咨询与建议

限定检索结果

文献类型

  • 2,342 篇 会议
  • 1,927 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,797 篇 工学
    • 1,906 篇 计算机科学与技术...
    • 1,500 篇 软件工程
    • 580 篇 信息与通信工程
    • 345 篇 电气工程
    • 338 篇 控制科学与工程
    • 310 篇 电子科学与技术(可...
    • 257 篇 生物工程
    • 216 篇 机械工程
    • 203 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 150 篇 仪器科学与技术
    • 141 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 88 篇 网络空间安全
    • 86 篇 材料科学与工程(可...
    • 82 篇 安全科学与工程
    • 78 篇 土木工程
  • 1,428 篇 理学
    • 707 篇 数学
    • 376 篇 物理学
    • 309 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 151 篇 化学
    • 147 篇 系统科学
  • 755 篇 管理学
    • 503 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 195 篇 工商管理
  • 180 篇 医学
    • 146 篇 临床医学
    • 116 篇 基础医学(可授医学...
  • 115 篇 法学
    • 76 篇 社会学
  • 72 篇 经济学
  • 55 篇 农学
  • 21 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 94 篇 feature extracti...
  • 89 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 68 篇 deep learning
  • 65 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 53 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 49 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 accuracy
  • 47 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 121 篇 school of comput...
  • 99 篇 national enginee...
  • 91 篇 hubei province k...
  • 86 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 services computi...
  • 43 篇 state key labora...
  • 39 篇 huazhong univers...
  • 39 篇 hubei province k...
  • 39 篇 national enginee...
  • 39 篇 school of cyber ...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 school of comput...
  • 34 篇 key laboratory o...
  • 33 篇 school of comput...
  • 33 篇 university of ch...

作者

  • 235 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 niyato dusit
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 song wu
  • 26 篇 shen linlin
  • 24 篇 wang wei
  • 22 篇 li peng
  • 22 篇 hu shengshan
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 liu yang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,966 篇 英文
  • 186 篇 其他
  • 139 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4285 条 记 录,以下是3981-3990 订阅
排序:
Using GPU to Accelerate Cache Simulation
Using GPU to Accelerate Cache Simulation
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Wan Han Gao Xiaopeng Wang Zhiqiang Li Yi State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beijing Aeronautics and Astronautics University Beijing China
Caches play a major role in the performance of high speed computer systems. Trace driven simulator is the most widely used method to evaluate cache architectures. However, as the cache design moves to more complicated... 详细信息
来源: 评论
Conflict driven scan chain configuration for high transition fault coverage and low test power
Conflict driven scan chain configuration for high transition...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: Zhen Chen Boxue Yin Dong Xiang Department of Computer Science and Technology Tsinghua University Beijing China School of software Key Laboratory of Information System Security Ministry of Education Tsinghua National Laboratory of Information Science and Technology Tsinghua University Beijing China School of software Key Laboratory of Information System Security Ministry of Education Tsinghua National Laboratory of Information Science and Technology Tsinghua University Beijing China
Two conflict-driven schemes and a new scan architecture based on them are presented to improve fault coverage of transition fault. They make full use of the advantages of broadside, skewed-load and enhanced scan testi... 详细信息
来源: 评论
With an application to workflow management based on Colored Petri net
With an application to workflow management based on Colored ...
收藏 引用
IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID
作者: Daoxun Xia Xiaoyao Xie Yang Xu Key Laboratory of Information and Computing Science of Guizhou Province Guizhou Normal University Guiyang China School of Computer Science and Technology Guizhou University Guiyang China
Workflow management promises a new solution to an ancient problem: monitoring, controlling and supporting business processes. What is new about workflow management is the explicit representation of the business proces... 详细信息
来源: 评论
Web GIS server solutions using open-source software
Web GIS server solutions using open-source software
收藏 引用
IEEE International Workshop on Open-source Software for Scientific Computation (OSSC)
作者: Daoxun Xia Xiaoyao Xie Yang Xu Key Laboratory of Information and Computing Science of Guizhou Province Guizhou Normal University Guiyang China School of Computer Science and Technology Guizhou University Guiyang China
Web GIS has become an indispensable tool for managing, analyzing and decision making by seamlessly combining both spatial and non-spatial data. Open-source software has the advantages of low cost, high stability and s... 详细信息
来源: 评论
Research and design on LVS cluster system
Research and design on LVS cluster system
收藏 引用
IEEE International Workshop on Open-source Software for Scientific Computation (OSSC)
作者: Yang Xu Xiaoyao Xie Daoxun Xia Key Laboratory of Information and Computing Science of Guizhou Province Guizhou Normal University Guiyang China School of Computer Science and Technology Guizhou University Guiyang China
With the explosive growth of the network, the workload on the servers is increasing rapidly so that servers will be easily overloaded for a short time. Linux virtual server (LVS) project which is an open source projec... 详细信息
来源: 评论
Model Checking Needham-Schroeder Security Protocol Based on Temporal Logic of Knowledge
Model Checking Needham-Schroeder Security Protocol Based on ...
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted computing, NSWCTC
作者: Xiangyu Luo Yan Chen Ming Gu Lijun Wu School of Software Key Laboratory of Security for Information System of Ministry of Education Tsinghua University Beijing China Department of Computer Science Guilin University of Electronic Technology Guilin China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the... 详细信息
来源: 评论
A Security Model for VoIP Steganography
A Security Model for VoIP Steganography
收藏 引用
The First International Conference on Multimedia Information Networking and Security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Zhiwei Yu Clark Thomborson Junning Fu Jianmin Wang Chaokun Wang Department of Computer Science and Technology Tsinghua University Department of Computer Science The University of Auckland New Zealand School of Software Tsinghua University Key Laboratory for Information System Security Ministry of
In 2005, an extensive taxonomy of threats for VoIP was published by a prominent industry group. Strangely, this taxonomy does not identify stegocommunication as a threat, even though many steganographic channels have ... 详细信息
来源: 评论
Voltage control scheme in distribution network with double feed induction generator wind farm
收藏 引用
WSEAS Transactions on Circuits and systems 2009年 第8期8卷 709-718页
作者: Zhao, Jingjing Li, Xin Hao, Jutao State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University 400044 Chongqing China School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology 200093 Shanghai China
This paper presents the particle swarm optimization (PSO) for reactive power and voltage control (Volt/Var Control) in distribution system considering DFIG wind farm. In this paper, the reactive power output of DFIG w... 详细信息
来源: 评论
The construction of urban and rural integrative cadastral management information system
The construction of urban and rural integrative cadastral ma...
收藏 引用
2009 International Workshop on Intelligent systems and Applications, ISA 2009
作者: Zhong, Mei Xu, De-Jun Du, Qing-Yun Ye, Zhiwei School of Resource and Environment Science Wuhan University 129 Luoyu Road Wuhan 430079 China Key Laboratory Geographic Information System Ministry of Education Wuhan University 129 Luoyu Road Wuhan 430079 China Bureau of Land Resource of Linhai 299 Renming Road Zhejiang Linhai 31700 China School of Computer Science Hubei University of Technology Wuhan 430070 China
Based on the present condition and developing trend of cadastral management of Linhai, The paper explores on the construction status of the Cadastral Management Information system on Integration of Urban and Rural are... 详细信息
来源: 评论
The discovery of the basic terrain features based on integration technology between GIS and spatial data mining
The discovery of the basic terrain features based on integra...
收藏 引用
2009 International Workshop on Intelligent systems and Applications, ISA 2009
作者: Zhong, Mei Xu, De-Jun Du, Qing-Yun Ye, Zhiwei School of Resource and Environment Science Wuhan University 129 Luoyu Road Wuhan 430079 China Key Laboratory Geographic Information System Ministry of Education Wuhan University 129 Luoyu Road Wuhan 430079 China Bureau of Land Resource of Linhai 299 Renming Road Zhejiang Linhai 31700 China School of Computer Science Hubei University of Technology Wuhan 430070 China
The computer discovery technology of terrain features in topographic map is a new research project in the world. In this paper the author uses CD-TIN which is constructed on the basis of contour lines to discover and ... 详细信息
来源: 评论