咨询与建议

限定检索结果

文献类型

  • 858 篇 会议
  • 658 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 798 篇 计算机科学与技术...
    • 665 篇 软件工程
    • 172 篇 信息与通信工程
    • 113 篇 控制科学与工程
    • 92 篇 生物工程
    • 83 篇 电气工程
    • 71 篇 电子科学与技术(可...
    • 66 篇 机械工程
    • 64 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 41 篇 网络空间安全
    • 36 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 31 篇 交通运输工程
    • 25 篇 土木工程
  • 451 篇 理学
    • 263 篇 数学
    • 109 篇 生物学
    • 101 篇 物理学
    • 72 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 44 篇 化学
  • 276 篇 管理学
    • 189 篇 管理科学与工程(可...
    • 107 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 57 篇 医学
    • 53 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 13 篇 教育学
  • 12 篇 农学
  • 12 篇 军事学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 40 篇 computer science
  • 35 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 31 篇 training
  • 29 篇 software enginee...
  • 29 篇 accuracy
  • 26 篇 data mining
  • 26 篇 software
  • 24 篇 deep learning
  • 23 篇 predictive model...
  • 20 篇 testing
  • 19 篇 authentication
  • 18 篇 convolution
  • 18 篇 artificial intel...
  • 17 篇 optimization
  • 17 篇 cloud computing
  • 16 篇 analytical model...
  • 14 篇 conferences

机构

  • 177 篇 state key labora...
  • 120 篇 university of ch...
  • 97 篇 institute of sof...
  • 55 篇 college of compu...
  • 47 篇 academy of compu...
  • 40 篇 jd explore acade...
  • 39 篇 technology cente...
  • 36 篇 school of comput...
  • 29 篇 academy of compu...
  • 28 篇 institute of inf...
  • 25 篇 institute of com...
  • 23 篇 shenzhen institu...
  • 21 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 school of electr...
  • 19 篇 state key labora...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 school of comput...
  • 15 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 19 篇 fan heng
  • 19 篇 zhang libo
  • 18 篇 wu enhua
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 15 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 tian feng
  • 13 篇 bin sheng
  • 12 篇 zheng changwen
  • 11 篇 xiong hui

语言

  • 1,267 篇 英文
  • 230 篇 其他
  • 46 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering name"
1539 条 记 录,以下是1261-1270 订阅
排序:
Finding all justifications of OWL entailments using TMS and MapReduce  11
Finding all justifications of OWL entailments using TMS and ...
收藏 引用
20th ACM Conference on Information and Knowledge Management, CIKM'11
作者: Wu, Gang Qi, Guilin Du, Jianfeng Ministry of Education Shenyang 110004 China College of Information Science and Engineering Northeastern University Shenyang 110004 China School of Computer Science and Engineering Southeast University Nanjing 210096 China Guangdong University of Foreign Studies Guangzhou 510006 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China
Finding all justifications of an OWL entailment is an important reasoning service for explaining logical inconsistencies. In this paper, we consider finding all justifications of an entailment in OWL pD*fragment, whic... 详细信息
来源: 评论
Homomorphic linear authentication schemes for proofs of retrievability
Homomorphic linear authentication schemes for proofs of retr...
收藏 引用
3rd IEEE International Conference on Intelligent Networking and CollaborativeSystems, INCoS 2011
作者: Liu, Shengli Chen, Kefei Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
In a proof of retrievability (POR) system, interactive POR protocols are executed between a storage server and clients, so that clients can be convinced that their data is available at the storage server, ready to be ... 详细信息
来源: 评论
Biologically inspired obsolescence management in mobile agent systems: A dynamic, service oriented approach
Biologically inspired obsolescence management in mobile agen...
收藏 引用
Congress on Evolutionary Computation
作者: Duncan Anthony Coulter Elizabeth Ehlers Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Ubiquitous computing heralds an era marked by the increasing pervasiveness of computational hardware throughout a given environment. In order to capitalize on the increased abundance of the underlying infrastructure m... 详细信息
来源: 评论
Towards Bluetooth multi-hop messaging
Towards Bluetooth multi-hop messaging
收藏 引用
AFRICON Conference
作者: Dimitri Mallis Marijke Coetzee Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Bluetooth-enabled cellphones are found in abundance today. Since cellphones are inherently mobile, they present obstacles for traditional Bluetooth multi-hop structures, namely scatternets. The main issue concerning s... 详细信息
来源: 评论
Web Services Security Policy Assertion Trade-offs
Web Services Security Policy Assertion Trade-offs
收藏 引用
International Conference on Availability, Reliability and Security, ARES
作者: Tristan Lavarack Marijke Coetzee Academy of Computer Science and Software Engineering University of Johannesburg Gauteng South Africa
Web services security requirements and capabilities are described in security policies. To enable the seamless interoperation between services, security policy intersection aims to provide a security policy that will ... 详细信息
来源: 评论
A Charged PSO Inspired Method for Generating Immune Detectors for Network Intrusion Detection
A Charged PSO Inspired Method for Generating Immune Detector...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Mark Heydenrych Elizabeth Marie Ehlers Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
This paper will present a method for generating immune detectors inspired by the working of charged particle swarm optimisation and negative selection in the artificial immune system. The paper will also test the effi... 详细信息
来源: 评论
Implementing rootkits to address operating system vulnerabilities
Implementing rootkits to address operating system vulnerabil...
收藏 引用
Information Security for South Africa (ISSA)
作者: Manuel Corregedor Sebastiaan Von Solms Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Statistics show that although malware detection techniques are detecting and preventing malware, they do not guarantee a 100% detection and / or prevention of malware. This is especially the case when it comes to root...
来源: 评论
Enhancing Digital Business Ecosystem trust and reputation with centrality measures
Enhancing Digital Business Ecosystem trust and reputation wi...
收藏 引用
Information Security for South Africa (ISSA)
作者: Donovan Isherwood Marijke Coetzee Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Digital Business Ecosystem (DBE) is a decentralised environment where very small enterprises (VSEs) and small to medium sized enterprises (SMEs) interoperate by establishing collaborations with each other. Collaborati... 详细信息
来源: 评论
Static Detection of Bugs Caused by Incorrect Exception Handling in Java Programs
Static Detection of Bugs Caused by Incorrect Exception Handl...
收藏 引用
International Conference on Quality software
作者: Xiaoquan Wu Zhongxing Xu Jun Wei Technology Center of Software Engineering State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China Chinese Academy and Sciences Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China
Exception handling is a vital but often poorly tested part of a program. Static analysis can spot bugs on exceptional paths without actually making the exceptions happen. However, the traditional methods only focus on... 详细信息
来源: 评论
DNA Computing Model Based on Self-Assembled Nanoparticle Probes for SAT Problem
DNA Computing Model Based on Self-Assembled Nanoparticle Pro...
收藏 引用
The 2010 International Conference on Manufacturing science and Materials engineering(ICMSME 2011)
作者: Fei Li Jin Xu Zheng Li Institute of Software School of Electronics Engineering and Computer SciencePeking University Equipment Academy of Air Force
SAT problem is one of important NP-complete problems with widespread applicationIn this paper, a new DNA computing model based on self-assembled nanoparticle probes is presented to solve this problemIts essence is tha... 详细信息
来源: 评论