咨询与建议

限定检索结果

文献类型

  • 4,538 篇 会议
  • 3,102 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,692 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,956 篇 工学
    • 3,571 篇 计算机科学与技术...
    • 2,851 篇 软件工程
    • 890 篇 信息与通信工程
    • 712 篇 控制科学与工程
    • 439 篇 电气工程
    • 408 篇 电子科学与技术(可...
    • 394 篇 生物工程
    • 369 篇 机械工程
    • 283 篇 生物医学工程(可授...
    • 277 篇 光学工程
    • 211 篇 仪器科学与技术
    • 173 篇 动力工程及工程热...
    • 167 篇 化学工程与技术
    • 140 篇 土木工程
    • 139 篇 交通运输工程
    • 126 篇 建筑学
    • 123 篇 安全科学与工程
    • 120 篇 材料科学与工程(可...
  • 2,408 篇 理学
    • 1,402 篇 数学
    • 512 篇 物理学
    • 480 篇 生物学
    • 361 篇 统计学(可授理学、...
    • 334 篇 系统科学
    • 183 篇 化学
  • 1,379 篇 管理学
    • 837 篇 管理科学与工程(可...
    • 578 篇 图书情报与档案管...
    • 337 篇 工商管理
  • 271 篇 医学
    • 224 篇 临床医学
    • 181 篇 基础医学(可授医学...
  • 162 篇 法学
    • 121 篇 社会学
  • 109 篇 经济学
  • 71 篇 农学
  • 54 篇 教育学
  • 24 篇 文学
  • 19 篇 军事学
  • 14 篇 艺术学

主题

  • 482 篇 computer science
  • 372 篇 laboratories
  • 238 篇 software enginee...
  • 154 篇 data mining
  • 143 篇 application soft...
  • 131 篇 computational mo...
  • 119 篇 semantics
  • 117 篇 feature extracti...
  • 116 篇 software
  • 109 篇 wireless sensor ...
  • 107 篇 computer archite...
  • 102 篇 costs
  • 99 篇 software testing
  • 99 篇 algorithm design...
  • 96 篇 quality of servi...
  • 93 篇 optimization
  • 92 篇 protocols
  • 92 篇 testing
  • 89 篇 deep learning
  • 88 篇 software systems

机构

  • 493 篇 state key labora...
  • 213 篇 department of co...
  • 202 篇 department of co...
  • 170 篇 state key labora...
  • 157 篇 college of compu...
  • 108 篇 state key labora...
  • 101 篇 university of ch...
  • 90 篇 national enginee...
  • 88 篇 national key lab...
  • 84 篇 school of softwa...
  • 81 篇 department of co...
  • 66 篇 department of co...
  • 60 篇 department of co...
  • 60 篇 department of co...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 50 篇 tsinghua nationa...
  • 45 篇 national key lab...
  • 44 篇 peng cheng labor...
  • 43 篇 key laboratory o...

作者

  • 52 篇 rajkumar buyya
  • 42 篇 shen linlin
  • 41 篇 junping du
  • 32 篇 shen furao
  • 32 篇 baowen xu
  • 31 篇 yu huiqun
  • 30 篇 guihai chen
  • 30 篇 xu baowen
  • 29 篇 li wu-jun
  • 28 篇 xiang-yang li
  • 28 篇 zhao jian
  • 27 篇 dou wanchun
  • 26 篇 fan guisheng
  • 25 篇 zhou zhi-hua
  • 24 篇 jun zhang
  • 24 篇 yang tianbao
  • 23 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 22 篇 yang yang
  • 22 篇 wang wei

语言

  • 7,174 篇 英文
  • 337 篇 其他
  • 178 篇 中文
  • 4 篇 德文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science Software System Laboratory"
7692 条 记 录,以下是4991-5000 订阅
排序:
Designing and analysis of a new book-lending system based on logic Petri nets
Designing and analysis of a new book-lending system based on...
收藏 引用
2011 International Conference on Electric Information and Control Engineering, ICEICE 2011
作者: Xia, Jiang Luan, Wenjing Department of Computer Laiwu Vocational and Technical College Laiwu 271100 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China
A new book-lending system is designed and analyzed based on logic Petri nets in this paper. The batch processing function and indeterminacy of readers are included in the system. Its logic Petri net model is establish... 详细信息
来源: 评论
Memory Leak Detection Based on Memory State Transition Graph
Memory Leak Detection Based on Memory State Transition Graph
收藏 引用
Asia-Pacific Conference on software Engineering
作者: Zhenbo Xu Jian Zhang Zhongxing Xu Department of Computer Science and Technology University of Science and Technology of China China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China
Memory leak is a common type of defect that is hard to detect manually. Existing memory leak detection tools suffer from lack of precise interprocedural alias and path conditions. To address this problem, we present a... 详细信息
来源: 评论
Fault analysis study of the block cipher FOX64
收藏 引用
Multimedia Tools and Applications 2011年 第3期63卷 691-708页
作者: Li, Ruilin You, Jianxiong Sun, Bing Li, Chao Department of Mathematics and System Science Science College National University of Defense Technology Changsha China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China College of Computer National University of Defense Technology Changsha China
FOX is a family of symmetric block ciphers from MediaCrypt AG that helps to secure digital media, communications, and storage. The high-level structure of FOX is the so-called (extended) Lai–Massey scheme. This paper...
来源: 评论
The hidden experts in software-engineering communication: NIER track
The hidden experts in software-engineering communication: NI...
收藏 引用
International Conference on software Engineering (ICSE)
作者: Irwin Kwan Daniela Damian Software Engineering Global InterAction Laboratory Department of Computer Science University of Victoria Victoria BC Canada
Sharing knowledge in a timely fashion is important in distributed software development. However, because experts are difficult to locate, developers tend to broadcast information to find the right people, which leads ... 详细信息
来源: 评论
SIMD Friendly Ray Tracing on GPU
SIMD Friendly Ray Tracing on GPU
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Peng Zhou Xiangxu Meng Department of Computer Science Shandong Provincial Key Laboratory of Software Engineering Shandong University Jinan China
In this paper, we present a novel BVH tracing method on GPU, which can achieve better SIMD utilization than traditional method. In the traditional way, thread usually sticks to a ray until the closest hit is found. Wh... 详细信息
来源: 评论
Network Recovery and Augmentation under Geographically Correlated Region Failures
Network Recovery and Augmentation under Geographically Corre...
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Xiaoliang Wang State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University China
The network infrastructures are under the threat of large-scale disruptions, both natural (like earthquake, flooding) and intentional (like EMP attack, bomb explosion). In such scenarios, a number of network elements ... 详细信息
来源: 评论
3DV quality model based depth maps for view synthesis in FTV system
收藏 引用
Journal of Shanghai University(English Edition) 2011年 第4期15卷 335-341页
作者: 张秋闻 安平 张艳 张兆杨 王元庆 Key Laboratory of Advanced Display and System Application (Shanghai University) Ministry of EducationShanghai 200072P.R.China School of Communication and Information Engineering Shanghai University Department of Computer Science and Technology Anhui University of Finance and EconomicsBengbu 230030AuhuiP.R.China Department of Electronics Science and Engineering Nanjing University
Depth maps are used for synthesis virtual view in free-viewpoint television (FTV) systems. When depth maps are derived using existing depth estimation methods, the depth distortions will cause undesirable artifacts ... 详细信息
来源: 评论
Evaluating the viability of process replication reliability for exascale systems
Evaluating the viability of process replication reliability ...
收藏 引用
Supercomputing Conference
作者: Kurt Ferreira Jon Stearley James H. Laros Ron Oldfield Kevin Pedretti Ron Brightwell Rolf Riesen Patrick G. Bridges Dorian Arnold Scalable System Software Department Sandia National Laboratories USA IBM Research Ireland Department of Computer Science University of New Mexico USA
As high-end computing machines continue to grow in size, issues such as fault tolerance and reliability limit application scalability. Current techniques to ensure progress across faults, like checkpoint-restart, are ... 详细信息
来源: 评论
Cross-platform wireless sensor network development
Cross-platform wireless sensor network development
收藏 引用
International Symposium on Information Processing in Sensor Networks (IPSN)
作者: Morten Tranberg Hansen Branislav Kusy Department of Computer Science Aarhus University Denmark Autonomous System Laboratory CSIRO ICT Centre Australia
Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as we... 详细信息
来源: 评论
Unified broadcast in sensor networks
Unified broadcast in sensor networks
收藏 引用
International Symposium on Information Processing in Sensor Networks (IPSN)
作者: Morten Tranberg Hansen Raja Jurdak Branislav Kusy Department of Computer Science Aarhus University Denmark Autonomous System Laboratory CSIRO ICT Centre Australia
Complex sensor network applications include multiple services such as collection, dissemination, time synchronization, and failure detection protocols. Many of these protocols require local state maintenance through p... 详细信息
来源: 评论