咨询与建议

限定检索结果

文献类型

  • 1,411 篇 会议
  • 1,100 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,516 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,736 篇 工学
    • 1,394 篇 计算机科学与技术...
    • 1,128 篇 软件工程
    • 309 篇 信息与通信工程
    • 238 篇 控制科学与工程
    • 140 篇 生物工程
    • 116 篇 电子科学与技术(可...
    • 108 篇 电气工程
    • 101 篇 机械工程
    • 76 篇 光学工程
    • 64 篇 仪器科学与技术
    • 63 篇 生物医学工程(可授...
    • 52 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 45 篇 网络空间安全
    • 34 篇 建筑学
    • 32 篇 土木工程
    • 31 篇 安全科学与工程
  • 753 篇 理学
    • 482 篇 数学
    • 147 篇 生物学
    • 143 篇 物理学
    • 136 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 58 篇 化学
  • 502 篇 管理学
    • 329 篇 管理科学与工程(可...
    • 195 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 59 篇 法学
    • 43 篇 社会学
  • 46 篇 医学
    • 41 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 9 篇 艺术学
  • 7 篇 文学
  • 6 篇 军事学

主题

  • 107 篇 computer science
  • 71 篇 laboratories
  • 63 篇 semantics
  • 50 篇 software
  • 42 篇 software enginee...
  • 42 篇 algorithm design...
  • 40 篇 cloud computing
  • 38 篇 optimization
  • 37 篇 wireless sensor ...
  • 37 篇 web services
  • 36 篇 feature extracti...
  • 36 篇 testing
  • 34 篇 computational mo...
  • 33 篇 software testing
  • 33 篇 clustering algor...
  • 32 篇 protocols
  • 31 篇 reinforcement le...
  • 30 篇 routing
  • 30 篇 task analysis
  • 28 篇 educational inst...

机构

  • 945 篇 state key labora...
  • 209 篇 department of co...
  • 124 篇 national key lab...
  • 107 篇 state key labora...
  • 107 篇 state key labora...
  • 87 篇 state key labora...
  • 79 篇 college of compu...
  • 67 篇 department of co...
  • 54 篇 school of comput...
  • 51 篇 state key labora...
  • 48 篇 nanjing universi...
  • 47 篇 national key lab...
  • 42 篇 school of artifi...
  • 34 篇 state key labora...
  • 33 篇 school of comput...
  • 32 篇 state key lab. f...
  • 31 篇 the state key la...
  • 29 篇 university of ch...
  • 28 篇 department of co...
  • 27 篇 school of electr...

作者

  • 58 篇 gao yang
  • 47 篇 dou wanchun
  • 42 篇 sanglu lu
  • 42 篇 shi yinghuan
  • 39 篇 guihai chen
  • 37 篇 li wu-jun
  • 33 篇 zhang lijun
  • 32 篇 qi lei
  • 31 篇 shen furao
  • 31 篇 ying mingsheng
  • 30 篇 zhao jian
  • 30 篇 xu baowen
  • 29 篇 chen guihai
  • 28 篇 lu sanglu
  • 27 篇 baowen xu
  • 27 篇 xu xiaolong
  • 27 篇 chen zhenyu
  • 26 篇 wanchun dou
  • 26 篇 jie wu
  • 26 篇 xu chang

语言

  • 2,176 篇 英文
  • 282 篇 其他
  • 57 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computer Science and Technology&State Key Laboratory for Novel Software Technology"
2516 条 记 录,以下是2321-2330 订阅
排序:
Cooperative cognition and its implementation under web environment
Cooperative cognition and its implementation under web envir...
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Dou, Wanchun Chen, Guihai Cheung, S.C. Cai, Shijie State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China Department of Computer Science Hong Kong University of Science and Technology Hong Kong Hong Kong
Problem cognition is often the first step to problem solving. Complex problem solving is often promoted by cooperative cognition. Our research work presented in this paper is initialed by a motivated example. Then met... 详细信息
来源: 评论
Providing resource oriented security solution for heterogeneous clustered sensor networks
Providing resource oriented security solution for heterogene...
收藏 引用
2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems, MASS
作者: Cao, Xiaomei Chen, Guihai Yu, Bo State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Engineering Fudan University Shanghai 200433 China
Heterogeneous clustered sensor networks (HCSNs) help meet the cost, lifetime, and scalability requirements of real applications. However, the security solution should be reconsidered for their unique properties, such ... 详细信息
来源: 评论
Formal description and verification of MAS interaction protocols
Formal description and verification of MAS interaction proto...
收藏 引用
作者: Chen, Hongbing Yang, Qun Li, Qianmu Xu, Manwu State Key Laboratory for Novel Software Technology Nanjing University 22 Hankou Road Nanjing210093 China Department of Computer Science and Technology Nanjing University of Science and Technology Nanjing210094 China
Formal description and verification of interaction protocols is an important field of MAS. In this paper a calculus for describing interaction protocols of MAS is defined. The calculus is based on process algebra and ... 详细信息
来源: 评论
GA-MTL: A random method of multi-task learning
收藏 引用
IMACS Multiconference on "Computational Engineering in Systems Applications", CESA
作者: Liu, T.-Y. Li, G.-Z. Wu, G.-F. Chi, E.C. School of Computer Engineering and Science Shanghai University Shanghai 200072 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Multi-task learning techniques can employ the removed redundant information to improve prediction accuracy. Which features to add to the target and/or the input during multi-task learning is still an open issue. The p... 详细信息
来源: 评论
Scenario-based component behavior derivation
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2006年 4260 LNCS卷 206-225页
作者: Zhang, Yan Hu, Jun Yu, Xiaofeng Zhang, Tian Li, Xuandong Zheng, Guoliang State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China
The reusability of components affects how much benefit we can get from the component based software development (CBSD). For enhancing the reuse of components, we propose an approach to derive the desired behavior from... 详细信息
来源: 评论
Comparison of static analysis technology for intrusion prevention
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第3期32卷 174-176+253页
作者: Wu, Chunmei Xia, Nai Mao, Bing State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
A testbed which includes the common vulnerabilities is built. The paper compares three typical and publicly available tools by applying them to the testbed individually for sake of preventing intrusion. The result rev... 详细信息
来源: 评论
A Solution of Grid Computing Flow Using MDA Methodology
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2006年 第1期13卷 29-33页
作者: JI Yi-mu WANG Ru-chuan Department of Computer Science Nanjing University of Posts and Telecommunications Nanjing 210003 P.R. China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 P.R. China
This paper presents an approach to build a flow of grid services named GFlow. This approach converts all of the services' interfaces in globus toolkit 3 into platform independent model format. The conversion uses ecl... 详细信息
来源: 评论
Estimation of the future earthquake situation by using neural networks ensemble
Estimation of the future earthquake situation by using neura...
收藏 引用
3rd International Symposium on Neural Networks, ISNN 2006 - Advances in Neural Networks
作者: Liu, Tian-Yu Li, Guo-Zheng Liu, Yue Wu, Geng-Feng Wang, Wei School of Computer Engineering and Science Shanghai University Shanghai 200072 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Earthquake Administration of Shanghai Municipality Shanghai 200062 China
Earthquakes will do great harms to the people, to estimate the future earthquake situation in Chinese mainland is still an open issue. There have been previous attempts to solve this problem by using artificial neural... 详细信息
来源: 评论
Data-link user's safeguard strategy based on reliability theory
收藏 引用
Journal of Computational Information Systems 2006年 第3期2卷 987-992页
作者: Li, Qianmu Xu, Manwu Zhang, Hong Liu, Fengyu State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science Nanjing University of Science and Technology Nanjing 210094 China
The performance of the user's safeguard strategy is a direct factor which touches the reliability and cost of data link network in the whole procedure from fault discovering to trouble shooting. To improve the per... 详细信息
来源: 评论
novel Ad hoc network troubleshooting system
收藏 引用
Journal of Computational Information Systems 2006年 第3期2卷 981-986页
作者: Li, Qianmu Wang, Yuan Xu, Manwu Zhang, Hong Liu, Fengyu State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science Nanjing University of Science and Technology Nanjing 210094 China
Due to the rapid development of Ad hoc network system, the traditional methods like vulnerability scanning to analyze network troubleshooting are confronted with the large challenge, because it is difficult to find fo... 详细信息
来源: 评论