咨询与建议

限定检索结果

文献类型

  • 1,003 篇 期刊文献
  • 803 篇 会议
  • 1 册 图书

馆藏范围

  • 1,807 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,163 篇 工学
    • 732 篇 计算机科学与技术...
    • 497 篇 软件工程
    • 194 篇 电子科学与技术(可...
    • 168 篇 信息与通信工程
    • 110 篇 控制科学与工程
    • 101 篇 电气工程
    • 90 篇 光学工程
    • 88 篇 核科学与技术
    • 83 篇 生物工程
    • 79 篇 机械工程
    • 71 篇 动力工程及工程热...
    • 51 篇 材料科学与工程(可...
    • 44 篇 化学工程与技术
    • 38 篇 生物医学工程(可授...
    • 37 篇 仪器科学与技术
    • 35 篇 建筑学
    • 31 篇 土木工程
    • 23 篇 力学(可授工学、理...
  • 751 篇 理学
    • 430 篇 物理学
    • 249 篇 数学
    • 97 篇 生物学
    • 60 篇 统计学(可授理学、...
    • 56 篇 系统科学
    • 52 篇 化学
  • 200 篇 管理学
    • 149 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 43 篇 工商管理
  • 42 篇 医学
    • 35 篇 临床医学
    • 30 篇 基础医学(可授医学...
  • 21 篇 法学
  • 18 篇 经济学
  • 11 篇 农学
  • 6 篇 军事学
  • 5 篇 教育学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 艺术学

主题

  • 111 篇 hadron colliders
  • 75 篇 computer archite...
  • 41 篇 laboratories
  • 39 篇 hardware
  • 34 篇 training
  • 33 篇 computational mo...
  • 33 篇 delay
  • 31 篇 higgs bosons
  • 29 篇 w & z bosons
  • 29 篇 deep learning
  • 29 篇 circuit faults
  • 25 篇 semantics
  • 24 篇 benchmarking
  • 23 篇 bandwidth
  • 23 篇 wireless sensor ...
  • 23 篇 costs
  • 21 篇 quantum cryptogr...
  • 20 篇 neural networks
  • 20 篇 top quark
  • 20 篇 energy efficienc...

机构

  • 209 篇 state key labora...
  • 190 篇 yerevan physics ...
  • 163 篇 university of ch...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 147 篇 universidad iber...
  • 147 篇 indian institute...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 142 篇 charles universi...
  • 138 篇 università di to...
  • 135 篇 infn sezione di ...
  • 134 篇 imperial college...
  • 134 篇 university of de...
  • 133 篇 rwth aachen univ...
  • 133 篇 department of ph...
  • 132 篇 infn sezione di ...
  • 131 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 111 篇 a. babaev
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 108 篇 v. karjavine
  • 105 篇 n. colino
  • 105 篇 f. moortgat
  • 104 篇 b. clerbaux
  • 104 篇 g. sultanov
  • 103 篇 m. a. ciocci
  • 103 篇 k. lamichhane
  • 103 篇 s. maselli
  • 102 篇 e. migliore
  • 102 篇 p. avery
  • 102 篇 l. silvestris

语言

  • 1,695 篇 英文
  • 75 篇 中文
  • 41 篇 其他
检索条件"机构=State Key Laboratory of Computer Architecture~ Institute of Computing Technology"
1807 条 记 录,以下是1451-1460 订阅
排序:
Multi-Layer Synthesis of HighlyStructured Texture
收藏 引用
Wuhan University Journal of Natural Sciences 2012年 第4期17卷 302-308页
作者: TANG Li YU Rongwei GU Yuanting YUAN Jie DU Gong School of Computer Science and Engineering ChangshuInstitute of Technology Changshu 215500 Jiangsu China State Key Laboratary of Software Engineering WuhanUniversity Wuhan 430072 Hubei China Key Laboratory of Aerospace Information Security andTrust Computing Ministry of Education Wuhan 430072 HubeiChina Institute of Software Chinese Academy of Sciences Beijing100080 Beijing China
In this paper, a novel concept of multilayer synthesis and a general framework for texture synthesis method are presented. Within this framework, we first decompose the texture into the supposed pattern layer and mate... 详细信息
来源: 评论
Selective opening chosen ciphertext security directly from the DDH assumption
Selective opening chosen ciphertext security directly from t...
收藏 引用
6th International Conference on Network and System Security, NSS 2012
作者: Liu, Shengli Zhang, Fangguo Chen, Kefei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t... 详细信息
来源: 评论
A clustering-based scheme for concurrent trace in debugging NoC-based multicore systems  12
A clustering-based scheme for concurrent trace in debugging ...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Jianliang Gao Jianxin Wang Yinhe Han Lei Zhang Xiaowei Li School of Information Science and Engineering Central South University China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences China
Concurrent trace is an emerging challenge when debugging multicore systems. In concurrent trace, trace buffer becomes a bottleneck since all trace sources try to access it simultaneously. In addition, the on-chip inte... 详细信息
来源: 评论
A design of artificial high-rise building evacuation systems under fires
A design of artificial high-rise building evacuation systems...
收藏 引用
2012 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2012
作者: Hu, Yu-Ling Liu, Xi-Wei School of Automation Beijing Institute of Technology Beijing 100081 China School of Electric and Information Engineering Beijing University of Civil Engineering and Architecture Beijing 100044 China State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences Beijing 100190 China Dongguan Research Institute of CASIA Cloud Computing Center Chinese Academy of Sciences Songshan Lake Dongguan China
Because the structure and function of a high-rise building is complex and the density of occupants is high, and the rescue from outside is very difficult, safe and timely evacuation is an important issue under high-ri... 详细信息
来源: 评论
Topological Similarity-Based Scheme for Large-Scale Group Communication Services
Topological Similarity-Based Scheme for Large-Scale Group Co...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Yuehua Wang Zhong Zhou Ling Liu Liang Cheng Wei Wu State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University China Georgia Institute of Technology College of Computing Georgia Institute of Technology USA Department of Computer Science and Engineering Lehigh University USA
Group communication is essential for multi-user applications. However, due to unpredictable node departures and non-deterministic network partitions, providing reliable and scalable group communication services is cha... 详细信息
来源: 评论
New Methodologies for Parallel architecture
收藏 引用
Journal of computer Science & technology 2011年 第4期26卷 578-587页
作者: 范东睿 李晓维 李国杰 Key Laboratory of Computer System and Architecture Institute of Computing TechnologyChinese Academy of Sciences
Moore's law continues to grant computer architects ever more transistors in the foreseeable future, and parallelism is the key to continued performance scaling in modern microprocessors. In this paper, the achievemen... 详细信息
来源: 评论
Green challenges to system software in data centers
收藏 引用
中国计算机科学前沿 2011年 第3期5卷 353-368页
作者: Yuzhong SUN Yiqiang ZHAO Ying SONG Yajun YANG Haifeng FANG Hongyong ZANG Yaqiong LI Yunwei GAO Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Graduate University of Chinese Academy of Sciences Beijing 100190 China
With the increasing demand and the wide application of high performance commodity multi-core processors,both the quantity and scale of data centers grow dramatically and they bring heavy energy *** and engineers have ... 详细信息
来源: 评论
An architecture description language based on dynamic description logics  1
收藏 引用
7th IFIP International Conference on Intelligent Information Processing, IIP 2012
作者: Wang, Zhuxiao Peng, Hui Guo, Jing Zhang, Ying Wu, Kehe Xu, Huan Wang, Xiaofeng School of Control and Computer Engineering State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources North China Electric Power University Beijing 102206 China Education Technology Center Beijing International Studies University Beijing 100024 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
ADML is an architectural description language based on Dynamic Description Logic for defining and simulating the behavior of system architecture. ADML is being developed as a new formal language and/or conceptual mode... 详细信息
来源: 评论
Left-to-Right Tree-to-String Decoding with Prediction  12
Left-to-Right Tree-to-String Decoding with Prediction
收藏 引用
Conference on Empirical Methods in Natural Language Processing
作者: Yang Feng Yang Liu Qun Liu Trevor Cohn Department of Computer Science The University of Sheffield Sheffield UK State Key Laboratory on Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Sci. and Tech. Tsinghua University Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China
Decoding algorithms for syntax based machine translation suffer from high computational complexity, a consequence of intersecting a language model with a context free grammar. Left-to-right decoding, which generates t... 详细信息
来源: 评论
Delay-bounded Sink Mobility in Wireless Sensor Networks
Delay-bounded Sink Mobility in Wireless Sensor Networks
收藏 引用
IEEE International Conference on Communications
作者: Yu Gu Yusheng Ji Jie Li Biao Han Baohua Zhao Information Systems Architecture Science Research Division National Institute of Informatics Department of Computer Science University of Tsukuba Tsukuba Science City State Key Laboratory of Networking and Switching Technology
This paper exploits sink mobility to prolong the network lifetime in wireless sensor networks (WSNs) where the information delay caused by moving the sink should be bounded. We build a unified framework for analyzing ... 详细信息
来源: 评论