咨询与建议

限定检索结果

文献类型

  • 8,662 篇 期刊文献
  • 1,152 篇 会议
  • 1 册 图书

馆藏范围

  • 9,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,771 篇 工学
    • 3,242 篇 计算机科学与技术...
    • 2,242 篇 软件工程
    • 1,235 篇 机械工程
    • 845 篇 控制科学与工程
    • 710 篇 仪器科学与技术
    • 591 篇 信息与通信工程
    • 519 篇 电子科学与技术(可...
    • 370 篇 材料科学与工程(可...
    • 289 篇 网络空间安全
    • 249 篇 交通运输工程
    • 214 篇 建筑学
    • 213 篇 动力工程及工程热...
    • 201 篇 化学工程与技术
    • 190 篇 土木工程
    • 159 篇 光学工程
    • 150 篇 地质资源与地质工...
    • 144 篇 电气工程
    • 140 篇 石油与天然气工程
    • 136 篇 航空宇航科学与技...
    • 101 篇 力学(可授工学、理...
  • 1,584 篇 管理学
    • 1,415 篇 管理科学与工程(可...
    • 120 篇 工商管理
  • 1,463 篇 理学
    • 596 篇 数学
    • 264 篇 系统科学
    • 192 篇 物理学
    • 192 篇 化学
  • 351 篇 教育学
    • 293 篇 教育学
  • 285 篇 经济学
    • 280 篇 应用经济学
  • 269 篇 医学
    • 135 篇 临床医学
  • 259 篇 艺术学
    • 240 篇 设计学(可授艺术学...
  • 175 篇 农学
  • 105 篇 军事学
  • 39 篇 文学
  • 26 篇 法学
  • 13 篇 哲学
  • 6 篇 历史学

主题

  • 283 篇 计算机
  • 178 篇 设计
  • 117 篇 internet
  • 101 篇 面向对象
  • 96 篇 cad
  • 93 篇 计算机网络
  • 91 篇 软件开发
  • 87 篇 数据库
  • 75 篇 微机
  • 73 篇 软件
  • 73 篇 数学模型
  • 72 篇 遗传算法
  • 61 篇 专家系统
  • 60 篇 数据处理
  • 46 篇 地理信息系统
  • 41 篇 xml
  • 41 篇 多媒体
  • 41 篇 虚拟现实
  • 39 篇 计算机应用
  • 38 篇 信息系统

机构

  • 257 篇 哈尔滨工业大学
  • 200 篇 北京理工大学
  • 161 篇 上海交通大学
  • 142 篇 西安交通大学
  • 138 篇 浙江大学
  • 126 篇 中国科学院计算技...
  • 110 篇 天津理工学院
  • 101 篇 山东建筑工程学院
  • 96 篇 北京航空航天大学
  • 88 篇 清华大学
  • 82 篇 西安电子科技大学
  • 81 篇 华中科技大学
  • 75 篇 沈阳工业学院
  • 71 篇 北京大学
  • 65 篇 西北工业大学
  • 63 篇 中国科学院软件研...
  • 59 篇 天津大学
  • 58 篇 西南石油学院
  • 57 篇 南京航空学院
  • 56 篇 四川大学

作者

  • 309 篇 china
  • 33 篇 p.r.china
  • 26 篇 胡铭曾
  • 22 篇 方滨兴
  • 22 篇 战守义
  • 21 篇 曾建潮
  • 18 篇 陈平
  • 17 篇 china)
  • 15 篇 宋瀚涛
  • 15 篇 harbin
  • 14 篇 史忠植
  • 13 篇 tsinghua univers...
  • 13 篇 杨孝宗
  • 13 篇 harbin institute...
  • 13 篇 李伟
  • 12 篇 顾毓清
  • 11 篇 刘刚
  • 11 篇 王春东
  • 11 篇 王宏志
  • 11 篇 李晓梅

语言

  • 7,730 篇 中文
  • 2,085 篇 英文
检索条件"作者=Computer center, beijing institute of technology, beijing 100081, china"
9815 条 记 录,以下是51-60 订阅
排序:
Perturbation Methods of Stability Analysis for Parallel Real-Time Digital Simulation Models
收藏 引用
Journal of Systems Engineering and Electronics 1992年 第2期3卷 38-48页
作者: Fei Jinggaobeijing institute of computer Application and Simulation technology, P.O. Box 142-213, beijing 100854, china beijing institute of computer Application and Simulation technology P.O. Box 142-213. Beijing 100854. China
In this paper, the stability analysis for parallel real-time digital simulation models is discussed. The coupling coefficient perturbation method and the simulation stepsize perturbation method are established. For tw... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Scan chain design for shift power reduction in scan-based testing
收藏 引用
Science china(Information Sciences) 2011年 第4期54卷 767-777页
作者: LI Jia 1,HU Yu 2 & LI XiaoWei 2 1 The School of Software,Tsinghua University,beijing 100084,china 2 The institute of Computing technology,Chinese Academy of Sciences,beijing 100190,china 1. The School of Software Tsinghua University Beijing 100084 China2. The Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Test power of VLSI systems has become a challenging issue *** scan shift power dominates the average test power and restricts clock frequency of the shift phase,leading to excessive thermal accumulation and long test ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An improved cross-domain role mapping mechanism
An improved cross-domain role mapping mechanism
收藏 引用
2010 International Conference on Circuit and Signal Processing (ICCSP 2010) & 2010 Second IITA International Joint Conference on Artificial Intelligence (IITA-JCAI 2010)
作者: Jun Zheng,Yichun Chen School of computer Science and technology beijing institute of technology beijing 100081,china Qikun Zhang,Yuan TAN and Qiongxin Liu School of computer Science and technology beijing institute of technology beijing 100081,china
Aimed at the aberrations of inter-domain role mapping issues including privilege-aberration and role aberration,an improved inter-domain role mapping mechanism was purposed in this article,and it can guarantee the con... 详细信息
来源: cnki会议 评论
HEST: A Hybrid-Language-Based Expert System Tool
收藏 引用
Journal of Systems Engineering and Electronics 1995年 第3期6卷 25-30页
作者: Huang Houkuan Hao Jigang Wang Zhaoqi & Gao Feng( Dept. of computer Set., Northern Jiaotong University, beijing 100044, china)( Dept. of computer Set., Tsinghua University, beijing 100084, china)( computer center, Research institute No.701, Shanghai 201 Dept. of computer Sci. Northern Jiaotong University Beijing 100044 China Dept. of computer Sci. Tsinghua University Beijing 100084 China computer center Research Institute No.701 Shanghai 201103 China Dept. of computer Sci Harbin Engineering University Harbin 150001 China
HEST is a practical integrated expert system tool. Its basis is a knowledge programming language FFLL, characterized by a combination of fuzzy logic and function paradigms. The tool integrates alot of important knowle... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Salient region detection and segmentation for general object recognition and image understanding
收藏 引用
Science china(Information Sciences) 2011年 第12期54卷 2481-2490页
作者: HUANG TieJun 1 , TIAN YongHong 1 , LI Jia 2 & YU HaoNan 11 National Engineering Laboratory for Video technology, School of Electrical Engineering and computer Science, Peking University, beijing 100871, china 2 Key Laboratory of Intelligent Information Processing, institute of Computing technology, Chinese Academy of Sciences, beijing 100190, china 1. National Engineering Laboratory for Video technology School of Electrical Engineering and Computer Science Peking University Beijing 100871 China2. Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
General object recognition and image understanding is recognized as a dramatic goal for computer vision and multimedia retrieval. In spite of the great efforts devoted in the last two decades, it still remains an open... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Communication network designing:Transmission capacity,cost and scalability
收藏 引用
Science china(Information Sciences) 2012年 第11期55卷 2454-2465页
作者: ZHANG GuoQiang1,2,3 & ZHANG GuoQing1 1institute of Computing technology,Chinese Academy of Sciences,beijing 100190,china 2School of computer Science and technology,Nanjing Normal University,Nanjing 210046,china 3Provincial Key Laboratory for computer Information Processing technology,Soochow University,Suzhou 215000,china 1. institute of Computing technology Chinese Academy of Sciences Beijing 100190 China2. School of Computer Science and Technology Nanjing Normal University Nanjing 210046 China3. Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215000 China
Despite the growing number of works centering around the traffic dynamics on complex networks,these researches still have some common shortcomings,e.g.,too simple traffic flow model and lack of considerations for the ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Another ID-Based Proxy Signature Scheme and Its Extension
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 33-36页
作者: ZHANG Jianhong1,2 , ZOU Wei3 1. College of Science, North china University of technology, beijing 100041,china 2. institute of Software of Chinese Academy of Sciences /State Key Laboratory of Information Security, beijing 100080, china 3. institute of computer Science and technology, Peking University, beijing 100871, china College of Science North China University of Technology Beijing China State Key Laboratory of Information Security Institute of Software of Chinese Academy of Sciences Beijing China institute of computer Science and technology Peking University Beijing China
So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is propo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Machine Recognition for Population Feature of Wheat Images Based on BP Neural Network
收藏 引用
Agricultural Sciences in china 2002年 第8期1卷 885-889页
作者: LI Shao-kun, SUO Xing-mei, BAI Zhong-ying, QI Zhi-li, Liu Xiao-hong, GAO Shi-ju and ZHAO Shuang-ning( institute of Crop Breeding and Cultivation /Key Laboratory of Crop Genetic & Breeding, Ministry of Agriculture, ChineseAcademy of Agricultural Sciences, beijing 100081 , P . R . china Department of computer Science and technology, CentralUniversity for Nationalities, beijing 100081 , P. R . china School of computer Science and technology, beijing Universityof Posts and Telecommunications, beijing 100876, P. R . china Research center of Xinjiang Crop High-yield,Shihezi University, Shihezi 832003, P.R. china) institute of Crop Breeding and Cultivation/Key Laboratory of Crop Genetic (ж) Breeding Ministry of Agriculture Chinese Academy of Agricultural Sciences Beijing 100081 P.R.China Research center of Xinjiang Crop High-yield Shihezi University Shihezi 8 Department of computer Science and technology Central University for Nationalities Beijing 100081 P. R . China School of computer Science and technology Beijing University of Posts and Telecommunications Beijing 100876 P. R . China institute of Crop Breeding and Cultivation/Key Laboratory of Crop Genetic (ж) Breeding Ministry of Agriculture Chinese Academy of Agricultural Sciences Beijing 100081 P. R . China
Recognition and analysis of dynamic information about population images during wheat growth periods can be taken for the base of quantitative diagnosis for wheat growth. A recognition system based on self-learning BP ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SOME ALGORITHMS IN GRAPHICS AND IMAGE PROCESSING
收藏 引用
Science in china,Ser.A 1988年 第2期31卷 234-246页
作者: 唐守文 Department of computer Science beijing computer institute
In this paper, we present an O(logN) space algorithm and an O(N1/2. logN) space, O(NlogN) time algorithm to deal with the filling problem and components counting problem. Besides, we give a fast parallel algorithm... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new method of special words identification in security filtering
A new method of special words identification in security fil...
收藏 引用
2006北京地区高校研究生学术交流会
作者: Li Dun CaoYuanda Wan Yueliang (School of computer Science & technology, beijing institute of technology,) (beijing 100081, china ) (Modern Education technology center, Shanxi University, Taiyuan 030006, china)
In order to prevent the spread of the ill metamorphosed texts in Internet which escaped from the traditional security filtering, a method of new special words identification is presented. In the paper, metamorphosed c... 详细信息
来源: cnki会议 评论