咨询与建议

限定检索结果

文献类型

  • 278 篇 会议
  • 201 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 254 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 70 篇 信息与通信工程
    • 37 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 光学工程
    • 18 篇 电子科学与技术(可...
    • 17 篇 仪器科学与技术
    • 16 篇 交通运输工程
    • 14 篇 电气工程
    • 12 篇 动力工程及工程热...
    • 12 篇 建筑学
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 安全科学与工程
    • 9 篇 土木工程
    • 8 篇 化学工程与技术
    • 6 篇 网络空间安全
  • 123 篇 理学
    • 71 篇 数学
    • 27 篇 生物学
    • 20 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 15 篇 系统科学
    • 14 篇 化学
  • 81 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 8 篇 法学
    • 5 篇 社会学
  • 8 篇 医学
    • 7 篇 临床医学
  • 4 篇 哲学
  • 4 篇 经济学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 14 篇 semantics
  • 10 篇 object detection
  • 10 篇 servers
  • 9 篇 feature extracti...
  • 9 篇 software
  • 9 篇 heuristic algori...
  • 7 篇 computational mo...
  • 7 篇 machine learning
  • 7 篇 computer vision
  • 7 篇 training
  • 6 篇 semantic segment...
  • 6 篇 deep learning
  • 6 篇 programming
  • 6 篇 safety
  • 6 篇 educational inst...
  • 6 篇 optimization
  • 6 篇 graph neural net...
  • 6 篇 resource allocat...
  • 6 篇 blockchain
  • 6 篇 satellites

机构

  • 178 篇 school of comput...
  • 156 篇 state key labora...
  • 109 篇 state key labora...
  • 47 篇 state key labora...
  • 23 篇 state key lab of...
  • 20 篇 institute of art...
  • 13 篇 zhongguancun lab...
  • 12 篇 beijing advanced...
  • 12 篇 hangzhou innovat...
  • 11 篇 school of comput...
  • 7 篇 state key labora...
  • 7 篇 sino-french engi...
  • 6 篇 school of mechan...
  • 5 篇 shen yuan honors...
  • 5 篇 school of artifi...
  • 5 篇 beihang universi...
  • 5 篇 beihang universi...
  • 5 篇 school of comput...
  • 5 篇 ping an technolo...
  • 5 篇 state key labora...

作者

  • 41 篇 xiao limin
  • 31 篇 huang di
  • 30 篇 ruan li
  • 29 篇 limin xiao
  • 20 篇 li ruan
  • 18 篇 zhang xiong
  • 17 篇 hao sheng
  • 14 篇 bai xiao
  • 14 篇 di huang
  • 11 篇 wang yunhong
  • 10 篇 li zhoujun
  • 10 篇 chen jiaxin
  • 10 篇 zhu mingfa
  • 9 篇 liu xianglong
  • 8 篇 wenge rong
  • 8 篇 yang hongyu
  • 8 篇 li yongnan
  • 8 篇 xu ke
  • 8 篇 luo jie
  • 7 篇 peng hao

语言

  • 400 篇 英文
  • 73 篇 其他
  • 9 篇 中文
检索条件"机构=State Key Lab.Of Software Development Environment School of Computer Science & Engineering"
480 条 记 录,以下是341-350 订阅
排序:
A general framework for computing maximal contractions
收藏 引用
Frontiers of computer science 2013年 第1期7卷 83-94页
作者: Jie LUO State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing 100191 China
This paper investigates the problem of computing all maximal contractions of a given formula set F with re- spect to a consistent set A of atomic formulas and negations of atomic formulas. We first give a constructive... 详细信息
来源: 评论
Multi-threaded code generation from Signal program to OpenMP
收藏 引用
Frontiers of computer science 2013年 第5期7卷 617-626页
作者: Kai HU Teng ZHANG Zhibin YANG State Key Laboratory of Software Development Environment Beihang University Beijing 100191 China School of Computer Science and Engineering Beihang University Beijing 100191 China IRIT-CNRS Universite de Toulouse Toulouse 31062 France
The use of multi-core processors will become a trend in safety critical systems. For safe execution of multi- threaded code, automatic code generation from formal spec- ification is a desirable method. Signal, a synch... 详细信息
来源: 评论
Social-aware relay node selection in delay tolerant networks
Social-aware relay node selection in delay tolerant networks
收藏 引用
2013 IEEE 2013 22nd International Conference on computer Communication and Networks, ICCCN 2013
作者: Wei, Kaimin Zeng, Deze Guo, Song Xu, Ke State Key Lab. of Software Development Environment Beihang University China School of Computer Science and Engineering University of Aizu Japan
In Delay Tolerant Networks (DTNs), the connections between mobile nodes are intermittent and constant end-to-end paths rarely exist. In order to achieve high delivery ratio, most existing DTN routing algorithms favor ... 详细信息
来源: 评论
Analysis and optimization of CFS scheduler on NUMA-based systems
Analysis and optimization of CFS scheduler on NUMA-based sys...
收藏 引用
2012 International Conference on Emerging Technologies for Information Systems, Computing, and Management, ICM 2012
作者: Tian, Hongyun Zhang, Kun Ruan, Li Zhu, Mingfa Xiao, Limin Li, Xiuqiao Liu, Yuhang State Key Laboratory of Software Development Environment Beijing China School of Computer Science and Engineering Beihang University Beijing China
Non Uniform Memory Access (NUMA) architecture becomes more and more popular as it has better scalability than Uniform Memory Access (UMA). However, all previous work on the operation system scheduler assumed that the ... 详细信息
来源: 评论
An evaluation framework for software crowdsourcing
收藏 引用
Frontiers of computer science 2013年 第5期7卷 694-709页
作者: Wenjun WU Wei-Tek TSAI Wei LI State Key Laboratory of Software Development Environment Beihang University Beijing 100191 China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ85281 USA Department of Computer Science and Technology INLIST Tsinghua University Beijing 100084 China
Recently software crowdsourcing has become an emerging area of software engineering. Few papers have pre- sented a systematic analysis on the practices of software crowdsourcing. This paper first presents an evaluatio... 详细信息
来源: 评论
A framework for porting linux OS to a cc-NUMA server based on loongson processors
A framework for porting linux OS to a cc-NUMA server based o...
收藏 引用
2012 International Conference on Emerging Technologies for Information Systems, Computing, and Management, ICM 2012
作者: Zhang, Kun Tian, Hongyun Ruan, Li Xiao, Limin Li, Yongnan Liu, Yuhang State Key Laboratory of Software Development Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
In order to make the Linux operating system available on a cache coherence NUMA (cc-NUMA) server based on Loongson processors, a family of general-purpose MIPS64 CPUs developed by the Institute of Computing Technology... 详细信息
来源: 评论
Shedder: A metadata sharing management method across multi-clusters
Shedder: A metadata sharing management method across multi-c...
收藏 引用
13th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2013
作者: Hao, Qinfen Zhong, Qianqian Ruan, Li Zhang, Zhenzhong Xiao, Limin State Key Laboratory of Software Development Environment Beihang University Beijing 100191 China School of Computer Science and Engineering Beihang University Beijing 100191 China
With the increase of large number of data, multi-clusters structure has been adopted for data storage. Therefore, the demand for file metadata sharing across global scale clusters is quickly rising. However, today'... 详细信息
来源: 评论
Accelerate demodulation of quadrature amplitude modulation using GPU
Accelerate demodulation of quadrature amplitude modulation u...
收藏 引用
2013 2nd International Conference on Manufacturing engineering and Process, ICMEP 2013
作者: Gao, Xiao Peng Wang, Si Yuan Wan, Han State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Xueyuan Road No.37 Haidian District Beijing China
Quadrature amplitude modulation (QAM) is widely used in communication systems. The traditional QAM demodulation method was implemented in hardware. This paper proposes a demodulation algorithm using GPU. The GPU algor... 详细信息
来源: 评论
A DNA computing system of modular-multiplication over finite field GF(2n)
A DNA computing system of modular-multiplication over finite...
收藏 引用
13th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2013
作者: Li, Yongnan Xiao, Limin Ruan, Li Zhang, Zhenzhong Li, Deguo State Key Laboratory of Software Development Environment Beihang University Beijing 100191 China School of Computer Science and Engineering Beihang University Beijing 100191 China
The enormous parallel computing ability and high memory density of DNA computing bring potential challenges and opportunities to traditional cryptography. Finite field GF(2n) is one of the most commonly used mathemati... 详细信息
来源: 评论
Locating and understanding concurrency bugs based on edge-labeled communication graphs  25
Locating and understanding concurrency bugs based on edge-la...
收藏 引用
25th International Conference on software engineering and Knowledge engineering, SEKE 2013
作者: Li, He Lin, Mengxiang Jameel, Tahir Jiang, Zhenyuan State Key Laboratory of Software Development Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University China School of Mechanical Engineering and Automation Beihang University China
Concurrency bugs are difficult to locate and understand. This paper presents LUCON, a novel edge-labeled communication graph based technique, which locates the concurrency bugs and presents buggy access patterns and b... 详细信息
来源: 评论