咨询与建议

限定检索结果

文献类型

  • 858 篇 会议
  • 658 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 798 篇 计算机科学与技术...
    • 665 篇 软件工程
    • 172 篇 信息与通信工程
    • 113 篇 控制科学与工程
    • 92 篇 生物工程
    • 83 篇 电气工程
    • 71 篇 电子科学与技术(可...
    • 66 篇 机械工程
    • 64 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 41 篇 网络空间安全
    • 36 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 31 篇 交通运输工程
    • 25 篇 土木工程
  • 451 篇 理学
    • 263 篇 数学
    • 109 篇 生物学
    • 101 篇 物理学
    • 72 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 44 篇 化学
  • 276 篇 管理学
    • 189 篇 管理科学与工程(可...
    • 107 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 57 篇 医学
    • 53 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 13 篇 教育学
  • 12 篇 农学
  • 12 篇 军事学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 40 篇 computer science
  • 35 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 31 篇 training
  • 29 篇 software enginee...
  • 29 篇 accuracy
  • 26 篇 data mining
  • 26 篇 software
  • 24 篇 deep learning
  • 23 篇 predictive model...
  • 20 篇 testing
  • 19 篇 authentication
  • 18 篇 convolution
  • 18 篇 artificial intel...
  • 17 篇 optimization
  • 17 篇 cloud computing
  • 16 篇 analytical model...
  • 14 篇 conferences

机构

  • 177 篇 state key labora...
  • 120 篇 university of ch...
  • 97 篇 institute of sof...
  • 55 篇 college of compu...
  • 47 篇 academy of compu...
  • 40 篇 jd explore acade...
  • 39 篇 technology cente...
  • 36 篇 school of comput...
  • 29 篇 academy of compu...
  • 28 篇 institute of inf...
  • 25 篇 institute of com...
  • 23 篇 shenzhen institu...
  • 21 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 school of electr...
  • 19 篇 state key labora...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 school of comput...
  • 15 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 19 篇 fan heng
  • 19 篇 zhang libo
  • 18 篇 wu enhua
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 15 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 tian feng
  • 13 篇 bin sheng
  • 12 篇 zheng changwen
  • 11 篇 xiong hui

语言

  • 1,267 篇 英文
  • 230 篇 其他
  • 46 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering name"
1539 条 记 录,以下是1121-1130 订阅
排序:
Simple three-party password-based key exchange protocol with provable security
收藏 引用
International Journal of computers and Applications 2013年 第1期35卷 44-50页
作者: Xiong, Hu Chen, Yanan Chen, Zhong Li, Fagen School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China School of Electronics Engineering and Computer Science Peking University Beijing China School of Traffic and Transportation Bejing Jiaotong University Beijing China
Three-party password-based authenticated key exchange (3PAKE) protocols allow two users (clients) to establish a session key with the help of an authenticated server over an insecure channel. Owning to the significanc... 详细信息
来源: 评论
A hybrid floor identification algorithm based on Bayesian classification and special AP
A hybrid floor identification algorithm based on Bayesian cl...
收藏 引用
International Conference on Information and Automation (ICIA)
作者: Fang Zhao Dan Luo Wu Yuan Haiyong Luo School of Software Engineering International School Beijing University of Posts and Telecommunications Beijing China NSFC Taiyuan-Zhongguancun Cooperation School of Computer Science Beijing Institute of Technology Beijing China Research Centre of Pervasive Computing Institute of Computing Technology Chinese Academy of Sciences Beijing China
Accurately discriminating different floors is a very important task in indoor fingerprinting localization, which can be used to reduce space search domain and improve localization accuracy. There exist some research w... 详细信息
来源: 评论
Assumption generation for asynchronous systems by abstraction refinement
收藏 引用
9th International Symposium on Formal Aspects of Component software, FACS 2012
作者: Yang, Qiusong Clarke, Edmund M. Komuravelli, Anvesh Li, Mingshu National Engineering Research Center of Fundamental Software Institute of Software Chinese Academy of Sciences Beijing 100190 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China Computer Science Department Carnegie Mellon University Pittsburgh PA 15213 United States
Compositional verification provides a way for deducing properties of a complete program from properties of its constituents. In particular, the assume-guarantee style of reasoning splits a specification into assumptio... 详细信息
来源: 评论
Layered depth-of-field rendering using color spreading
Layered depth-of-field rendering using color spreading
收藏 引用
12th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2013
作者: Yu, Kai Wu, Shang Sheng, Bin Ma, Lizhuang Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
Depth of field (DoF) is a depth range outside of which objects are blurred. DoF has been widely used in photography and films by artists and is expected to be applied to realistic image rendering and virtual reality a... 详细信息
来源: 评论
DevNet: Exploring developer collaboration in heterogeneous networks of bug repositories
DevNet: Exploring developer collaboration in heterogeneous n...
收藏 引用
2013 ACM / IEEE International Symposium on Empirical software engineering and Measurement, ESEM 2013
作者: Wang, Song Zhang, Wen Yang, Ye Wang, Qing Laboratory for Internet Software Technologies Institute of Software Chinese Academy of Sciences China State Key Laboratory of Computer Science ISCAS China State Key Laboratory of Software Engineering Wuhan University China
During open source software development and maintenance, bug fixing is a result of developer collaboration. Understanding the structure of developer collaboration could be helpful for effective and efficient bug fixin... 详细信息
来源: 评论
An exploration on long-distance communication between left-behind children and their parents in China
An exploration on long-distance communication between left-b...
收藏 引用
2013 2nd ACM Conference on computer Supported Cooperative Work, CSCW 2013
作者: Pan, Lu Tian, Feng Lu, Fei Zhang, Xiaolong Liu, Ying Feng, Wenxin Dai, Guozhong Wang, Hongan Intelligence Engineering Lab Chinese Academy of Sciences Institute of Software China State Key Lab. of Computer Science Chinese Academy of Sciences Institute of Software China Pennsylvania State University United States Intel Corporation China Computer Science Department Boston University United States
In China, hundreds of millions of migrant workers have moved to cities or coastal regions for more or better-paid jobs and have left their children behind at their rural homes. Separated by thousands of kilometers, th... 详细信息
来源: 评论
Constraint-based locality analysis for X10 programs  13
Constraint-based locality analysis for X10 programs
收藏 引用
ACM SIGPLAN 2013 Workshop on Partial Evaluation and Program Manipulation, PEPM 2013 - Co-located with POPL 2013
作者: Sun, Qiang Chen, Yuting Zhao, Jianjun Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China School of Software Shanghai Jiao Tong University Shanghai China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai China
X10 is a HPC (High Performance Computing) programming language proposed by IBMfor supporting a PGAS (Partitioned Global Address Space) programming model offering a shared address space. The address space can be furthe... 详细信息
来源: 评论
ANFIS and SA Based Approach to Prediction, Scheduling, and Performance Evaluation for Semiconductor Wafer Fabrication
收藏 引用
电子学报(英文版) 2013年 第1期22卷 25-30页
作者: CAO Zhengcai ZHAO Huidan WANG Yongji College of Information Science and Technology Beijing University of Chemical Technology Beijing 100029 China State Key Laboratory of Manufacturing Systems Engineering Xi'an Jiaotong University Xi'an 710054 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China
In this paper, an optimized mechanism for Semiconductor wafer fabrication (SWF) by integrating the Adaptive neuro-fuzzy inference system (ANFIS) with Sim- ulated annealing (SA) algorithm is proposed. In this ap- proac... 详细信息
来源: 评论
Memristors for neural branch prediction: A case study in strict latency and write endurance challenges  13
Memristors for neural branch prediction: A case study in str...
收藏 引用
2013 ACM International Conference on Computing Frontiers, CF 2013
作者: Saadeldeen, Hebatallah Franklin, Diana Long, Guoping Hill, Charlotte Browne, Aisha Strukov, Dmitri Sherwood, Timothy Chong, Frederic T. Department of Computer Science UC Santa Barbara United States Electrical and Computer Engineering UC Santa Barbara United States Institute of Software Chinese Academy of Sciences China
Memristors offer many potential advantages over more traditional memory-cell technologies, including the potential for extreme densities, and fast read times. Current devices, however, are plagued by problems of yield... 详细信息
来源: 评论
An expressive decentralizing KP-ABE scheme with constant-size ciphertext
收藏 引用
International Journal of Network Security 2013年 第3期15卷 131-140页
作者: Li, Qinyi Xiong, Hu Zhang, Fengli Zeng, Shengke School of Computer Science and Engineering University of Electronic Science and Technology of China No.2006 Xiyuan Avenue West Hi-tech Zone Chengdu 611731 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 China
Decentralizing attribute based encryption is a variant of multi-authority attribute based encryption which doesn't require a trusted central authority to conduct the system setup. In this paper, we propose an expr... 详细信息
来源: 评论