咨询与建议

限定检索结果

文献类型

  • 1,411 篇 会议
  • 1,100 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,516 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,736 篇 工学
    • 1,394 篇 计算机科学与技术...
    • 1,128 篇 软件工程
    • 309 篇 信息与通信工程
    • 238 篇 控制科学与工程
    • 140 篇 生物工程
    • 116 篇 电子科学与技术(可...
    • 108 篇 电气工程
    • 101 篇 机械工程
    • 76 篇 光学工程
    • 64 篇 仪器科学与技术
    • 63 篇 生物医学工程(可授...
    • 52 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 45 篇 网络空间安全
    • 34 篇 建筑学
    • 32 篇 土木工程
    • 31 篇 安全科学与工程
  • 753 篇 理学
    • 482 篇 数学
    • 147 篇 生物学
    • 143 篇 物理学
    • 136 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 58 篇 化学
  • 502 篇 管理学
    • 329 篇 管理科学与工程(可...
    • 195 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 59 篇 法学
    • 43 篇 社会学
  • 46 篇 医学
    • 41 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 9 篇 艺术学
  • 7 篇 文学
  • 6 篇 军事学

主题

  • 107 篇 computer science
  • 71 篇 laboratories
  • 63 篇 semantics
  • 50 篇 software
  • 42 篇 software enginee...
  • 42 篇 algorithm design...
  • 40 篇 cloud computing
  • 38 篇 optimization
  • 37 篇 wireless sensor ...
  • 37 篇 web services
  • 36 篇 feature extracti...
  • 36 篇 testing
  • 34 篇 computational mo...
  • 33 篇 software testing
  • 33 篇 clustering algor...
  • 32 篇 protocols
  • 31 篇 reinforcement le...
  • 30 篇 routing
  • 30 篇 task analysis
  • 28 篇 educational inst...

机构

  • 945 篇 state key labora...
  • 209 篇 department of co...
  • 124 篇 national key lab...
  • 107 篇 state key labora...
  • 107 篇 state key labora...
  • 87 篇 state key labora...
  • 79 篇 college of compu...
  • 67 篇 department of co...
  • 54 篇 school of comput...
  • 51 篇 state key labora...
  • 48 篇 nanjing universi...
  • 47 篇 national key lab...
  • 42 篇 school of artifi...
  • 34 篇 state key labora...
  • 33 篇 school of comput...
  • 32 篇 state key lab. f...
  • 31 篇 the state key la...
  • 29 篇 university of ch...
  • 28 篇 department of co...
  • 27 篇 school of electr...

作者

  • 58 篇 gao yang
  • 47 篇 dou wanchun
  • 42 篇 sanglu lu
  • 42 篇 shi yinghuan
  • 39 篇 guihai chen
  • 37 篇 li wu-jun
  • 33 篇 zhang lijun
  • 32 篇 qi lei
  • 31 篇 shen furao
  • 31 篇 ying mingsheng
  • 30 篇 zhao jian
  • 30 篇 xu baowen
  • 29 篇 chen guihai
  • 28 篇 lu sanglu
  • 27 篇 baowen xu
  • 27 篇 xu xiaolong
  • 27 篇 chen zhenyu
  • 26 篇 wanchun dou
  • 26 篇 jie wu
  • 26 篇 xu chang

语言

  • 2,176 篇 英文
  • 282 篇 其他
  • 57 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computer Science and Technology&State Key Laboratory for Novel Software Technology"
2516 条 记 录,以下是2301-2310 订阅
排序:
A kind of fuzzy constructive neural network and its application
A kind of fuzzy constructive neural network and its applicat...
收藏 引用
26th Chinese Control Conference, CCC 2007
作者: Tao, Wu Liwei, Chen Junjun, Mao Ling, Zhang State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China Key Lab. IC and SP Anhui University Hefei 230039 China School of Mathematics and Computational Science Anhui University Hefei 230039 China
Support vector machine (SVM) has been studied and applied extensively for its high accuracy, but it must construct SVM decision tree to classify sample sets with multiclass for it just be applicable for binary classif... 详细信息
来源: 评论
An efficient Method for Protein Secondary Structure Prediction
An efficient Method for Protein Secondary Structure Predicti...
收藏 引用
The 1st International Conference on Bioinformatics and Biomedical Engineering(iCBBE 2007)(首届IEEE生物信息与生物医学工程国际会议)
作者: Tao WU Junjun MAO Ling ZHANG State Key Laboratory for Novel Software Technology Department of Computer Science & TechnologyNanj School of Mathematics and Computational Science Anhui University Hefei 230039 R.P.China Key Lab IC&SP Anhui University Hefei 230039 R.P.China
The secondary structure prediction of protein plays an important role to obtain its tertiary structure and function. In the past thirty years, a huge amount of algorithms have been employed to this task. The better pr... 详细信息
来源: 评论
Designing Security Protocols Using novel Neural Network Model
Designing Security Protocols Using Novel Neural Network Mode...
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Tieming Chen Rongrong Jiang College of Software Engineering Zhejiang University of Technology Hangzhou China State Key Laboratory of Software Development Environment Beihang University Beijing China Department of Computer Science and Technology Zhejiang Radio and Television University Hangzhou China
Two neural networks with the common input vector can finally synchronize their weight vectors by output- based mutual learning. It can be well utilized to negotiate secure information over a public channel. Designing ... 详细信息
来源: 评论
Study on Spatial Windows of Stationary Processes in Communication System
收藏 引用
通讯和计算机(中英文版) 2007年 第1期4卷 46-48页
作者: LIU Gan RUAN You-lin Department of Electronics and Information Engineering Huazhong University of Science and Technology Wuhan 430074 China Department of Electronics and Information Engineering Hubei University Wuhan 430062 China School of Information Engineering Wuhan University of Technology Wuhan 430070 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
来源: 评论
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymo...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Li Lu Jinsong Han Lei Hu Jinpeng Huai Yunhao Liu Lionel M. Ni State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China State Key Laboratory of Software Developing Environment Beihang University Beijing China
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence, there exists an inhere... 详细信息
来源: 评论
Uncalibrated eye-in-hand visual servoing using recursive least squares
Uncalibrated eye-in-hand visual servoing using recursive lea...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Miao Hao Zengqi Sun Masakazu Fujii Wei Song Candidate of State Key Laboratory of Intelligent Technology and Systems Department Computer Science & Technology Tsinghua University Beijing China Department Computer Science & Technology Tsinghua University Beijing China Corporate Research and Development Ishikawajima-Harima Heavy Industries Company Limited Yokohama Japan Software engineer of BCM Department Infosys Technologies Limited Shanghai China
In this paper, an uncalibrated dynamic visual servoing algorithm is proposed and analyzed. No calibration or robot model is needed. After a brief introduction of the development of uncalibrated visual servoing, the th... 详细信息
来源: 评论
Feature Selection and Partial Least Squares Based Dimension Reduction for Tumor Classification
Feature Selection and Partial Least Squares Based Dimension ...
收藏 引用
IEEE Symposium on Bioinformatics and Bioengineering (BIBE)
作者: Hua-Long Bu Guo-Zheng Li Xue-Qiang Zeng Jack Y. Yang Mary Qu Yang School of Computer Engineering & Science Shanghai University Shanghai China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Harvard Medical School Harvard University Cambridge MA USA U.S. Department of Health and Human Services Bethesda National Institutes of Health MD USA
Partial least squares (PLS) is one of the widely used dimension reduction methods for analysis of gene expression microarray data, it represents the data in a low dimensional space through linear transformation, the s... 详细信息
来源: 评论
Support Vector Regression with Feature Selection for the Multivariate Calibration of Spectrofluorimetric Determination of Aromatic Amino Acids
Support Vector Regression with Feature Selection for the Mul...
收藏 引用
IEEE Symposium on Bioinformatics and Bioengineering (BIBE)
作者: Guo-Zheng Li Hao-Hua Meng Mary Qu Yang Jack Y. Yang School of Computer Science & Engineering Shanghai University Shanghai China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China National Human Genome Research Institute U.S. Department of Health and Human Services National Institutes of Health DHHS Bethesda MD USA Harvard Medical School Harvard University Cambridge MA USA
Several artificial intelligent methods, including support vector regression (SVR), artificial neural networks (ANNs), and partial least square (PLS) are used for the multivariate calibration in the determination of th... 详细信息
来源: 评论
Probabilistic bisimulations for quantum processes
收藏 引用
Information and Computation 2007年
作者: Yuan Feng Runyao Duan Zhengfeng Ji Mingsheng Ying State Key Laboratory of Intelligent Technology and Systems Department of Computer Science and Technology Tsinghua University Beijing 100084 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100084 China
来源: 评论
Remove Irrelevant Atomic Formulas for Timed Automaton Model Checking
收藏 引用
Journal of computer science & technology 2006年 第1期21卷 41-51页
作者: 赵建华 李宣东 郑滔 郑国梁 State Key Laboratory of Novel Software Technology Nanjing University Nanjing 210093 P.R. China Department of Computer Science and Technology Nanjing University Nanjing 210093 P.R. China
Most of the timed automata reachability analysis algorithms in the literature explore the state spaces by enumeration of symbolic states, which use time constraints to represent a set of concrete states. A time constr... 详细信息
来源: 评论