science and Technology Anhui University of Finance and Economics China
A depth map represents three-dimensional (3D) scene information and is used to synthesize virtual views in 3D video. Since the quality of synthesized virtual views highly depends on the quality of depth map, efficient... 详细信息
来源: 评论