咨询与建议

限定检索结果

文献类型

  • 2,342 篇 会议
  • 1,927 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,797 篇 工学
    • 1,906 篇 计算机科学与技术...
    • 1,500 篇 软件工程
    • 580 篇 信息与通信工程
    • 345 篇 电气工程
    • 338 篇 控制科学与工程
    • 310 篇 电子科学与技术(可...
    • 257 篇 生物工程
    • 216 篇 机械工程
    • 203 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 150 篇 仪器科学与技术
    • 141 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 88 篇 网络空间安全
    • 86 篇 材料科学与工程(可...
    • 82 篇 安全科学与工程
    • 78 篇 土木工程
  • 1,428 篇 理学
    • 707 篇 数学
    • 376 篇 物理学
    • 309 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 151 篇 化学
    • 147 篇 系统科学
  • 755 篇 管理学
    • 503 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 195 篇 工商管理
  • 180 篇 医学
    • 146 篇 临床医学
    • 116 篇 基础医学(可授医学...
  • 115 篇 法学
    • 76 篇 社会学
  • 72 篇 经济学
  • 55 篇 农学
  • 21 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 94 篇 feature extracti...
  • 89 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 68 篇 deep learning
  • 65 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 53 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 49 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 accuracy
  • 47 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 121 篇 school of comput...
  • 99 篇 national enginee...
  • 91 篇 hubei province k...
  • 86 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 services computi...
  • 43 篇 state key labora...
  • 39 篇 huazhong univers...
  • 39 篇 hubei province k...
  • 39 篇 national enginee...
  • 39 篇 school of cyber ...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 school of comput...
  • 34 篇 key laboratory o...
  • 33 篇 school of comput...
  • 33 篇 university of ch...

作者

  • 235 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 niyato dusit
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 song wu
  • 26 篇 shen linlin
  • 24 篇 wang wei
  • 22 篇 li peng
  • 22 篇 hu shengshan
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 liu yang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,966 篇 英文
  • 186 篇 其他
  • 139 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4285 条 记 录,以下是3901-3910 订阅
排序:
Robustify a job-shop schedule according to the payload of the machine
Robustify a job-shop schedule according to the payload of th...
收藏 引用
International Conference on services systems and services Management, ICSSSM
作者: Zhiyang You Zhigang Sun Xibin Zhao Daxin Zang Department of Computer Science and Technology Tsinghua University Beijing China School of Software Tsinghua University Beijing China Key Laboratory of Information System Security Ministry of Education School of Software Tsinghua University Beijing China Software Engineering Institute Beijing Aeronautics and Astronautics University Beijing China
Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimiza... 详细信息
来源: 评论
A collaborative framework for privacy protection in online social networks
A collaborative framework for privacy protection in online s...
收藏 引用
International Conference on Collaborative computing: Networking, Applications and Worksharing (CollaborateCom)
作者: Yan Zhu Zexing Hu Huaixi Wang Hongxin Hu Gail-Joon Ahn Key Laboratory of Network and Software Security Assurance Ministry of Education Peking University China Institute of Computer Science and Technology Peking University Beijing China School of Mathematical Sciences Peking University Beijing China Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University Tempe AZ USA
With the wide use of online social networks (OSNs), the problem of data privacy has attracted much attention. Several approaches have been proposed to address this issue. One of privacy management approaches for OSN l... 详细信息
来源: 评论
PARBLO:Page-Allocation-Based DRAM Row Buffer Locality Optimization
收藏 引用
Journal of computer science & technology 2009年 第6期24卷 1086-1097页
作者: 米伟 冯晓兵 贾耀仓 陈莉 薛京灵 Key Laboratory of Computer System and Architecture Institution of Computing Technology Chinese Academy of Sciences Graduate University of Chinese Academy of Sciences Programming Languages and Compilers Group School of Computer Science and Engineering University of New South Wales
DRAM row buffer conflicts can increase memory access latency significantly. This paper presents a new pageallocation-based optimization that works seamlessly together with some existing hardware and software optimizat... 详细信息
来源: 评论
QoS Requirement Generation and Algorithm Selection for Composite Service Based on Reference Vector
收藏 引用
Journal of computer science & technology 2009年 第2期24卷 357-372页
作者: 吴邦欲 支志雄 徐世杰 顾明 孙家广 School of Software Tsinghua University Key Laboratory for Information System Security Ministry of Education of China Department of Computer Science and Technology Tsinghua University
Under SOA (Service-Oriented Architecture), composite service is formed by aggregating multiple component services together in a given workflow. One key criterion of this research topic is QoS composition. Most work ... 详细信息
来源: 评论
Risk analysis of physical protection system based on evidence theory
收藏 引用
Journal of Information and Computational science 2010年 第13期7卷 2871-2878页
作者: Xu, Peida Su, Xiaoyan Wu, Jiyi Sun, Xiaohong Zhang, Yajuan Deng, Yong College of Computer and Information Sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Zhejiang 310036 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China Key Subject Laboratory of National defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai 200240 China
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t... 详细信息
来源: 评论
Co-optimization of Dynamic/Static Test PoWer in Scan Test
收藏 引用
电子学报(英文版) 2009年 第1期18卷 54-58页
作者: WANG Wei HAN Yinhe LI Xiaowei FANG Fang School of Computer and Information Hefei University of Technology Hefei 230009 China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China School of Management Hefei University of Technology Hefei 230009 China
Low-power design has become a challenge of test. We propose an effective low-power scan architecture named PowerSluice to minimize power consumption during scan test, which is based on scan chain modifications. On one... 详细信息
来源: 评论
Client visor: Leverage COTS OS functionalities for power management in virtualized desktop environment  09
Client visor: Leverage COTS OS functionalities for power man...
收藏 引用
2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE'09
作者: Huacai, Chen Hai, Jin Zhiyuan, Shao Ke, Yu Kun, Tian Services Computing Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China Intel Corporation Shanghai 200241 China
As an emerging trend, virtualization is more and more widely used in today's computing world. But, the introduction of virtual machines bring trouble for the power management (PM for short), since the operating sy... 详细信息
来源: 评论
A bipartite model for load balancing in grid computing environments
收藏 引用
中国高等学校学术文摘·计算机科学 2009年 第4期3卷 503-523页
作者: Wenchao JIANG Matthias BAUMGARTEN Yanhong ZHOU Hai JIN School of Computer Science and Technology Hubei bioinformatics and molecular imaging key laboratoryHuazhong University of Science and TechnologyWuhan 430074China Information Engineering College of Faculty of Computing and Engineering University of UlsterShore RoadNewtownabbey BT37 0QBUK School of Computer Science and Technology Hubei bioinformatics and molecular imaging key laboratoryHuazhong University of Science and TechnologyWuhan 430074China
In this paper,a bipartite model for load balanchag (LB) in grid computing environments,called Transverse viewpoint-based Bi-Tier model (TBT),is *** can efficiently eliminate topology mismatching between overlay-and ph... 详细信息
来源: 评论
ClientVisor: Leverage COTS OS functionalities for power management in virtualized desktop environment
ClientVisor: Leverage COTS OS functionalities for power mana...
收藏 引用
作者: Chen, Huacai Jin, Hai Shao, Zhiyuan Hu, Kan Yu, Ke Tian, Kun Services Computing Technology and System Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China Intel Corporation Shanghai 200241 China
As an emerging trend, virtualization is more and more widely used in today's computing world. But, the introduction of virtual machines bring trouble for the power management (PM for short), since the operating sy... 详细信息
来源: 评论
Evolutionary Games on Weighted Newman-Watts Small-World Networks
收藏 引用
Chinese Physics Letters 2009年 第5期26卷 255-258页
作者: 杜文博 曹先彬 赵琳 周宏 Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei 230026 School of Life Sciences University of Science and Technology of China Hefei 230026
We investigate the evolutionary prisoner's dilemma game (PDG) on weighted Newman-Watts (NW) networks. In weighted NW networks, the link weight ωij is assigned to the link between the nodes i and j as: ωij = (... 详细信息
来源: 评论