咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 26 篇 期刊文献

馆藏范围

  • 71 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 54 篇 工学
    • 43 篇 计算机科学与技术...
    • 38 篇 软件工程
    • 9 篇 信息与通信工程
    • 8 篇 生物工程
    • 7 篇 化学工程与技术
    • 3 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 安全科学与工程
  • 33 篇 理学
    • 17 篇 数学
    • 8 篇 化学
    • 8 篇 生物学
    • 7 篇 物理学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
  • 16 篇 管理学
    • 9 篇 图书情报与档案管...
    • 8 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 6 篇 semantics
  • 4 篇 redundancy
  • 3 篇 availability
  • 2 篇 scalability
  • 2 篇 resource managem...
  • 2 篇 authentication
  • 2 篇 syntactics
  • 2 篇 vector
  • 2 篇 context
  • 2 篇 network security
  • 2 篇 extraction
  • 2 篇 object recogniti...
  • 1 篇 complex networks
  • 1 篇 reed-solomon cod...
  • 1 篇 collaborative fi...
  • 1 篇 complex systems
  • 1 篇 reinforcement le...
  • 1 篇 semantic segment...
  • 1 篇 spatial
  • 1 篇 indexing

机构

  • 9 篇 tianjin key labo...
  • 7 篇 tianjin key lab....
  • 7 篇 college of intel...
  • 5 篇 computer and com...
  • 5 篇 tianjin key labo...
  • 4 篇 key laboratory o...
  • 3 篇 key lab of high ...
  • 3 篇 tianjin key lab....
  • 3 篇 tianjin key lab....
  • 3 篇 tianjin universi...
  • 3 篇 tianjin key lab....
  • 3 篇 tianjin key labo...
  • 3 篇 national key lab...
  • 3 篇 school of comput...
  • 2 篇 ikkem
  • 2 篇 hedps capt colle...
  • 2 篇 school of nursin...
  • 2 篇 tianjin key lab ...
  • 2 篇 tianjin universi...
  • 2 篇 ministry of educ...

作者

  • 10 篇 ning hongyun
  • 9 篇 hua zhang
  • 9 篇 guangping xu
  • 7 篇 sheng lin
  • 7 篇 hongyun ning
  • 6 篇 zhang hua
  • 5 篇 zhang degan
  • 4 篇 xing guo
  • 4 篇 kai shi
  • 4 篇 xu guangping
  • 3 篇 hao jianye
  • 3 篇 li yongrui
  • 3 篇 yiying wang
  • 2 篇 zhang duo
  • 2 篇 cai chun
  • 2 篇 zhao tian
  • 2 篇 jiang wanrun
  • 2 篇 wang shuo
  • 2 篇 zhang linfeng
  • 2 篇 qunfang mao

语言

  • 67 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"机构=Tianjin Key Lab. of Intelligence Computing and New Software Technology"
71 条 记 录,以下是41-50 订阅
排序:
HERO: Heterogeneity-aware erasure coded redundancy optimal allocation for reliable storage in distributed networks
HERO: Heterogeneity-aware erasure coded redundancy optimal a...
收藏 引用
IEEE International Conference on Performance, computing and Communications (IPCCC)
作者: Guangping Xu Sheng Lin Gang Wang Xiaoguang Liu Kai Shi Hua Zhang Tianjin Key Lab. of Intelligence Computing and New Software Technology Tianjin China College of Information Tech. and Science Nankai University Tianjin China School of Computer and Communication Tianjin University of Technology Tianjin China
Heterogeneity is the natural feature in distributed networks. Different from the traditional disk array, the amount of data allocated on heterogenous peers may be not the same. To maximize the reliability of stored da... 详细信息
来源: 评论
Context-aware computing approach with uncertainty for active application
收藏 引用
Journal of Information and Computational Science 2008年 第1期5卷 179-186页
作者: Zhang, Degan Zhang, Hua Wang, Fayu Xue, Yabing School of Computer Science and Technology Tianjin University of Technology Tianjin 300191 China Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin 300191 China Key Lab. of Industrial Controlling Technology Zhejiang University Hangzhou 310027 China
For active application of many cases, context-aware computing with uncertainty includes forming model, fusing of aware context, managing context information and so on. Approach research on computing of aware context w... 详细信息
来源: 评论
A kind of new decision fusion method based on sensor evidence for active application
收藏 引用
Journal of Information and Computational Science 2008年 第1期5卷 171-178页
作者: Zhang, Degan Zhang, Hua Ning, Hongyun Li, Wenjie School of Computer Science and Technology Tianjin University of Technology Tianjin 300191 China Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin 300191 China Key Lab. of Industrial Controlling Technology Zhejiang University Hangzhou 310027 China
During decision making procedure of active application, the primary signals with noise, which got from each sensor, were sent to a decision making center, the fusion center, through the distributed or centralized comp... 详细信息
来源: 评论
An Adaptive POI Recommendation Algorithm by Integrating User’s Temporal and Spatial Features in LBSNs
An Adaptive POI Recommendation Algorithm by Integrating User...
收藏 引用
作者: Miao Li Wenguang Zheng Yingyuan Xiao Xu Jiao Tianjin Key Laboratory of Intelligence Computing & New Software Technology Tianjin University of Technology Department of Liberal Education Tianjin Foreign Studies University
With the rapid development of Internet technology and global positioning technology, location-based social networks(LBSNs)have emerged. Massive check-in data generated by LBSNs can be employed to explore users’ beh... 详细信息
来源: 评论
Network measurement based redundancy model and maintenance in dynamic P2P storage systems
Network measurement based redundancy model and maintenance i...
收藏 引用
IEEE International Conference on Performance, computing and Communications (IPCCC)
作者: Guangping Xu Hua Zhang Jing Liu Gang Wang Xiaoguang Liu The Key Laboratory of Intelligence Computing & New Software Technology Tianjin TianJin University of Technology Tianjin China Information Technology Science College Nankai University Tianjin China
Peer-to-peer distributed storage systems aggregate the storage space of many peers spread over the Internet. Due to the dynamic and scalab.e nature of these systems, it is a challenging issue to access data in an avai... 详细信息
来源: 评论
Code Difference Guided Adversarial Example Generation for Deep Code Models
Code Difference Guided Adversarial Example Generation for De...
收藏 引用
IEEE International Conference on Automated software Engineering (ASE)
作者: Zhao Tian Junjie Chen Zhi Jin College of Intelligence and Computing Tianjin University Tianjin China Key Lab of High Confidence Software Technology Peking University Beijing China
Adversarial examples are important to test and enhance the robustness of deep code models. As source code is discrete and has to strictly stick to complex grammar and semantics constraints, the adversarial example gen...
来源: 评论
Code Difference Guided Adversarial Example Generation for Deep Code Models  23
Code Difference Guided Adversarial Example Generation for De...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated software Engineering
作者: Zhao Tian Junjie Chen Zhi Jin College of Intelligence and Computing Tianjin University Tianjin China Key Lab of High Confidence Software Technology Peking University Beijing China
Adversarial examples are important to test and enhance the robustness of deep code models. As source code is discrete and has to strictly stick to complex grammar and semantics constraints, the adversarial example gen... 详细信息
来源: 评论
Code Difference Guided Adversarial Example Generation for Deep Code Models
arXiv
收藏 引用
arXiv 2023年
作者: Tian, Zhao Chen, Junjie Jin, Zhi College of Intelligence and Computing Tianjin University Tianjin China Key Lab of High Confidence Software Technology Peking University Beijing China
Adversarial examples are important to test and enhance the robustness of deep code models. As source code is discrete and has to strictly stick to complex grammar and semantics constraints, the adversarial example gen... 详细信息
来源: 评论
An Efficient Algorithm for Accurate Sensor Data Aggregation
An Efficient Algorithm for Accurate Sensor Data Aggregation
收藏 引用
2015 International Conference on Informatics, Control and Automation(ICA 2015)
作者: Ying-yuan XIAO Xin-rong ZHAO Yan SHEN Hua-feng DENG Ching-hsien HSU Tianjin University of Technology Tianjin Key Lab of Intelligence Computing and Novel Software Tech Jiangxi Normal University "Chung Hua University"
Wireless sensor networks have received considerable attention in many applications. The widely used multipath routing-based aggregation in wireless sensor networks typically suffers from the problem of duplicates. In ... 详细信息
来源: 评论
A FUZZY IDENTIFICATION METHOD OF CONTOURS BASED ON CHAIN-CODE FEATURES
A FUZZY IDENTIFICATION METHOD OF CONTOURS BASED ON CHAIN-COD...
收藏 引用
第三届全国智能视觉监控学术会议
作者: Qi Dong Guangping Xu Liu Jing Yanbing Xue Hua Zhang Key Laboratory of Intelligence Computing and New Software Technology TianjinChina300384 Key Laboratory of Computer Vision and SystemMinistry of EducationTianjinChina300384 School of Computer and CommunicationTianjin University of TechnologyTianjinChina300384
The contour analysis and identification are the important aspects in visual surveillance *** paper proposes a fuzzy identification method of ***,according to the description of a contour based on the chain-code method... 详细信息
来源: 评论