咨询与建议

限定检索结果

文献类型

  • 858 篇 会议
  • 658 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 798 篇 计算机科学与技术...
    • 665 篇 软件工程
    • 172 篇 信息与通信工程
    • 113 篇 控制科学与工程
    • 92 篇 生物工程
    • 83 篇 电气工程
    • 71 篇 电子科学与技术(可...
    • 66 篇 机械工程
    • 64 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 41 篇 网络空间安全
    • 36 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 31 篇 交通运输工程
    • 25 篇 土木工程
  • 451 篇 理学
    • 263 篇 数学
    • 109 篇 生物学
    • 101 篇 物理学
    • 72 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 44 篇 化学
  • 276 篇 管理学
    • 189 篇 管理科学与工程(可...
    • 107 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 57 篇 医学
    • 53 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 13 篇 教育学
  • 12 篇 农学
  • 12 篇 军事学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 40 篇 computer science
  • 35 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 31 篇 training
  • 29 篇 software enginee...
  • 29 篇 accuracy
  • 26 篇 data mining
  • 26 篇 software
  • 24 篇 deep learning
  • 23 篇 predictive model...
  • 20 篇 testing
  • 19 篇 authentication
  • 18 篇 convolution
  • 18 篇 artificial intel...
  • 17 篇 optimization
  • 17 篇 cloud computing
  • 16 篇 analytical model...
  • 14 篇 conferences

机构

  • 177 篇 state key labora...
  • 120 篇 university of ch...
  • 97 篇 institute of sof...
  • 55 篇 college of compu...
  • 47 篇 academy of compu...
  • 40 篇 jd explore acade...
  • 39 篇 technology cente...
  • 36 篇 school of comput...
  • 29 篇 academy of compu...
  • 28 篇 institute of inf...
  • 25 篇 institute of com...
  • 23 篇 shenzhen institu...
  • 21 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 school of electr...
  • 19 篇 state key labora...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 school of comput...
  • 15 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 19 篇 fan heng
  • 19 篇 zhang libo
  • 18 篇 wu enhua
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 15 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 tian feng
  • 13 篇 bin sheng
  • 12 篇 zheng changwen
  • 11 篇 xiong hui

语言

  • 1,267 篇 英文
  • 230 篇 其他
  • 46 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering name"
1539 条 记 录,以下是1101-1110 订阅
排序:
An experimental study on firewall performance: Dive into the bottleneck for firewall effectiveness
An experimental study on firewall performance: Dive into the...
收藏 引用
International Symposium on Information Assurance and Security (IAS)
作者: Chenghong Wang Donghong Zhang Hualin Lu Jing Zhao Zhenyu Zhang Zheng Zheng Computer Science and Techology Dept. Harbin Engineering University Harbin China Institute of Software Chinese Academy of Sciences Beijing China Beijing University of Aeronautics and Astronautics Beijing China
Performance is an important indicator of firewalls effectiveness, which represents capability of firewalls handling network requests. ModSecurity and iptables, two representative firewalls of packet filtering and appl... 详细信息
来源: 评论
WEB TOPIC DETECTION USING A RANKED CLUSTERING-LIKE PATTERN ACROSS SIMILARITY CASCADES
WEB TOPIC DETECTION USING A RANKED CLUSTERING-LIKE PATTERN A...
收藏 引用
IEEE International Conference on Multimedia and Expo
作者: Fei Jia Junbiao Pang Weigang Zhang Guorong Li Chunjie Zhang Qingming Huang Yugui Liu School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing Key Laboratory of Multimedia and Intelligent Software Technology College of Metropolitan Transportation Beijing University of Technology School of Computer Science and Technology Harbin Institute of Technology
In multi-media and social media communities, web topic detection poses two main difficulties that conventional approaches can barely handle: 1) there are large inter-topic variations among web topics;2) supervised inf... 详细信息
来源: 评论
Entropy Adaptive On-Line Compression
Entropy Adaptive On-Line Compression
收藏 引用
IEEE International Symposium on Network Computing and Applications
作者: Shlomi Dolev Sergey Frenkel Marina Kopeetsky Department of Computer Science Ben-Gurion University of the Negev Beer-Sheva Israel Institute of Informatics Problems Russian Academy of Sciences Moscow Russia Department of Software Engineering Shamoon College of Engineering Beer-Sheva Israel
Self-Organization is based on adaptivity. Adaptivity should start with the very basic fundamental communication tasks such as encoding the information to be transmitted or stored. Obviously, the less signal transmitte... 详细信息
来源: 评论
Almost Optimal Channel Access in Multi-Hop Networks with Unknown Channel Variables
Almost Optimal Channel Access in Multi-Hop Networks with Unk...
收藏 引用
International Conference on Distributed Computing Systems
作者: Yaqin Zhou Qiuyuan Huang Fan Li Xiang-Yang Li Min Liu Zhongcheng Li Zhiyuan Yin Institute of Computing Technology Chinese Academy of Sciences Beijing China Department of Electrical and Computer Engineering University of Florida Gainesville FL USA School of Computer Science Beijing Institute of Technology School of Software and TNLIST Tsinghua University China
We consider the problem of online dynamic channel accessing in multi-hop cognitive radio networks. Previous works on online dynamic channel accessing mainly focus on single-hop networks that assume complete conflicts ... 详细信息
来源: 评论
Task assignment for minimizing application completion time using honeybee mating optimization
收藏 引用
Frontiers of computer science 2013年 第3期7卷 404-415页
作者: Qinma KANG Hong HE School of Information Engineering Shandong University Weihai 264209 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China
Effective task assignment is essential for achieving high performance in heterogeneous distributed computing systems. This paper proposes a new technique for minimizing the parallel application time cost of task assig... 详细信息
来源: 评论
Modular reversibility analysis in self-loops connections of petri net systems
收藏 引用
Journal of Networks 2013年 第2期8卷 493-500页
作者: Pu, Fei College of Computer and Information Engineering Zhejiang Gongshang University China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China
It is well known that the use of a modular approach for modeling has many advantages: it allows the modeler to consider different parts of the model independently of one another. A modular approach to analysis is also... 详细信息
来源: 评论
Mathematical modeling of CSTR bioreactor control for production of recombinant protein
Mathematical modeling of CSTR bioreactor control for product...
收藏 引用
2014 4th International Conference on Advanced Materials Research, ICAMR 2014
作者: Jia, Xiao Yi Lin, Yu Tian Lin, Hui Bin Gao, Ling Lin, Jian Qun Lin, Jian Qiang School of Administration Shandong University Jinan 250100 China Zhejiang University Hangzhou China Shandong Academy of Chinese Medicine Jinan 250014 China Shandong Provincial Key Lab for Distributed Computer Software Novel Technology School of Information Science and Engineering Shandong Normal University Jinan 250014 China State Key Lab of Microbial Technology Shandong University Jinan 250100 China
Fermentation process using recombinant strain for production of recombinant protein is widely used in commercialization of the biotechnologies. The continuous stirred tank reactor (CSTR) is a typical microbial cultiva... 详细信息
来源: 评论
Towards reputation-as-a-service
Towards reputation-as-a-service
收藏 引用
2013 Annual Conference on Information Security for South Africa, ISSA 2013
作者: Hillebrand, Channel Coetzee, Marijke Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Reputation is used to regulate relationships of trust in online communities. When deploying a reputation system, it needs to accommodate the requirements and constrains of the specific community in order to assist the... 详细信息
来源: 评论
Automated breakpoint generation for debugging
Journal of Software
收藏 引用
Journal of software 2013年 第3期8卷 603-616页
作者: Zhang, Cheng Yang, Juyuan Yan, Dacong Yang, Shengqian Chen, Yuting Department of Computer Science and Engineering Shanghai Jiao Tong University China School of Software Shanghai Jiao Tong University China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Computer Science and Engineering Department Ohio State University United States
In debugging processes breakpoints are frequently used to inspect and understand the run-time program behavior. Although modern development environments provide convenient breakpoint utilities, it mostly requires cons... 详细信息
来源: 评论
Adaptive Object Retrieval with Kernel Reconstructive Hashing
Adaptive Object Retrieval with Kernel Reconstructive Hashing
收藏 引用
IEEE Conference on computer Vision and Pattern Recognition
作者: Haichuan Yang Xiao Bai Jun Zhou Peng Ren Zhihong Zhang Jian Cheng School of Computer Science and Engineering Beihang University School of Information and Communication Technology Griffith University College of Information and Control Engineering China University of Petroleum Software School Xiamen University Institute of Automation Chinese Academy of Sciences
Hashing is very useful for fast approximate similarity search on large database. In the unsupervised settings, most hashing methods aim at preserving the similarity defined by Euclidean distance. Hash codes generated ... 详细信息
来源: 评论