咨询与建议

限定检索结果

文献类型

  • 1,409 篇 会议
  • 1,088 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,502 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,725 篇 工学
    • 1,388 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 308 篇 信息与通信工程
    • 233 篇 控制科学与工程
    • 139 篇 生物工程
    • 114 篇 电子科学与技术(可...
    • 105 篇 电气工程
    • 99 篇 机械工程
    • 73 篇 光学工程
    • 64 篇 仪器科学与技术
    • 62 篇 生物医学工程(可授...
    • 52 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 45 篇 网络空间安全
    • 33 篇 建筑学
    • 31 篇 土木工程
    • 31 篇 安全科学与工程
  • 748 篇 理学
    • 481 篇 数学
    • 147 篇 生物学
    • 140 篇 物理学
    • 136 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 58 篇 化学
  • 501 篇 管理学
    • 329 篇 管理科学与工程(可...
    • 194 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 59 篇 法学
    • 43 篇 社会学
  • 45 篇 医学
    • 40 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 9 篇 艺术学
  • 7 篇 文学
  • 6 篇 军事学

主题

  • 107 篇 computer science
  • 71 篇 laboratories
  • 64 篇 semantics
  • 49 篇 software
  • 42 篇 software enginee...
  • 42 篇 algorithm design...
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 wireless sensor ...
  • 37 篇 web services
  • 36 篇 testing
  • 35 篇 feature extracti...
  • 34 篇 computational mo...
  • 33 篇 software testing
  • 33 篇 clustering algor...
  • 32 篇 protocols
  • 31 篇 reinforcement le...
  • 30 篇 routing
  • 30 篇 task analysis
  • 28 篇 educational inst...

机构

  • 941 篇 state key labora...
  • 207 篇 department of co...
  • 125 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 state key labora...
  • 86 篇 state key labora...
  • 78 篇 college of compu...
  • 66 篇 department of co...
  • 54 篇 school of comput...
  • 52 篇 state key labora...
  • 47 篇 national key lab...
  • 46 篇 nanjing universi...
  • 41 篇 school of artifi...
  • 34 篇 state key labora...
  • 33 篇 school of comput...
  • 32 篇 the state key la...
  • 32 篇 state key lab. f...
  • 28 篇 department of co...
  • 27 篇 university of ch...
  • 27 篇 school of comput...

作者

  • 56 篇 gao yang
  • 47 篇 dou wanchun
  • 42 篇 sanglu lu
  • 41 篇 shi yinghuan
  • 39 篇 guihai chen
  • 37 篇 li wu-jun
  • 33 篇 zhang lijun
  • 31 篇 ying mingsheng
  • 31 篇 qi lei
  • 30 篇 shen furao
  • 30 篇 xu baowen
  • 29 篇 zhao jian
  • 29 篇 chen guihai
  • 28 篇 lu sanglu
  • 27 篇 baowen xu
  • 27 篇 xu xiaolong
  • 27 篇 chen zhenyu
  • 26 篇 wanchun dou
  • 26 篇 jie wu
  • 26 篇 xu chang

语言

  • 2,223 篇 英文
  • 221 篇 其他
  • 57 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computer Science and Technology&State Key Laboratory for Novel Software Technology"
2502 条 记 录,以下是2311-2320 订阅
排序:
Scenario-based component behavior derivation
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2006年 4260 LNCS卷 206-225页
作者: Zhang, Yan Hu, Jun Yu, Xiaofeng Zhang, Tian Li, Xuandong Zheng, Guoliang State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China
The reusability of components affects how much benefit we can get from the component based software development (CBSD). For enhancing the reuse of components, we propose an approach to derive the desired behavior from... 详细信息
来源: 评论
Comparison of static analysis technology for intrusion prevention
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第3期32卷 174-176+253页
作者: Wu, Chunmei Xia, Nai Mao, Bing State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
A testbed which includes the common vulnerabilities is built. The paper compares three typical and publicly available tools by applying them to the testbed individually for sake of preventing intrusion. The result rev... 详细信息
来源: 评论
A Solution of Grid Computing Flow Using MDA Methodology
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2006年 第1期13卷 29-33页
作者: JI Yi-mu WANG Ru-chuan Department of Computer Science Nanjing University of Posts and Telecommunications Nanjing 210003 P.R. China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 P.R. China
This paper presents an approach to build a flow of grid services named GFlow. This approach converts all of the services' interfaces in globus toolkit 3 into platform independent model format. The conversion uses ecl... 详细信息
来源: 评论
Estimation of the future earthquake situation by using neural networks ensemble
Estimation of the future earthquake situation by using neura...
收藏 引用
3rd International Symposium on Neural Networks, ISNN 2006 - Advances in Neural Networks
作者: Liu, Tian-Yu Li, Guo-Zheng Liu, Yue Wu, Geng-Feng Wang, Wei School of Computer Engineering and Science Shanghai University Shanghai 200072 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Earthquake Administration of Shanghai Municipality Shanghai 200062 China
Earthquakes will do great harms to the people, to estimate the future earthquake situation in Chinese mainland is still an open issue. There have been previous attempts to solve this problem by using artificial neural... 详细信息
来源: 评论
Data-link user's safeguard strategy based on reliability theory
收藏 引用
Journal of Computational Information Systems 2006年 第3期2卷 987-992页
作者: Li, Qianmu Xu, Manwu Zhang, Hong Liu, Fengyu State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science Nanjing University of Science and Technology Nanjing 210094 China
The performance of the user's safeguard strategy is a direct factor which touches the reliability and cost of data link network in the whole procedure from fault discovering to trouble shooting. To improve the per... 详细信息
来源: 评论
novel Ad hoc network troubleshooting system
收藏 引用
Journal of Computational Information Systems 2006年 第3期2卷 981-986页
作者: Li, Qianmu Wang, Yuan Xu, Manwu Zhang, Hong Liu, Fengyu State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science Nanjing University of Science and Technology Nanjing 210094 China
Due to the rapid development of Ad hoc network system, the traditional methods like vulnerability scanning to analyze network troubleshooting are confronted with the large challenge, because it is difficult to find fo... 详细信息
来源: 评论
Subsumption Checking between Concept Queries in Different Ontologies Based on Mutual Instances
收藏 引用
Wuhan University Journal of Natural sciences 2006年 第1期11卷 68-72页
作者: KANG Da-zhou LU Jian-jiang XU Bao-wen WANG Peng ZHOU Jin Department of Computer Science and Engineering NmtheastUniversity Nanjing 210096 Jiangsu China Jiangsu Institute of Software Quality Nanjing 210096 JiangsuChina Institute of Science The People's Liberation Army University of Science and Technology Nanjing 210007 Jiangsu China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 Hubei China
This paper proposes a checking method based on mutual instances and discusses three key problems in the method: how to deal with mistakes in the mutual instances and how to deal with too many or too few mutual instan... 详细信息
来源: 评论
Concept Approximation between Fuzzy Ontologies
收藏 引用
Wuhan University Journal of Natural sciences 2006年 第1期11卷 73-77页
作者: LI Yan-hui XU Bao-wen LU Jian-jiang KANG Da-zhou ZHOU Jing-jing Department of Computer Science and Engineering Southeast University Nanjing 210096 Jiangsu China Jiangsu Institute of Software Quality Nanjing 210096 JiangsuChina State Key Laboratory of Software Engineering Wuhan UniversityWuhan 430072 Hubei China Institute of Science The People's Liberation Army University of Science and Technology Nanjing 210007 Jiangsu China
Fuzzy ontologics are efficient tools to handle fuzzy and uncertain knowledge on the semantic web; but there are heterogeneity problems when gaining interoperability among different fuzzy ontologies. This paper uses co... 详细信息
来源: 评论
Binary Alpha-plane Assisted Motion Estimation of MPEG-4 Arbitrarily Shaped Video Objects
Binary Alpha-plane Assisted Motion Estimation of MPEG-4 Arbi...
收藏 引用
2006 8th International Conference on Signal Processing
作者: Chuan-ming Song Xiang-hai Wang Yu Xiao Department of Computer Science and Technology Nanjing University College of Computer and Information Technology Liaoning Normal University State Key Laboratory for Novel Software Technology Nanjing University
In this paper,we propose a fast motion estimation algorithm of arbitrarily shaped video object in MPEG- *** proposed algorithm incorporates the binary alpha-plane and the extended contour to predict accurately the mot... 详细信息
来源: 评论
Improve Model Checking Efficiency Using Specific Knowledge about the System
Improve Model Checking Efficiency Using Specific Knowledge a...
收藏 引用
International Symposium on Leveraging Applications of Formal Methods, Verification and Validation ( ISoLA)
作者: Jianhua Zhao Bin Lei Xuandong Li Guoliang Zheng State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu China Dept. of Computer Sci. and Tech. State Key Laboratory of Novel Software Technology Nanjing Jiangsu P.R.China
In this paper, we present a timed automaton reachability analysis algorithm which can use some other properties to improve the model checking efficiency. If the model checker aborts because of memory or CPU time limit... 详细信息
来源: 评论