咨询与建议

限定检索结果

文献类型

  • 2,342 篇 会议
  • 1,927 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,797 篇 工学
    • 1,906 篇 计算机科学与技术...
    • 1,500 篇 软件工程
    • 580 篇 信息与通信工程
    • 345 篇 电气工程
    • 338 篇 控制科学与工程
    • 310 篇 电子科学与技术(可...
    • 257 篇 生物工程
    • 216 篇 机械工程
    • 203 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 150 篇 仪器科学与技术
    • 141 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 88 篇 网络空间安全
    • 86 篇 材料科学与工程(可...
    • 82 篇 安全科学与工程
    • 78 篇 土木工程
  • 1,428 篇 理学
    • 707 篇 数学
    • 376 篇 物理学
    • 309 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 151 篇 化学
    • 147 篇 系统科学
  • 755 篇 管理学
    • 503 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 195 篇 工商管理
  • 180 篇 医学
    • 146 篇 临床医学
    • 116 篇 基础医学(可授医学...
  • 115 篇 法学
    • 76 篇 社会学
  • 72 篇 经济学
  • 55 篇 农学
  • 21 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 94 篇 feature extracti...
  • 89 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 68 篇 deep learning
  • 65 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 53 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 49 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 accuracy
  • 47 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 121 篇 school of comput...
  • 99 篇 national enginee...
  • 91 篇 hubei province k...
  • 86 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 services computi...
  • 43 篇 state key labora...
  • 39 篇 huazhong univers...
  • 39 篇 hubei province k...
  • 39 篇 national enginee...
  • 39 篇 school of cyber ...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 school of comput...
  • 34 篇 key laboratory o...
  • 33 篇 school of comput...
  • 33 篇 university of ch...

作者

  • 235 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 niyato dusit
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 song wu
  • 26 篇 shen linlin
  • 24 篇 wang wei
  • 22 篇 li peng
  • 22 篇 hu shengshan
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 liu yang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,966 篇 英文
  • 186 篇 其他
  • 139 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4285 条 记 录,以下是3881-3890 订阅
排序:
Robust Control for Discrete-Time Networked Control systems
Robust Control for Discrete-Time Networked Control Systems
收藏 引用
The 8th World Congress on Intelligent Control and Automation(第八届智能控制与自动化世界大会 WCICA 2010)
作者: Dongxiao Wu Jun Wu Sheng Chen State Key Laboratory of Industrial Control Technology Institute of Cyber-System and Control Zhejiang School of Electronics and Computer Science University of Southampton Highfield Southampton SO17 1BJ
This paper considers analysis and synthesis of discrete-time networked control systems (NCSs), where the plant has additive uncertainty and the controller is updated with the sensor information at stochastic time inte... 详细信息
来源: 评论
The Transition Between Sharp and Rounded Features and the Manipulation of Incompatible Boundary in Filling n-sided Holes
The Transition Between Sharp and Rounded Features and the Ma...
收藏 引用
International Conference on Shape Modeling and Applications
作者: Kan-Le Shi Jun-Hai Yong Peng Liu Jia-Guang Sun Jean-Claude Paul Key Laboratory of Information System Security Ministry of Education of China Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China School of Software Tsinghua University Beijing China Tsinghua University Beijing Beijing CN INRIA France
N-sided hole filling plays an important role in vertex blending. Piegl and Tiller presented an algorithm to interpolate the given boundary and cross-boundary derivatives in B-spline form. To deal with the incompatible... 详细信息
来源: 评论
Authenticated Asymmetric Group Key Agreement Protocol and Its Application
Authenticated Asymmetric Group Key Agreement Protocol and It...
收藏 引用
IEEE International Conference on Communications
作者: Lei Zhang Qianhong Wu Bo Qin Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain School of Computer Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education Wuhan University of China China School of Science Department of Maths Xi''an University of Technology China
A recent primitive known as asymmetric group key agreement allows a group of users to negotiate a common encryption key which is accessible to any entities while each user holds her respective secret decryption key. T... 详细信息
来源: 评论
Performance evaluation of Independent Component Analysis in an iris recognition system
Performance evaluation of Independent Component Analysis in ...
收藏 引用
ACS/IEEE International Conference on computer systems and Applications
作者: Imen Bouraoui Salim Chitroub Ahmed Bouridane Signal and Image Processing Laboratory Electronics and Computer Science Faculty University of Sciences and Technology Houari Boumediene Algiers Algeria School of Computing Engineering and Information Sciences Northumbria University Newcastle-upon-Tyne UK
The overall performance of any iris recognition system relies on the performance of its components, which are preprocessing, feature extraction and matching. Feature extraction is the important step of such recognitio... 详细信息
来源: 评论
Facial expression synthesis based on emotion dimensions for affective talking avatar
收藏 引用
Smart Innovation, systems and Technologies 2010年 第1期2010卷 109-132页
作者: Zhang, Shen Wu, Zhiyong Meng, Helen M. Cai, Lianhong Key Laboratory of Pervasive Computing Ministry of Education Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084 China Tsinghua-CUHK Joint Research Center for Media Sciences Technologies and Systems Graduate School at Shenzhen Tsinghua University Shenzhen China Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong HKSAR Hong Kong
Facial expression is one of the most expressive ways for human beings to deliver their emotion, intention, and other nonverbal messages in face to face communications. In this chapter, a layered parametric framework i... 详细信息
来源: 评论
Multiple-Pursuer Cooperative Multiple-Evader Games based on auction mechanism
收藏 引用
Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of technology 2010年 第SUPPL. 2期42卷 160-164页
作者: Cai, Ze-Su Hong, Bing-Rong Sun, Li-Ning State Key Laboratory Robotics and System Harbin Institute of Technology Harbin 150001 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
This paper mainly discusses Multiple-Pursuer Cooperative Multiple-Evader Games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. The traditional Contract Net... 详细信息
来源: 评论
Selected Crosstalk Avoidance Code for Reliable Network-on-Chip
收藏 引用
Journal of computer science & technology 2009年 第6期24卷 1074-1085页
作者: 张颖 李华伟 李晓维 Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Graduate School of the Chinese Academy of Sciences
With the shrink of the technology into nanometer scale, network-on-chip (NOC) has become a reasonable solution for connecting plenty of IP blocks on a single chip. But it suffers from both crosstalk effects and sing... 详细信息
来源: 评论
Internal model control for hysteretic nonlinear systems based on support vector regression
Internal model control for hysteretic nonlinear systems base...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Wenguang Zhang Jianqin Mao Yanhua Ma Beijing Key Laboratory of Measurement and Control Technology and System for Industrial Process Control & Computer Engineering School North China Electric Power University Beijing China School of Automation Science and Electrical Engineering Beijing Aeronautics and Astronautics University Beijing China
Aim at the hysteretic nonlinearity characteristic of the giant magnetostrictive actuator in control, an internal model control method based on support vector regression is presented in this paper. Its models are built... 详细信息
来源: 评论
Availability based trust model of clusters for MANET
Availability based trust model of clusters for MANET
收藏 引用
International Conference on services systems and services Management, ICSSSM
作者: Xibin Zhao Zhiyang You Zhifeng Zhao Danning Chen Feng Peng Key Laboratory of Information System Security of Ministry of Education School of Software Tsinghua University China Department of Computer Science and Technology Tsinghua University China Zhenjiang Watercraft College Department of Computer Science Zhenjiang Watercraft College China School of Software Tsinghua University China China Minzu Securities Company Limited China
MANET (Mobile ad hoc network) is vulnerable to security attack due to its characteristics such as open network environment, lack of centralized control, dynamic topology, and so on, while traditional security mechanis... 详细信息
来源: 评论
The generation of transport networks based on DLA model in an artificial society model with characteristics of geographical systems
The generation of transport networks based on DLA model in a...
收藏 引用
International Conference on computer and Automation Engineering, ICCAE
作者: Lihu Pan Heqing Huang School of Computer Taiyuan University of Science and Technology Taiyuan China State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources Research Chinese Academy and Sciences Beijing China Chinese Academy of Sciences China
The artificial society modeling approach for studying the behavior of complex systems has gained wide applications in recent years. The integration of this approach with geographical theories provides an inter-discipl... 详细信息
来源: 评论