咨询与建议

限定检索结果

文献类型

  • 298 篇 会议
  • 206 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 505 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 352 篇 工学
    • 272 篇 计算机科学与技术...
    • 224 篇 软件工程
    • 72 篇 信息与通信工程
    • 38 篇 控制科学与工程
    • 28 篇 生物工程
    • 25 篇 机械工程
    • 24 篇 光学工程
    • 19 篇 电子科学与技术(可...
    • 17 篇 仪器科学与技术
    • 16 篇 交通运输工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 电气工程
    • 13 篇 建筑学
    • 12 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
    • 11 篇 安全科学与工程
    • 10 篇 土木工程
    • 8 篇 化学工程与技术
    • 6 篇 网络空间安全
  • 135 篇 理学
    • 81 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 16 篇 系统科学
    • 14 篇 化学
  • 93 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 9 篇 法学
  • 8 篇 医学
    • 7 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 哲学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 14 篇 semantics
  • 11 篇 object detection
  • 10 篇 servers
  • 9 篇 feature extracti...
  • 9 篇 software
  • 9 篇 heuristic algori...
  • 7 篇 educational inst...
  • 7 篇 computational mo...
  • 7 篇 machine learning
  • 7 篇 computer vision
  • 7 篇 training
  • 6 篇 semantic segment...
  • 6 篇 deep learning
  • 6 篇 programming
  • 6 篇 safety
  • 6 篇 resource allocat...
  • 6 篇 blockchain
  • 6 篇 satellites
  • 6 篇 privacy
  • 6 篇 cryptography

机构

  • 177 篇 school of comput...
  • 158 篇 state key labora...
  • 109 篇 state key labora...
  • 46 篇 state key labora...
  • 23 篇 state key lab of...
  • 19 篇 institute of art...
  • 12 篇 zhongguancun lab...
  • 12 篇 beijing advanced...
  • 12 篇 hangzhou innovat...
  • 11 篇 school of comput...
  • 7 篇 state key lab. o...
  • 7 篇 sino-french engi...
  • 6 篇 national lab. of...
  • 6 篇 state key labora...
  • 6 篇 school of mechan...
  • 5 篇 shen yuan honors...
  • 5 篇 school of artifi...
  • 5 篇 beihang universi...
  • 5 篇 school of comput...
  • 5 篇 ping an technolo...

作者

  • 41 篇 xiao limin
  • 31 篇 huang di
  • 30 篇 ruan li
  • 29 篇 limin xiao
  • 20 篇 li ruan
  • 18 篇 zhang xiong
  • 17 篇 hao sheng
  • 14 篇 bai xiao
  • 14 篇 di huang
  • 11 篇 wang yunhong
  • 10 篇 li zhoujun
  • 10 篇 chen jiaxin
  • 10 篇 zhu mingfa
  • 10 篇 xu ke
  • 9 篇 liu xianglong
  • 8 篇 wenge rong
  • 8 篇 yang hongyu
  • 8 篇 li yongnan
  • 8 篇 luo jie
  • 7 篇 peng hao

语言

  • 479 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=State Key Lab. Of Software Development Environment School of Computer Science & Engineering"
505 条 记 录,以下是471-480 订阅
排序:
An integrated resource allocation algorithm for CPU intensive and I/O intensive jobs in multi-core cluster
An integrated resource allocation algorithm for CPU intensiv...
收藏 引用
2010 2nd International Conference on Future computer and Communication, ICFCC 2010
作者: Liang, Aihua Liu, Zhuo Xiao, Limin Ruan, Li State Key Laboratory of Software Development Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China Beijing Union University Beijing China
In cluster jobs have different characteristics, such as CPU intensive and I/O intensive. Many resource allocation strategies deal with CPU intensive jobs or I/O intensive jobs. However, few algorithms can deal with bo... 详细信息
来源: 评论
A Reactive Geographic Routing Protocol for wireless sensor networks
A Reactive Geographic Routing Protocol for wireless sensor n...
收藏 引用
2010 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2010
作者: Ding, Rong Yang, Lei State Key Laboratory of Software Development Environment Beihang University Xueyuan Road No.37 Beijing China School of Computer Science and Engineering Beihang University Xueyuan Road No.37 Beijing China
Geographic routing has been studied as an attractive approach due to its simplicity and scalab.lity properties in routing for wireless sensor networks. The most influential geographic routing protocol is GPSR (Greedy ... 详细信息
来源: 评论
A network extend method of OpenMPI
A network extend method of OpenMPI
收藏 引用
International Conference on computer science and Information Technology (CSIT)
作者: Yaohui Hu Limin Xiao Yongnan Li Ruan Li Tian Li State Key Laboratory of Software Development Environment School of Computer Science and Engineering BeiHang University Beijing China State Key Laboratory of Software Development Environment BeiHang University Beijing China
This paper is mainly to present a method to extend the network under Open MPI parallel environment. We walk through the Modular Component Architecture (MCA) and three core elements: framework, component and module com... 详细信息
来源: 评论
Resilient Virtual Network Service Provision in Network Virtualization environments
Resilient Virtual Network Service Provision in Network Virtu...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yang Chen Jianxin Li Tianyu Wo Chunming Hu Wantao Liu School of Computer Science and Engineering Beihang University China State Key Laboratory of Software Development Environment China
Network Virtualization has recently emerged to provide scalab.e, customized and on-demand virtual network services over a shared substrate network. How to provide VN services with resiliency guarantees against network... 详细信息
来源: 评论
Marching Prisms: Rapid Section Generation in 3D Geological Model
Marching Prisms: Rapid Section Generation in 3D Geological M...
收藏 引用
International Conference on computer Modeling and Simulation, ICCMS
作者: Ping Xu Qin Yang Xianhai Meng State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
To efficiently construct the profile in 3D geological model expressed by triangular mesh and rapidly cut the model into separated parts, a new idea is presented in large scale compatible triangular mesh. It promotes t... 详细信息
来源: 评论
Formal Analysis of Behavioural Equivalence for Trustworthy and Composite Web Services
Formal Analysis of Behavioural Equivalence for Trustworthy a...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Yongwang Zhao Chunyang Hu Min Liu Dianfu Ma State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
Trustworthy and composite web services play important roles in service-oriented systems. Web services choreography as one important approach of composing web services describes the global model of service interactions... 详细信息
来源: 评论
A Revision Approach Based on Assignment Equivalence Classes
A Revision Approach Based on Assignment Equivalence Classes
收藏 引用
Workshop on Intelligent Systems and Applications
作者: Dongchen Jiang Yihua Lou Yi Jin State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University China Development Laboratory IBM
The problem of belief revision and specification evolution has been studied for years. Different methods have been proposed to solve this problem. However, the problem of efficiency has not been solved well. Therefore... 详细信息
来源: 评论
Real-time constrained task scheduling in 3D chip multiprocessor to reduce peak temperature
Real-time constrained task scheduling in 3D chip multiproces...
收藏 引用
International Workshop on Wireless Network Algorithm and Theory
作者: Li, Jiayin Qiu, Meikang Niu, Jianwei Zhu, Yongxin Chen, Tianzhou Dept. of Electrical and Computer Engineering University of Kentucky Lexington KY 40506 United States State Key Lab. of Software Develop. Environment Beihang University Beijing 100191 China School of Microelectronics Shanghai Jiaotong University Shanghai 200240 China College of Computer Science Zhejiang University Hangzhou 310027 China
Chip multiprocessor technique has been implemented in embedded systems due to the tremendous computation requirements. Three dimension chip multiprocessor architecture has been studied recently for integrating more fu... 详细信息
来源: 评论
Research and Simulation on the Scalab.lity of High-Productivity computer's Interconnection Network
Research and Simulation on the Scalability of High-Productiv...
收藏 引用
The 2010 2nd International Conference on Future computer and Communication(第二届未来计算机与通信国际会议 ICFCC 2010)
作者: Ting Chen Limin Xiao Li Ruan State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University BUAA Beijing.China
This paper aims at the research on how the amount of internal nodes of a high productivity computer system using 2-D Mesh as its interconnection network influence the quality and speed of communication. In the experim... 详细信息
来源: 评论
Parallel Algorithms for Cryptosystem on Conic Curves over Finite Field Fp
Parallel Algorithms for Cryptosystem on Conic Curves over Fi...
收藏 引用
The Ninth International Conference on Grid and Cloud Computing(第九届网格与云计算国际学术会议 GCC 2010)
作者: Yongnan Li Limin Xiao Yaohui Hu Aihua Liang Li Tian State Key Laboratory of Software Development Environment Beijing 100191 China School of Computer Science and Engineering Beihang University Beijing 100191 China
Existing algorithms in conic curves cryptosystem are all sequential ones. It is important to have fast parallel algorithms to both encrypt and decrypt data for cryptosystem on conic curves. This paper proposes our own... 详细信息
来源: 评论