咨询与建议

限定检索结果

文献类型

  • 1,406 篇 会议
  • 1,116 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 2,528 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,754 篇 工学
    • 1,415 篇 计算机科学与技术...
    • 1,149 篇 软件工程
    • 317 篇 信息与通信工程
    • 240 篇 控制科学与工程
    • 139 篇 生物工程
    • 111 篇 电子科学与技术(可...
    • 105 篇 电气工程
    • 100 篇 机械工程
    • 74 篇 光学工程
    • 65 篇 仪器科学与技术
    • 62 篇 生物医学工程(可授...
    • 55 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 45 篇 网络空间安全
    • 33 篇 建筑学
    • 32 篇 安全科学与工程
    • 31 篇 土木工程
  • 765 篇 理学
    • 495 篇 数学
    • 147 篇 生物学
    • 141 篇 统计学(可授理学、...
    • 139 篇 物理学
    • 101 篇 系统科学
    • 58 篇 化学
  • 507 篇 管理学
    • 331 篇 管理科学与工程(可...
    • 198 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 59 篇 法学
    • 43 篇 社会学
  • 46 篇 医学
    • 41 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 10 篇 艺术学
  • 7 篇 文学
  • 6 篇 军事学

主题

  • 107 篇 computer science
  • 71 篇 laboratories
  • 65 篇 semantics
  • 47 篇 software
  • 42 篇 software enginee...
  • 42 篇 wireless sensor ...
  • 42 篇 algorithm design...
  • 40 篇 cloud computing
  • 38 篇 optimization
  • 38 篇 web services
  • 36 篇 feature extracti...
  • 36 篇 testing
  • 34 篇 computational mo...
  • 33 篇 reinforcement le...
  • 33 篇 software testing
  • 33 篇 clustering algor...
  • 32 篇 protocols
  • 30 篇 routing
  • 30 篇 task analysis
  • 28 篇 educational inst...

机构

  • 960 篇 state key labora...
  • 221 篇 department of co...
  • 127 篇 national key lab...
  • 108 篇 state key labora...
  • 106 篇 state key labora...
  • 87 篇 state key labora...
  • 78 篇 college of compu...
  • 67 篇 department of co...
  • 55 篇 school of comput...
  • 51 篇 state key labora...
  • 48 篇 national key lab...
  • 45 篇 nanjing universi...
  • 42 篇 school of artifi...
  • 34 篇 state key labora...
  • 34 篇 school of comput...
  • 33 篇 the state key la...
  • 32 篇 state key lab. f...
  • 27 篇 school of electr...
  • 27 篇 university of ch...
  • 27 篇 department of co...

作者

  • 59 篇 gao yang
  • 46 篇 dou wanchun
  • 42 篇 sanglu lu
  • 41 篇 shi yinghuan
  • 39 篇 guihai chen
  • 37 篇 li wu-jun
  • 33 篇 zhang lijun
  • 31 篇 shen furao
  • 31 篇 ying mingsheng
  • 30 篇 zhao jian
  • 30 篇 xu baowen
  • 30 篇 qi lei
  • 28 篇 lu sanglu
  • 28 篇 chen guihai
  • 27 篇 baowen xu
  • 27 篇 xu xiaolong
  • 27 篇 chen zhenyu
  • 26 篇 wanchun dou
  • 26 篇 jie wu
  • 26 篇 xu chang

语言

  • 2,327 篇 英文
  • 121 篇 其他
  • 79 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computer Science and Technology&State Key Laboratory for Novel Software Technology"
2528 条 记 录,以下是2401-2410 订阅
排序:
A search eigine of internet information based on agent
A search eigine of internet information based on agent
收藏 引用
International Conference on Machine Learning and Cybernetics, ICMLC 2005
作者: Cheng, Xian-Y.I. Yan, L.I. Liu, Y.I.- Song Lin, Qing Bi, Jian-Liang Xia, D.E.-Shen State Key Laboratory for Novel Software Technology Nanjing University Nianjing. 2 10093 China Computer Science and Communication Engineering Institute Jiangsu University Zhenjiang212013 China Department of Computer Science NanJing University of ScienceandTechnology Nianjing 219004 China
In this paper, the frame of AgentSeek, which is a search engine based on Agent are introduced. It can find user interesting the user does want, thereby rates of recall and accuracy have been improved largely. © 2... 详细信息
来源: 评论
Performance evaluation of allgather algorithms on terascale Linux cluster with Fast Ethernet
Performance evaluation of allgather algorithms on terascale ...
收藏 引用
8th International Conference on High-Performance Computing in Asia-Pacific Region
作者: Chen, Jing Zhang, Linbo Zhang, Yunquan Yuan, Wei Department of Computer Science University of Science and Technology of China China Lab. of Parallel Computing Institute of Software CAS China State Key Laboratory of Computer Science China Academy of Mathematics and Systems Sciences CAS China
We report our work on evaluating performance of several MPI Allgather algorithms on Fast Ethernet. These algorithms are ring, recursive doubling, Bruck, and neighbor exchange. The first three algorithms are widely use... 详细信息
来源: 评论
Research of pivotal policy in grid security model
Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute ...
收藏 引用
Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications 2005年 第2期25卷 71-75页
作者: Chen, Hong-Wei Wang, Ru-Chuan Department of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
A platform-independent grid security model and several model-based security policies such as authentication and authorization are presented in this paper. The security policies include the public key infrastructure (P... 详细信息
来源: 评论
Constructing platform independent models of web application
Constructing platform independent models of web application
收藏 引用
SOSE 2005: IEEE International Workshop on Service-Oriented System Engineering
作者: Chengwan, He Fei, He Keqing, He Wenjie, Tu State Key Laboratory of Software Engineering Wuhan University China Department of Computer Science and Technology Wuhan Institute of Chemical Technology China Major in Computer Science Graduate School of Science and Engineering Waseda University Tokyo 169-8555 Japan
Web application has some interesting and special characteristics, such as complicated structure and variety of the implementation method, etc. So its model is generally very difficult to be reused. This paper proposes... 详细信息
来源: 评论
Multi-objective adaptive scheme for analog circuit design based on two-layer genetic programming
Multi-objective adaptive scheme for analog circuit design ba...
收藏 引用
2005 International Conference on Neural Networks and Brain Proceedings, ICNNB'05
作者: Feng, Wang Yuanxiang, Li Department of Computer Science and Technology Wuhan University Wuhan Hubei China State's Key Laboratory of Software Engineering Wuhan University Wuhan Hubei China
Analog circuits are very important in many high-speed applications. Since the size of analog circuit is becoming larger and more complex, the design is becoming more and more difficult. In this paper, a novel design a... 详细信息
来源: 评论
AN IMPROVED RIJNDAEL ALGORITHM
AN IMPROVED RIJNDAEL ALGORITHM
收藏 引用
2005中国宁波国际计算机科学与技术学术大会
作者: Yu Xinchun Yang Jie Xie Li Department of Computer Science and Engineering Yangzhou University State Key Laboratory for Novel Software Technology Nanjing University
After the construction of S-boxes satisfying some good cryptographic properties,the ByteSub step in Rijndael algorithm was improved based on the dynamical selection of S-boxes depending on the round *** improved algor... 详细信息
来源: 评论
A path-history-sensitive access control model for mobile agent environment
A path-history-sensitive access control model for mobile age...
收藏 引用
International Conference on Distributed Computing Systems Workshop
作者: Chun Cao Jian Lu State Key Laboratory for Novel Software Technology Department of Computer Science Nanjing University Nanjing Jiangsu China
To solve the security issues in a mobile agent system, the access control is always employed. Existing access control models enable the agent's identity, trust and other information to influence the security decis... 详细信息
来源: 评论
HMM-based on-line multi-stroke sketch recognition
HMM-based on-line multi-stroke sketch recognition
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Wei Jiang Zheng-Xing Sun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
This paper describes a new approach for on-line multi-stroke sketch recognition. The approach is based on hidden Markov model (HMM). Sketches are modeled to HMM chains, and strokes are mapped to different HMM states. ... 详细信息
来源: 评论
Feature selection for high dimensional face image using self-organizing maps
收藏 引用
9th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2005
作者: Tan, Xiaoyang Chen, Songcan Zhou, Zhi-Hua Zhang, Fuyan National Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Engineering Nanjing University of Aeronautics and Astronautics Nanjing 210016 China Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai 200433 China
While feature selection is very difficult for high dimensional, unstructured data such as face image, it may be much easier to do if the data can be faithfully transformed into lower dimensional space. In this paper, ... 详细信息
来源: 评论
New constant-degree P2P overlay network
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2005年 第7期28卷 1084-1095页
作者: Chen, Gui-Hai Xu, Cheng-Zhong Shen, Hai-Ying Ye, Mao Liu, Zhi-Yu State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Electrical and Computer Engineering Wayne State University Detroit MI 48202 United States
Many structured P2P systems use DHT technologies to map data items onto the nodes in various ways for scalable routing and location. Most of the systems require O(logn) hops per lookup request with O(logn) neighbors p... 详细信息
来源: 评论