咨询与建议

限定检索结果

文献类型

  • 1,411 篇 会议
  • 1,100 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,516 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,736 篇 工学
    • 1,394 篇 计算机科学与技术...
    • 1,128 篇 软件工程
    • 309 篇 信息与通信工程
    • 238 篇 控制科学与工程
    • 140 篇 生物工程
    • 116 篇 电子科学与技术(可...
    • 108 篇 电气工程
    • 101 篇 机械工程
    • 76 篇 光学工程
    • 64 篇 仪器科学与技术
    • 63 篇 生物医学工程(可授...
    • 52 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 45 篇 网络空间安全
    • 34 篇 建筑学
    • 32 篇 土木工程
    • 31 篇 安全科学与工程
  • 753 篇 理学
    • 482 篇 数学
    • 147 篇 生物学
    • 143 篇 物理学
    • 136 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 58 篇 化学
  • 502 篇 管理学
    • 329 篇 管理科学与工程(可...
    • 195 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 59 篇 法学
    • 43 篇 社会学
  • 46 篇 医学
    • 41 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 9 篇 艺术学
  • 7 篇 文学
  • 6 篇 军事学

主题

  • 107 篇 computer science
  • 71 篇 laboratories
  • 63 篇 semantics
  • 50 篇 software
  • 42 篇 software enginee...
  • 42 篇 algorithm design...
  • 40 篇 cloud computing
  • 38 篇 optimization
  • 37 篇 wireless sensor ...
  • 37 篇 web services
  • 36 篇 feature extracti...
  • 36 篇 testing
  • 34 篇 computational mo...
  • 33 篇 software testing
  • 33 篇 clustering algor...
  • 32 篇 protocols
  • 31 篇 reinforcement le...
  • 30 篇 routing
  • 30 篇 task analysis
  • 28 篇 educational inst...

机构

  • 945 篇 state key labora...
  • 209 篇 department of co...
  • 124 篇 national key lab...
  • 107 篇 state key labora...
  • 107 篇 state key labora...
  • 87 篇 state key labora...
  • 79 篇 college of compu...
  • 67 篇 department of co...
  • 54 篇 school of comput...
  • 51 篇 state key labora...
  • 48 篇 nanjing universi...
  • 47 篇 national key lab...
  • 42 篇 school of artifi...
  • 34 篇 state key labora...
  • 33 篇 school of comput...
  • 32 篇 state key lab. f...
  • 31 篇 the state key la...
  • 29 篇 university of ch...
  • 28 篇 department of co...
  • 27 篇 school of electr...

作者

  • 58 篇 gao yang
  • 47 篇 dou wanchun
  • 42 篇 sanglu lu
  • 42 篇 shi yinghuan
  • 39 篇 guihai chen
  • 37 篇 li wu-jun
  • 33 篇 zhang lijun
  • 32 篇 qi lei
  • 31 篇 shen furao
  • 31 篇 ying mingsheng
  • 30 篇 zhao jian
  • 30 篇 xu baowen
  • 29 篇 chen guihai
  • 28 篇 lu sanglu
  • 27 篇 baowen xu
  • 27 篇 xu xiaolong
  • 27 篇 chen zhenyu
  • 26 篇 wanchun dou
  • 26 篇 jie wu
  • 26 篇 xu chang

语言

  • 2,176 篇 英文
  • 282 篇 其他
  • 57 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computer Science and Technology&State Key Laboratory for Novel Software Technology"
2516 条 记 录,以下是2281-2290 订阅
排序:
An efficient method for protein secondary structure prediction
An efficient method for protein secondary structure predicti...
收藏 引用
2007 1st International Conference on Bioinformatics and Biomedical Engineering, ICBBE
作者: Wu, Tao Mao, Junjun Zhang, Ling State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China School of Mathematics and Computational Science Anhui University Hefei 23009 China Key Lab IC and SP Anhui University Hefei 230039 China
The secondary structure prediction of protein plays an important role to obtain its tertiary structure and function. In the past thirty years, a huge amount of algorithms have been employed to this task. The better pr... 详细信息
来源: 评论
DLEC: A Delay-constrained Least Energy Consumption Routing Protocol in Sensor Networks
DLEC: A Delay-constrained Least Energy Consumption Routing P...
收藏 引用
International Conference on Communications and Networking in China (CHINACOM)
作者: Jue Hong Hao Han SangLu Lu Daoxu Chen Li Xie State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Current researches on routing protocol in sensor network mainly pursue a single metric such as the minimum delay or the maximum power saving. As the application requirements become more and more complex, the two metri... 详细信息
来源: 评论
D-S Theory-based Trust Model FIRE^+ in Multi-agent Systems
D-S Theory-based Trust Model FIRE^+ in Multi-agent Systems
收藏 引用
ACIS International Conference on software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Ping-Ping Lu Bin Li Mao-Lin Xing Liang Li Department of Computer Science Yangzhou University China State Key Laboratory for Novel Software Technology Nanjing University China
In open multi-agent systems (MAS), interaction between agents is uncertain. Trust plays an important role in deciding with whom to interact and how to interact with it. Current trust models have solved the problem of ... 详细信息
来源: 评论
Support vector machines applied to research of ancient Chinese porcelain: Modeling of Jun Glaze
Support vector machines applied to research of ancient Chine...
收藏 引用
2007 International Conference on Artificial Intelligence, ICAI 2007
作者: You, Lu-Jin Li, Guo-Zheng Yang, Jack Y. School of Computer Science and Engineering Shanghai University Shanghai 200072 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Harvard Medical School Harvard University Cambridge MA 02140 United States
Jun ware is one of the famous Chinese ancient porcelain produced in Song dynasty. In this work, support vector machines, as new chemometrics algorithms especially suitable for the data processing of small sample sets,... 详细信息
来源: 评论
Research of main mode with a pre-shared key in IKE protocol
收藏 引用
Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural science) 2007年 第5期27卷 50-55页
作者: Zhang, Lin Wang, Ru-Chuan Zhang, Yong-Ping College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China College of Computer Science and Technology China University of Mining and Technology Xuzhou 221008 China
IKE becomes the most significant protocol of the key exchange in Internet. Following an introduction to the mechanism of IKE, the security of the whole message-exchanging process is analyzed. Considering the existing ... 详细信息
来源: 评论
A Policy Language for Adaptive Web Services Security Framework
A Policy Language for Adaptive Web Services Security Framewo...
收藏 引用
ACIS International Conference on software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Jian-Xin Li Bin Li Liang Li Tong-Sheng Che Department of Computer Science and Engineering Yangzhou University China State Key Laboratory for Novel Software Technology Nanjing University China
How to resolve access control on Web services has become one of the important research tasks about the application of Web services. In this paper, we propose a policy based adaptive Web services security framework. In... 详细信息
来源: 评论
An Agent-based Policy Aware Framework for Web Services Security
An Agent-based Policy Aware Framework for Web Services Secur...
收藏 引用
IFIP International Conference on Network and Parallel Computing Workshops (NPC Workshops)
作者: JIAN-XIN LI BIN LI LIANG LI TONG-SHENG CHE Department of Computer Science and Engineering Yangzhou University China State Key Laboratory for Novel Software Technology Nanjing University China
The security of Web services has become one of the important research topics about the application of Web services. In this paper, we propose an agent-based policy aware framework for Web services security. In this fr... 详细信息
来源: 评论
Reducing Error of Tumor Classification by Using Dimension Reduction with Feature Selection
Reducing Error of Tumor Classification by Using Dimension Re...
收藏 引用
第一届最优化与系统生物学国际研讨会
作者: Hua-Long Bu Guo-Zheng Li Xue-Qiang Zeng State Key Laboratory for Novel Software Technology Nanjing University School of Computer Engineering and Science Shanghai University
Dimension reduction is an important issue for analysis of gene expression microarray data, of which principle component analysis (PCA) is one of the frequently used methods, and in the previous works, the top several ... 详细信息
来源: 评论
Self-interested Nodes Modeling in Mobile Wireless Ad Hoc Networks
Self-interested Nodes Modeling in Mobile Wireless Ad Hoc Net...
收藏 引用
第三届IEEE无线通讯、网络技术暨移动计算国际会议
作者: Jun Wu Chongjun Wang Shifu Chen National Key Laboratory for Novel Software Technology (Nanjing University) Department of Computer Science and Technology Nanjing University Nanjing 210093
The Increasing adoption of the techniques of mobile wireless ad hoc network in the field of civilian applications arouses many urgent problems. As we known nodes to consist a MANET may belong to different users, thus ... 详细信息
来源: 评论
HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging
HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tag...
收藏 引用
International Conference on Convergence Information technology
作者: Lixin Han Guihai Chen Department of Computer Science and Engineering Hohai University HHU Nanjing China State Key Laboratory of Novel Software Technology Nanjing University Nanjing China
In recent years, there has been considerable interest in collaborative tagging. This paper proposes a hybrid fuzzy clustering method for collaborative tagging. key feature of the method includes using a combination of... 详细信息
来源: 评论