咨询与建议

限定检索结果

文献类型

  • 2,342 篇 会议
  • 1,927 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,797 篇 工学
    • 1,906 篇 计算机科学与技术...
    • 1,500 篇 软件工程
    • 580 篇 信息与通信工程
    • 345 篇 电气工程
    • 338 篇 控制科学与工程
    • 310 篇 电子科学与技术(可...
    • 257 篇 生物工程
    • 216 篇 机械工程
    • 203 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 150 篇 仪器科学与技术
    • 141 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 88 篇 网络空间安全
    • 86 篇 材料科学与工程(可...
    • 82 篇 安全科学与工程
    • 78 篇 土木工程
  • 1,428 篇 理学
    • 707 篇 数学
    • 376 篇 物理学
    • 309 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 151 篇 化学
    • 147 篇 系统科学
  • 755 篇 管理学
    • 503 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 195 篇 工商管理
  • 180 篇 医学
    • 146 篇 临床医学
    • 116 篇 基础医学(可授医学...
  • 115 篇 法学
    • 76 篇 社会学
  • 72 篇 经济学
  • 55 篇 农学
  • 21 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 94 篇 feature extracti...
  • 89 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 68 篇 deep learning
  • 65 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 53 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 49 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 accuracy
  • 47 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 121 篇 school of comput...
  • 99 篇 national enginee...
  • 91 篇 hubei province k...
  • 86 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 services computi...
  • 43 篇 state key labora...
  • 39 篇 huazhong univers...
  • 39 篇 hubei province k...
  • 39 篇 national enginee...
  • 39 篇 school of cyber ...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 school of comput...
  • 34 篇 key laboratory o...
  • 33 篇 school of comput...
  • 33 篇 university of ch...

作者

  • 235 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 niyato dusit
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 song wu
  • 26 篇 shen linlin
  • 24 篇 wang wei
  • 22 篇 li peng
  • 22 篇 hu shengshan
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 liu yang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,966 篇 英文
  • 186 篇 其他
  • 139 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4285 条 记 录,以下是3991-4000 订阅
排序:
A Threshold RSA Signature Scheme with Traceable Signers
A Threshold RSA Signature Scheme with Traceable Signers
收藏 引用
International Conference on E-Business and Information system Security, EBISS
作者: Runhua Shi Hong Zhong Key Laboratory of Intelligent Computing & Signal Processing Anhui University Ministry of Education Hefei China School of Computer Science and Technology Anhui University Hefei China
This paper proposed a threshold RSA signature with traceable signers. In such scheme, there is a trusted center (TC), which generates all system parameters, the secret keys and the corresponding public keys of the gro... 详细信息
来源: 评论
Solid texture synthesis using Position Histogram Matching
Solid texture synthesis using Position Histogram Matching
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Jiating Chen Bin Wang Department of Computer Science and Technology Tsinghua University Beijing China Ministry of Education Key Laboratory of Information System Security Beijing China School of Software Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China
In the past, several approaches have been proposed to produce high quality solid textures. Unfortunately, they often suffer from several synthesis artifacts, such as color blurry, bad texture structures, introducing a... 详细信息
来源: 评论
Single vs. population cell coding: Gaze movement control in target search
Single vs. population cell coding: Gaze movement control in ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Jun Miao Laiyun Qing Lijuan Duan Baixian Zou Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy and Sciences Beijing China School of Information Science and Engineering Chinese Academy of Sciences Beijing China College of Computer Science and Technology University of Technology Beijing China Department of Information Science and Technology College of Art and Science Beijing Union Technology Beijing China
Gaze movement plays an important role in human visual search system. In literature, the winner-take-all method is wildly used to simulate the controlling of the gaze movement. The winner-take-all is a type of single-c... 详细信息
来源: 评论
ARRAY: A Non-application-Related, Secure, Wide-Area Disaster Recovery Storage system
ARRAY: A Non-application-Related, Secure, Wide-Area Disaster...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Lingfang Zeng Dan Feng Bharadwaj Veeravalli Qingsong Wei Division of Data Storage System Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Electrical and Computer Engineering National University of Singapore Singapore Data Storage Institute Singapore
With our society more information-driven, we have begun to distribute data in wide-area storage systems. At the same time, both physical failure and logic error have made it difficult to bring the necessary recovery t... 详细信息
来源: 评论
DFTT4CWS: A Testing Tool for Composite Web services Based on Data-Flow
DFTT4CWS: A Testing Tool for Composite Web Services Based on...
收藏 引用
Web Information systems and Applications Conference (WISA)
作者: Jun Hou Lei Xu School of Computer Science and Engineering South-East University Nanjing China China Telecom Jiangsu Hongxin System Integration Company Limited Nanjing China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
For large and complex composite Web services which are composed by BPEL and a set of WSDL and XSD documents, we urgently need the aid of the tools in designing and selecting test cases. However, most of mature testing... 详细信息
来源: 评论
Design of a flip-flop circuit within digital logic analyzer based on FPGA
收藏 引用
Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of technology 2009年 第SUPPL. 1期41卷 58-62页
作者: Xiao, Ling-Li Xu, Ning Han, Yin-He School of Computer Science and Technology Wuhan University Of Technology Wuhan 430070 China System Architecture Key Laboratory Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
With the wide application of EDA technique, the period for the development of electronic products has been shortened. That implements the software of the hardware design and reduces the costs. Based on the analysis of... 详细信息
来源: 评论
Learning long term face aging patterns from partially dense aging databases
Learning long term face aging patterns from partially dense ...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Jinli Suo Xilin Chen Shiguang Shan Wen Gao Key Laboratory of Intelligent Information Processing of CAS Institute for Computing Technology Beijing China Chinese Academy and Sciences China School of Electronic Engineering and Computer Science Peking University China
Studies on face aging are handicapped by lack of long term dense aging sequences for model training. To handle this problem, we propose a new face aging model, which learns long term face aging patterns from partially... 详细信息
来源: 评论
Differential Fault Analysis on SHACAL-1
Differential Fault Analysis on SHACAL-1
收藏 引用
Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
作者: Ruilin Li Chao Li Chunye Gong Department of Mathematics and System Science Science College National University of Defense Technology Changsha China State Key Laboratory of Information Security Institute of Software Chinese Academy and Sciences Beijing China School of Computer National University of Defense Technology Changsha China
SHACAL-1, known as one of the finalists of the NESSIE project, originates from the compression component of the widely used hash function SHA-1. The requirements of confusion and diffusion are implemented through mixi... 详细信息
来源: 评论
The Discovery of the Basic Terrain Features Based on Integration technology between GIS and Spatial Data Mining
The Discovery of the Basic Terrain Features Based on Integra...
收藏 引用
International Workshop on Intelligent systems and Applications, ISA
作者: Mei Zhong De-Jun Xu Qing-Yun Du Zhiwei Ye The Key Laboratory Geographic Information System Wuhan University Wuhan The Bureau of Land Resource of Linhai Linhai Zhejiang School of Resource and Environment Science Wuhan University Wuhan School of Computer Science Hubei University of Technology Wuhan China
The computer discovery technology of terrain features in topographic map is a new research project in the world. In this paper the author uses CD-TIN which is constructed on the basis of contour lines to discover and ... 详细信息
来源: 评论
A threshold RSA signature scheme with traceable signers
收藏 引用
Journal of Computational Information systems 2009年 第4期5卷 1143-1146页
作者: Shi, Runhua Zhong, Hong Huang, Liusheng Key Laboratory of Intelligent Computing and Signal Processing Anhui University Hefei 230039 China School of Computer Science and Technology Anhui University Hefei 230039 China NHPCC Depart. of CS. and Tech. USTC Hefei 230027 China
This paper proposes a threshold RSA signature scheme with traceable signers. In such scheme, there is a trusted center (TC), which generates all system parameters, the secret keys and the corresponding public keys of ... 详细信息
来源: 评论