咨询与建议

限定检索结果

文献类型

  • 2,671 篇 期刊文献
  • 113 篇 会议

馆藏范围

  • 2,784 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,271 篇 工学
    • 1,386 篇 计算机科学与技术...
    • 656 篇 软件工程
    • 321 篇 控制科学与工程
    • 247 篇 机械工程
    • 221 篇 电子科学与技术(可...
    • 197 篇 仪器科学与技术
    • 168 篇 网络空间安全
    • 139 篇 信息与通信工程
    • 64 篇 材料科学与工程(可...
    • 53 篇 力学(可授工学、理...
    • 43 篇 动力工程及工程热...
    • 34 篇 光学工程
    • 34 篇 交通运输工程
    • 31 篇 航空宇航科学与技...
    • 26 篇 电气工程
    • 24 篇 化学工程与技术
    • 23 篇 地质资源与地质工...
    • 21 篇 建筑学
  • 553 篇 管理学
    • 536 篇 管理科学与工程(可...
  • 513 篇 理学
    • 269 篇 数学
    • 98 篇 物理学
    • 46 篇 系统科学
    • 29 篇 生物学
  • 87 篇 医学
    • 78 篇 临床医学
  • 37 篇 军事学
    • 36 篇 军队指挥学
  • 33 篇 农学
  • 27 篇 经济学
    • 26 篇 应用经济学
  • 27 篇 教育学
    • 25 篇 教育学
  • 27 篇 艺术学
    • 22 篇 设计学(可授艺术学...
  • 24 篇 文学
    • 19 篇 外国语言文学
  • 22 篇 法学
    • 22 篇 社会学
  • 10 篇 哲学
  • 2 篇 历史学

主题

  • 99 篇 cloud computing
  • 92 篇 parallel computi...
  • 73 篇 deep learning
  • 72 篇 computing
  • 65 篇 machine learning
  • 63 篇 parallel
  • 39 篇 cloud
  • 36 篇 gpu
  • 32 篇 data
  • 30 篇 edge computing
  • 29 篇 internet of thin...
  • 29 篇 security
  • 29 篇 algorithm
  • 26 篇 simulation
  • 26 篇 big data
  • 26 篇 blockchain
  • 26 篇 software
  • 25 篇 optimization
  • 24 篇 performance
  • 24 篇 network

机构

  • 33 篇 university of ch...
  • 25 篇 university of ch...
  • 19 篇 shanghai key lab...
  • 19 篇 institute of com...
  • 18 篇 trusted computin...
  • 18 篇 shanghai key lab...
  • 17 篇 ieee
  • 17 篇 department of co...
  • 17 篇 state key labora...
  • 16 篇 school of comput...
  • 16 篇 college of compu...
  • 16 篇 department of co...
  • 16 篇 state key labora...
  • 15 篇 state key labora...
  • 14 篇 school of comput...
  • 14 篇 riphah school of...
  • 13 篇 state key labora...
  • 13 篇 state key labora...
  • 12 篇 jiangsu collabor...
  • 11 篇 department of co...

作者

  • 21 篇 muhammad adnan k...
  • 18 篇 wei li
  • 16 篇 sagheer abbas
  • 16 篇 fei-yue wang
  • 14 篇 muhammad waseem ...
  • 13 篇 hai jin
  • 12 篇 qi liu
  • 12 篇 tao wang
  • 12 篇 陈勇
  • 12 篇 xiaolong xu
  • 12 篇 wei wang
  • 11 篇 huaimin wang
  • 10 篇 gang yin
  • 10 篇 xin liu
  • 10 篇 yong chen
  • 10 篇 xiaodong liu
  • 10 篇 dengguo feng
  • 9 篇 yuefei sui
  • 9 篇 jun li
  • 9 篇 taher m.ghazal

语言

  • 2,570 篇 英文
  • 214 篇 中文
检索条件"机构=Laboratory of Parallel Software and Computing Science"
2784 条 记 录,以下是81-90 订阅
排序:
Constrained maximum weighted bipartite matching:a novel approach to radio broadcast scheduling
收藏 引用
science China(Information sciences) 2019年 第7期62卷 156-169页
作者: Shaojiang WANG Tianyong WU Yuan YAO Dongbo BU Shaowei CAI State Key laboratory of Computer science Institute of SoftwareChinese Academy of Sciences School of Computer science and Technology University of Chinese Academy of Sciences Beijing Key Lab of Human-Computer Interaction Institute of SoftwareChinese Academy of Sciences Institute of computing Technology Chinese Academy of Sciences
Given a set of radio broadcast programs, the radio broadcast scheduling problem is to allocate a set of devices to transmit the programs to achieve the optimal sound quality. In this article, we propose a complete alg... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Providing Virtual Cloud for Special Purposes on Demand in JointCloud computing Environment
收藏 引用
Journal of Computer science & Technology 2017年 第2期32卷 211-218页
作者: Dong-Gang Cao Member, CCF, IEEE, Bo An Pei-Chang Shi Huai-Min Wang Key laboratory of High Confidence software Technologies (Peking University) Ministry of Education Beijing 100871 China National Key laboratory for parallel and Distributed Processing National University of Defense and Technology Changsha 410073 China
Cloud computing has been widely adopted by enterprises because of its on-demand and elastic resource usage paradigm. Currently most cloud applications are running on one single cloud. However, more and more applicatio... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Representation learning on textual network with personalized Page Rank
收藏 引用
science China(Information sciences) 2021年 第11期64卷 95-104页
作者: Teng LI Yong DOU National laboratory for parallel and Distributed Processing National University of Defense Technology
Representation learning on textual network or textual network embedding, which leverages rich textual information associated with the network structure to learn low-dimensional embedding of vertices, has been useful i... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of a Completely Anonymous Multi-recipient Signcryption Scheme with Public Verification
收藏 引用
Journal of Donghua University(English Edition) 2015年 第2期32卷 240-243页
作者: 张波 孙涛 于代荣 School of Information science and Engineering University of Jinan Shandong Provincial Key laboratory of Network Based Intelligent computing Shandong Provincial Key laboratory of software Engineering
Anonymity is a very important security objective in network ***,Pang et *** a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was strong existential unforgeabi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quality assessment of crowdsourced test cases
收藏 引用
science China(Information sciences) 2020年 第9期63卷 27-42页
作者: Yuan ZHAO Yang FENG Yi WANG Rui HAO Chunrong FANG Zhenyu CHEN State Key laboratory for Novel software Technology Nanjing University Golisano College of computing and Information sciences Rochester Institute of Technology
Various software-engineering problems have been solved by crowdsourcing. In many projects,the software outsourcing process is streamlined on cloud-based platforms. Among software engineering tasks,test-case developmen... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
High Performance Interconnect Network for Tianhe System
收藏 引用
Journal of Computer science & Technology 2015年 第2期30卷 259-272页
作者: 廖湘科 庞征 王克非 卢宇彤 谢旻 夏军 董德尊 所光 College of Computer National University of Defense Technology Changsha 410073 science and Technology on parallel and Distributed Processing laboratory National Changsha 410073 China China University of Defense Technology State Key laboratory of High Performance computing National University of Defense Technology Changsha 410073 China
In this paper, we present the Tianhe-2 interconnect network and message passing services. We describe the architecture of the router and network interface chips, and highlight a set of hardware and software features e... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
TULAM:trajectory-user linking via attention mechanism
收藏 引用
science China(Information sciences) 2024年 第1期67卷 51-68页
作者: Hao LI Shuyu CAO Yaqing CHEN Min ZHANG Dengguo FENG Trusted computing and Information Assurance laboratory Institute of SoftwareChinese Academy of Sciences University of Chinese Academy of sciences
Recently,the application of location-based services(LBS) has become a prevalent means to provide convenience in customers’ everyday ***,because massive volumes of location information are collected by LBS application... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure Two-Party Point-Circle Inclusion Problem
收藏 引用
Journal of Computer science & Technology 2007年 第1期22卷 88-91页
作者: 罗永龙 黄刘生 仲红 Department of Computer science University of Science and Technology of China Hefei 230027 China Department of Computer science Anhui Normal University Wuhu 241000 China Anhui Province Key laboratory of software in computing and Communication Hefei 230027 China
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Improved lattice-based CCA2-secure PKE in the standard model
收藏 引用
science China(Information sciences) 2020年 第8期63卷 147-168页
作者: Jiang ZHANG Yu YU Shuqin FAN Zhenfeng ZHANG State Key laboratory of Cryptology Guangdong Provincial Key laboratory of Data Security and Privacy Protection Jinan University Department of Computer science and Engineering Shanghai Jiao Tong University Trusted computing and Information Assurance laboratory Institute of SoftwareChinese Academy of Sciences
Based on the identity-based encryption(IBE) from lattices by Agrawal et al.(Eurocrypt’10),Micciancio and Peikert(Eurocrypt’12) presented a CCA1-secure public-key encryption(PKE), which has the best known efficiency ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Feature-Oriented Nonfunctional Requirement Analysis for software Product Line
收藏 引用
Journal of Computer science & Technology 2009年 第2期24卷 319-338页
作者: 彭鑫 Seok-Won Lee 赵文耘 School of Computer science Fudan University Knowledge-Intensive software Engineering Research Group Department of Software and Information Systems College of Computing and Informatics University of North Carolina at Charlotte
Domain analysis in software product line (SPL) development provides a basis for core assets design and imple- mentation by a systematic and comprehensive commonality/variability analysis. In feature-oriented SPL met... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论