咨询与建议

限定检索结果

文献类型

  • 843 篇 会议
  • 646 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,512 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 996 篇 工学
    • 783 篇 计算机科学与技术...
    • 665 篇 软件工程
    • 166 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 90 篇 生物工程
    • 76 篇 电气工程
    • 65 篇 电子科学与技术(可...
    • 64 篇 机械工程
    • 62 篇 生物医学工程(可授...
    • 59 篇 光学工程
    • 41 篇 化学工程与技术
    • 37 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 26 篇 交通运输工程
    • 24 篇 动力工程及工程热...
  • 449 篇 理学
    • 269 篇 数学
    • 106 篇 生物学
    • 100 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 40 篇 化学
  • 274 篇 管理学
    • 187 篇 管理科学与工程(可...
    • 107 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 53 篇 医学
    • 49 篇 临床医学
    • 40 篇 基础医学(可授医学...
    • 25 篇 药学(可授医学、理...
  • 34 篇 法学
    • 31 篇 社会学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 12 篇 农学
  • 12 篇 军事学
  • 11 篇 教育学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 39 篇 computer science
  • 34 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 30 篇 training
  • 29 篇 software enginee...
  • 27 篇 data mining
  • 27 篇 accuracy
  • 26 篇 software
  • 22 篇 deep learning
  • 22 篇 predictive model...
  • 20 篇 testing
  • 18 篇 convolution
  • 18 篇 authentication
  • 17 篇 cloud computing
  • 16 篇 analytical model...
  • 16 篇 artificial intel...
  • 15 篇 optimization
  • 14 篇 conferences

机构

  • 178 篇 state key labora...
  • 119 篇 university of ch...
  • 96 篇 institute of sof...
  • 54 篇 college of compu...
  • 45 篇 academy of compu...
  • 41 篇 technology cente...
  • 38 篇 jd explore acade...
  • 37 篇 school of comput...
  • 29 篇 academy of compu...
  • 26 篇 institute of inf...
  • 25 篇 institute of com...
  • 22 篇 shenzhen institu...
  • 21 篇 department of co...
  • 20 篇 state key labora...
  • 19 篇 school of electr...
  • 18 篇 school of comput...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 graduate univers...
  • 16 篇 school of comput...

作者

  • 37 篇 tao dacheng
  • 33 篇 du bo
  • 18 篇 fan heng
  • 18 篇 wu enhua
  • 18 篇 zhang libo
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 16 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 bin sheng
  • 12 篇 tian feng
  • 11 篇 dai guozhong
  • 10 篇 qing wang

语言

  • 1,413 篇 英文
  • 55 篇 其他
  • 45 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering"
1512 条 记 录,以下是1401-1410 订阅
排序:
Perfect concurrent signature protocol
Perfect concurrent signature protocol
收藏 引用
SNPD 2007: 8th ACIS International Conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Zhenjie, Huang Rufen, Huang Xuanzhi, Lin Department of Computer Science and Engineering Zhangzhou Normal University Fujian 363000 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 China
The concept of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004 which allows two entities to produce two signatures in such a way that, the signer of each signa... 详细信息
来源: 评论
Slicing of component behavior specification with respect to their composition
Slicing of component behavior specification with respect to ...
收藏 引用
10th International ACM SIGSOFT Symposium on Component-Based software engineering, CBSE 2007
作者: Šerý, Ondřej Plašil, František Charles University in Prague Faculty of Mathematics And Physics Department of Software Engineering Malostranske namesti 25 118 00 Prague 1 Czech Republic Academy of Sciences of the Czech Republic Institute of Computer Science
Being an important means of reducing development costs, behavior specification of software components facilitates reuse of a component and even reuse of a component's architecture (assembly). However, since typica... 详细信息
来源: 评论
Validating a network simulation testbed for army UAVs
Validating a network simulation testbed for army UAVs
收藏 引用
Simulation Winter Conference
作者: Stephen Hamilton Timothy Schmoyer J. A. Hamilton Electrical Engineering & Computer Science United States Military Academy West Point NY USA Computer Science & Software Engineering Auburn University AL 36849 USA
Auburn University, through the Army's aviation and missile research, development and engineering center (AMRDEC) has been supporting the unmanned systems initiative (USI) program in three research areas related to... 详细信息
来源: 评论
Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols
Pseudo trust: Zero-knowledge based authentication in anonymo...
收藏 引用
21st International Parallel and Distributed Processing Symposium, IPDPS 2007
作者: Lu, Li Han, Jinsong Hu, Lei Huai, Jinpeng Liu, Yunhao Ni, Lionel M. State Key Lab. of Information Security Graduate School Chinese Academy of Sciences Beijing China Dept. of Computer Science and Engineering Hong Kong University of Science and Technology Kowloon Hong Kong School of Computer Science Beihang University Beijing China State Key Lab. of Software Developing Environment Beihang University Beijing China
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence, there exists an inhere... 详细信息
来源: 评论
Evaluation of SAT-based Bounded Model Checking of ACTL Properties
Evaluation of SAT-based Bounded Model Checking of ACTL Prope...
收藏 引用
Theoretical Aspects of software engineering (TASE)
作者: Yanyan Xu Wei Chen Liang Xu Wenhui Zhang School of Information Science and Engineering Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences China
Bounded model checking (BMC) based on SAT has been introduced as a complementary method to BDD based symbolic model checking of LTL and ACTL properties in recent years. For general LTL and ACTL properties, BMC has tra... 详细信息
来源: 评论
B-spline Surfaces of Clustered Point Sets with Normal Maps
B-spline Surfaces of Clustered Point Sets with Normal Maps
收藏 引用
10th IEEE International Conference on computer Aided Design and computer Graphics(第十届CAO/Graphics国际会议)
作者: Yanci Zhang Hanqiu Sun Enhua Wu State Key Lab.of Computer Science Institute of SoftwareChinese Academy of Sciences Department of Computer Science and EngineeringThe Chinese University of Hong Kong Faculty of Science and TechnologyUniversity of Macau
In this paper,we propose a novel method that represents the highly-complex point sets by clustering the points to normal-mapped B-spline surfaces (NBSs). The main idea is to construct elaborate normal maps on simple s... 详细信息
来源: 评论
The tilt cursor: Enhancing stimulus-response compatibility by providing 3D orientation cue of pen
Conference on Human Factors in Computing Systems - Proceedin...
收藏 引用
Conference on Human Factors in Computing Systems - Proceedings 2007年 303-306页
作者: Tian, Feng Ao, Xiang Wang, Hongan Setlur, Vidya Dai, Guozhong Intelligence Engineering Lab. Institute of Software Chinese Academy of Sciences P.O.Box 8718 Beijing China State Key Lab. of Computer Science P.O.Box 8718 Beijing China Nokia Research Palo Alto 975 Page Mill Road Palo Alto CA United States
In order to improve stimulus-response compatibility of touchpad in pen-based user interface, we present the tilt cursor, i.e. a cursor dynamically reshapes itself to providing the 3D orientation cue of pen. We also pr... 详细信息
来源: 评论
Moving Schemes for Mobile Sinks in Wireless Sensor Networks
Moving Schemes for Mobile Sinks in Wireless Sensor Networks
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Yanzhong Bi Jianwei Niu Limin Sun Wei Huangfu Yi Sun Institute of Software Chinese Academy and Sciences Beijing China School of Computer Science and Engineering Beihang University Beijing China College of Information Sciences and Engineering Graduate University of Academy of Sciences Beijing China
In a wireless sensor network for data-gathering applications, if all network data congregate to a stationary sink node hop by hop, the sensor nodes near the sink have to consume more energy on forwarding data for othe... 详细信息
来源: 评论
Perfect Concurrent Signature Protocol
Perfect Concurrent Signature Protocol
收藏 引用
ACIS International Conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Zhenjie Huang Rufen Huang Xuanzhi Lin Department of Computer Science and Engineering Zhangzhou Normal University Fujian China State Key Laboratory of Information Security Institute of Software Chinese Academy and Sciences Beijing China
The concept of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004 which allows two entities to produce two signatures in such a way that, the signer of each signa... 详细信息
来源: 评论
An Combination Approach to Tackling Semantic Conflicts Based on RDF Model
An Combination Approach to Tackling Semantic Conflicts Based...
收藏 引用
2007年第三届语义和知识网格国际会议(Third International Conference on Semantics,Knowledge,and Grid)(SKG 2007)
作者: Yinglong Ma Beihong Jin School of Computer Science and Technology North China Electric Power University Beijing 102206 P.R. Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences P.O.Box
Within Semantic Web environments, ontologies have been adopted as their conceptual backbone. An important task for Web information integration and sharing is to resolve semantic conflicts because of semantic heterogen... 详细信息
来源: 评论