咨询与建议

限定检索结果

文献类型

  • 212 篇 期刊文献
  • 113 篇 会议

馆藏范围

  • 325 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 254 篇 工学
    • 177 篇 计算机科学与技术...
    • 133 篇 软件工程
    • 41 篇 信息与通信工程
    • 20 篇 电子科学与技术(可...
    • 20 篇 控制科学与工程
    • 17 篇 土木工程
    • 16 篇 电气工程
    • 16 篇 生物工程
    • 15 篇 机械工程
    • 15 篇 建筑学
    • 11 篇 生物医学工程(可授...
    • 10 篇 化学工程与技术
    • 9 篇 动力工程及工程热...
    • 8 篇 仪器科学与技术
    • 7 篇 光学工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 农业工程
    • 6 篇 航空宇航科学与技...
  • 142 篇 理学
    • 99 篇 数学
    • 31 篇 统计学(可授理学、...
    • 21 篇 生物学
    • 17 篇 物理学
    • 12 篇 化学
    • 11 篇 系统科学
  • 98 篇 管理学
    • 59 篇 图书情报与档案管...
    • 40 篇 管理科学与工程(可...
    • 11 篇 工商管理
  • 13 篇 法学
    • 13 篇 社会学
  • 10 篇 农学
    • 9 篇 作物学
  • 7 篇 医学
    • 7 篇 临床医学
  • 4 篇 经济学
  • 1 篇 军事学

主题

  • 11 篇 clustering algor...
  • 8 篇 complex networks
  • 7 篇 graphics process...
  • 7 篇 data mining
  • 6 篇 computational mo...
  • 6 篇 analytical model...
  • 5 篇 visualization
  • 4 篇 information syst...
  • 4 篇 conferences
  • 4 篇 reinforcement le...
  • 4 篇 efficiency
  • 4 篇 probability
  • 4 篇 virtual reality
  • 4 篇 mesh generation
  • 3 篇 parallel process...
  • 3 篇 deep learning
  • 3 篇 concurrent compu...
  • 3 篇 trees (mathemati...
  • 3 篇 model checking
  • 3 篇 acceleration

机构

  • 60 篇 college of infor...
  • 43 篇 the key laborato...
  • 34 篇 school of inform...
  • 20 篇 key laboratory f...
  • 18 篇 state key labora...
  • 16 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 10 篇 state key labora...
  • 10 篇 college of infor...
  • 10 篇 the key laborato...
  • 10 篇 school of inform...
  • 9 篇 college of infor...
  • 8 篇 school of comput...
  • 8 篇 guangdong-hongko...
  • 7 篇 key laboratory f...
  • 7 篇 national key lab...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 5 篇 software enginee...

作者

  • 45 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 13 篇 guo jingfeng
  • 13 篇 liu yongshan
  • 10 篇 he haitao
  • 10 篇 xia chunhe
  • 9 篇 wu hongfei
  • 9 篇 gong jibing
  • 8 篇 gao xiaopeng
  • 8 篇 kang jiawen
  • 7 篇 niyato dusit
  • 7 篇 zhang fuzhi
  • 7 篇 tang yong
  • 7 篇 jin shunfu
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 cao zining
  • 6 篇 jing chen

语言

  • 301 篇 英文
  • 18 篇 中文
  • 7 篇 其他
检索条件"机构=The Key Laboratory for Computer Virtual Technology and System Integration"
325 条 记 录,以下是81-90 订阅
排序:
Conflict detection model of access control policy in collaborative environment
Conflict detection model of access control policy in collabo...
收藏 引用
2011 International Conference on Computational and Information Sciences, ICCIS 2011
作者: Fan, Beibei Liang, Xiaoyan Luo, Yang Bo, Yang Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Cross-domain interoperation based on role-mapping increasingly becomes a representative research field of collaborative environment. However, in this collaborative environment, there would still be more permission or ... 详细信息
来源: 评论
Automatic generation for penetration testing scheme analysis model for network
Automatic generation for penetration testing scheme analysis...
收藏 引用
2011 International Conference on Computational and Information Sciences, ICCIS 2011
作者: Shen, Lu Liang, Xiaoyan Bo, Yang Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
The existing penetration testing systems need to rely on the professional skills in the testing process, so they increase the penetration testing of human resources and costs. While it also reduces the efficiency of t... 详细信息
来源: 评论
Network penetration testing scheme description language
Network penetration testing scheme description language
收藏 引用
2011 International Conference on Computational and Information Sciences, ICCIS 2011
作者: Dai, Zhiyong Lv, Liangshuang Liang, Xiaoyan Bo, Yang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Penetration testing is widely used to help ensure the security of the network. Traditional penetration testings were manually performed by tester according to scheme, the process is usually complex resulting in that i... 详细信息
来源: 评论
Capacity planning of the registration server in cloud storage
收藏 引用
International Journal of High Performance systems Architecture 2017年 第2期7卷 105-112页
作者: Gu, Rui Jin, Shunfu Wu, Haixing School of Information Science and Engineering Yanshan University No. 438 Hebei Avenue Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province No. 438 Hebei Avenue Qinhuangdao066004 China Science and Technology on Communication Networks Laboratory No. 589 West Zhongshan Road Shijiazhuang050081 China
Cloud storage is one of the key services in cloud computing. In order to appeal more users to the cloud storage, free cloud experience is provided to potential users. A registration server is set specially for intenti... 详细信息
来源: 评论
Accelerate cache simulation with generic GPU
Accelerate cache simulation with generic GPU
收藏 引用
IEEE 9th International Conference on computer and Information technology, CIT 2009
作者: Han, Wan Xiaopeng, Gao Zhiqiang, Wang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Trace-driven cache simulation is the most widely used method to evaluate different cache structures. Several techniques have been proposed to reduce the simulation time of sequential trace-driven simulation. An obviou... 详细信息
来源: 评论
Using GPU to accelerate a pin-based multi-level cache simulator  10
Using GPU to accelerate a pin-based multi-level cache simula...
收藏 引用
Proceedings of the 2010 Spring Simulation Multiconference
作者: Han, Wan Gao, Xiaopeng Long, Xiang Chen, Xianqin State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Trace-driven simulation methodology is the most widely used method to evaluate the design of future computer memory architecture. Since this methodology demands large amounts of storage and computer time, there is a g... 详细信息
来源: 评论
A new estimator analysis method to synchronization among multivariate neural series of mild cognitive impairment
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第23期6卷 868-874页
作者: Wen, Dong Guan, Xinyong Chen, Ruihong The Key Laboratory for Computer Virtual Technology System Integration of HeBei Province Yanshan University Qinhuangdao Hebei 066004 China Liren College Yanshan University Qinhuangdao Hebei 066004 China Division of General Internal Medicine Xiantao First People's Hospital Xiantao Hubei 433000 China
Synchronization decay of resting state EEG has shown that cognitive dysfunction in mild cognitive impairment (MCI) was relevant to a loss of functional connectivity in intermediate frequency bands. A new estimator ana... 详细信息
来源: 评论
An algorithm based on bit vector decomposition and hash linklist for mining frequent patterns in data streams
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第22期6卷 570-579页
作者: Ren, Jiadong Zhang, Yuanyuan Yu, Shiying College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China Hebei Provincial S and T Management Information Center 159 Dongfeng Road Shijiazhuang 050021 China
Most of algorithms based on bit vector for mining frequent pattern always produce candidate itemsets and scan the same data repeatedly;this increases the running time and the space consumption. In this paper, an algor... 详细信息
来源: 评论
Analysis of a new type islanding detection method for micro-grid based on the calculation of variance  8
Analysis of a new type islanding detection method for micro-...
收藏 引用
8th IEEE International Power Electronics and Motion Control Conference, IPEMC-ECCE Asia 2016
作者: Ying, Zhang Wang, Xiaohuan Zhang, Chunjiang Feng, Jianzhou Yanshan University Key Lab of Power Electronics for Energy Conservation and Motor Drive of HeBei Province Qinhuangdao China Yanshan University Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
UL1741 rules that to realize the islanding detection, the inverter must stop running within 2s after the main grid failure occurs. However, with the increasing of the capacity of distributed generation system, in orde... 详细信息
来源: 评论
A cloud-edge-device collaborative offloading scheme with heterogeneous tasks and its performance evaluation
收藏 引用
Frontiers of Information technology & Electronic Engineering 2024年 第5期25卷 664-684页
作者: Xiaojun BAI Yang ZHANG Haixing WU Yuting WANG Shunfu JIN School of Information Science and Engineering Yanshan UniversityQinhuangdao 066004China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan UniversityQinhuangdao 066004China
How to collaboratively offload tasks between user devices,edge networks(ENs),and cloud data centers is an interesting and challenging research *** this paper,we investigate the offoading decision,analytical modeling,a... 详细信息
来源: 评论