咨询与建议

限定检索结果

文献类型

  • 1,409 篇 会议
  • 1,088 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,502 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,725 篇 工学
    • 1,388 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 308 篇 信息与通信工程
    • 233 篇 控制科学与工程
    • 139 篇 生物工程
    • 114 篇 电子科学与技术(可...
    • 105 篇 电气工程
    • 99 篇 机械工程
    • 73 篇 光学工程
    • 64 篇 仪器科学与技术
    • 62 篇 生物医学工程(可授...
    • 52 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 45 篇 网络空间安全
    • 33 篇 建筑学
    • 31 篇 土木工程
    • 31 篇 安全科学与工程
  • 748 篇 理学
    • 481 篇 数学
    • 147 篇 生物学
    • 140 篇 物理学
    • 136 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 58 篇 化学
  • 501 篇 管理学
    • 329 篇 管理科学与工程(可...
    • 194 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 59 篇 法学
    • 43 篇 社会学
  • 45 篇 医学
    • 40 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 9 篇 艺术学
  • 7 篇 文学
  • 6 篇 军事学

主题

  • 107 篇 computer science
  • 71 篇 laboratories
  • 64 篇 semantics
  • 49 篇 software
  • 42 篇 software enginee...
  • 42 篇 algorithm design...
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 wireless sensor ...
  • 37 篇 web services
  • 36 篇 testing
  • 35 篇 feature extracti...
  • 34 篇 computational mo...
  • 33 篇 software testing
  • 33 篇 clustering algor...
  • 32 篇 protocols
  • 31 篇 reinforcement le...
  • 30 篇 routing
  • 30 篇 task analysis
  • 28 篇 educational inst...

机构

  • 941 篇 state key labora...
  • 207 篇 department of co...
  • 125 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 state key labora...
  • 86 篇 state key labora...
  • 78 篇 college of compu...
  • 66 篇 department of co...
  • 54 篇 school of comput...
  • 52 篇 state key labora...
  • 47 篇 national key lab...
  • 46 篇 nanjing universi...
  • 41 篇 school of artifi...
  • 34 篇 state key labora...
  • 33 篇 school of comput...
  • 32 篇 the state key la...
  • 32 篇 state key lab. f...
  • 28 篇 department of co...
  • 27 篇 university of ch...
  • 27 篇 school of comput...

作者

  • 56 篇 gao yang
  • 47 篇 dou wanchun
  • 42 篇 sanglu lu
  • 41 篇 shi yinghuan
  • 39 篇 guihai chen
  • 37 篇 li wu-jun
  • 33 篇 zhang lijun
  • 31 篇 ying mingsheng
  • 31 篇 qi lei
  • 30 篇 shen furao
  • 30 篇 xu baowen
  • 29 篇 zhao jian
  • 29 篇 chen guihai
  • 28 篇 lu sanglu
  • 27 篇 baowen xu
  • 27 篇 xu xiaolong
  • 27 篇 chen zhenyu
  • 26 篇 wanchun dou
  • 26 篇 jie wu
  • 26 篇 xu chang

语言

  • 2,223 篇 英文
  • 221 篇 其他
  • 57 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computer Science and Technology&State Key Laboratory for Novel Software Technology"
2502 条 记 录,以下是2341-2350 订阅
排序:
On Control Gain Selection in PI-RED
On Control Gain Selection in PI-RED
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Naixue Xiong X. Defago Yan Yang Yanxiang He Jing He Key Laboratory of Software Engineering Computer School of Wuhan University China School of Information Science Institute of Science and Technology Japan School of Computer Science and Technology Wuhan University of Science and Technology Hubei China State Key Laboratory of Software Engineering Computer School Wuhan University of China Hubei China Department of Computer Science Utah State University Logan UT USA
Active queue management (AQM) is an effective method used in Internet routers to enhance congestion control, and to achieve a trade off between link utilization and delay. The de facto standard, the random early detec... 详细信息
来源: 评论
Online rule generation model for intrusion detection
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2006年 第9期29卷 1523-1532页
作者: Guo, Shan-Qing Xie, Li Zeng, Ying-Pei State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Progress has been made in using machine learning techniques such as SVM and neural networks for intrusion detection, but the non-understandable detection results have prevented those algorithms from being thoroughly u... 详细信息
来源: 评论
Information extraction for eb resource
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第10期32卷 74-76页
作者: Zhu, Yongsheng Wu, Gangshan State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
With the widespread use of Internet and the development of information technology, there are a tremendous amount of news information resource. The ability to quickly obtain useful resource from the huge news informati... 详细信息
来源: 评论
Dynamic software architecture oriented approach to online evolution
收藏 引用
Ruan Jian Xue Bao/Journal of software 2006年 第6期17卷 1360-1371页
作者: Yu, Ping Ma, Xiao-Xing Lu, Jian Tao, Xian-Ping State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
An increasingly important requirement for software systems is the capability to evolve dynamically according to the changes of computing environment and users' need during runtime. In this paper, a dynamic softwar... 详细信息
来源: 评论
Adaptive load balancing algorithm for service composition
收藏 引用
Ruan Jian Xue Bao/Journal of software 2006年 第5期17卷 1068-1077页
作者: Li, Wen-Zhong Guo, Sheng Xu, Ping Lu, Sang-Lu Chen, Dao-Xu State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Service Composition enables a new way to create new services by assembling independent service components. One of the important goals in service composition is load balancing across service replicas. In this paper, a ... 详细信息
来源: 评论
Evaluation method for trusted channel based on protocol analysis
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2006年 第8期29卷 1329-1336页
作者: Li, Qin Zeng, Qing-Kai State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Trusted channel provides various security services for information products in the environment of insecure networks. It has become a focused problem that whether the services of trusted channel provided by security pr... 详细信息
来源: 评论
A Self-Tuning Multicast Flow Control Scheme Based on Autonomic technology
A Self-Tuning Multicast Flow Control Scheme Based on Autonom...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: N. Xiong Yanxiang He Yan Yang Laurence T. Yang Chao Peng The State Key Laboratory of Software Engineering Computer School of Wuhan University China School of Information Science Japan Advanced Institute of Science and Technology Japan Department of Computer Science Saint Francis Xavier University Antigonish Canada
With the increase of multicast data applications, research interests have focused on the design of congestion control schemes for multicast communications. This paper describes a novel control-theoretic multicast cong... 详细信息
来源: 评论
Design and Analysis of a Self-Tuning Proportional and Integral Controller for Active Queue Management Routers to Support TCP Flows
Design and Analysis of a Self-Tuning Proportional and Integr...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: N. Xiong X. Defago X. Jia Y. Yan Y. He State Key Laboratory of Software Engineering Computer School Wuhan University of China China School of Information Science Japan Advanced Institute of Science and Technology Japan PRESTO Japan Science and Technology Agency Japan School of Information Science Japan Advanced Institute of Science and Technology Nomi Ishikawa Japan Member of IEEE Communication Society Computer School Wuhan University Department of Computer Science City University of Hong Kong Kowloon Hong Kong China School of Computer Science and Technology Wuhan University of Science and Technology China The State Key Lab of Software Engineering Computer School Wuhan University
来源: 评论
A Simulink-to-FPGA Co-Design of Encryption Module
A Simulink-to-FPGA Co-Design of Encryption Module
收藏 引用
IEEE Asia-Pacific Conference on Circuits and Systems
作者: Xiaoying Li Fuming Sun Enhua Wu Department of Computer and Information Science FST University of Macau Macao China School of Information Engineering University of Science and Technology Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China
In this paper, circuit design of an arithmetic module applied to cryptography - modulo multiplicative inverse is presented and implemented using FPGA hardware technology. This modular arithmetic function contains iter... 详细信息
来源: 评论
An Evolutionary Computational Method for N-Connection Subgraph Discovery
An Evolutionary Computational Method for N-Connection Subgra...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Enhong Chen Xujia Chen Phillip C-y Sheu Tieyun Qian Department of CS University of Science and Technology Hefei Anhui China State Key Laboratory of Software Engineering Wuhan University of China China Department of EECS University of California Irvine CA USA Department of Computer Science Huazhong University of Science and Technology Wuhan Hubei China
The problem of n-connection subgraph discovery (n-CSDP for short) is to find a small sized subgraph that can well capture the relationship among the n given nodes in a large graph. However there have been very few res... 详细信息
来源: 评论