咨询与建议

限定检索结果

文献类型

  • 858 篇 会议
  • 658 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 798 篇 计算机科学与技术...
    • 665 篇 软件工程
    • 172 篇 信息与通信工程
    • 113 篇 控制科学与工程
    • 92 篇 生物工程
    • 83 篇 电气工程
    • 71 篇 电子科学与技术(可...
    • 66 篇 机械工程
    • 64 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 41 篇 网络空间安全
    • 36 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 31 篇 交通运输工程
    • 25 篇 土木工程
  • 451 篇 理学
    • 263 篇 数学
    • 109 篇 生物学
    • 101 篇 物理学
    • 72 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 44 篇 化学
  • 276 篇 管理学
    • 189 篇 管理科学与工程(可...
    • 107 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 57 篇 医学
    • 53 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 13 篇 教育学
  • 12 篇 农学
  • 12 篇 军事学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 40 篇 computer science
  • 35 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 31 篇 training
  • 29 篇 software enginee...
  • 29 篇 accuracy
  • 26 篇 data mining
  • 26 篇 software
  • 24 篇 deep learning
  • 23 篇 predictive model...
  • 20 篇 testing
  • 19 篇 authentication
  • 18 篇 convolution
  • 18 篇 artificial intel...
  • 17 篇 optimization
  • 17 篇 cloud computing
  • 16 篇 analytical model...
  • 14 篇 conferences

机构

  • 177 篇 state key labora...
  • 120 篇 university of ch...
  • 97 篇 institute of sof...
  • 55 篇 college of compu...
  • 47 篇 academy of compu...
  • 40 篇 jd explore acade...
  • 39 篇 technology cente...
  • 36 篇 school of comput...
  • 29 篇 academy of compu...
  • 28 篇 institute of inf...
  • 25 篇 institute of com...
  • 23 篇 shenzhen institu...
  • 21 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 school of electr...
  • 19 篇 state key labora...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 school of comput...
  • 15 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 19 篇 fan heng
  • 19 篇 zhang libo
  • 18 篇 wu enhua
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 15 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 tian feng
  • 13 篇 bin sheng
  • 12 篇 zheng changwen
  • 11 篇 xiong hui

语言

  • 1,267 篇 英文
  • 230 篇 其他
  • 46 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering name"
1539 条 记 录,以下是1171-1180 订阅
排序:
Parallel Map Matching on Massive Vehicle GPS Data Using MapReduce
Parallel Map Matching on Massive Vehicle GPS Data Using MapR...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Jian Huang Shaoqing Qiao Haitao Yu Jinhui Qie Chunwei Liu School of Software Beihang University (BUAA) Beijing China School of Computer Science and Engineering Beihang University (BUAA) Beijing China Beijing Transportation Information Center Beijing China National Space Science Center (NSSC) Chinese Academy of Sciences(CAS) Beijing China
The procedure of matching vehicle location data onto road map is very essential for many ITS (Intelligent Transportation System) applications. However, with the boosting deployment of GPS devices in vehicles, the accu... 详细信息
来源: 评论
A multi-agent immunologically-inspired model for critical information infrastructure protection - An immunologically-inspired conceptual model for security on the power grid
A multi-agent immunologically-inspired model for critical in...
收藏 引用
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
作者: Mavee, S.M.A. Ehlers, E.M. Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Critical Infrastructure (CI) is the term used to describe assets that are of utmost importance, or in other words, essential in the functioning of an environment. Societies depend on their critical infrastructure in o... 详细信息
来源: 评论
Inflammation security: A decentralised immune model for resource distribution in networks
Inflammation security: A decentralised immune model for reso...
收藏 引用
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
作者: Heydenrych, Mark Ehlers, Elizabeth Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
This paper will present a method for disseminating mobile agents throughout a network in order to protect that network. This method is based on the immune concept of inflammation, which provides greater blood flow to ... 详细信息
来源: 评论
Predicting the Next Scenic Spot a User Will Browse on a Tourism Website Based on Markov Prediction Model
Predicting the Next Scenic Spot a User Will Browse on a Tour...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Yifan Shi Yimin Wen Zhigang Fan Yuqing Miao School of Computer Science and Engineering Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Shanghai Advanced Research Institute Chinese Academy of Sciences Shanghai China
In order to handle the information overload on the tourism websites and understand user's travel preference, we propose to build a users' preference matrix to reflect the users' preference degree on a set ... 详细信息
来源: 评论
The design of bus accessing timing to NAND flash array for high bandwidth
The design of bus accessing timing to NAND flash array for h...
收藏 引用
International SoC Design Conference, ISOCC
作者: Cheng Li-xin Yue Yang Liu Yun-yun J. K. Seon Ka Lok Man Suzhou Institute of Nano-Tech and Nano-Bionics (SINANO) Chinese Academy of Sciences Suzhou China Network Information Center Harbin Engineering University Harbin China LS Industrial Systems Korea Department of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool University Suzhou China
To improve the reading and writing speed of NAND flash array with multi-channel and multi-way, and to obtain the highest available bandwidth, an approach is presented in this paper. One mechanism of high efficiency bu... 详细信息
来源: 评论
A path-oriented approach to generating executable test sequences for extended finite state machines
A path-oriented approach to generating executable test seque...
收藏 引用
IEEE 6th International Symposium on Theoretical Aspects of software engineering, TASE 2012
作者: Wu, Tianyong Yan, Jun Zhang, Jian Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China Graduate University Chinese Academy of Sciences China
The Extended Finite State Machine (EFSM) is a commonly used model for specifying software systems. A test sequence for an EFSM is a sequence composed of values of input variables, which can make the EFSM "execute... 详细信息
来源: 评论
Polar differential power attacks and evaluation
收藏 引用
science China(Information sciences) 2012年 第7期55卷 1588-1604页
作者: TANG Ming 1 ,QIU ZhenLong 1 ,GAO Si 1,2 ,YI Mu 3 ,LIU ShuBo 1 ,ZHANG HuanGuo 1 & JIN YingZhen 1 1 School of computer science,Wuhan University,Wuhan 430072,China 2 State Key Laboratory of Information Security,Institute of software,Chinese academy of sciences,Beijing 100190,China 3 Centre for computer and Information Security Research School of computer science and software engineering University of Wollongong,Wollongong,NSW 2522,Australia 1. School of Computer Science Wuhan University Wuhan 430072 China2. State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China3. Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong NSW 2522 Australia
Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system *** existing SCAs generally require the knowledge of the corresponding cryptographic algorithm and implem... 详细信息
来源: 评论
A particle-based method for granular flow simulation
收藏 引用
science China(Information sciences) 2012年 第5期55卷 1062-1072页
作者: CHANG YuanZhang 1,BAO Kai 2,3,ZHU Jian 1 & WU EnHua 1,2 1 Department of computer and Information science,University of Macau,Macao,China 2 State Key Laboratory of computer science,Institute of software,Chinese academy of sciences,Beijing 100190,China 3 Division of Mathematical and computer sciences & engineering,KAUST,Thuwal,Saudi Arabia 1. Department of Computer and Information Science University of Macau Macao China2. State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China3. Division of Mathematical and Computer Sciences & Engineering KAUST Thuwal Saudi Arabia
We present a new particle-based method for granular flow *** the method,a new elastic stress term,which is derived from a modified form of the Hooke's law,is included in the momentum governing equation to handle t... 详细信息
来源: 评论
A local algorithm for finding dense bipartite-like subgraphs
A local algorithm for finding dense bipartite-like subgraphs
收藏 引用
18th Annual International Computing and Combinatorics Conference, COCOON 2012
作者: Peng, Pan State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China School of Information Science and Engineering Graduate University of China Academy of Sciences China
We give a local algorithm to extract dense bipartite-like subgraphs which characterize cyber-communities in the Web [13]. We use the bipartiteness ratio of a set as the quality measure that was introduced by Trevisan ... 详细信息
来源: 评论
Proving liveness property under strengthened compassion requirements
Proving liveness property under strengthened compassion requ...
收藏 引用
9th Annual Conference on Theory and Applications of Models of Computation, TAMC 2012
作者: Long, Teng Zhang, Wenhui State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Information Science and Engineering Graduate University of China Academy of Sciences Beijing China
Deductive rules are useful for proving properties with fairness constraints and there have been many studies on such rules with justice and compassion constraints. This paper focuses on system specifications with stre... 详细信息
来源: 评论