咨询与建议

限定检索结果

文献类型

  • 852 篇 会议
  • 654 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,003 篇 工学
    • 787 篇 计算机科学与技术...
    • 662 篇 软件工程
    • 167 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 92 篇 生物工程
    • 75 篇 电气工程
    • 66 篇 电子科学与技术(可...
    • 65 篇 机械工程
    • 63 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 38 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 31 篇 安全科学与工程
    • 29 篇 交通运输工程
    • 25 篇 土木工程
  • 446 篇 理学
    • 263 篇 数学
    • 108 篇 生物学
    • 100 篇 物理学
    • 73 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 41 篇 化学
  • 274 篇 管理学
    • 187 篇 管理科学与工程(可...
    • 106 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 54 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 12 篇 教育学
  • 12 篇 农学
  • 12 篇 军事学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 40 篇 computer science
  • 35 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 31 篇 training
  • 29 篇 software enginee...
  • 29 篇 accuracy
  • 26 篇 data mining
  • 26 篇 software
  • 24 篇 deep learning
  • 23 篇 predictive model...
  • 20 篇 testing
  • 19 篇 authentication
  • 18 篇 convolution
  • 18 篇 artificial intel...
  • 17 篇 cloud computing
  • 16 篇 optimization
  • 16 篇 analytical model...
  • 14 篇 conferences

机构

  • 178 篇 state key labora...
  • 120 篇 university of ch...
  • 96 篇 institute of sof...
  • 54 篇 college of compu...
  • 45 篇 academy of compu...
  • 40 篇 jd explore acade...
  • 39 篇 technology cente...
  • 36 篇 school of comput...
  • 29 篇 academy of compu...
  • 28 篇 institute of inf...
  • 25 篇 institute of com...
  • 23 篇 shenzhen institu...
  • 21 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 school of electr...
  • 19 篇 state key labora...
  • 18 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 school of comput...
  • 15 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 19 篇 fan heng
  • 19 篇 zhang libo
  • 18 篇 wu enhua
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 15 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 tian feng
  • 13 篇 bin sheng
  • 11 篇 zheng changwen
  • 11 篇 dai guozhong

语言

  • 1,316 篇 英文
  • 171 篇 其他
  • 46 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering name"
1529 条 记 录,以下是1181-1190 订阅
排序:
MAP-numa: Access patterns used to characterize the NUMA memory access optimization techniques and algorithms
MAP-numa: Access patterns used to characterize the NUMA memo...
收藏 引用
9th IFIP International Conference on Network and Parallel Computing, NPC 2012
作者: Luo, Qiuming Liu, Chenjian Kong, Chang Cai, Ye Shenzhen China College of Computer Science and Software Engineering Shenzhen University China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Some typical memory access patterns are provided and programmed in C, which can be used as benchmark to characterize the various techniques and algorithms aim to improve the performance of NUMA memory access. These ac... 详细信息
来源: 评论
An iterated local search algorithm for task assignment in distributed computing systems
An iterated local search algorithm for task assignment in di...
收藏 引用
2012 International Conference on Advances in Mechanics engineering, ICAME 2012
作者: Kang, Qinma He, Hong Jiang, Haining School of Information Engineering Shandong University at Weihai Weihai 264209 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China
This paper considers the problem of task assignment in heterogeneous distributed computing systems with the goal of minimizing the total execution and communication costs. An iterated local search algorithm is propose... 详细信息
来源: 评论
Accurate depth-of-field rendering using adaptive bilateral depth filtering
Accurate depth-of-field rendering using adaptive bilateral d...
收藏 引用
1st International Conference on Computational Visual Media, CVM 2012
作者: Wu, Shang Yu, Kai Sheng, Bin Huang, Feiyue Gao, Feng Ma, Lizhuang Department of Computer Science and Engineering Shanghai Jiao Tong University China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China Tencent Research Gumei Road 1528 Shanghai 200233 China
Real-time depth of field (DoF) rendering is crucial to realistic image synthesis and VR applications. This paper presents a new method to simulate the depth-of-field effects with bilateral depth filtering. Unlike the ... 详细信息
来源: 评论
ATE: Anti-malware technique evaluator
ATE: Anti-malware technique evaluator
收藏 引用
Information Security for South Africa (ISSA)
作者: Manuel Corregedor Sebastiaan Von Solms Academy of Computer Science and Software Engineering Johannesburg South Africa
Current commercial anti-malware products fail to guarantee a 100% detection and prevention of malware. This paper proposes an evaluation framework called ATE (Anti-malware Technique Evaluator) that can be used to eval... 详细信息
来源: 评论
Improving software testing process: Feature prioritization to make winners of success-critical stakeholders
Improving software testing process: Feature prioritization t...
收藏 引用
作者: Li, Qi Yang, Ye Li, Mingshu Wang, Qing Boehm, Barry W. Hu, Chenyong Universy of Southern California Center for Systems and Software Engineering 941 W. 37th Place Los Angeles CA 90089 United States Laboratory for Internet Software Technologies Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
For a successful software project, acceptable quality must be achieved within an acceptable cost, demonstrating business value to customers and satisfactorily meeting delivery timeliness. Testing serves as the most wi... 详细信息
来源: 评论
Discriminant graph based linear embedding
Discriminant graph based linear embedding
收藏 引用
8th International Conference on Intelligent Computing Technology, ICIC 2012
作者: Li, Bo Liu, Jin Dong, Wen-Yong Zhang, Wen-Sheng School of Computer Science and Technology Wuhan University of Science and Technology 430081 Wuhan China State Key Lab. for Novel Software Technology Nanjing China State Key Lab. of Software Engineering Wuhan China Institute of Automation Chinese Academy of Science Beijing China
LLE is a nonlinear dimensionality reduction method, which has been successfully applied to data visualization. Based on the assumption of local linearity, LLE can compute the weights between the KNN nodes using the lo... 详细信息
来源: 评论
Multivariate Logistic Regression Analysis for the Network Education Unified National Exam Results
Multivariate Logistic Regression Analysis for the Network Ed...
收藏 引用
2012 4th International Conference on Environmental science and Information Application Technology(ESIAT 2012)
作者: Luo Changri He Tingting Zhang Xinhua Zhou Zibo National Engineering Research Center for e-Learning Central China Normal University College of Vocational and Continuing Education Central China Normal University Academy of Computer Science Central China Normal University College of Computer and software Wuhan Vocational College of Software and Engineering
In this paper,the logistic regression model is applied to analyze the influence of the factors affecting the Basics of computer Application and College English B exam *** model the logistic regression by using the two... 详细信息
来源: 评论
Data integrity check and repair in design and manufacture of distributed storage network
Data integrity check and repair in design and manufacture of...
收藏 引用
3rd International Conference on Material and Manufacturing Technology, ICMMT 2012
作者: Liu, Gang Lou, Yanxiang Liu, Shengli Department of Computer Science and Engineering Shanghai JiaoTong University Shanghai 200240 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
When clients store large files on a remote network of unreliable distributed servers, they want to verify that their files are properly stored in the servers without any modification. This can be achieved by the techn... 详细信息
来源: 评论
Towards a Holistic Information Security Governance Framework for SOA
Towards a Holistic Information Security Governance Framework...
收藏 引用
International Conference on Availability, Reliability and Security, ARES
作者: Marijke Coetzee Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Service Oriented Architecture (SOA) is a design paradigm that enables applications to be built from business processes to support enterprise architecture. This architecture introduces information security challenges t... 详细信息
来源: 评论
Perspective:Societally connected multimedia across cultures
收藏 引用
Journal of Zhejiang University-science C(computers and Electronics) 2012年 第12期13卷 875-880页
作者: Zhongfei ZHANG Zhengyou ZHANG Ramesh JAIN Yueting ZHUANG Noshir CONTRACTOR Alexander G. HAUPTMANN Alejandro (Alex) JAIMES Wanqing LI Alexander C. LOUI Tao MEI Nicu SEBE Yonghong TIAN Vincent S. TSENG Qing WANG Changsheng XU Huimin YU Shiwen YU Department of lnformation Science & Electronic Engineering Zhejiang University Hangzhou 310027 China Microsoft Research Redmond WA USA Department of Computer Science University of California IrvineCA USA College of Computer Science and Technology Zhejiang UniversityHangzhou 310027 China School of Communication Northwestern University Evanston 1LUSA Informedia Group CMU Pittsburgh PA Yahoo.t Research Spain School of Computer Science and Software Engineering Universityof Wollongong NSW Australia Kodak Research Labs USA Microsoft Research Asia China Department of Information Engineering and Computer Science University of Trento Italy Institute of Computational Linguistics Peking University Beijing100871 China Institute of Computer Science and Information National ChengKung University Taiwan 701 Tainan School of Computer Science Northwestern Polytechnical UniversityXi'an 710129 China Institute of Automation Chinese Academy of Sciences Beijing100080 China
The advance of the Internet in the past decade has radically changed the way people communicate and col- laborate with each other. Physical distance is no more a barrier in online social networks, but cultural differe... 详细信息
来源: 评论