咨询与建议

限定检索结果

文献类型

  • 780 篇 会议
  • 328 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,113 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 878 篇 工学
    • 635 篇 计算机科学与技术...
    • 542 篇 软件工程
    • 190 篇 信息与通信工程
    • 131 篇 控制科学与工程
    • 86 篇 电子科学与技术(可...
    • 70 篇 电气工程
    • 59 篇 机械工程
    • 48 篇 光学工程
    • 44 篇 生物工程
    • 42 篇 动力工程及工程热...
    • 38 篇 材料科学与工程(可...
    • 33 篇 化学工程与技术
    • 30 篇 建筑学
    • 29 篇 土木工程
    • 27 篇 生物医学工程(可授...
    • 27 篇 安全科学与工程
    • 26 篇 仪器科学与技术
    • 17 篇 交通运输工程
  • 500 篇 理学
    • 354 篇 数学
    • 108 篇 物理学
    • 79 篇 统计学(可授理学、...
    • 66 篇 系统科学
    • 50 篇 生物学
    • 32 篇 化学
  • 237 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 72 篇 工商管理
  • 31 篇 法学
    • 25 篇 社会学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 19 篇 医学
    • 17 篇 基础医学(可授医学...
  • 15 篇 农学
  • 7 篇 文学
  • 6 篇 教育学
  • 5 篇 艺术学
  • 3 篇 军事学

主题

  • 24 篇 semantics
  • 17 篇 computational mo...
  • 14 篇 wireless sensor ...
  • 12 篇 computer science
  • 12 篇 optimization
  • 12 篇 data mining
  • 11 篇 training
  • 10 篇 graphics process...
  • 10 篇 web services
  • 9 篇 ordinary differe...
  • 9 篇 quality of servi...
  • 9 篇 algorithm design...
  • 9 篇 software
  • 9 篇 cloud computing
  • 9 篇 forecasting
  • 8 篇 conferences
  • 8 篇 wireless communi...
  • 8 篇 bandwidth
  • 8 篇 servers
  • 8 篇 computers

机构

  • 87 篇 state key lab. f...
  • 66 篇 state key lab. o...
  • 46 篇 state key lab. o...
  • 35 篇 university of ch...
  • 33 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 26 篇 computer school ...
  • 22 篇 state key lab. o...
  • 21 篇 state key lab. o...
  • 18 篇 school of comput...
  • 16 篇 state key labora...
  • 16 篇 state key lab. o...
  • 16 篇 school of comput...
  • 15 篇 state key lab. f...
  • 14 篇 department of co...
  • 11 篇 state key lab. o...
  • 11 篇 college of compu...
  • 10 篇 graduate univers...
  • 10 篇 nanjing universi...
  • 9 篇 international sc...

作者

  • 21 篇 zhan naijun
  • 21 篇 xue bai
  • 17 篇 liu jin
  • 16 篇 xia gui-song
  • 14 篇 pan zhigeng
  • 12 篇 cai deng
  • 12 篇 he xiaofei
  • 12 篇 sheng zhang
  • 11 篇 zhuzhong qian
  • 11 篇 jie wu
  • 11 篇 chen jiming
  • 10 篇 wang hongan
  • 10 篇 f. richard yu
  • 9 篇 jiming chen
  • 9 篇 shen xuemin
  • 9 篇 fuchun sun
  • 9 篇 sanglu lu
  • 9 篇 zhang yunquan
  • 9 篇 chen hongsheng
  • 9 篇 he yanxiang

语言

  • 1,058 篇 英文
  • 43 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab. of Computer Architecture"
1113 条 记 录,以下是31-40 订阅
排序:
An on-demand service discovery approach based on mined domain knowledge
An on-demand service discovery approach based on mined domai...
收藏 引用
2012 IEEE 8th World Congress on Services, SERVICES 2012
作者: Li, Zheng State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China
With the increasing availab.lity of Web services, how to effictively and accurately discover services according to users' requirements becomes a key issue. In this paper, we propose an on-demand service discovery ... 详细信息
来源: 评论
Unsupervised feature selection for Multi-Cluster data
Unsupervised feature selection for Multi-Cluster data
收藏 引用
16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD-2010
作者: Cai, Deng Zhang, Chiyuan He, Xiaofei State Key Lab. of CAD and CG College of Computer Science Zhejiang University China
In many data analysis tasks, one is often confronted with very high dimensional data. Feature selection techniques are designed to find the relevant feature subset of the original features which can facilitate cluster... 详细信息
来源: 评论
Error-Correcting Output Hashing in fast similarity search  10
Error-Correcting Output Hashing in fast similarity search
收藏 引用
Proceedings of the Second International Conference on Internet Multimedia Computing and Service
作者: Yu, Zhou Cai, Deng He, Xiaofei State Key Lab. of CAD and CG College of Computer Science Zhejiang University China
Fast similarity search is one of the key techniques in many large scale learning and data mining applications. Recently, hashing-based methods, which create compact and efficient codes that preserve data distribution,... 详细信息
来源: 评论
Detecting implicit exceptions of service-oriented application based on context
Detecting implicit exceptions of service-oriented applicatio...
收藏 引用
2010 International Conference on computer and Information Application, ICCIA 2010
作者: Jia, Xiangyang Ying, Shi Zhao, Kai Wu, Qing State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China
Implicit exceptions in service-oriented applications will result in uncertainty of system, incorrect business data, unexpected error pages, or even uncovered disaster situations. This paper proposes a context-based ap... 详细信息
来源: 评论
Large scale spectral clustering with landmark-based representation  25
Large scale spectral clustering with landmark-based represen...
收藏 引用
25th AAAI Conference on Artificial Intelligence and the 23rd Innovative Applications of Artificial Intelligence Conference, AAAI-11 / IAAI-11
作者: Chen, Xinlei Cai, Deng State Key Lab. of CAD and CG College of Computer Science Zhejiang University China
Spectral clustering is one of the most popular clustering approaches. Despite its good performance, it is limited in its applicability to large-scale problems due to its high computational complexity. Recently, many a... 详细信息
来源: 评论
A strong and efficient user authentication protocol for wireless sensor networks using smart card
收藏 引用
Journal of Convergence Information Technology 2012年 第7期7卷 35-42页
作者: Su, Bo Pei, Changxing Yang, Junhan Tang, Jun Wang, Bin The State Key Lab. of ISN Xidian University Xi'an Shaanxi 710071 China School of Computer China University of Mining and Technology Xuzhou Jiangsu 221116 China
Cryptanalysis of Zhou et al.'s user authentication protocol, we found that it was easily vulnerable to password guessing attack, user impersonation attack, privileged administrator attack and Dos attack if the att... 详细信息
来源: 评论
A reconfigurable routing method for fault-tolerant mesh-based network on chip
收藏 引用
Journal of Information and Computational Science 2013年 第1期10卷 157-165页
作者: Liu, Yanhua Ruan, Ying Lai, Zongsheng Sun, Ling Institute of Microelectronics Circuit and System East China Normal University Shanghai 200241 China Jiangsu Provincial Key Lab. of ASIC Design Nantong University Nantong 226019 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
As the semiconductor industry advances to nano-technology points, Network on Chip (NoC) components are becoming vulnerable to errors during the system operation. Consequently, fault-tolerant techniques for NoC are nee... 详细信息
来源: 评论
Sparse structured probabilistic projections for factorized latent spaces  11
Sparse structured probabilistic projections for factorized l...
收藏 引用
20th ACM Conference on Information and Knowledge Management, CIKM'11
作者: Qu, Xinquan Chen, Xinlei State Key Lab. of CAD and CG College of Computer Science Zhejiang University Hangzhou China
Building a common representation for several related data sets is an important problem in multi-view learning. CCA and its extensions have shown that they are effective in finding the shared variation among all data s... 详细信息
来源: 评论
A high-performance algorithm for frequent itemset mining
A high-performance algorithm for frequent itemset mining
收藏 引用
13th International Conference on Web-Age Information Management, WAIM 2012
作者: Qu, Jun-Feng Liu, Mengchi State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan 430072 China
Frequent itemsets, also called frequent patterns, are important information about databases, and mining efficiently frequent itemsets is a core problem in data mining area. Pattern growth approaches, such as the class... 详细信息
来源: 评论
Search web images using objects, backgrounds and conditions
Search web images using objects, backgrounds and conditions
收藏 引用
20th ACM International Conference on Multimedia, MM 2012
作者: Zhang, Jiemi Wu, Chenxia Cai, Deng State Key Lab. of CAD and CG College of Computer Science Zhejiang University Hangzhou China
As the volumes of web images have grown rapidly in the last decade, Content-Based Image Retrieval (CBIR) has attracted substantial interests as an effective tool to manage the images. Most existing CBIR systems focus ... 详细信息
来源: 评论