咨询与建议

限定检索结果

文献类型

  • 843 篇 会议
  • 646 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,512 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 996 篇 工学
    • 783 篇 计算机科学与技术...
    • 665 篇 软件工程
    • 166 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 90 篇 生物工程
    • 76 篇 电气工程
    • 65 篇 电子科学与技术(可...
    • 64 篇 机械工程
    • 62 篇 生物医学工程(可授...
    • 59 篇 光学工程
    • 41 篇 化学工程与技术
    • 37 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 26 篇 交通运输工程
    • 24 篇 动力工程及工程热...
  • 449 篇 理学
    • 269 篇 数学
    • 106 篇 生物学
    • 100 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 40 篇 化学
  • 274 篇 管理学
    • 187 篇 管理科学与工程(可...
    • 107 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 53 篇 医学
    • 49 篇 临床医学
    • 40 篇 基础医学(可授医学...
    • 25 篇 药学(可授医学、理...
  • 34 篇 法学
    • 31 篇 社会学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 12 篇 农学
  • 12 篇 军事学
  • 11 篇 教育学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 39 篇 computer science
  • 34 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 30 篇 training
  • 29 篇 software enginee...
  • 27 篇 data mining
  • 27 篇 accuracy
  • 26 篇 software
  • 22 篇 deep learning
  • 22 篇 predictive model...
  • 20 篇 testing
  • 18 篇 convolution
  • 18 篇 authentication
  • 17 篇 cloud computing
  • 16 篇 analytical model...
  • 16 篇 artificial intel...
  • 15 篇 optimization
  • 14 篇 conferences

机构

  • 178 篇 state key labora...
  • 119 篇 university of ch...
  • 96 篇 institute of sof...
  • 54 篇 college of compu...
  • 45 篇 academy of compu...
  • 41 篇 technology cente...
  • 38 篇 jd explore acade...
  • 37 篇 school of comput...
  • 29 篇 academy of compu...
  • 26 篇 institute of inf...
  • 25 篇 institute of com...
  • 22 篇 shenzhen institu...
  • 21 篇 department of co...
  • 20 篇 state key labora...
  • 19 篇 school of electr...
  • 18 篇 school of comput...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 graduate univers...
  • 16 篇 school of comput...

作者

  • 37 篇 tao dacheng
  • 33 篇 du bo
  • 18 篇 fan heng
  • 18 篇 wu enhua
  • 18 篇 zhang libo
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 16 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 bin sheng
  • 12 篇 tian feng
  • 11 篇 dai guozhong
  • 10 篇 qing wang

语言

  • 1,413 篇 英文
  • 55 篇 其他
  • 45 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering"
1512 条 记 录,以下是1421-1430 订阅
排序:
An application-semantics-based relaxed transaction model for internetware
收藏 引用
science in China(Series F) 2006年 第6期49卷 774-791页
作者: HUANG Tao DING Xiaoning WEI Jun Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing 100080 China Key laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing100080 China Graduate School of Chinese Academy of Sciences Beijing 100080 China
An internetware application is composed by existing individual services, while transaction processing is a key mechanism to make the composition reliable. The existing research of transactional composite service (TCS... 详细信息
来源: 评论
3-Dimensional Sensor Model in the Sensor Network
收藏 引用
电子学报(英文版) 2006年 第2期15卷 324-328页
作者: LIN Zhiting QU Yugui ZHAI Yujia ZHAO Baohua Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
Sensor webs consisting of nodes with limited battery power and wireless communication are deployed to collect useful information from a variety of environments. One fundamental issue in sensor networks is the coverage... 详细信息
来源: 评论
Placement Algorithm for the Wireless Sensor Network
收藏 引用
电子学报(英文版) 2006年 第1期15卷 179-182页
作者: LIN Zhiting QU Yugui ZHAI Yujia ZHAO Baohua Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
Wireless sensor networks (WSN) are deployed to monitor the physical world and to provide relevant data to the users. The coverage problem of WSN is one of the hot topics of research. Deploying insufficient nodes might... 详细信息
来源: 评论
Research and establishment of quality cost oriented software testing model
Research and establishment of quality cost oriented software...
收藏 引用
2006 Canadian Conference on Electrical and computer engineering, CCECE'06
作者: Yuyu, Yuan Shen, Gu Computer Science Department Computer Architecture Group Pkuing University Beijing 100871 China College of Software Engineering Graduate School Chinese Academy of Sciences Beijing 100049 China
In a competitive market, quality is essential to the software. software test plays an important role during the software-developing period. Any saving on software test, will greatly reduce the total cost of software. ... 详细信息
来源: 评论
Integrating Ada 2005 into visual studio 2005  06
Integrating Ada 2005 into visual studio 2005
收藏 引用
SIGAda'06 - 2006 ACM SIGAda Annual International Conference
作者: Carlisle, Martin C. Hamilton Jr., J.A. Department of Computer Science U.S. Air Force Academy 2354 Fairchild Drive CO 80840-6234 United States Computer Science and Software Engineering 107 Dunstan Hall Auburn University AL 36849 United States
In this paper, we describe the integration of an Ada 2005 compiler into Microsoft's 2005 Visual Studio and its implications for the Ada community and beyond. Copyright 2006 ACM.
来源: 评论
A predictive approach to achieving consistency in cooperative caching in MANET
A predictive approach to achieving consistency in cooperativ...
收藏 引用
1st International Conference on Scalable Information Systems, InfoScale '06
作者: Huang, Yu Cao, Jiannong Jin, Beihong Dept. of Computer Science Univ. of Science and Technology of China Hefei China Internet and Mobile Computing Lab. Dept. of Computing Hong Kong Polytechnic Univ. Kawloon Hong Kong Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing China
Cooperative caching is a very important technique for efficient data dissemination and sharing in mobile ad hoc networks (MANETs). Many applications have requirements on the consistency of the content cached on differ... 详细信息
来源: 评论
Safely redistributing untrusted code using .NET
Safely redistributing untrusted code using .NET
收藏 引用
2006 IEEE Workshop on Information Assurance
作者: Carlisle, Martin C. Humphries, Jeffrey W. Hamilton Jr., John A. IEEE Department of Computer Science and Software Engineering Auburn University Auburn AL 36849 United States United States Air Force Academy CO 80840 United States US Air Force GA United States
Reusing software components is a textbook software engineering best practice. Developers reuse components written by others, combining them in unique ways to create new software products. Reusing software components c... 详细信息
来源: 评论
The new Java security architecture
CrossTalk
收藏 引用
CrossTalk 2006年 第7期19卷
作者: Mkpong-Ruffin, Idongesit Hamilton Jr., John A. Carlisle, Martin C. Department of Computer Science and Software Engineering Auburn University Department of Computer Science United States Air Force Academy Auburn University 107 Dunstan Hall Auburn AL 36849
Java's original security architecture was designed to facilitate the execution of software from remote systems while simultaneously preventing downloaded code from performing unauthorized operations on host machin... 详细信息
来源: 评论
The Integration of a Virtual Environment and 3D Modeling Tools in a Networked Robot System
The Integration of a Virtual Environment and 3D Modeling Too...
收藏 引用
作者: Tan, Jiacheng Clapworthy, Gordon J. Belousov, Igor R. Department of Computer Science and Software Engineering University of Portsmouth Lion Terrace PortsmouthPO12HE United Kingdom Department of Computing and Information Systems University of Luton Luton United Kingdom Keldysh Institute of Applied Mathematics Russian Academy of Science Moscow Russia
This paper presents interfacing techniques to integrate a virtual environment (VE), computer graphics, image-based modeling, and other technologies in a networked system for robot control. Technologies such as network... 详细信息
来源: 评论
Distributed Utilization Control for Real-Time Clusters with Load Balancing
Distributed Utilization Control for Real-Time Clusters with ...
收藏 引用
Real-Time Systems Symposium (RTSS)
作者: Yong Fu Hongan Wang Chenyang Lu Ramu Sharat Chandra Intelligence Engineering Laboratory Institute of Software Chinese Academy and Sciences China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences China Department of Computer Science and Engineering Washington University of Saint Louis USA GE Global Research Center USA
Previous years have seen rapid growth of online services that rely on large-scale server clusters to handle high volume of requests. Such clusters must adaptively control the CPU utilizations of many processors in ord... 详细信息
来源: 评论