咨询与建议

限定检索结果

文献类型

  • 858 篇 会议
  • 658 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 798 篇 计算机科学与技术...
    • 665 篇 软件工程
    • 172 篇 信息与通信工程
    • 113 篇 控制科学与工程
    • 92 篇 生物工程
    • 83 篇 电气工程
    • 71 篇 电子科学与技术(可...
    • 66 篇 机械工程
    • 64 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 41 篇 网络空间安全
    • 36 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 31 篇 交通运输工程
    • 25 篇 土木工程
  • 451 篇 理学
    • 263 篇 数学
    • 109 篇 生物学
    • 101 篇 物理学
    • 72 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 44 篇 化学
  • 276 篇 管理学
    • 189 篇 管理科学与工程(可...
    • 107 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 57 篇 医学
    • 53 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 13 篇 教育学
  • 12 篇 农学
  • 12 篇 军事学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 40 篇 computer science
  • 35 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 31 篇 training
  • 29 篇 software enginee...
  • 29 篇 accuracy
  • 26 篇 data mining
  • 26 篇 software
  • 24 篇 deep learning
  • 23 篇 predictive model...
  • 20 篇 testing
  • 19 篇 authentication
  • 18 篇 convolution
  • 18 篇 artificial intel...
  • 17 篇 optimization
  • 17 篇 cloud computing
  • 16 篇 analytical model...
  • 14 篇 conferences

机构

  • 177 篇 state key labora...
  • 120 篇 university of ch...
  • 97 篇 institute of sof...
  • 55 篇 college of compu...
  • 47 篇 academy of compu...
  • 40 篇 jd explore acade...
  • 39 篇 technology cente...
  • 36 篇 school of comput...
  • 29 篇 academy of compu...
  • 28 篇 institute of inf...
  • 25 篇 institute of com...
  • 23 篇 shenzhen institu...
  • 21 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 school of electr...
  • 19 篇 state key labora...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 school of comput...
  • 15 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 19 篇 fan heng
  • 19 篇 zhang libo
  • 18 篇 wu enhua
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 15 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 tian feng
  • 13 篇 bin sheng
  • 12 篇 zheng changwen
  • 11 篇 xiong hui

语言

  • 1,267 篇 英文
  • 230 篇 其他
  • 46 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering name"
1539 条 记 录,以下是1131-1140 订阅
排序:
The buffered π-calculus: A model for concurrent languages
收藏 引用
7th International Conference on Language and Automata Theory and Applications, LATA 2013
作者: Deng, Xiaojie Zhang, Yu Deng, Yuxin Zhong, Farong BASICS Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China State Key Laboratory for Computer Science Institute of Software Chinese Academy of Sciences Beijing China Department of Computer Science Zhejiang Normal University Zhejiang China
Message-passing based concurrent languages are widely used in developing large distributed and coordination systems. This paper presents the buffered π-calculus - a variant of the π-calculus where channel names are ... 详细信息
来源: 评论
Cloud computing in electric vehicles charging control and dispatch optimization
Cloud computing in electric vehicles charging control and di...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Dan Wu Bo Liu Zhijian Chen Wenyan Xie Xiang Huang Shuwei Pei Bin Sheng Donghan Feng Information Center China Southern Power Grid Co. Ltd. Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Network & Information Branch Guangdong Electric Power Design Institute Guangzhou China Chinese Academy of Sciences Institute of Software Beijing China Dept. of Electrical Engineering Shanghai Jiao Tong University Shanghai China
Charging of large-scale electric vehicles will have a significant impact on the grid so that their charging schedule needs to be optimized. The traditional centralized scheduling method requires high performance in in... 详细信息
来源: 评论
Creating a program and research a cryptosystem on the basis of Cardan grille
Creating a program and research a cryptosystem on the basis ...
收藏 引用
2013 2nd International Conference on Informatics and Applications, ICIA 2013
作者: Utepbergenov, Irbulat Kuandykova, Janna Mussin, Tamerlan Sagyndykova, Sholpan Department of Computer Science and Information Systems Kazakh Academy of Transport and Communications Almaty Kazakhstan Department of Computer and Software Engineering Turan University Almaty Kazakhstan Division of Research and Cooperation Caspian University of Technologies and Engineering Aktay Kazakhstan
Considered cryptosystems such as Cardano square lattices are characterized by the high-speed encryption in use today Enhanced Programming computers. This is because the number of different variants rapidly increases w... 详细信息
来源: 评论
A large RGB-D gait dataset and the baseline algorithm
收藏 引用
2012 International Conference on Service-Oriented Computing, ICSOC 2012
作者: Yu, Shiqi Wang, Qing Huang, Yongzhen College of Computer Science and Software Engineering Shenzhen University Shenzhen 518060 China National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences Beijing 100190 China
With the development of depth sensors, images with high quality depth can be obtained easily. Using depth information, some challenging problems in gait recognition can be reconsidered and better solutions can be deve... 详细信息
来源: 评论
WAVE-CIA: A novel CIA approach based on call graph mining  13
WAVE-CIA: A novel CIA approach based on call graph mining
收藏 引用
28th Annual ACM Symposium on Applied Computing, SAC 2013
作者: Li, Bixin Zhang, Qiandong Sun, Xiaobing Leung, Hareton School of Computer Science and Engineering Southeast University Nanjing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
software change impact analysis (CIA) is a key technique to identify the potential effects caused by software changes. In this paper, a new graph mining based CIA technique is proposed, which takes the interference am... 详细信息
来源: 评论
Context-aware RESTful services on mobile devices
Context-aware RESTful services on mobile devices
收藏 引用
International Conference for Internet Technology and Secured Transactions (ICITST)
作者: Charl van der Westhuizen Marijke Coetzee Academy of Computer Science and Software Engineering University of Johannesburg Auckland Park
Web accessible services on mobile devices such as smart phones and tablets are a reality in today's age. Services hosted on mobile devices consume valuable device resources such as battery power, network connectiv... 详细信息
来源: 评论
Towards Reputation-as-a-Service
Towards Reputation-as-a-Service
收藏 引用
Information Security for South Africa (ISSA)
作者: Channel Hillebrand Marijke Coetzee Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Reputation is used to regulate relationships of trust in online communities. When deploying a reputation system, it needs to accommodate the requirements and constrains of the specific community in order to assist the... 详细信息
来源: 评论
On the adoption of MC/DC and control-flow adequacy for a tight integration of program testing and statistical fault localization
On the adoption of MC/DC and control-flow adequacy for a tig...
收藏 引用
作者: Jiang, Bo Zhai, Ke Chan, W.K. Tse, T.H. Zhang, Zhenyu School of Computer Science and Engineering Beihang University Beijing China Department of Computer Science University of Hong Kong Pokfulam Hong Kong Hong Kong Department of Computer Science City University of Hong Kong Tat Chee Avenue Hong Kong Hong Kong State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
Context: Testing and debugging consume a significant portion of software development effort. Both processes are usually conducted independently despite their close relationship with each other. Test adequacy is vital ... 详细信息
来源: 评论
MFCC extraction in AAC domain for audio content analysis
MFCC extraction in AAC domain for audio content analysis
收藏 引用
作者: Ai, Haojun Miki, Haseyama Wang, Kang Computer School of Wuhan University Wuhan China National Engineering Research Centre of Multimedia Software Wuhan China Graduate School of Information Science and Technology Hokkaido University Japan Wuhan Academy of Educational Science Wuhan China
We focus the attention on the extraction of Mel-frequency cepstral coefficients (MFCC) features from MDCT spectrum in AAC domain for audio content analysis. In particular, a MFCC extraction method is proposed, which i... 详细信息
来源: 评论
Towards a generic Identity and Access Assurance model by component analysis - A conceptual review
Towards a generic Identity and Access Assurance model by com...
收藏 引用
Enterprise Systems Conference (ES)
作者: Ferdinand Damon Marijke Coetzee Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Identity management provides a view on who has access to systems. Continuous organisational integration creates new Identity Management requirements such as Federation of Identities, Secure Token Services and Social M... 详细信息
来源: 评论