咨询与建议

限定检索结果

文献类型

  • 1,409 篇 会议
  • 1,088 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,502 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,725 篇 工学
    • 1,388 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 308 篇 信息与通信工程
    • 233 篇 控制科学与工程
    • 139 篇 生物工程
    • 114 篇 电子科学与技术(可...
    • 105 篇 电气工程
    • 99 篇 机械工程
    • 73 篇 光学工程
    • 64 篇 仪器科学与技术
    • 62 篇 生物医学工程(可授...
    • 52 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 45 篇 网络空间安全
    • 33 篇 建筑学
    • 31 篇 土木工程
    • 31 篇 安全科学与工程
  • 748 篇 理学
    • 481 篇 数学
    • 147 篇 生物学
    • 140 篇 物理学
    • 136 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 58 篇 化学
  • 501 篇 管理学
    • 329 篇 管理科学与工程(可...
    • 194 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 59 篇 法学
    • 43 篇 社会学
  • 45 篇 医学
    • 40 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 9 篇 艺术学
  • 7 篇 文学
  • 6 篇 军事学

主题

  • 107 篇 computer science
  • 71 篇 laboratories
  • 64 篇 semantics
  • 49 篇 software
  • 42 篇 software enginee...
  • 42 篇 algorithm design...
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 wireless sensor ...
  • 37 篇 web services
  • 36 篇 testing
  • 35 篇 feature extracti...
  • 34 篇 computational mo...
  • 33 篇 software testing
  • 33 篇 clustering algor...
  • 32 篇 protocols
  • 31 篇 reinforcement le...
  • 30 篇 routing
  • 30 篇 task analysis
  • 28 篇 educational inst...

机构

  • 941 篇 state key labora...
  • 207 篇 department of co...
  • 125 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 state key labora...
  • 86 篇 state key labora...
  • 78 篇 college of compu...
  • 66 篇 department of co...
  • 54 篇 school of comput...
  • 52 篇 state key labora...
  • 47 篇 national key lab...
  • 46 篇 nanjing universi...
  • 41 篇 school of artifi...
  • 34 篇 state key labora...
  • 33 篇 school of comput...
  • 32 篇 the state key la...
  • 32 篇 state key lab. f...
  • 28 篇 department of co...
  • 27 篇 university of ch...
  • 27 篇 school of comput...

作者

  • 56 篇 gao yang
  • 47 篇 dou wanchun
  • 42 篇 sanglu lu
  • 41 篇 shi yinghuan
  • 39 篇 guihai chen
  • 37 篇 li wu-jun
  • 33 篇 zhang lijun
  • 31 篇 ying mingsheng
  • 31 篇 qi lei
  • 30 篇 shen furao
  • 30 篇 xu baowen
  • 29 篇 zhao jian
  • 29 篇 chen guihai
  • 28 篇 lu sanglu
  • 27 篇 baowen xu
  • 27 篇 xu xiaolong
  • 27 篇 chen zhenyu
  • 26 篇 wanchun dou
  • 26 篇 jie wu
  • 26 篇 xu chang

语言

  • 2,223 篇 英文
  • 221 篇 其他
  • 57 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computer Science and Technology&State Key Laboratory for Novel Software Technology"
2502 条 记 录,以下是2351-2360 订阅
排序:
Detection algorithm for multi-step attack based on CTPN
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2006年 第8期29卷 1383-1391页
作者: Yan, Fen Huang, Hao Yin, Xin-Chun State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Engineering Technology Institute Yangzhou University Yangzhou 225009 China
As a matter of fact, most attacks are not single attack action. They are multi-step attacks which are composed by a set of attack actions. How to detect multi-step attack is an important aspect of IDS research. The tr... 详细信息
来源: 评论
Anomaly detection model based on dynamic behavior and character patterns
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2006年 第9期29卷 1553-1560页
作者: Lin, Guo-Yuan Guo, Shan-Qing Huang, Hao Cao, Tian-Jie State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China School of Computer China University of Mining and Technology Xuzhou 221008 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 China
Differing from existed anomaly detection methods which only dealt with the frequencies of system calls or local variation, the paper puts forward a model named DBCPIDS. It took in both dynamic behavior and character p... 详细信息
来源: 评论
Energy efficient and location-independent QoS protocol for wireless sensor networks
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2006年 第6期43卷 1019-1026页
作者: Mao, Yingchi Gong, Haigang Liu, Ming Chen, Daoxu Xie, Li State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China Computer and Information Engineering College Hehai University Nanjing 210098 China
Wireless sensor networks often face the critical problem of maintaining the sufficient sensing coverage (QoS) at an application specific level while keeping a small number of nodes active at any time to save energy. T... 详细信息
来源: 评论
Distributed energy-efficient location-independent coverage protocol in wireless sensor networks
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2006年 第2期43卷 187-195页
作者: Mao, Yingchi Liu, Ming Chen, Lijun Chen, Daoxu Xie, Li State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China School of Computer and Information Engineering Hehai University Nanjing 210098 China
One of the major challenges in constructing WSNs is to maintain long network lifetime as well as sufficient sensing area. In this paper, the broad problems of coverage in WSNs are discussed, and coverage protocols dep... 详细信息
来源: 评论
Two-level-loop scheduling model based on mobile agent in grid environment
收藏 引用
Nanjing Hangkong Hangtian Daxue Xuebao/Journal of Nanjing University of Aeronautics and Astronautics 2006年 第4期38卷 503-508页
作者: Chen, Hongwei Wang, Ruchuan Wang, Haiyan College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China School of Computer Science and Technology Soochow University Suzhou 215006 China
A two-level-loops scheduling model, based on mobile agent in grid environment, is composed of a grid task management center, grid resource nodes, grid users, and jobs. According to jobs submitted by grid users, a two-... 详细信息
来源: 评论
Adaptive ant clustering algorithm
收藏 引用
Ruan Jian Xue Bao/Journal of software 2006年 第9期17卷 1884-1889页
作者: Xu, Xiao-Hua Chen, Ling College of Information Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China Department of Computer Science and Engineering Yangzhou University Yangzhou 225009 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Enlightened by the behaviors of gregarious ant colonies, an artificial ant movement (AM) model and an adaptive ant clustering (AAC) algorithm for this model are presented. In the algorithm, each ant is treated as an a... 详细信息
来源: 评论
Ant colony algorithm for mining association rules
收藏 引用
Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural science) 2006年 第5期26卷 36-40页
作者: Tu, Li Chen, Ling Institute of Information Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China Department of Computer Science Jiangyin Polytechnic College Jiangyin 214405 China Department of Computer Yangzhou University Yangzhou 225009 China State Key Laboratory of Novel Software Technology Nanjing University Nanjing 210093 China
Ant-based evolutional algorithms has been widely applied to kinds of combinatorial optimization problems. In this paper, we first present an ant colony algorithm for association rule discovery (RA3). A digraph is cons... 详细信息
来源: 评论
Negotiation-based approach for software process collaboration
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2006年 第2期43卷 314-320页
作者: Zhao, Xinpei Li, Mingshu Chan, Keith Wang, Qing Laboratory for Internet Software Technology Institute of Software Chinese Academy of Sciences Beijing 100080 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
Large-scale software development typically requires participation of multiple people. One motivation of the participants to collaborate with others is to maximize the profit they may gain from the software development... 详细信息
来源: 评论
Traffic adaptive MAC protocol for wireless sensor network
Traffic adaptive MAC protocol for wireless sensor network
收藏 引用
Third International Conference on computer Network and Mobile Computing, ICCNMC 2005
作者: Gong, Haigang Liu, Ming Mao, Yinchi Chen, Li-Jun Xie, Li State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
In this paper, we propose TA-MAC, a traffic load adaptive Medium Access Control protocol for wireless sensor network. TA-MAC modified the contention window mechanism of S-MAC. It adjusts the initial contention window ... 详细信息
来源: 评论
Mobile-agent-based web service composition
收藏 引用
4th International Conference on Grid and Cooperative Computing - GCC 2005
作者: Qian, Zhuzhong Lu, SangLu Xie, Li State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
In this paper we propose a mobile-agent-based web service composition (MAWSC) model for the dynamic web service composition (WSC). As compared with the traditional WSC models, our model avoids bottleneck of data trans... 详细信息
来源: 评论