咨询与建议

限定检索结果

文献类型

  • 2,387 篇 会议
  • 1,956 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,359 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,834 篇 工学
    • 1,933 篇 计算机科学与技术...
    • 1,510 篇 软件工程
    • 583 篇 信息与通信工程
    • 352 篇 电气工程
    • 349 篇 控制科学与工程
    • 314 篇 电子科学与技术(可...
    • 256 篇 生物工程
    • 218 篇 机械工程
    • 202 篇 光学工程
    • 164 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 142 篇 动力工程及工程热...
    • 140 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 91 篇 网络空间安全
    • 89 篇 材料科学与工程(可...
    • 81 篇 土木工程
    • 79 篇 安全科学与工程
  • 1,428 篇 理学
    • 703 篇 数学
    • 385 篇 物理学
    • 308 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 152 篇 化学
    • 144 篇 系统科学
  • 754 篇 管理学
    • 503 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 175 篇 医学
    • 145 篇 临床医学
    • 114 篇 基础医学(可授医学...
  • 117 篇 法学
    • 77 篇 社会学
  • 73 篇 经济学
  • 52 篇 农学
  • 24 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 101 篇 feature extracti...
  • 92 篇 semantics
  • 78 篇 computational mo...
  • 72 篇 computer science
  • 72 篇 deep learning
  • 66 篇 training
  • 64 篇 computer archite...
  • 59 篇 cloud computing
  • 56 篇 laboratories
  • 56 篇 optimization
  • 56 篇 servers
  • 54 篇 accuracy
  • 53 篇 scalability
  • 52 篇 grid computing
  • 50 篇 protocols
  • 49 篇 predictive model...
  • 48 篇 bandwidth
  • 45 篇 data models
  • 43 篇 resource managem...
  • 43 篇 analytical model...

机构

  • 129 篇 school of comput...
  • 101 篇 national enginee...
  • 94 篇 hubei province k...
  • 90 篇 school of comput...
  • 77 篇 department of co...
  • 55 篇 services computi...
  • 49 篇 services computi...
  • 49 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 45 篇 national enginee...
  • 44 篇 state key labora...
  • 42 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 national enginee...
  • 34 篇 school of comput...
  • 34 篇 university of ch...
  • 33 篇 key laboratory o...

作者

  • 235 篇 hai jin
  • 187 篇 jin hai
  • 53 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 29 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 21 篇 li peng
  • 19 篇 liu yang
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 18 篇 liu jun
  • 18 篇 li bo

语言

  • 3,762 篇 英文
  • 463 篇 其他
  • 148 篇 中文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4359 条 记 录,以下是931-940 订阅
排序:
An Authenticated Method for a Secure Changing Password  5
An Authenticated Method for a Secure Changing Password
收藏 引用
5th International Conference in Electronic Engineering, Information technology and Education, EEITE 2024
作者: Kara, Mostefa Karampidis, Konstantinos Kenioua, Laid Karampidis, Manolis Alshaikh, Muath Papadourakis, Giorgos Laouid, Abdelkader National Higher School of Mathematics Scientific and Technology Hub of Sidi Abdellah Algiers16093 Algeria Hellenic Mediterranean University Department of Electrical and Computer Engineering Crete Greece El Oued University LIAP Laboratory PO Box 789 El Oued39000 Algeria College of Computing and Informatics Saudi Electronic University Computer Science Department Riyadh11673 Saudi Arabia
Despite their age, passwords are still widely used more than ever. In many cases, it is the solution that best fits the usage scenario. Researchers are proposing innovative designs and methods to support these scenari... 详细信息
来源: 评论
SoVAR: Building Generalizable Scenarios from Accident Reports for Autonomous Driving Testing
SoVAR: Building Generalizable Scenarios from Accident Report...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: An Guo Yuan Zhou Haoxiang Tian Chunrong Fang Yunjian Sun Weisong Sun Xinyu Gao Anh Tuan Luu Yang Liu Zhenyu Chen State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer Science and Technology Zhejiang Sci-Tech University Hangzhou China College of Computing and Data Science Nanyang Technological University Singapore
Autonomous driving systems (ADSs) have undergone remarkable development and are increasingly employed in safety-critical applications. However, recently reported data on fatal accidents involving ADSs suggests that th... 详细信息
来源: 评论
Using Lock-Free Design for Throughput-Optimized Cache Eviction  25
Using Lock-Free Design for Throughput-Optimized Cache Evicti...
收藏 引用
Abstracts of the 2025 ACM SIGMETRICS International Conference on Measurement and Modeling of computer systems
作者: Chao Dong Fang Wang Hong Jiang Dan Feng Key Laboratory of Information Storage System (Wuhan National Laboratory for Optoelectronics) Engineering Research Center of data storage systems and Technology (School of Computer Science and Technology) Ministry of Education of China Huazhong University of Science and Techonolgy Wuhan Hubei China Department of Computer Science and Engineering University of Texas at Arlington Arlington Texas USA
This paper presents a practical approach to cache eviction algorithm design, called Mobius, that optimizes the concurrent throughput of caches and reduces cache operation latency by utilizing lock-free data structures... 详细信息
来源: 评论
Adaptive ELM-Based Time-Constrained Control of Uncertain Robotic Manipulators With Minimum Learning Computation
收藏 引用
IEEE Transactions on Emerging Topics in computing 2025年
作者: Jin, Xiaozheng Hou, Yuhan Wu, Xiaoming Chi, Jing Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Jinan250013 China Qilu Institute of Technology School of Intelligent Manufacturing and Control Engineering Shandong Jinan250200 China Shandong University of Finance and Economics School of Computing and Artificial Intelligence Shandong Jinan250014 China
This paper studies the extreme learning machine (ELM)-based time-constrained trajectory tracking control of a class of robotic manipulator systems with model/input uncertainties, matched and mismatched disturbances. A... 详细信息
来源: 评论
Signature Scheme Based on The SM2 Algorithm in Fabric
Signature Scheme Based on The SM2 Algorithm in Fabric
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Zhang, Yaling Wang, Hongyun Wang, Yichuan Ji, Wenjiang Zhu, Lei Xi'an University of technology School of computer science and engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of technology Xi'an China
Based on the analysis and research of the widely used Hyperledger Fabric alliance chain structure, this paper proposes a digital signature scheme based on the national cryptographic algorithm SM2 which can be applied ... 详细信息
来源: 评论
Datapath Combinational Equivalence Checking With Hybrid Sweeping Engines and Parallelization
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Zhihan Zhang, Xindi Qian, Yuhang Cai, Shaowei School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
In the application of IC design for microprocessors, there are often demands for optimizing the implementation of datapath circuits, on which various arithmetic operations are performed. Combinational equivalence chec... 详细信息
来源: 评论
Toward digital twin of the ocean: from digitalization to cloning
收藏 引用
Intelligent Marine technology and systems 2023年 第1期1卷 1-12页
作者: Chen, Ge Yang, Jie Huang, Baoxiang Ma, Chunyong Tian, Fenglin Ge, Linyao Xia, Linghui Li, Jianhui Frontiers Science Center for Deep Ocean Multispheres and Earth System School of Marine Technology Ocean University of China Qingdao China Laboratory for Regional Oceanography and Numerical Modeling Laoshan Laboratory Qingdao China Department of Computer Science and Technology Qingdao University Qingdao China
The forthcoming wave of progress in oceanographic technology is the digital twin of the ocean, a concept that integrates marine big data and artificial intelligence (AI). This development is a logical consequence of c...
来源: 评论
Two-timescale Optimization for E2E Network Slicing-aided Cloud-edge Collaborative Networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第6期74卷 9777-9789页
作者: Wang, Yunfeng Zhao, Liqiang Chu, Xiaoli Song, Shenghui Deng, Yansha Nallanathan, Arumugam Zhou, Guorong Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China Xidian University Guangzhou Institute of Technology Guangzhou510100 China University of Sheffield Department of Electronic and Electrical Engineering SheffieldS10 2TN United Kingdom Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong King's College London Department of Engineering LondonWC2R 2LS United Kingdom Queen Mary University of London School of Electronic Engineering and Computer Science LondonE1 4NS United Kingdom Kyung Hee University Department of Electronic Engineering Gyeonggi-do Yongin-si17104 Korea Republic of
To leverage the synergy between cloud computing (CC) and edge computing (EC) to support various services while reducing the CC/EC switching overhead, the two-timescale utility maximization problem for an end-to-end ne... 详细信息
来源: 评论
A Local Search Algorithm for MaxSMT(LIA)
arXiv
收藏 引用
arXiv 2024年
作者: He, Xiang Li, Bohan Zhao, Mengyu Cai, Shaowei Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
MaxSAT modulo theories (MaxSMT) is an important generalization of Satisfiability modulo theories (SMT) with various applications. In this paper, we focus on MaxSMT with the background theory of Linear Integer Arithmet... 详细信息
来源: 评论
ParLS-PBO: A Parallel Local Search Solver for Pseudo Boolean Optimization
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Zhihan Lin, Peng Hu, Hao Cai, Shaowei Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
As a broadly applied technique in numerous optimization problems, recently, local search has been employed to solve Pseudo-Boolean Optimization (PBO) problem. A representative local search solver for PBO is LS-PBO. In... 详细信息
来源: 评论