咨询与建议

限定检索结果

文献类型

  • 852 篇 会议
  • 651 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,526 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,002 篇 工学
    • 787 篇 计算机科学与技术...
    • 662 篇 软件工程
    • 167 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 92 篇 生物工程
    • 75 篇 电气工程
    • 66 篇 电子科学与技术(可...
    • 65 篇 机械工程
    • 63 篇 生物医学工程(可授...
    • 59 篇 光学工程
    • 42 篇 化学工程与技术
    • 38 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 31 篇 安全科学与工程
    • 29 篇 交通运输工程
    • 25 篇 土木工程
  • 446 篇 理学
    • 263 篇 数学
    • 108 篇 生物学
    • 100 篇 物理学
    • 73 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 41 篇 化学
  • 274 篇 管理学
    • 187 篇 管理科学与工程(可...
    • 106 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 54 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 12 篇 教育学
  • 12 篇 农学
  • 12 篇 军事学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 40 篇 computer science
  • 35 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 31 篇 training
  • 29 篇 software enginee...
  • 29 篇 accuracy
  • 26 篇 data mining
  • 26 篇 software
  • 23 篇 deep learning
  • 23 篇 predictive model...
  • 20 篇 testing
  • 19 篇 authentication
  • 18 篇 convolution
  • 18 篇 artificial intel...
  • 17 篇 cloud computing
  • 16 篇 optimization
  • 16 篇 analytical model...
  • 14 篇 conferences

机构

  • 178 篇 state key labora...
  • 120 篇 university of ch...
  • 96 篇 institute of sof...
  • 54 篇 college of compu...
  • 45 篇 academy of compu...
  • 40 篇 jd explore acade...
  • 39 篇 technology cente...
  • 36 篇 school of comput...
  • 29 篇 academy of compu...
  • 28 篇 institute of inf...
  • 25 篇 institute of com...
  • 23 篇 shenzhen institu...
  • 21 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 school of electr...
  • 19 篇 state key labora...
  • 18 篇 school of comput...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 15 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 19 篇 fan heng
  • 19 篇 zhang libo
  • 18 篇 wu enhua
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 15 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 tian feng
  • 13 篇 bin sheng
  • 11 篇 zheng changwen
  • 11 篇 dai guozhong

语言

  • 1,313 篇 英文
  • 171 篇 其他
  • 46 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering name"
1526 条 记 录,以下是1331-1340 订阅
排序:
Decomposition-Based Consistent Query Answering in Databases with Universal Constraints under Cardinality-Based Semantics
Decomposition-Based Consistent Query Answering in Databases ...
收藏 引用
International Conference on Computational Intelligence and software engineering (CiSE)
作者: Jianfeng Du Yi-Dong Shen Guilin Qi Guangdong University of Foreign Studies (GDUFS) Guangzhou China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China School of Computer Science and Engineering South-East University Nanjing China
Consistent query answering (CQA) in relational databases under cardinality-based semantics is a well-known approach to dealing with inconsistency between databases and certain integrity constraints (ICs). It computes ... 详细信息
来源: 评论
Application of Logical Petri Nets in Web Service composition
Application of Logical Petri Nets in Web Service composition
收藏 引用
IEEE International Conference on Mechatronics and Automation
作者: ChangYan Zhu YuYue Du College of Information Science and Engineering Shandong University of Science and Technology Qingdao China State Key Laboratory of Computer Science institute of Software Chinese Academy and Sciences Beijing China Shandong University of Science and Technology Qingdao China
In the process of Web service composition, there are several cases about working up an atomic Web service; as well as the outputs of Web service have many possibilities because of the different requirements from users... 详细信息
来源: 评论
An evolutionary multi-objective approach for dynamic mission planning
An evolutionary multi-objective approach for dynamic mission...
收藏 引用
Congress on Evolutionary Computation
作者: Lam Thu Bui Zbignew Michalewicz Department of Software Engineering Faculty of IT Quy Don University Vietnam Polish Japanese Institute of Information Technology Warsaw Poland School of Computer Science University of Adelaide Adelaide SA Australia Institute of Computer Science Polish Academy of Sciences Warsaw Poland
In this paper, we propose a computational approach for adaptation in mission planning, an important process in the chain of command and control. In this area, it has been highly regarded that military missions are oft... 详细信息
来源: 评论
Efficient Data Delivery in Mobile Sensor Networks
收藏 引用
通讯和计算机(中英文版) 2010年 第5期7卷 23-29页
作者: Yongping Xiong Jianwei Niu Jian Ma Limin Sun Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Graduate University of the Chinese Academy of Sciences Beijing 100039 China School of Computer Science and Engineering Beihang University Beijing 100191 China Nokia Research Center Beijing 100176 China Institute of Software Chinese Academy of Sciences Beijing 100190 China
来源: 评论
Enhancing fairness: A novel C2C e-commerce community member reputation algorithm based on transaction social networks
Enhancing fairness: A novel C2C e-commerce community member ...
收藏 引用
IADIS International Conference WWW/Internet 2010
作者: Feng, Wangsen Zhang, Bei Xia, Yunni Li, Jiajing Meng, Tao Key Laboratory of Network and Software Security Assurance of Ministry of Education Computing Center Peking University Beijing 100871 China College of Computer Science Chongqing University Chongqing 400044 China School of Mechanical Electronic and Information Engineering China University of Mining and Technology Beijing 100083 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Today, almost all the C2C e-commerce community member reputation evaluating algorithms are time sensitive. The reputation of a community member is accumulated after transactions and the increment of reputation after a... 详细信息
来源: 评论
The Risk Assessment of Crime Prevention System Based on Risk Entropy Model
The Risk Assessment of Crime Prevention System Based on Risk...
收藏 引用
International Conference on computer Research and Development (ICCRD)
作者: Guo Xi Hu Ruimin Peng Yongjun Dai Jingjing School of Computer Science Wuhan University of China Wuhan China National Engineering Research Center for Multimedia Software Wuhan University of China Wuhan China Communication and Command Academy of PLA Wuhan China
With the rapid development of industrialization and urbanization, crime prevention issues become serious in China each day. Although various security facilities have played a positive role in the field of crime preven... 详细信息
来源: 评论
Adaptive and impulsive cluster synchronization of a general complex dynamical network
Adaptive and impulsive cluster synchronization of a general ...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Bingxiong Shi Junan Lu Jinhu Lu Xinghuo Yu College of Mathematics and Statistics and State Key Laboratory of Software Engineering Wuhan University of China Wuhan China School of Electrical and Computer Engineering RMIT University Melbourne Australia Key Laboratory of Systems and Control Institute of Systems Science Chinese Academy and Sciences Beijing China School of Electrical and Computer Engineering RMIT University Melbourne VIC Australia
Recently, cluster synchronization has attracted an increasing interest in various disciplines, including mathematics, physics, and engineering sciences. This paper further investigates the cluster synchronization of a... 详细信息
来源: 评论
A New Secret Sharing Scheme Based on Commutative Encrypted Function
A New Secret Sharing Scheme Based on Commutative Encrypted F...
收藏 引用
International Forum on Information Technology and Applications, IFITA
作者: Jun He Ximei Li Lijuan Li Chunming Tang Computer and Information Engineering Department HuaiHua Vocational and Technical College Huaihua Hunan China School of Computer and Communication Hunan University Changsha Hunan China School of Mathematics and Information Science Guangzhou University Guangzhou Guangdong China State Key Laboratory of Information Security Institute of Software Science Chinese Academy and Sciences Beijing China
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper ... 详细信息
来源: 评论
Design and Implementation of Granary Monitoring System Based on Wireless Sensor Network Node
Design and Implementation of Granary Monitoring System Based...
收藏 引用
2010 International Conference on Measuring Technology and Mechatronics Automation(ICMTMA 2010)(2010年检测技术与机电自动化国际会议)
作者: Yuanyuan Zhang Deyi Tai Lin Zhang Jian Ding Min Yuan Xiaowei Xu Xiang Zhen Department of Electronics & Electrical Engineering Hefei University HefeiAnhui 230022 China Department of Computer Science & Technology Hefei University HefeiAnhui 230022 China Nanjing Zhongxing Software Company Limited Nanjing Jiangsu 210090 China Hangzhou Academy of Environmental Science Hangzhou Zhejiang 310014 China
Aecording to the application requirements of granary environment, short-range wireless transmission method Is employed to design n temperature and humidity monitoring system of granary, which is based on Atmega128 ... 详细信息
来源: 评论
Lumiproxy:A Hybrid Representation of Image-Based Models
收藏 引用
Journal of computer science & Technology 2009年 第3期24卷 578-587页
作者: 盛斌 朱鉴 吴恩华 张言辞 Department of Computer Science and Engineering The Chinese University of Hong Kong Faculty of Science and Technology University of Macao Institute of Software Chinese Academy of Sciences Department of Informatics University of Zurich
In this paper, we present a hybrid representation of image-based models combining the textured planes and the hierarchical points. Taking a set of depth images as input, our method starts from classifying input pixels... 详细信息
来源: 评论