咨询与建议

限定检索结果

文献类型

  • 852 篇 会议
  • 651 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,526 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,002 篇 工学
    • 787 篇 计算机科学与技术...
    • 662 篇 软件工程
    • 167 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 92 篇 生物工程
    • 75 篇 电气工程
    • 66 篇 电子科学与技术(可...
    • 65 篇 机械工程
    • 63 篇 生物医学工程(可授...
    • 59 篇 光学工程
    • 42 篇 化学工程与技术
    • 38 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 31 篇 安全科学与工程
    • 29 篇 交通运输工程
    • 25 篇 土木工程
  • 446 篇 理学
    • 263 篇 数学
    • 108 篇 生物学
    • 100 篇 物理学
    • 73 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 41 篇 化学
  • 274 篇 管理学
    • 187 篇 管理科学与工程(可...
    • 106 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 54 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 12 篇 教育学
  • 12 篇 农学
  • 12 篇 军事学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 40 篇 computer science
  • 35 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 31 篇 training
  • 29 篇 software enginee...
  • 29 篇 accuracy
  • 26 篇 data mining
  • 26 篇 software
  • 23 篇 deep learning
  • 23 篇 predictive model...
  • 20 篇 testing
  • 19 篇 authentication
  • 18 篇 convolution
  • 18 篇 artificial intel...
  • 17 篇 cloud computing
  • 16 篇 optimization
  • 16 篇 analytical model...
  • 14 篇 conferences

机构

  • 178 篇 state key labora...
  • 120 篇 university of ch...
  • 96 篇 institute of sof...
  • 54 篇 college of compu...
  • 45 篇 academy of compu...
  • 40 篇 jd explore acade...
  • 39 篇 technology cente...
  • 36 篇 school of comput...
  • 29 篇 academy of compu...
  • 28 篇 institute of inf...
  • 25 篇 institute of com...
  • 23 篇 shenzhen institu...
  • 21 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 school of electr...
  • 19 篇 state key labora...
  • 18 篇 school of comput...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 15 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 19 篇 fan heng
  • 19 篇 zhang libo
  • 18 篇 wu enhua
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 15 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 tian feng
  • 13 篇 bin sheng
  • 11 篇 zheng changwen
  • 11 篇 dai guozhong

语言

  • 1,313 篇 英文
  • 171 篇 其他
  • 46 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering name"
1526 条 记 录,以下是1411-1420 订阅
排序:
A performance analysis of the spring protocol through simulation
A performance analysis of the spring protocol through simula...
收藏 引用
2007 Business and Industry Symposium, BIS 2007
作者: Richardson, Kevin Hamilton, John A. Carlisle, Martin C. Department of Computer Science and Software Engineering Auburn University United States Department of Computer Science United States Air Force Academy United States
Many of today's organizations have set up wireless networks for company use, some merely for the convenience of not having wires everywhere. In addition, many of these networks are using a hardware implementation ... 详细信息
来源: 评论
Wireless network simulation for army UAVs
Wireless network simulation for army UAVs
收藏 引用
Fall Simulation Interoperability Workshop 2007
作者: Hamilton Jr., John A. Box, Daniel Hamilton, Major Stephen S. Computer Science and Software Engineering Auburn University Auburn AL 36849 United States Electrical Engineering and Computer Science United States Military Academy West Point NY 10996 United States
Auburn University, through the Army's Aviation and Missile Research, Development and engineering Center (AMRDEC) has been supporting the Unmanned Systems Initiative program. The research program at Auburn is focus... 详细信息
来源: 评论
Validating a network simulation testbed for Army UAVS
Validating a network simulation testbed for Army UAVS
收藏 引用
2007 Winter Simulation Conference, WSC
作者: Hamilton, Stephen Schmoyer, Colonel Timothy Hamilton Jr., J. A. Drew Electrical Engineering and Computer Science United States Military Academy West Point NY 10996 United States Computer Science and Software Engineering Auburn University Auburn AL 36849 United States
Auburn University, through the Army's Aviation and Missile Research, Development and engineering Center (AMRDEC) has been supporting the Unmanned Systems Initiative (USI) program in three research areas related to... 详细信息
来源: 评论
MHH: A novel protocol for mobility management in publish/subscribe systems
MHH: A novel protocol for mobility management in publish/sub...
收藏 引用
36th International Conference on Parallel Processing in Xi'an, ICPP
作者: Wang, Jinling Cao, Jiannong Li, Jing Wu, Jie Department of Computing Hong Kong Polytechnic University Institute of Software Chinese Academy of Sciences Department of Computer Science and Engineering Florida Atlantic University
Mobility management is an important issue for publish/subscribe systems to support mobile clients. The objectives of mobility management for publish / subscribe are to achieve short handoff delay and low message overh... 详细信息
来源: 评论
An combination approach to tackling semantic conflicts based on RDF model
An combination approach to tackling semantic conflicts based...
收藏 引用
3rd International Conference on Semantics, Knowledge, and Grid, SKG 2007
作者: Ma, Yinglong Jin, Beihong School of Computer Science and Technology North China Electric Power University Beijing 102206 China Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences P.O.Box 8718 Beijing 100080 China
Within Semantic Web environments, ontologies have been adopted as their conceptual backbone. An important task for Web information integration and sharing is to resolve semantic conflicts because of semantic heterogen... 详细信息
来源: 评论
Perfect concurrent signature protocol
Perfect concurrent signature protocol
收藏 引用
SNPD 2007: 8th ACIS International Conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Zhenjie, Huang Rufen, Huang Xuanzhi, Lin Department of Computer Science and Engineering Zhangzhou Normal University Fujian 363000 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 China
The concept of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004 which allows two entities to produce two signatures in such a way that, the signer of each signa... 详细信息
来源: 评论
Approach for runtime monitoring of WS-BPEL processes
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2007年 第SUPPL. 2期36卷 174-178页
作者: Chen, Jin-Liang Wu, Guo-Quan Wei, Jun Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing 100080 China Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 China
As a service-based language, WS-BPEL is widely adopted into enterprise solutions. However, because of the intrinsic flexibility and dynamism of the web services it used, its behavior couldn't be foreseen until it ... 详细信息
来源: 评论
Slicing of component behavior specification with respect to their composition
Slicing of component behavior specification with respect to ...
收藏 引用
10th International ACM SIGSOFT Symposium on Component-Based software engineering, CBSE 2007
作者: Šerý, Ondřej Plašil, František Charles University in Prague Faculty of Mathematics And Physics Department of Software Engineering Malostranske namesti 25 118 00 Prague 1 Czech Republic Academy of Sciences of the Czech Republic Institute of Computer Science
Being an important means of reducing development costs, behavior specification of software components facilitates reuse of a component and even reuse of a component's architecture (assembly). However, since typica... 详细信息
来源: 评论
Validating a network simulation testbed for army UAVs
Validating a network simulation testbed for army UAVs
收藏 引用
Simulation Winter Conference
作者: Stephen Hamilton Timothy Schmoyer J. A. Hamilton Electrical Engineering & Computer Science United States Military Academy West Point NY USA Computer Science & Software Engineering Auburn University AL 36849 USA
Auburn University, through the Army's aviation and missile research, development and engineering center (AMRDEC) has been supporting the unmanned systems initiative (USI) program in three research areas related to... 详细信息
来源: 评论
Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols
Pseudo trust: Zero-knowledge based authentication in anonymo...
收藏 引用
21st International Parallel and Distributed Processing Symposium, IPDPS 2007
作者: Lu, Li Han, Jinsong Hu, Lei Huai, Jinpeng Liu, Yunhao Ni, Lionel M. State Key Lab. of Information Security Graduate School Chinese Academy of Sciences Beijing China Dept. of Computer Science and Engineering Hong Kong University of Science and Technology Kowloon Hong Kong School of Computer Science Beihang University Beijing China State Key Lab. of Software Developing Environment Beihang University Beijing China
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence, there exists an inhere... 详细信息
来源: 评论