咨询与建议

限定检索结果

文献类型

  • 1,510 篇 会议
  • 1,329 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,841 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 926 篇 计算机科学与技术...
    • 658 篇 软件工程
    • 367 篇 电子科学与技术(可...
    • 292 篇 电气工程
    • 278 篇 控制科学与工程
    • 254 篇 信息与通信工程
    • 183 篇 动力工程及工程热...
    • 181 篇 机械工程
    • 148 篇 光学工程
    • 141 篇 仪器科学与技术
    • 115 篇 生物工程
    • 112 篇 材料科学与工程(可...
    • 85 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 65 篇 土木工程
    • 63 篇 交通运输工程
    • 56 篇 力学(可授工学、理...
    • 54 篇 生物医学工程(可授...
    • 51 篇 建筑学
    • 47 篇 环境科学与工程(可...
  • 967 篇 理学
    • 409 篇 物理学
    • 385 篇 数学
    • 129 篇 生物学
    • 129 篇 系统科学
    • 99 篇 统计学(可授理学、...
    • 91 篇 化学
  • 336 篇 管理学
    • 274 篇 管理科学与工程(可...
    • 89 篇 工商管理
    • 61 篇 图书情报与档案管...
  • 60 篇 医学
    • 51 篇 临床医学
  • 34 篇 经济学
  • 33 篇 农学
  • 26 篇 法学
  • 8 篇 军事学
  • 4 篇 教育学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 107 篇 computer archite...
  • 106 篇 hadron colliders
  • 70 篇 laboratories
  • 63 篇 hardware
  • 52 篇 optimization
  • 47 篇 delay
  • 45 篇 computational mo...
  • 44 篇 bandwidth
  • 43 篇 computer science
  • 37 篇 deep learning
  • 37 篇 circuit faults
  • 33 篇 benchmark testin...
  • 32 篇 wireless sensor ...
  • 32 篇 clocks
  • 30 篇 routing
  • 29 篇 neural networks
  • 28 篇 w & z bosons
  • 28 篇 algorithm design...
  • 28 篇 protocols
  • 28 篇 energy efficienc...

机构

  • 219 篇 state key labora...
  • 217 篇 university of ch...
  • 154 篇 centro brasileir...
  • 153 篇 national and kap...
  • 153 篇 yerevan physics ...
  • 152 篇 istanbul technic...
  • 151 篇 universidad iber...
  • 151 篇 university of sp...
  • 150 篇 charles universi...
  • 149 篇 indian institute...
  • 148 篇 brunel universit...
  • 148 篇 academy of scien...
  • 148 篇 department of ph...
  • 147 篇 university of de...
  • 146 篇 imperial college...
  • 145 篇 rwth aachen univ...
  • 144 篇 indian institute...
  • 143 篇 institute for nu...
  • 141 篇 università di to...
  • 140 篇 zhejiang univers...

作者

  • 113 篇 g. tonelli
  • 113 篇 d. barney
  • 113 篇 l. valencia palo...
  • 113 篇 t. liu
  • 113 篇 c. hensel
  • 113 篇 a. garcia-bellid...
  • 113 篇 a. steen
  • 113 篇 n. cartiglia
  • 113 篇 n. colino
  • 113 篇 f. moortgat
  • 113 篇 b. clerbaux
  • 113 篇 g. sultanov
  • 113 篇 m. a. ciocci
  • 113 篇 k. lamichhane
  • 113 篇 s. maselli
  • 112 篇 a. babaev
  • 112 篇 v. karjavine
  • 112 篇 e. migliore
  • 112 篇 p. avery
  • 110 篇 l. silvestris

语言

  • 2,638 篇 英文
  • 135 篇 中文
  • 64 篇 其他
检索条件"机构=State Key Laboratory of Computer System and Architecture"
2841 条 记 录,以下是351-360 订阅
排序:
On-orbit real-time robust cooperative target identification in complex background
收藏 引用
Chinese Journal of Aeronautics 2015年 第5期28卷 1451-1463页
作者: Wen Zhuoman Wang Yanjie Arjan Kuijper Di Nan Luo Jun Zhang Lei Jin Minghe Changchun Institute of Optics Fine Mechanics and Physics Chinese Academy of Sciences University of the Chinese Academy of Sciences Fraunhofer Institute for Computer Graphics Research Technische Universitt Darmstadt State Key Laboratory of Robotics and System Harbin Institute of Technology
Cooperative target identification is the prerequisite for the relative position and orientation measurement between the space robot arm and the to-be-arrested object. We propose an on- orbit real-time robust algorithm... 详细信息
来源: 评论
dCompaction: Speeding up Compaction of the LSM-Tree via Delayed Compaction
收藏 引用
Journal of computer Science & Technology 2017年 第1期32卷 41-54页
作者: Feng-Feng Pan Yin-Liang Yue Jin Xiong State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China University of Chinese Academy of Sciences Beijing 100049 China Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China
key-value (KV) stores have become a backbone of large-scale applications in today's data centers. Write- optimized data structures like the Log-Structured Merge-tree (LSM-tree) and their variants are widely used ... 详细信息
来源: 评论
Hohmann transfer via constrained optimization
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2018年 第11期19卷 1444-1458页
作者: Li XIE Yi-qun ZHANG Jun-yan XU State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources School of Control and Computer EngineeringNorth China Electric Power UniversityBeijing 102206China Beijing Institute of Electronic Systems Engineering Beijing 100854China
Inspired by the geometric method proposed by Jean-Pierre MAREC, we first consider the Hohmann transfer problem between two coplanar circular orbits as a static nonlinear programming problem with an inequality constrai... 详细信息
来源: 评论
Network penetration testing scheme description language
Network penetration testing scheme description language
收藏 引用
2011 International Conference on Computational and Information Sciences, ICCIS 2011
作者: Dai, Zhiyong Lv, Liangshuang Liang, Xiaoyan Bo, Yang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Penetration testing is widely used to help ensure the security of the network. Traditional penetration testings were manually performed by tester according to scheme, the process is usually complex resulting in that i... 详细信息
来源: 评论
GPU accelerating for rapid multi-core cache simulation
GPU accelerating for rapid multi-core cache simulation
收藏 引用
25th IEEE International Parallel and Distributed Processing Symposium, Workshops and Phd Forum, IPDPSW 2011
作者: Han, Wan Xiang, Long Gao, Xiaopeng Yi, Li State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
To find the best memory system for emerging workloads, traces are obtained during application's execution, then caches with different configurations are simulated using these traces. Since program traces can be se... 详细信息
来源: 评论
IntML-KNN: A Few-Shot Radio Frequency Fingerprint Identification Scheme for Lora Devices
收藏 引用
IEEE Signal Processing Letters 2025年
作者: Cao, Xin Tan, Weijie Gao, Qiangqiang Hu, Zhilong Li, Chunguo Guizhou University College of Computer Science and Technology Guiyang 550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang 550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu 610025 China Ministry of Industry and Information Technology Laboratory of Cryptograph Application Technology Innovation and Testing Verification Beijing 100015 China Southeast University School of Information Science and Engineering Nanjing 210096 China
Deep learning (DL) is widely used in radio frequency fingerprint identification (RFFI). However, in few-shot case, traditional DL-based RFFI need to construct auxiliary dataset to realize radio frequency fingerprint i... 详细信息
来源: 评论
A method to boost support vector machines  6th
A method to boost support vector machines
收藏 引用
6th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2002
作者: Diao, Lili Hu, keyun Lu, Yuchang Shi, Chunyi The State Key Laboratory of Intelligent Technology and System Dept of Computer Science and Technology Tsinghua University Beijing100084 China
Combining boosting and Support Vector Machine (SVM) is proved to be beneficial, but it is too complex to be feasible. This paper introduces an efficient way to boost SVM. It embraces the idea of active learning to dyn... 详细信息
来源: 评论
Teach and playback of realistic target reaching movement of virtual human upper limb
Teach and playback of realistic target reaching movement of ...
收藏 引用
3rd International Conference on Autonomic and Autonomous systems, ICAS 2007
作者: Na, Meng Ding, Li Jia, Peifa State Key Laboratory of Intelligent Technology and System Department of Computer Science and Technology Tsinghua University Beijing 100084 China
The significant research objective of virtual human is to generate realistic movement like real-life person. For the most frequent daily activity of target reaching movement of human upper limb, teach and playback met... 详细信息
来源: 评论
Learning bayesian networks with hidden variables using the combination of em and evolutionary algorithms  5th
收藏 引用
5th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2001
作者: Tian, Fengzhan Lu, Yuchang Shi, Chunyi The State Key Laboratory of Intelligent Technology and System The Department of Computer Science and Technology Tsinghua University Beijing100084 China
In this paper, a new method, called EM-EA, is put forward for learning Bayesian network structures from incomplete data. This method combines the EM algorithm with an evolutionary algorithm (EA) and transforms the inc... 详细信息
来源: 评论
Automatic generation for penetration testing scheme analysis model for network
Automatic generation for penetration testing scheme analysis...
收藏 引用
2011 International Conference on Computational and Information Sciences, ICCIS 2011
作者: Shen, Lu Liang, Xiaoyan Bo, Yang Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
The existing penetration testing systems need to rely on the professional skills in the testing process, so they increase the penetration testing of human resources and costs. While it also reduces the efficiency of t... 详细信息
来源: 评论