咨询与建议

限定检索结果

文献类型

  • 606 篇 期刊文献
  • 35 篇 会议

馆藏范围

  • 641 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 486 篇 工学
    • 174 篇 计算机科学与技术...
    • 101 篇 软件工程
    • 58 篇 控制科学与工程
    • 48 篇 材料科学与工程(可...
    • 44 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 37 篇 仪器科学与技术
    • 32 篇 信息与通信工程
    • 25 篇 网络空间安全
    • 20 篇 测绘科学与技术
    • 20 篇 交通运输工程
    • 19 篇 电气工程
    • 18 篇 环境科学与工程(可...
    • 16 篇 地质资源与地质工...
    • 15 篇 化学工程与技术
    • 11 篇 矿业工程
    • 11 篇 航空宇航科学与技...
    • 10 篇 动力工程及工程热...
    • 10 篇 水利工程
    • 9 篇 核科学与技术
  • 132 篇 理学
    • 42 篇 物理学
    • 26 篇 数学
    • 14 篇 天文学
    • 10 篇 生物学
  • 89 篇 管理学
    • 80 篇 管理科学与工程(可...
  • 42 篇 农学
    • 16 篇 农业资源与环境
    • 10 篇 作物学
  • 39 篇 医学
    • 19 篇 临床医学
    • 10 篇 药学(可授医学、理...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 8 篇 艺术学
  • 6 篇 军事学
  • 4 篇 教育学
  • 3 篇 文学
  • 2 篇 法学
  • 1 篇 哲学

主题

  • 19 篇 深度学习
  • 9 篇 卷积神经网络
  • 7 篇 神经网络
  • 6 篇 并行计算
  • 6 篇 数值模拟
  • 6 篇 培养条件
  • 5 篇 区块链
  • 5 篇 数据中心
  • 5 篇 人工智能
  • 5 篇 云计算
  • 5 篇 大数据
  • 5 篇 边缘计算
  • 5 篇 图形处理器(gpu)
  • 5 篇 机器学习
  • 4 篇 羊肚菌
  • 4 篇 性能分析
  • 4 篇 高性能计算
  • 4 篇 温度
  • 4 篇 知识图谱
  • 4 篇 注意力机制

机构

  • 67 篇 中国科学院大学
  • 49 篇 中国科学院计算技...
  • 23 篇 清华大学
  • 21 篇 university of ch...
  • 18 篇 北京科技大学
  • 16 篇 北京农学院
  • 13 篇 北京交通大学
  • 13 篇 北京工业大学
  • 12 篇 中国铁道科学研究...
  • 12 篇 北京理工大学
  • 11 篇 北京大学
  • 11 篇 中国地质大学
  • 11 篇 中国石油大学
  • 11 篇 中国矿业大学
  • 10 篇 中国科学技术大学
  • 9 篇 计算机体系结构国...
  • 9 篇 北京航空航天大学
  • 8 篇 西安电子科技大学
  • 8 篇 中国农业大学
  • 7 篇 华中科技大学

作者

  • 37 篇 张国庆
  • 16 篇 陈青君
  • 10 篇 张磊
  • 10 篇 china
  • 9 篇 李周
  • 7 篇 guoqing zhang
  • 7 篇 章隆兵
  • 7 篇 郑亮
  • 7 篇 李国庆
  • 6 篇 张国清
  • 5 篇 许文勇
  • 5 篇 王国庆
  • 5 篇 赵士彭
  • 5 篇 胡渤洋
  • 5 篇 张立志
  • 5 篇 韩鹏
  • 5 篇 张鹏
  • 5 篇 孙国清
  • 5 篇 jun li
  • 5 篇 di li

语言

  • 443 篇 中文
  • 198 篇 英文
检索条件"作者=ZHANG GuoQiang1,2.3.& ZHANG GuoQing1 1Institute of computing Technology,{2. academy of {3.,beijing 100190,china"
641 条 记 录,以下是1-10 订阅
排序:
Communication network designing:Transmission capacity,cost and scalability
收藏 引用
Science china(Information Sciences) 2012年 第11期55卷 2454-2465页
作者: zhang guoqiang1,2.3.& zhang guoqing1 1institute of computing technology,Chinese {2. of Sciences,{3.,china 2.chool of Computer Science and technology,Nanjing Normal University,Nanjing 2.0046,china 3.rovincial Key Laboratory for Computer Information Processing technology,Soochow University,Suzhou 2.5000,china 1. institute of computing {2. Chinese Academy of Sciences Beijing 100190 China2. School of Computer Science and Technology Nanjing Normal University Nanjing 210046 China3. Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215000 China
Despite the growing number of works centering around the traffic dynamics on complex networks,these researches still have some common shortcomings,e.g.,too simple traffic flow model and lack of considerations for the ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Identifying heavy hitters in high-speed network monitoring
收藏 引用
Science china(Information Sciences) 2010年 第3期53卷 659-676页
作者: zhang Yu1, FANG BinXing1,2.& zhang YongZheng2.1Research Center of Computer Network and Information Security {2., Harbin institute of {2., Harbin 150001, china 2.esearch Center of Information Security, institute of computing {2., Chinese academy of Sciences, {13., china 1. Research Center of Computer Network and Information Security technology Harbin Institute of Technology Harbin 150001 China2. Research Center of Information Security Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Identifying heavy hitters in a network traffic stream is important for a variety of network applications ranging from traffic engineering to anomaly detection such as detection of denial-of-service attacks. Existing m... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Analysis of moment invariants under general linear transformation
收藏 引用
Science china(Information Sciences) 2010年 第7期53卷 1305-1311页
作者: DIAO LuHong1, LI Hua2. zhang Sen1 & LIU Lei1 1College of Applied Sciences, beijing University of {2., beijing 10012., china 2.ational Center of Intelligent computing, institute of computing {2., Chinese academy of Science, beijing 100080, china 1. College of Applied Sciences Beijing University of Technology Beijing 100124 China2. National Center of Intelligent Computing Institute of Computing Technology Chinese Academy of Science Beijing 100080 China
This paper presents the necessary and sufficient condition of moment invariants under general linear transformation. Based on this condition, arbitrary order and dimensional moment invariant sets can be constructed. D... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
P2. traffic optimization
收藏 引用
Science china(Information Sciences) 2012年 第7期55卷 1475-1492页
作者: zhang guoqiang 1,2 ,TANG MingDong 3.,CHENG SuQi 2,4 ,zhang {3. 2 ,SONG HaiBin 5 ,CAO JiGuang 6 & YANG Jing 7 1 School of Computer Science and technology,Nanjing Normal University,Nanjing 210046,china 2 institute of computing technology,Chinese academy of Sciences,beijing 100190,china 3.School of Computer Science and Engineering,Hunan University of Science and technology,Xiangtan 411201,china 4 Graduate University of Chinese academy of Sciences,beijing 100190,china 5 Nanjing R&D Center,Huawei Technologies,Nanjing 210012,china 6 china academy of Telecommunication Research of MIIT,beijing 100191,china 7 china Mobile Research institute,beijing 100053.china 1. School of Computer Science and technology Nanjing Normal University Nanjing 210046 China2. Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China3. School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan 411201 China4. Graduate University of Chinese Academy of Sciences Beijing 100190 China5. Nanjing R&D Center Huawei Technologies Nanjing 210012 China6. China Academy of Telecommunication Research of MIIT Beijing 100191 China7. China Mobile Research Institute Beijing 100053 China
Peer-to-peer (P2.) based content distribution systems have emerged as the main form for content distribution on the Internet,which can greatly reduce the distribution cost of content providers and improve the overall ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Multiparty simultaneous quantum identity authentication with secret sharing
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第3期51卷 321-327页
作者: YANG YuGuang1,2.WEN QiaoYan3.& zhang Xing4,5 1 College of Computer Science and technology,{2. University of technology,{2. 10002.,china 2.State Key Laboratory of Information Security (Graduate University of the Chinese academy of Sciences),{2. 100049,china 3.School of Science,{2. University of Posts and Telecommunications,{2. 100876,china 4 {12. of Electronic technology,Information Engineering University,Zhengzhou 450004,china 5 Trusted computing Laboratory,{2. University of technology,{2. 10002.,china College of Computer Science technology Beijing University of Technology Beijing 100022 China State Key Laboratory of Information Security [Graduate University of the Chinese academy of Sciences] Beijing 100049 China School of Science Beijing University of Posts Telecommunications Beijing 100876 China institute of Electronic technology Information Engineering University Zhengzhou 450004 China Trusted computing Laboratory Beijing University of Technology Beijing 100022 China
Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first proto... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Symmetric Banzhaf Value for Fuzzy Games with a Coalition Structure
收藏 引用
International Journal of Automation and computing 2012年 第6期9卷 600-608页
作者: Fan-Yong Meng 1 Qiang zhang 2.1 School of Management,Qingdao Technological University,Qingdao 2.652.,china 2.School of Management and Economics,{2. institute of technology,{2. 100081,china 1. School of Management Qingdao Technological University Qingdao 266520 China 2. School of Management and Economics Beijing Institute of Technology Beijing 100081 China
In this paper,a generalized form of the symmetric Banzhaf value for cooperative fuzzy games with a coalition structure is *** axiomatic systems of the symmetric Banzhaf value are given by extending crisp ***,we study ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The structural analysis of fuzzy measures
收藏 引用
Science china(Information Sciences) 2011年 第1期54卷 38-50页
作者: zhang Ling1,zhang Bo2.& zhang YanPing1 1 Computer Science College,Anhui University,Hefei 2.003.,china 2.tate Key Lab of Intelligent technology & Systems Tsinghua National Lab for Information Science & technology Information Science & technology College,Computer Science & technology,Tsinghua University,beijing 100084,china 1. Computer Science College Anhui University Hefei 230039 China2. State Key Lab of Intelligent Technology & Systems Tsinghua National Lab for Information Science & technology Information Science & technology College Computer Science & Technology Tsinghua University Beijing 100084 China
From quotient space based granular computing theory we explore the fuzzy measures of fuzzy sets. Based on the structural analysis of fuzzy sets,we present an"isotropism"*** this assumption we achieved the following in... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Subchronic toxicological effects of aquatic nitrobenzene on Medaka and Chinese rare minnow
收藏 引用
Science china Chemistry 2007年 第5期50卷 707-717页
作者: ZHOU QunFang1, FU JianJie1,2. MENG HaiZhen1,2. ZHU XueYan1,2. JIANG GuiBin1, {3. JianBin1, LIU JieMin2.& SHI guoqing2.1 State Key Laboratory of Environmental Chemistry and Ecotoxicology, Research Center for Eco-environmental Sciences, Chinese {2. of Sciences, beijing 100085, china 2.Department of Chemistry, School of Applied Science, University of Science and technology beijing, beijing 100083. china State Key Laboratory of Environmental Chemistry and Ecotoxicology ResearchCenter for Eco-environmental SciencesChinese Academy of SciencesBeijing 100085China Department ofChemistry School of Applied ScienceUniversity of Science and Technology B
Based on the simulative exposure experiments of nitrobenzene to two small experimental fishes, Medaka (Oryzias latipes) and Chinese Rare Minnow (Gobiocypris rarus), it was found that nitrobenzene could decrease in a l... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Parallel computing of Ocean General Circulation Model
收藏 引用
Wuhan University Journal of Natural Sciences 2001年 第Z1期6卷 568-573页
作者: zhang Li lun 1, Song Jun qiang 1, Li Xiao mei 2.1. School of Computer Science, National University of Defense technology, Changsha 410073. {2. 2. Department of Computer, institute of Command technology, beijing 100081, {2. School of Computer Science National University of Defense Technology Changsha 410073 P.R. China
This paper discusses the parallel computing of the third generation Ocean General Circulation Model (OGCM) from the State Key Laboratory of Numerical Modeling for Atmospheric Science and Geophysical Fluid Dynamics(LAS... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research on trusted computing and its development
收藏 引用
Science china(Information Sciences) 2010年 第3期53卷 405-433页
作者: SHEN ChangXiang1, zhang HuanGuo1?, WANG HuaiMin3. WANG Ji3. ZHAO Bo2. YAN Fei2. YU FaJiang2. zhang LiQiang2.& XU MingDi2.{2. University of technology, {2. 10012., china 2.chool of Computer, Wuhan University, Key Laboratory of Aerospace Information Security and Trusted {13. of Ministry of Education, Wuhan 43.072. china 3.chool of Computer, National University of Defence technology, Changsha 43.074, china 1. beijing University of technology Beijing 100124 China3. School of Computer National University of Defence Technology Changsha 430074 China2. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education School of Computer Wuhan University Wuhan 430072 China
Trusted computing is a novel technology of information system security. It has become a new tide in worldwide information security area and achieved inspiring accomplishment. In {2., the initiative research of trust... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论