咨询与建议

限定检索结果

文献类型

  • 858 篇 会议
  • 658 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 798 篇 计算机科学与技术...
    • 665 篇 软件工程
    • 172 篇 信息与通信工程
    • 113 篇 控制科学与工程
    • 92 篇 生物工程
    • 83 篇 电气工程
    • 71 篇 电子科学与技术(可...
    • 66 篇 机械工程
    • 64 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 41 篇 网络空间安全
    • 36 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 31 篇 交通运输工程
    • 25 篇 土木工程
  • 451 篇 理学
    • 263 篇 数学
    • 109 篇 生物学
    • 101 篇 物理学
    • 72 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 44 篇 化学
  • 276 篇 管理学
    • 189 篇 管理科学与工程(可...
    • 107 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 57 篇 医学
    • 53 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 13 篇 教育学
  • 12 篇 农学
  • 12 篇 军事学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 40 篇 computer science
  • 35 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 31 篇 training
  • 29 篇 software enginee...
  • 29 篇 accuracy
  • 26 篇 data mining
  • 26 篇 software
  • 24 篇 deep learning
  • 23 篇 predictive model...
  • 20 篇 testing
  • 19 篇 authentication
  • 18 篇 convolution
  • 18 篇 artificial intel...
  • 17 篇 optimization
  • 17 篇 cloud computing
  • 16 篇 analytical model...
  • 14 篇 conferences

机构

  • 177 篇 state key labora...
  • 120 篇 university of ch...
  • 97 篇 institute of sof...
  • 55 篇 college of compu...
  • 47 篇 academy of compu...
  • 40 篇 jd explore acade...
  • 39 篇 technology cente...
  • 36 篇 school of comput...
  • 29 篇 academy of compu...
  • 28 篇 institute of inf...
  • 25 篇 institute of com...
  • 23 篇 shenzhen institu...
  • 21 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 school of electr...
  • 19 篇 state key labora...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 school of comput...
  • 15 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 19 篇 fan heng
  • 19 篇 zhang libo
  • 18 篇 wu enhua
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 15 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 tian feng
  • 13 篇 bin sheng
  • 12 篇 zheng changwen
  • 11 篇 xiong hui

语言

  • 1,267 篇 英文
  • 230 篇 其他
  • 46 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering name"
1539 条 记 录,以下是1111-1120 订阅
排序:
The identification of information sources to aid with Critical Information Infrastructure Protection
The identification of information sources to aid with Critic...
收藏 引用
2013 Annual Conference on Information Security for South Africa, ISSA 2013
作者: Mouton, Jean Ellefsen, Ian Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Providing Critical Information Infrastructure Protection (CIIP) has become an important focus area for countries across the world with the widespread adoption of computer systems and computer networks that handle and ... 详细信息
来源: 评论
Personally identifiable information leakage through online social networks
Personally identifiable information leakage through online s...
收藏 引用
South African Institute for computer Scientists and Information Technologists: A Connected Society, SAICSIT 2013
作者: Louw, Candice Von Solms, Sebastiaan Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Information sharing on the Internet has become a streamlined process through services such as e-mail, blogs and recently also Online Social Networks (OSNs). The speed of posting information in one central place and th... 详细信息
来源: 评论
Animating turbulent water by vortex shedding in PIC/FLIP
收藏 引用
science China(Information sciences) 2013年 第3期56卷 16-26页
作者: ZHU Jian LIU YouQuan CHANG YuanZhang WU EnHua Computer Graphics and Multimedia Laboratory(NG04) Faculty of Science and TechnologyUniversity of Macau School of Information Engineering Chang'an University State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of Sciences
In this paper,we present a hybrid method,which integrates PIC/FLIP and vortex particle methods into a unified framework,to efficiently simulate vortex shedding that happens when fluids flow around internal *** improve... 详细信息
来源: 评论
Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic Execution
Automated Coverage-Driven Test Data Generation Using Dynamic...
收藏 引用
International Conference on Secure System Integration and Reliability Improvement, SSIRI
作者: Ting Su Geguang Pu Bin Fang Jifeng He Jun Yan Siyuan Jiang Jianjun Zhao Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China State Key Laboratory of Computer Science Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering University of Notre Dame USA School of Software Shanghai Jiao Tong University Shanghai China
Recently code transformations or tailored fitness functions are adopted to achieve coverage (structural or logical criterion) driven testing to ensure software reliability. However, some internal threats like negative... 详细信息
来源: 评论
Cloud Computing in Electric Vehicles Charging Control and Dispatch Optimization
Cloud Computing in Electric Vehicles Charging Control and Di...
收藏 引用
2014 IEEE International Conference on Progress in Informatics and Computing
作者: Dan Wu Bo Liu Zhijian Chen Wenyan Xie Xiang Huang Shuwei Pei Bin Sheng Donghan Feng Information Center China Southern Power Grid Co. Ltd. Dept. of Computer Science and Engineering Shanghai JiaoTong University Network & Information Branch Guangdong Electric Power Design Institute The State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Dept. of Electrical Engineering Shanghai JiaoTong University
Charging of large-scale electric vehicles will have a significantimpact on the grid sothat their charging schedule needs tobe optimized. The traditional centralized scheduling method requires high performance in infor... 详细信息
来源: 评论
A secure self-destruction scheme with IBE for the internet content privacy
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2014年 第1期37卷 139-150页
作者: Xiong, Jin-Bo Yao, Zhi-Qiang Ma, Jian-Feng Li, Feng-Hua Liu, Xi-Meng Faculty of Software Fujian Normal University Fuzhou 350108 China School of Computer Science and Technology Xidian University Xi'an 710071 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the p... 详细信息
来源: 评论
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of computer science & Technology 2013年 第4期28卷 743-748页
作者: 葛爱军 黄欣沂 陈成 马传贵 张锐 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University Institute of Software Chinese Academy of Sciences
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... 详细信息
来源: 评论
Mobile robot path planning based on adaptive bacterial foraging algorithm
收藏 引用
Journal of Central South University 2013年 第12期20卷 3391-3400页
作者: 梁晓丹 李亮玉 武继刚 陈瀚宁 School of Computer Science and Software Tianjin Polytechnic University School of Mechanical and Engineering Tianjin Polytechnic University Laboratory of Information Service and Intelligent Control Shenyang Institute of AutomationChinese Academy of Sciences
The utilization of biomimicry of bacterial foraging strategy was considered to develop an adaptive control strategy for mobile robot, and a bacterial foraging approach was proposed for robot path planning. In the prop... 详细信息
来源: 评论
The load-based learner profile for incidental word learning task generation
The load-based learner profile for incidental word learning ...
收藏 引用
13th International Conference on Advances in Web-Based Learning, ICWL 2014
作者: Zou, Di Xie, Haoran Li, Qing Wang, Fu Lee Chen, Wei Department of English City University of Hong Kong Hong Kong Hong Kong Department of Computer Science City University of Hong Kong Hong Kong Hong Kong Multimedia Software Engineering Research Centre City University of Hong Kong Hong Kong Hong Kong Caritas Institute of Higher Education Hong Kong Hong Kong Agricultural Information Institute Chinese Academy of Agricultural Sciences China Key Laboratory of Agri-information Service Technology Ministry of Agriculture China
In recent years, the popularity and prosperity of mobile technologies and e-learning applications offer brand-new learning ways for people. English, as the most widely used language and the essential communication ski... 详细信息
来源: 评论
Analysis of trust-based access control using game theory
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2013年 第4期8卷 15-24页
作者: He, Jingsha Ma, Shunan Zhao, Bin School of Software Engineering Beijing University of Technology Beijing 100124 China College of Computer Science Beijing University of Technology Beijing 100124 China Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China
Access control is an important security mechanism that is used to limit user access to information and resources and to prevent malicious users from making unauthorized access. Traditional access control models are we... 详细信息
来源: 评论