咨询与建议

限定检索结果

文献类型

  • 568 篇 期刊文献
  • 359 篇 会议
  • 3 册 图书

馆藏范围

  • 930 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 655 篇 工学
    • 436 篇 计算机科学与技术...
    • 368 篇 软件工程
    • 128 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 78 篇 电气工程
    • 70 篇 生物工程
    • 53 篇 生物医学工程(可授...
    • 42 篇 机械工程
    • 37 篇 仪器科学与技术
    • 37 篇 材料科学与工程(可...
    • 36 篇 化学工程与技术
    • 31 篇 动力工程及工程热...
    • 24 篇 网络空间安全
    • 19 篇 交通运输工程
    • 14 篇 建筑学
    • 14 篇 土木工程
  • 373 篇 理学
    • 163 篇 数学
    • 133 篇 物理学
    • 85 篇 生物学
    • 42 篇 化学
    • 40 篇 统计学(可授理学、...
    • 37 篇 系统科学
  • 159 篇 管理学
    • 90 篇 图书情报与档案管...
    • 78 篇 管理科学与工程(可...
    • 24 篇 工商管理
  • 57 篇 医学
    • 49 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 15 篇 法学
  • 11 篇 经济学
  • 8 篇 农学
  • 4 篇 军事学
  • 1 篇 哲学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 25 篇 semantics
  • 16 篇 training
  • 14 篇 machine learning
  • 12 篇 deep learning
  • 10 篇 computational mo...
  • 10 篇 visualization
  • 9 篇 image segmentati...
  • 9 篇 optimization
  • 9 篇 embeddings
  • 9 篇 stochastic syste...
  • 9 篇 clustering algor...
  • 8 篇 object detection
  • 8 篇 computer archite...
  • 8 篇 feature extracti...
  • 8 篇 data models
  • 7 篇 deep neural netw...
  • 7 篇 three-dimensiona...
  • 7 篇 electroencephalo...
  • 7 篇 educational inst...
  • 7 篇 contrastive lear...

机构

  • 45 篇 state key labora...
  • 37 篇 university of ch...
  • 20 篇 college of compu...
  • 18 篇 state key lab of...
  • 18 篇 state key labora...
  • 17 篇 research center ...
  • 15 篇 ji hua laborator...
  • 15 篇 zhongguancun lab...
  • 14 篇 state key labora...
  • 13 篇 peng cheng labor...
  • 12 篇 department of el...
  • 12 篇 tencent ai lab
  • 12 篇 zhejiang lab
  • 11 篇 state key labora...
  • 11 篇 school of comput...
  • 10 篇 school of electr...
  • 10 篇 tencent youtu la...
  • 10 篇 state key labora...
  • 10 篇 the state key la...
  • 9 篇 university of sc...

作者

  • 11 篇 lihua zhang
  • 11 篇 xu linli
  • 11 篇 yang jian
  • 10 篇 timofte radu
  • 10 篇 liu qi
  • 10 篇 cai deng
  • 10 篇 zhang ming
  • 10 篇 xiaoyang kang
  • 9 篇 xiao zhiping
  • 9 篇 gao yang
  • 9 篇 chen chun
  • 9 篇 bu jiajun
  • 9 篇 he xiaofei
  • 8 篇 qiu cheng-wei
  • 8 篇 liu wei
  • 8 篇 jian yang
  • 8 篇 wang jianxin
  • 7 篇 zheng yefeng
  • 7 篇 sun fuchun
  • 7 篇 chen hao

语言

  • 729 篇 英文
  • 178 篇 其他
  • 25 篇 中文
检索条件"机构=TCA Lab of State Key Laboratory of Computer Science"
930 条 记 录,以下是891-900 订阅
排序:
Anomaly Detection by Clustering in the Network
Anomaly Detection by Clustering in the Network
收藏 引用
International Conference on Computational Intelligence and Software Engineering (CiSE)
作者: Feng Guo Yingzhen Yang Lian Duan Pervasive Computing lab College of Computer Science University of Zhejiang Hangzhou China State Key Laboratory of CAD&CG University of Zhejiang China Department of Management Science Henry B. tippie College of Business University of Iowa Iowa USA
Intrusions impose serious security threat to network environment, so it is necessary to detect and cope with them. Many intrusion detection methods focus on signature detection, where models are built to recognize kno... 详细信息
来源: 评论
Loss temporal dependency characteristic inference in wireless sensor network
收藏 引用
Journal of Computational Information Systems 2008年 第5期4卷 2303-2308页
作者: Li, Yongjun Ji, Wenli Dai, Yafei Computer Networks and Distributed Systems Laboratory Peking University Beijing 100871 China School of Computer Science Northwestern Polytechnical University Xi'an 710072 China School of Communication Engineering Xi'an University of Science and Technology Xi'an 710075 China State Key Lab. for Adv. Opt. Commun Syst and Networks Beijing 1000871 China
The internal link loss characteristic inference has become an increasingly important issue for operating and evaluating a wireless sensor network. Due to the inherent stringent bandwidth and energy constraints, it is ... 详细信息
来源: 评论
Loss cumulate generating function inference and application in wireless sensor network
收藏 引用
Journal of Computational Information Systems 2008年 第4期4卷 1399-1407页
作者: Li, Yongjun Ji, Wenli Dai, Yafei Computer Networks and Distributed Systems Laboratory Peking University Beijing 100871 China School of Computer Science Northwestern Polytechnical University Xi'an 710072 China School of Communication Engineering Xi'an University of Science and Technology Xi'an 710075 China State Key Lab. for Adv. Opt Commun. Syst. and Networks Beijing 1000871 China
The internal link loss characteristic inference has become an increasingly important issue for operating and evaluating a wireless sensor network. Due to the inherent stringent bandwidth and energy constraints of sens... 详细信息
来源: 评论
A probabilistic approach to consistency checking for pervasive context
A probabilistic approach to consistency checking for pervasi...
收藏 引用
5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
作者: Huang, Yu Ma, Xiang Tao, Xianping Cao, Jiannong Lu, Jian State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflicting contexts and cannot decide how to ad... 详细信息
来源: 评论
A Deployable Architecture Against Application-level DDoS Attacks
A Deployable Architecture Against Application-level DDoS Att...
收藏 引用
The 9th International Conference for Young computer Scientists(第九届国际青年计算机大会)
作者: Xiaolin Chen Feng Wang Hui Deng Mu Mu Sanglu Lu Computer Science Department Chuxiong Normal University China State Key Laboratory of Novel Softwar Computer Appliance Key Lab of Yunnan Province China Computing Department Lancaster University United Kingdom State Key Laboratory of Novel Software Technology Nanjing University China
In application-level DDoS attacks, attackers mimic legitimate client behavior by sending proper-looking requests via bots. The previous DDoS solutions focus on bandwidth flooding attacks, and have encountered signific... 详细信息
来源: 评论
Study of software fault tolerance system evaluation strategy
收藏 引用
Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information science of Wuhan University 2008年 第10期33卷 1018-1021页
作者: Liu, Xin Yin, Qian Guo, Ping Lab. of Pattern Recognition and Intelligent System Beijing Normal University 19 Xinjiekou Beijing 100875 China State Key Laboratory of Computer Science Institute of Software CAS 4 Zhongguancun Beijing 100080 China
Software fault tolerance technique is used to ensure high reliability. In order to evaluate the quality of fault-tolerant systems, expected execution time and cost must be considered. A new evaluation strategy is prop... 详细信息
来源: 评论
Mesh-guided optimized retexturing for image and video
Mesh-guided optimized retexturing for image and video
收藏 引用
作者: Guo, Yanwen Sun, Hanqiu Peng, Qunsheng Jiang, Zhongding IEEE National Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Engineering Chinese University of Hong Kong Shatin N.T. Hong Kong State Key Lab. CAD and CG Zhejiang University Hangzhou 310058 China Software School Fudan University Shanghai 201203 China
This paper presents a novel approach for replacing textures of specified regions in the input image and video using stretch-based mesh optimization. The retexturing results have the similar distortion and shading effe... 详细信息
来源: 评论
JobGrid: Chinese College Graduates Employment Information Grid System
JobGrid: Chinese College Graduates Employment Information Gr...
收藏 引用
ChinaGrid Annual Conference (ChinaGrid)
作者: Feng Zhao Bin Zhou Xiaoxing Sun Hai Jin Song Wu School of Computer Science and Technology Huazhong University of Science & Technology Wuhan China Cluster and Grid Computing Lab Wuhan China The State Key Laboratory of Virtual Reality Technology and Systems Beijing China School of Computer Science and Engineering Beihang University Beijing China
This paper proposes a realistic data grid system named JobGrid to construct information platform for Chinese college graduates employment, which supports centralized transaction processing to ensure consistent, effect... 详细信息
来源: 评论
A Probabilistic Approach to Consistency Checking for Pervasive Context
A Probabilistic Approach to Consistency Checking for Pervasi...
收藏 引用
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC
作者: Yu Huang Xiang Ma Xianping Tao Jiannong Cao Jian Lu State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China Internet and Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Hong Kong China
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflicting contexts and cannot decide how to ad... 详细信息
来源: 评论
Water color component analysis in saltwater intrusion reach - A case study in Shawan-Humen Watercourse, Pearl River Estuary
Water color component analysis in saltwater intrusion reach ...
收藏 引用
Remote Sensing of the Environment: 16th National Symposium on Remote Sensing of China
作者: Fang, Li-Gang Chen, Shui-Sen Li, Dan Zhang, Lixin Li, Dong Department of computer engineering Suzhou Vocational University Suzhou 215104 China Public Lab of Environment Science and Technology Guangdong Province Guangzhou Institute of Geography Guangzhou 510070 China State Key Laboratory of Remote Sensing Science Chinese Academy of Sciences Beijing 100875 China Beijing Normal University Institute of Remote Sensing Applications Chinese Academy of Sciences Beijing 100875 China Water Supply Corporation of Panyu District Guangzhou 511400 China College of Informatics South Agriculture University Guangzhou 510640 China
The saline water color component characteristic (chlorophyll-a and chromophoric dissolved organic matter (CDOM)) and their spatial change tendency in the Pearl River Estuary from the In-situ data in December of 2006 w... 详细信息
来源: 评论