咨询与建议

限定检索结果

文献类型

  • 832 篇 会议
  • 653 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,508 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 997 篇 工学
    • 781 篇 计算机科学与技术...
    • 663 篇 软件工程
    • 165 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 91 篇 生物工程
    • 82 篇 电气工程
    • 64 篇 生物医学工程(可授...
    • 63 篇 机械工程
    • 63 篇 电子科学与技术(可...
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 38 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 28 篇 交通运输工程
    • 23 篇 动力工程及工程热...
  • 449 篇 理学
    • 267 篇 数学
    • 108 篇 生物学
    • 101 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 44 篇 系统科学
    • 41 篇 化学
  • 276 篇 管理学
    • 188 篇 管理科学与工程(可...
    • 109 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 54 篇 医学
    • 49 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 13 篇 农学
  • 12 篇 军事学
  • 11 篇 教育学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 39 篇 computer science
  • 33 篇 computational mo...
  • 32 篇 machine learning
  • 31 篇 semantics
  • 31 篇 training
  • 29 篇 software enginee...
  • 28 篇 data mining
  • 28 篇 feature extracti...
  • 26 篇 software
  • 25 篇 accuracy
  • 21 篇 deep learning
  • 21 篇 predictive model...
  • 19 篇 testing
  • 18 篇 convolution
  • 18 篇 authentication
  • 17 篇 analytical model...
  • 17 篇 cloud computing
  • 16 篇 artificial intel...
  • 14 篇 conferences
  • 14 篇 optimization

机构

  • 178 篇 state key labora...
  • 120 篇 university of ch...
  • 98 篇 institute of sof...
  • 53 篇 college of compu...
  • 44 篇 academy of compu...
  • 41 篇 technology cente...
  • 38 篇 jd explore acade...
  • 37 篇 school of comput...
  • 29 篇 academy of compu...
  • 26 篇 institute of inf...
  • 24 篇 institute of com...
  • 22 篇 shenzhen institu...
  • 20 篇 department of co...
  • 20 篇 state key labora...
  • 19 篇 school of electr...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 18 篇 fan heng
  • 18 篇 wu enhua
  • 18 篇 zhang libo
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 16 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 bin sheng
  • 12 篇 tian feng
  • 11 篇 qing wang
  • 11 篇 dai guozhong

语言

  • 1,409 篇 英文
  • 55 篇 其他
  • 45 篇 中文
  • 1 篇 日文
检索条件"机构=Academy of Computer Science and Software Engineering"
1508 条 记 录,以下是171-180 订阅
排序:
Analysis and verification of dynamic stock trading systems
收藏 引用
Information Technology Journal 2008年 第3期7卷 466-473页
作者: Du, Yuyue Zheng, Hong Yu, Shuxia College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
A dynamic stock trading system with a distributed shared memory is analyzed formally based on its temporal Petri net model. The functional correctness of the system is formally verified and some important properties o... 详细信息
来源: 评论
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks
收藏 引用
Frontiers of computer science 2014年 第3期8卷 456-468页
作者: Mingwu ZHANG Yi MU School of Computer Sciences Hubei University of Technology Wuhan 430068 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Computer Science and Software Engineering University of Wollongong Wollongong NSW 2522 Australia
In order to tolerate possible leakage of secret keys, leakage-resilient cryptosystem models a class of attractive leakage output by allowing an adversary to provide any computable leakage function and learning the par... 详细信息
来源: 评论
Parallel software-Based Self-Testing with Bounded Model Checking for Kilo-Core Networks-on-Chip
收藏 引用
Journal of computer science & Technology 2023年 第2期38卷 405-421页
作者: 张颖 季鹏飞 朱潘玮 Zebo Peng 李华伟 江建慧 School of Software Engineering Tongji UniversityShanghai 200092China Department of Computer and Information Science Linkoping UniversityLinkoping 58183Sweden Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
Online testing is critical to ensuring reliable operations of the next generation of supercomputers based on a kilo-core network-on-chip(NoC)interconnection *** present a parallel software-based self-testing(SBST)solu... 详细信息
来源: 评论
A selective literature review on cyber counterintelligence  17
A selective literature review on cyber counterintelligence
收藏 引用
17th European Conference on Cyber Warfare and Security, ECCWS 2018
作者: Duvenage, Petrus Jaquire, Victor Von Solms, Sebastian Centre for Cyber Security Academy of Computer Science and Software Engineering University of Johannesburg South Africa
For state and non-state actors with sizable cyber interests, numerous breaches during this decade affirmed the necessity of having cyber counterintelligence (CCI) at the centre of cybersecurity efforts. Concurrent wit... 详细信息
来源: 评论
Global video object segmentation with spatial constraint module
收藏 引用
Computational Visual Media 2023年 第2期9卷 385-400页
作者: Yadang Chen Duolin Wang Zhiguo Chen Zhi-Xin Yang Enhua Wu Engineering Research Center of Digital Forensics Ministry of EducationSchool of Computer and SoftwareNanjing University of Information Science and TechnologyNanjing 210044China State Key Laboratory of Internet of Things for Smart City Department of Electromechanical EngineeringUniversity of MacaoMacao 999078China State Key Laboratory of Computer Science Institute of SoftwareUniversity of Chinese Academy of SciencesBeijing 100190China Faculty of Science and Technology University of MacaoMacao 999078China
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object se... 详细信息
来源: 评论
Pseudo complementary measurement for traditional single-pixel cameras
收藏 引用
Chinese Physics B 2020年 第11期29卷 315-322页
作者: Qian Dong Xu-Ri Yao Xin Liu Bing Liu Guang-Jie Zhai State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China Key Laboratory of Electronics and Information Technology for Space Systems National Space Science CenterChinese Academy of SciencesBeijing 100190China State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China University of Chinese Academy of Sciences Beijing 100049China
A traditional single-pixel camera needs a large number of measurements to reconstruct the object with compressive sensing *** with the 1/0 matrices in classical measurement,the 1/-1 matrices in the complementary measu... 详细信息
来源: 评论
Modeling non-repudiation in distributed systems
收藏 引用
Information Technology Journal 2008年 第1期7卷 228-230页
作者: Zheng, Hong Du, YuYue Yu, ShuXia Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
As an important security service in distributed systems, non-repudiation is required to implement evidence generating or validating in the application layer. Formal methods are powerful tools to provide security servi... 详细信息
来源: 评论
Roundtable: Research Opportunities and Challenges for Emerging software Systems
收藏 引用
Journal of computer science & Technology 2015年 第5期30卷 935-941页
作者: 张翔宇 张冬梅 Yves Le Traon 王青 张路 Department of Computer Science Purdue University West Lafayette IN 47907 U.S.A. Microsoft Research Beijing 100080 China Faculty of Science Technology and Communication University of Luxembourg Luxembourg Institute of Software Chinese Academy of Sciences Beijing 100190 China School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
For this special section on software systems special section, discuss important issues that will shape several research leaders in software systems, as guest editors for this this field's future directions. The essa... 详细信息
来源: 评论
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of computer science & Technology 2013年 第4期28卷 743-748页
作者: 葛爱军 黄欣沂 陈成 马传贵 张锐 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University Institute of Software Chinese Academy of Sciences
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... 详细信息
来源: 评论
Mobile robot path planning based on adaptive bacterial foraging algorithm
收藏 引用
Journal of Central South University 2013年 第12期20卷 3391-3400页
作者: 梁晓丹 李亮玉 武继刚 陈瀚宁 School of Computer Science and Software Tianjin Polytechnic University School of Mechanical and Engineering Tianjin Polytechnic University Laboratory of Information Service and Intelligent Control Shenyang Institute of AutomationChinese Academy of Sciences
The utilization of biomimicry of bacterial foraging strategy was considered to develop an adaptive control strategy for mobile robot, and a bacterial foraging approach was proposed for robot path planning. In the prop... 详细信息
来源: 评论