咨询与建议

限定检索结果

文献类型

  • 298 篇 会议
  • 206 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 505 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 352 篇 工学
    • 272 篇 计算机科学与技术...
    • 224 篇 软件工程
    • 72 篇 信息与通信工程
    • 38 篇 控制科学与工程
    • 28 篇 生物工程
    • 25 篇 机械工程
    • 24 篇 光学工程
    • 19 篇 电子科学与技术(可...
    • 17 篇 仪器科学与技术
    • 16 篇 交通运输工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 电气工程
    • 13 篇 建筑学
    • 12 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
    • 11 篇 安全科学与工程
    • 10 篇 土木工程
    • 8 篇 化学工程与技术
    • 6 篇 网络空间安全
  • 135 篇 理学
    • 81 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 16 篇 系统科学
    • 14 篇 化学
  • 93 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 9 篇 法学
  • 8 篇 医学
    • 7 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 哲学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 14 篇 semantics
  • 11 篇 object detection
  • 10 篇 servers
  • 9 篇 feature extracti...
  • 9 篇 software
  • 9 篇 heuristic algori...
  • 7 篇 educational inst...
  • 7 篇 computational mo...
  • 7 篇 machine learning
  • 7 篇 computer vision
  • 7 篇 training
  • 6 篇 semantic segment...
  • 6 篇 deep learning
  • 6 篇 programming
  • 6 篇 safety
  • 6 篇 resource allocat...
  • 6 篇 blockchain
  • 6 篇 satellites
  • 6 篇 privacy
  • 6 篇 cryptography

机构

  • 177 篇 school of comput...
  • 158 篇 state key labora...
  • 109 篇 state key labora...
  • 46 篇 state key labora...
  • 23 篇 state key lab of...
  • 19 篇 institute of art...
  • 12 篇 zhongguancun lab...
  • 12 篇 beijing advanced...
  • 12 篇 hangzhou innovat...
  • 11 篇 school of comput...
  • 7 篇 state key lab. o...
  • 7 篇 sino-french engi...
  • 6 篇 national lab. of...
  • 6 篇 state key labora...
  • 6 篇 school of mechan...
  • 5 篇 shen yuan honors...
  • 5 篇 school of artifi...
  • 5 篇 beihang universi...
  • 5 篇 school of comput...
  • 5 篇 ping an technolo...

作者

  • 41 篇 xiao limin
  • 31 篇 huang di
  • 30 篇 ruan li
  • 29 篇 limin xiao
  • 20 篇 li ruan
  • 18 篇 zhang xiong
  • 17 篇 hao sheng
  • 14 篇 bai xiao
  • 14 篇 di huang
  • 11 篇 wang yunhong
  • 10 篇 li zhoujun
  • 10 篇 chen jiaxin
  • 10 篇 zhu mingfa
  • 10 篇 xu ke
  • 9 篇 liu xianglong
  • 8 篇 wenge rong
  • 8 篇 yang hongyu
  • 8 篇 li yongnan
  • 8 篇 luo jie
  • 7 篇 peng hao

语言

  • 479 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=State Key Lab. Of Software Development Environment School of Computer Science & Engineering"
505 条 记 录,以下是401-410 订阅
排序:
INTERSECTION FOREGROUND DETECTION BASED ON THE CYBER-PHYSICAL SYSTEMS
INTERSECTION FOREGROUND DETECTION BASED ON THE CYBER-PHYSICA...
收藏 引用
IET International Conference on Information science and Control engineering
作者: Rong Ding Xu Liu Weilong Cui Yadong Wang State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing 100191 China|c|
Foreground detection is an important and challenging task in the traffic surveillance applications, especially at urban intersections. A very common solution for foreground detection with static cameras is background ... 详细信息
来源: 评论
Welcome Message from the Chairs
Welcome Message from the Chairs
收藏 引用
Asia International Conference on Modeling & Simulation
作者: David Al-Dabass Jasmy Yunus Dayu Giriantari Zuwairie Ibrahim Satya Kumar Department of Computer Science and Engineering The University of Aizu Japan State Key Lab of Software Development Environment Beihang University China
Asia Modelling Symposium 2012 (AMS2012), the sixth Asia international conference on mathematical modelling and computer simulation, received submissions from over 20 countries. The conference program committee had a v...
来源: 评论
Content Addressable Storage Optimization for Desktop Virtualization Based Disaster Backup Storage System
收藏 引用
China Communications 2012年 第7期9卷 1-13页
作者: Ruan Li Xiao Lim in Zhu Mingfa State Key Laboratory of Software Development Environment Beijing 100191 P. R. China School of Computer Science and Engineering Beihang University Beijing 100191 P. R. China
This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by em... 详细信息
来源: 评论
USO- a new Slope One algorithm based on modified user similarity
USO- a new Slope One algorithm based on modified user simila...
收藏 引用
International Conference on Information Management, Innovation Management and Industrial engineering, ICIII
作者: Mingtao Sun Hui Zhang Shiyu Song Kejia Wu State Key Software Development Environment Laboratory Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
Recommendation algorithm based on collab.rative filtering strategy has achieved great success in the field of personalized recommendation, However, based on collab.rative filtering recommendation algorithm complexity ... 详细信息
来源: 评论
Context-based requirement modeling for self-adaptive service software
收藏 引用
Journal of Computational Information Systems 2012年 第24期8卷 10131-10140页
作者: Liu, Wei Feng, Zaiwen School of Computer Science and Engineering Hubei Key Laboratory of Intelligence Robot Wuhan Institute of Technology Wuhan 430073 China State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China
Service-oriented self-adaptation software (SoSAS) utilizes services as fundamental elements for developing applications that have the capability to autonomously modify their behavior at run-time in response to changes... 详细信息
来源: 评论
Model-driven tenant development for PaaS-based SaaS
Model-driven tenant development for PaaS-based SaaS
收藏 引用
IEEE International Conference on Cloud Computing Technology and science (CloudCom)
作者: Wei-Tek Tsai Wu Li Babak Esmaeili Wenjun Wu Department of Computer Science and Technology INLIST Tsinghua University Beijing China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ USA State Key Laboratory of Software Development Environment Beihang University Beijing China
This paper proposes key SaaS (software-as-a-Service) design strategies for those SaaS systems that run on top of a commercial PaaS (Platform-as-a-Service) system such as GAE (Google App Engine)[1]. Specifically, this ... 详细信息
来源: 评论
R-calculus without the cut rule
收藏 引用
science China(Information sciences) 2011年 第12期54卷 2550-2563页
作者: LUO Jie & LI Wei state key lab.ratory of software development environment, school of computer science and engineering, Beihang University, Beijing 100191, China 1. State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing 100191 China
R-calculus is an inference system for deducing all possible changes when a theory is refuted by the facts. In this paper, we try to eliminate the cut rule in R-calculus by modifying the existing rules and by introduci... 详细信息
来源: 评论
Energy prediction for MapReduce workloads
Energy prediction for MapReduce workloads
收藏 引用
9th IEEE Int. Conf. on Dependable, Autonomic and Secure Comput., DASC 2011, incl. 9th Int. Conf. on Pervasive Intelligence and Computing, PICom 2011, 9th Int. Symp. on Embedded Computing, EmbeddedCom 2011, 1st Int. Conf. on Cloud and Green Comput.CGC
作者: Li, Wenjun Yang, Hailong Luan, Zhongzhi Qian, Depei State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
Energy efficiency of data centers has attracted wide research attention with growing concern for power consumption and heat dissipation. Map Reduce as an efficient programming model for data-intensive computing is inc... 详细信息
来源: 评论
Accelerate GMSK demodulation using GPU
Accelerate GMSK demodulation using GPU
收藏 引用
2011 International Conference on System science, engineering Design and Manufacturing Informatization, ICSEM 2011
作者: Gao, Xiaopeng Dong, Deping State Key Laboratory of Software Development Environment School of Computer Science Engineering Beihang University Beijing China
Gaussian Filtered Minimum Shift keying(GMSK) is used extensively in radio communication field nowadays;as frequency of radio signals increases, traditional technology such as DSP and FPGA can't satisfy the real-ti... 详细信息
来源: 评论
Safety mechanism of RTOS on multi-core processor
Safety mechanism of RTOS on multi-core processor
收藏 引用
2011 International Conference on System science, engineering Design and Manufacturing Informatization, ICSEM 2011
作者: Wu, Jiangtao Long, Xiang Wang, Lei State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
In safety critical area, even the slightest error of the operating system could lead to a significant property damage or casualties. As a result, the safety of the RTOS (Real Time Operating System) must be improved. R... 详细信息
来源: 评论