咨询与建议

限定检索结果

文献类型

  • 2,342 篇 会议
  • 1,927 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,797 篇 工学
    • 1,906 篇 计算机科学与技术...
    • 1,500 篇 软件工程
    • 580 篇 信息与通信工程
    • 345 篇 电气工程
    • 338 篇 控制科学与工程
    • 310 篇 电子科学与技术(可...
    • 257 篇 生物工程
    • 216 篇 机械工程
    • 203 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 150 篇 仪器科学与技术
    • 141 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 88 篇 网络空间安全
    • 86 篇 材料科学与工程(可...
    • 82 篇 安全科学与工程
    • 78 篇 土木工程
  • 1,428 篇 理学
    • 707 篇 数学
    • 376 篇 物理学
    • 309 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 151 篇 化学
    • 147 篇 系统科学
  • 755 篇 管理学
    • 503 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 195 篇 工商管理
  • 180 篇 医学
    • 146 篇 临床医学
    • 116 篇 基础医学(可授医学...
  • 115 篇 法学
    • 76 篇 社会学
  • 72 篇 经济学
  • 55 篇 农学
  • 21 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 94 篇 feature extracti...
  • 89 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 68 篇 deep learning
  • 65 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 53 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 49 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 accuracy
  • 47 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 121 篇 school of comput...
  • 99 篇 national enginee...
  • 91 篇 hubei province k...
  • 86 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 services computi...
  • 43 篇 state key labora...
  • 39 篇 huazhong univers...
  • 39 篇 hubei province k...
  • 39 篇 national enginee...
  • 39 篇 school of cyber ...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 school of comput...
  • 34 篇 key laboratory o...
  • 33 篇 school of comput...
  • 33 篇 university of ch...

作者

  • 235 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 niyato dusit
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 song wu
  • 26 篇 shen linlin
  • 24 篇 wang wei
  • 22 篇 li peng
  • 22 篇 hu shengshan
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 liu yang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,966 篇 英文
  • 186 篇 其他
  • 139 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4285 条 记 录,以下是3931-3940 订阅
排序:
Seamless virtual machine live migration on network security enhanced hypervisor
Seamless virtual machine live migration on network security ...
收藏 引用
2009 2nd IEEE International Conference on Broadband Network and Multimedia technology, IEEE IC-BNMT2009
作者: Xianqin, Chen Han, Wan Sumei, Wang Xiang, Long State Key Laboratory of Virtual Reality Technology System School of Computer Science and Technology Beijing University of Aeronautics and Astronautics Beijing 100191 China
Since the virtual network traffic is invisible outside the hypervisor, it is impossible for traditional network-base security devices to harness the attacks happened in virtual computing environment. Industry and acad... 详细信息
来源: 评论
GPRS based guard robot alarm system design
GPRS based guard robot alarm system design
收藏 引用
作者: Li, Maohai Sun, Lining Huang, Qingcheng Cai, Zesu Piao, Songhao State Key Laboratory of Robotics and System Harbin Institute of Technology Harbin 150001 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
This paper presents a practical approach to design guard robot alarm system using GPRS technology. GPRS offers an interesting communications infrastructure for remotely accessing, controlling and interacting with robo... 详细信息
来源: 评论
Accelerate cache simulation with generic GPU
Accelerate cache simulation with generic GPU
收藏 引用
IEEE 9th International Conference on computer and Information technology, CIT 2009
作者: Han, Wan Xiaopeng, Gao Zhiqiang, Wang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Trace-driven cache simulation is the most widely used method to evaluate different cache structures. Several techniques have been proposed to reduce the simulation time of sequential trace-driven simulation. An obviou... 详细信息
来源: 评论
Equality detection for linear arithmetic constraints
收藏 引用
Journal of Zhejiang University-science A(Applied Physics & Engineering) 2009年 第12期10卷 1784-1789页
作者: Li LI Kai-duo HE Ming GU Xiao-yu SONG Department of Computer Science and Technology Tsinghua University Beijing 100084 China School of Software Tsinghua University Beijing 100084 China MOE Key Laboratory for Information System Security Beijing 100084 China Department of Electrical and Computer Engineering Portland State University Oregon 97207 USA
Satisfiability modulo theories (SMT) play a key role in verification applications. A crucial SMT problem is to combine separate theory solvers for the union of theories. In previous work, the simplex method is used to... 详细信息
来源: 评论
Event-Driven Scheduling for P2P VoD
Event-Driven Scheduling for P2P VoD
收藏 引用
ChinaGrid Annual Conference (ChinaGrid)
作者: Bin Cheng Hai Jin Xiaofei Liao Bo Li Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computer Science Hong Kong University of Science and Technology Hong Kong China
Scheduling is essential in peer-to-peer (P2P) video-on-demand (VoD) applications to obtain desirable user experience and high sharing efficiency. Existing systems and proposals largely utilize scheduling mechanisms th... 详细信息
来源: 评论
A new clustering strategy in ambulatory electrocardiogram waveform
A new clustering strategy in ambulatory electrocardiogram wa...
收藏 引用
2009 International Conference on Information Engineering and computer science, ICIECS 2009
作者: Yu, Tian Zheng, Gang School of Computer and Communication Engineering Tianjin University of Technology China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 Tianjin China
Ambulatory electrocardiogram is used to record about 24 hours electrocardiogram waveform. The purpose is to find out the conspicuous variation in the recording data. A new strategy used to cluster the electrocardiogra... 详细信息
来源: 评论
Worm Containment in Peer-to-Peer Networks
Worm Containment in Peer-to-Peer Networks
收藏 引用
International Conference on Scalable computing and Communications;International Conference on Embedded computing, SCALCOM-EMBEDDEDCOM
作者: Sirui Yang Hai Jin Bo Li Xiaofei Liao Hong Yao Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Hong Kong University of Science and Technology Hong Kong China
Recently there have been increasing attentions on the security aspects in Peer-to-Peer (P2P) networks, especially with respect to worm epidemics. However, existing worm containment mechanisms can be largely ineffectiv... 详细信息
来源: 评论
SimRC: An architecture modeling and simulator generation tool for reconfigurable computing development
SimRC: An architecture modeling and simulator generation too...
收藏 引用
IASTED International Conference on Modelling, Simulation, and Identification, MSI 2009
作者: Liu, Yuexiao Gao, Xiaopeng Wu, Xingbo Lv, Liangshuang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing 100191 China
A modeling and simulation tool called SimRC is described in this paper. It is dedicated to improve the efficiency of reconfigurable computing development. In SimRC, a new architecture description language is designed ... 详细信息
来源: 评论
A preliminary study on why using the nonself detector set for anomaly detection in artificial immune systems
A preliminary study on why using the nonself detector set fo...
收藏 引用
2009 International Conference on Computational Intelligence and Security, CIS 2009
作者: Xu, Baoliang Luo, Wenjian Wang, Xufa Nature Inspired Computation and Applications Laboratory School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei 230027 Anhui China
In artificial immune systems, the detectors in the nonself space are often adopted to detect anomaly changes, such as the negative selection algorithm and its improvements. Since the detectors in the self space can al... 详细信息
来源: 评论
Evaluating dynamic performance of VMM in server consolidation
Evaluating dynamic performance of VMM in server consolidatio...
收藏 引用
IEEE Symposium on Web Society, SWS
作者: Pingpeng Yuan Yuhua Huang Hai Jin Wenzhi Cao Service Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
With the IT development, computer is more powerful and can accommodate more virtual servers than ever. Due to users' random requests, it is not economical to start all virtual servers beforehand. One reasonable ap... 详细信息
来源: 评论