咨询与建议

限定检索结果

文献类型

  • 22,187 篇 会议
  • 195 篇 期刊文献
  • 119 册 图书

馆藏范围

  • 22,501 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,441 篇 工学
    • 10,439 篇 计算机科学与技术...
    • 7,167 篇 软件工程
    • 2,510 篇 信息与通信工程
    • 2,023 篇 控制科学与工程
    • 1,419 篇 机械工程
    • 1,295 篇 仪器科学与技术
    • 1,201 篇 电气工程
    • 1,161 篇 电子科学与技术(可...
    • 644 篇 生物医学工程(可授...
    • 550 篇 生物工程
    • 500 篇 动力工程及工程热...
    • 420 篇 建筑学
    • 404 篇 安全科学与工程
    • 392 篇 化学工程与技术
    • 368 篇 光学工程
    • 358 篇 材料科学与工程(可...
    • 355 篇 交通运输工程
  • 4,189 篇 管理学
    • 2,846 篇 管理科学与工程(可...
    • 1,578 篇 图书情报与档案管...
    • 1,269 篇 工商管理
  • 4,146 篇 理学
    • 2,139 篇 数学
    • 922 篇 系统科学
    • 747 篇 物理学
    • 650 篇 统计学(可授理学、...
    • 625 篇 生物学
    • 346 篇 化学
  • 593 篇 医学
    • 438 篇 临床医学
    • 432 篇 基础医学(可授医学...
  • 573 篇 经济学
    • 564 篇 应用经济学
  • 478 篇 法学
  • 387 篇 教育学
    • 360 篇 教育学
  • 249 篇 农学
  • 184 篇 文学
  • 148 篇 艺术学
  • 69 篇 军事学
  • 1 篇 哲学

主题

  • 661 篇 servers
  • 632 篇 quality of servi...
  • 620 篇 educational inst...
  • 566 篇 computer archite...
  • 550 篇 computational mo...
  • 427 篇 monitoring
  • 378 篇 web services
  • 346 篇 computers
  • 292 篇 software
  • 277 篇 mathematical mod...
  • 272 篇 protocols
  • 264 篇 cloud computing
  • 244 篇 real time system...
  • 242 篇 algorithm design...
  • 221 篇 databases
  • 209 篇 indexes
  • 204 篇 bandwidth
  • 203 篇 semantics
  • 200 篇 service oriented...
  • 198 篇 wireless sensor ...

机构

  • 86 篇 department of co...
  • 53 篇 school of comput...
  • 42 篇 school of comput...
  • 39 篇 school of softwa...
  • 38 篇 school of comput...
  • 35 篇 school of comput...
  • 33 篇 school of comput...
  • 33 篇 school of comput...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of infor...
  • 28 篇 school of comput...
  • 27 篇 school of comput...
  • 25 篇 institute of inf...
  • 25 篇 college of compu...
  • 25 篇 college of compu...
  • 24 篇 department of el...
  • 24 篇 school of comput...
  • 22 篇 tsinghua nationa...

作者

  • 27 篇 wang wei
  • 22 篇 zhang lei
  • 22 篇 li li
  • 20 篇 china
  • 19 篇 li yang
  • 16 篇 li xin
  • 16 篇 wei li
  • 15 篇 jing zhang
  • 14 篇 wang lei
  • 14 篇 li tao
  • 14 篇 yang yang
  • 13 篇 tao yang
  • 13 篇 liu yang
  • 12 篇 liu jun
  • 11 篇 rui wang
  • 11 篇 zhang tao
  • 11 篇 zhang ning
  • 11 篇 wu bin
  • 11 篇 supriyanto eko
  • 11 篇 tao zhang

语言

  • 21,836 篇 英文
  • 646 篇 中文
  • 17 篇 其他
  • 2 篇 法文
检索条件"任意字段=2011 International Conference on Computer Science and Service System, CSSS 2011"
22501 条 记 录,以下是61-70 订阅
排序:
Security risks and countermeasures of college graduate employment of social transformation
Security risks and countermeasures of college graduate emplo...
收藏 引用
2011 international conference on computer science and service system, csss 2011
作者: Song, Dongliang Academy of Life Science Luoyang Normal University Luoyang China
A variety of security risks in the employment of college graduates in the process of social transformation was analyzed and summarized as followings: the security risks in the job recruitments, job security risks in i... 详细信息
来源: 评论
Design and implementation of context composition framework for end-user programming
Design and implementation of context composition framework f...
收藏 引用
2011 international conference on computer science and service system, csss 2011
作者: Su, Tianxiang Zhou, Rui Zhang, Changchun Li, Jing Chen, Canfeng Zhang, Jinfeng Rao, Jinghai School of Computer Science and Technology University of Science and Technology of China Hefei Anhui China Nokia Research Center Beijing China
Rich context available creates varied applications on mobile device and makes end-user possible to customize personalized context-aware application. Meanwhile, problems arise that how to realize the service compositio... 详细信息
来源: 评论
Web service composition based on bounded model checking
Web service composition based on bounded model checking
收藏 引用
2011 international conference on computer science and service system, csss 2011
作者: Fang, Zhi Liao, Lejian Chen, Ruoyu School of Computer Science and Technology Beijing Institute of Technology Beijing China
With the acceptance of service-oriented architecture (SOA) in many application domains and rapidly growing number of available services, it is now a challenge to effectively compose services to meet users' needs. ... 详细信息
来源: 评论
Fuzzy mathematics representation for key variables of logistics reputation evaluation
Fuzzy mathematics representation for key variables of logist...
收藏 引用
2011 international conference on computer science and service system, csss 2011
作者: Liang, Xikun Zhu, Zhengzheng Hangzhou Institute of Service Engineering Hangzhou Normal University Hangzhou China Department of International Trade Zhejiang Economic and Trade Polytechnic Hangzhou China
Based on the qualitative representation of logistics reputation grades, fuzzy mathematics methods are proposed to describe the grades and other variables according to the fuzzy characteristics of them. Moreover, some ... 详细信息
来源: 评论
Study on the core competence of enterprises on the basis of knowledge management
Study on the core competence of enterprises on the basis of ...
收藏 引用
international conference on computer science and service system
作者: Zhang, Guang-Ling Department of International Students College of Business Central South University of Forestry and Technology No.498 South Shaoshan Road Changsha City Hunan Province 410004 China
The essence of the core competence of enterprises is a dynamic knowledge system, whose forming process is a kind of process of knowledge obtaining, preservation, accumulation, spreading, sharing, application and innov... 详细信息
来源: 评论
Information network technology and collaborative learning
Information network technology and collaborative learning
收藏 引用
2011 international conference on computer science and service system, csss 2011
作者: Liu, Jiajun Li, Fengyun Liu, Shouyi Department of Computer Science Hebei Institute of Architecture and Civil Engineering Zhangjiakou City Hebei Province China
The basic concepts of network collaborative learning, theoretical grounds and social significance are mainly discussed in this article. With online collaborative learning practice, we summarized the advantages and dis... 详细信息
来源: 评论
A study of personalized recommendation evaluation based on customer satisfaction in E-commerce
A study of personalized recommendation evaluation based on c...
收藏 引用
2011 international conference on computer science and service system, csss 2011
作者: Liu, Beilin School of Computer Science and Information Engineering Beijing Technology and Business University Beijing China
The study of personalized recommendation in E-commerce has become the hot topic in the study of E-commerce application. This thesis puts forward a method of personalized recommendation evaluation in E-commerce based o... 详细信息
来源: 评论
Chaos-based true random number generator using image
Chaos-based true random number generator using image
收藏 引用
2011 international conference on computer science and service system, csss 2011
作者: Li, Xuan Zhang, Guoji Liao, Yuliang School of Computer Science and Engineering South China University of Technology Guangzhou China School of Science South China University of Technology Guangzhou China
This paper proposes a chaos-based true random number generator using image as nondeterministic entropy sources. Logistic map is applied to permute and diffuse the image to produce a random sequence after the image is ... 详细信息
来源: 评论
Paging query optimization of massive data in oracle 10g database
Paging query optimization of massive data in oracle 10g data...
收藏 引用
2011 international conference on computer science and service system, csss 2011
作者: Sun, Fengdong Wang, Lan Department of Computer Science and Technology DaLian Neusoft Institute of Information DaLian China
Paging query efficiency of massive data directly relates to the execution efficiency of application system in oracle database. Presented an optimized solution for paging query in oracle 10g database, which includes ma... 详细信息
来源: 评论
Research on the simulation model of network attacks
Research on the simulation model of network attacks
收藏 引用
2011 international conference on computer science and service system, csss 2011
作者: Tao, Yuan Zhang, Yuxiang Ren, Weihong Yuan, Jing Li, Moyan Zhang, Zhenfeng MPS Information Classified Security Protection Evaluation Center Third Research Institute Ministry of Public Security Beijing China
By analysis of the network attacks, three stages structure model and immunity parameters of network attacks are modeled, the evaluation tactic of immunity attacks are proposed, and the network attacks model based on i... 详细信息
来源: 评论