咨询与建议

限定检索结果

文献类型

  • 211 篇 期刊文献
  • 113 篇 会议

馆藏范围

  • 324 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 254 篇 工学
    • 175 篇 计算机科学与技术...
    • 133 篇 软件工程
    • 40 篇 信息与通信工程
    • 20 篇 电子科学与技术(可...
    • 19 篇 控制科学与工程
    • 16 篇 土木工程
    • 16 篇 生物工程
    • 15 篇 机械工程
    • 15 篇 电气工程
    • 14 篇 建筑学
    • 11 篇 生物医学工程(可授...
    • 10 篇 动力工程及工程热...
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 航空宇航科学与技...
    • 7 篇 农业工程
    • 6 篇 材料科学与工程(可...
    • 5 篇 力学(可授工学、理...
  • 144 篇 理学
    • 99 篇 数学
    • 31 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 17 篇 物理学
    • 13 篇 化学
    • 11 篇 系统科学
  • 99 篇 管理学
    • 60 篇 图书情报与档案管...
    • 40 篇 管理科学与工程(可...
    • 11 篇 工商管理
  • 13 篇 法学
    • 13 篇 社会学
  • 10 篇 农学
    • 9 篇 作物学
  • 8 篇 医学
    • 7 篇 临床医学
  • 4 篇 经济学
  • 1 篇 军事学

主题

  • 11 篇 clustering algor...
  • 8 篇 complex networks
  • 7 篇 graphics process...
  • 7 篇 data mining
  • 6 篇 computational mo...
  • 6 篇 analytical model...
  • 5 篇 visualization
  • 4 篇 information syst...
  • 4 篇 conferences
  • 4 篇 reinforcement le...
  • 4 篇 efficiency
  • 4 篇 probability
  • 4 篇 virtual reality
  • 4 篇 mesh generation
  • 3 篇 parallel process...
  • 3 篇 deep learning
  • 3 篇 concurrent compu...
  • 3 篇 trees (mathemati...
  • 3 篇 model checking
  • 3 篇 acceleration

机构

  • 60 篇 college of infor...
  • 42 篇 the key laborato...
  • 34 篇 school of inform...
  • 20 篇 key laboratory f...
  • 18 篇 state key labora...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 state key labora...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 10 篇 school of inform...
  • 9 篇 college of infor...
  • 8 篇 school of comput...
  • 8 篇 guangdong-hongko...
  • 7 篇 key laboratory f...
  • 7 篇 national key lab...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 5 篇 software enginee...

作者

  • 45 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 13 篇 guo jingfeng
  • 13 篇 liu yongshan
  • 10 篇 he haitao
  • 10 篇 xia chunhe
  • 9 篇 wu hongfei
  • 9 篇 gong jibing
  • 8 篇 gao xiaopeng
  • 8 篇 jin shunfu
  • 8 篇 kang jiawen
  • 7 篇 niyato dusit
  • 7 篇 zhang fuzhi
  • 7 篇 tang yong
  • 7 篇 han gaowei
  • 6 篇 wang lei
  • 6 篇 cao zining
  • 6 篇 jing chen
  • 6 篇 wang zhiqiang

语言

  • 294 篇 英文
  • 18 篇 中文
  • 14 篇 其他
检索条件"机构=The Key Laboratory for Computer Virtual Technology and System Integration"
324 条 记 录,以下是281-290 订阅
排序:
Automatic generation for penetration testing scheme analysis model for network
Automatic generation for penetration testing scheme analysis...
收藏 引用
2011 International Conference on Computational and Information Sciences, ICCIS 2011
作者: Shen, Lu Liang, Xiaoyan Bo, Yang Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
The existing penetration testing systems need to rely on the professional skills in the testing process, so they increase the penetration testing of human resources and costs. While it also reduces the efficiency of t... 详细信息
来源: 评论
A Network Security Situation Analysis framework based on information fusion
A Network Security Situation Analysis framework based on inf...
收藏 引用
2011 6th IEEE Joint International Information technology and Artificial Intelligence Conference, ITAIC 2011
作者: Zhang, Songmei Yao, Shan Ye, Xin'En Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing 100191 China
With the rapid development of the Internet, the network structure becomes larger and more complicated and attacking methods are more sophisticated, too. To enhance network security, Network Security Situation Analysis... 详细信息
来源: 评论
GPU Accelerating for Rapid Multi-core Cache Simulation
GPU Accelerating for Rapid Multi-core Cache Simulation
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW)
作者: Wan Han Long Xiang Gao Xiaopeng Li Yi State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
To find the best memory system for emerging workloads, traces are obtained during application's execution, then caches with different configurations are simulated using these traces. Since program traces can be se... 详细信息
来源: 评论
On the controller synthesis for probabilistic systems of conflict tolerant specification
收藏 引用
Journal of Computational Information systems 2011年 第4期7卷 1286-1293页
作者: Zhang, Junhua Huang, Zhiqiu Cao, Zining College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China Vocational Education Faculty Ningbo University Ningbo 315100 China National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China
For an embedded control system, different requirements maybe need be satisfied at same time. Always some of them makes the system to act inconsistently, or even conflicted. Conflict tolerant specification is provided ... 详细信息
来源: 评论
Interval-valued matrix factorization with applications
Interval-valued matrix factorization with applications
收藏 引用
10th IEEE International Conference on Data Mining, ICDM 2010
作者: Shen, Zhiyong Du, Liang Shen, Xukun Shen, Yidong Hewlett Packard Labs China State Key Laboratory of Computer Science China State Key Laboratory of Virtual Reality Technology and system China
In this paper, we propose the Interval-valued Matrix Factorization (IMF) framework. Matrix Factorization (MF) is a fundamental building block of data mining. MF techniques, such as Nonnegative Matrix Factorization (NM... 详细信息
来源: 评论
Using GPU to accelerate a pin-based multi-level cache simulator  10
Using GPU to accelerate a pin-based multi-level cache simula...
收藏 引用
Proceedings of the 2010 Spring Simulation Multiconference
作者: Han, Wan Gao, Xiaopeng Long, Xiang Chen, Xianqin State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Trace-driven simulation methodology is the most widely used method to evaluate the design of future computer memory architecture. Since this methodology demands large amounts of storage and computer time, there is a g... 详细信息
来源: 评论
Accelerate Smoothed Particle Hydrodynamics using GPU
Accelerate Smoothed Particle Hydrodynamics using GPU
收藏 引用
2010 IEEE Youth Conference on Information, Computing and Telecommunications, YC-ICT 2010
作者: Gao, Xiaopeng Wang, Zhiqiang Wan, Han Long, Xiang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University 100191 Beijing China
Physic-based fluid simulation is used extensively nowadays;however the traditional serial algorithm can't satisfy the realtime requirement due to its complexity and compute-intensive. The development of modern GPU... 详细信息
来源: 评论
Simplification for texture mapping models with mesh segmentation
Simplification for texture mapping models with mesh segmenta...
收藏 引用
2010 16th International Conference on virtual systems and Multimedia, VSMM 2010
作者: Wang, Lili Ma, Zhiqiang Xue, Bing Shen, Zhe State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing 100191 China
To reduce the loss of visual details in simplification for textured meshes, this paper presents a simplification method based on mesh segmentation. Firstly, the model is partitioned into some sub-meshes according to t... 详细信息
来源: 评论
Semantic similarity analysis model for CND policy and measure
Semantic similarity analysis model for CND policy and measur...
收藏 引用
2010 International Conference on Educational and Information technology, ICEIT 2010
作者: Hao, Senshen Jiao, Jian Xia, Chunhe Li, Xiaojian Yao, Shan State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University Beijing China
In order to effectively deal with large-scale attacks on computer networks, computer Network Defense (CND) policy refinement based on descriptive language is wildly used. However, it's very difficult to figure out... 详细信息
来源: 评论
Descriptive model of peer-to-peer botnet structures
Descriptive model of peer-to-peer botnet structures
收藏 引用
2010 International Conference on Educational and Information technology, ICEIT 2010
作者: Duan, Junfeng Jiao, Jian Xia, Chunhe Yao, Shan Li, Xiaojian State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University Beijing China
Peer-to-peer (P2P) Botnets, which are more resilient and robust than centralized botnets, have emerged as the peer-to-peer technology evolves. Better understanding of this new phenomenon will help researchers develop ... 详细信息
来源: 评论