咨询与建议

限定检索结果

文献类型

  • 1,406 篇 会议
  • 1,116 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 2,528 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,754 篇 工学
    • 1,415 篇 计算机科学与技术...
    • 1,149 篇 软件工程
    • 317 篇 信息与通信工程
    • 240 篇 控制科学与工程
    • 139 篇 生物工程
    • 111 篇 电子科学与技术(可...
    • 105 篇 电气工程
    • 100 篇 机械工程
    • 74 篇 光学工程
    • 65 篇 仪器科学与技术
    • 62 篇 生物医学工程(可授...
    • 55 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 45 篇 网络空间安全
    • 33 篇 建筑学
    • 32 篇 安全科学与工程
    • 31 篇 土木工程
  • 765 篇 理学
    • 495 篇 数学
    • 147 篇 生物学
    • 141 篇 统计学(可授理学、...
    • 139 篇 物理学
    • 101 篇 系统科学
    • 58 篇 化学
  • 507 篇 管理学
    • 331 篇 管理科学与工程(可...
    • 198 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 59 篇 法学
    • 43 篇 社会学
  • 46 篇 医学
    • 41 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 10 篇 艺术学
  • 7 篇 文学
  • 6 篇 军事学

主题

  • 107 篇 computer science
  • 71 篇 laboratories
  • 65 篇 semantics
  • 47 篇 software
  • 42 篇 software enginee...
  • 42 篇 wireless sensor ...
  • 42 篇 algorithm design...
  • 40 篇 cloud computing
  • 38 篇 optimization
  • 38 篇 web services
  • 36 篇 feature extracti...
  • 36 篇 testing
  • 34 篇 computational mo...
  • 33 篇 reinforcement le...
  • 33 篇 software testing
  • 33 篇 clustering algor...
  • 32 篇 protocols
  • 30 篇 routing
  • 30 篇 task analysis
  • 28 篇 educational inst...

机构

  • 960 篇 state key labora...
  • 221 篇 department of co...
  • 127 篇 national key lab...
  • 108 篇 state key labora...
  • 106 篇 state key labora...
  • 87 篇 state key labora...
  • 78 篇 college of compu...
  • 67 篇 department of co...
  • 55 篇 school of comput...
  • 51 篇 state key labora...
  • 48 篇 national key lab...
  • 45 篇 nanjing universi...
  • 42 篇 school of artifi...
  • 34 篇 state key labora...
  • 34 篇 school of comput...
  • 33 篇 the state key la...
  • 32 篇 state key lab. f...
  • 27 篇 school of electr...
  • 27 篇 university of ch...
  • 27 篇 department of co...

作者

  • 59 篇 gao yang
  • 46 篇 dou wanchun
  • 42 篇 sanglu lu
  • 41 篇 shi yinghuan
  • 39 篇 guihai chen
  • 37 篇 li wu-jun
  • 33 篇 zhang lijun
  • 31 篇 shen furao
  • 31 篇 ying mingsheng
  • 30 篇 zhao jian
  • 30 篇 xu baowen
  • 30 篇 qi lei
  • 28 篇 lu sanglu
  • 28 篇 chen guihai
  • 27 篇 baowen xu
  • 27 篇 xu xiaolong
  • 27 篇 chen zhenyu
  • 26 篇 wanchun dou
  • 26 篇 jie wu
  • 26 篇 xu chang

语言

  • 2,327 篇 英文
  • 121 篇 其他
  • 79 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computer Science and Technology&State Key Laboratory for Novel Software Technology"
2528 条 记 录,以下是2471-2480 订阅
排序:
The Report of Virtual Exhibition software Development
收藏 引用
Wuhan University Journal of Natural sciences 2001年 第Z1期6卷 340-346页
作者: Yu Jian xin 1, Sun Yuan hao 1, Gong Zhen yu 2, Cao Jing 2 1. state key laboratory for novel software technology, Nanjing University, Nanjing 210093, China 2. department of computer science and technology, Nanjing University,Nanjing 210093, China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
The main structure and key techniques of our Virtual Exhibition software are summarized. It demonstrates the practice of software Engineering during the development of our project and discusses the use of UML in it.
来源: 评论
Constraints on Extensions of a Default Theory
收藏 引用
Journal of computer science & technology 2001年 第4期16卷 329-340页
作者: 苏开乐 Department of Computer Science Zhongshan University Guangzhou P.R. China State Key Laboratory for Novel Software Technology Nanjing University Nanjing P.R. China
In this paper, the representability of a family of theories as the set of extensions of a default theory is studied. First, a new necessary condition is given for the representability by means of general default theor... 详细信息
来源: 评论
Some Contributions to Nonmonotonic Consequence
收藏 引用
Journal of computer science & technology 2001年 第4期16卷 297-314页
作者: 朱朝晖 张东摩 陈世福 朱梧槚 Department of Computer Science Nanjing University of Aeronautics and Astronautics Nanjing P.R. China State Key Laboratory for Novel Software Technology Nanjing University Nanjing P.R. China
This paper introduces a non-Horn rule WRM which is a weak form of rational monotony. We explore the effects of adding this non-Horn rule to the rules for the preferential inference. In this paper, a relation |~ is sai... 详细信息
来源: 评论
Efficient verification of a class of linear hybrid automata using linear programming  11th
收藏 引用
11th IFIP WG 10.5 Advanced Research Working Conference on Correct Hardware Design and Verification Methods, CHARME 2001 held jointly with the 14th International Conference on Theorem Proving in Higher Order Logics, TPHOLs 2009
作者: Xuandong, Li Yu, Pei Jianhua, Zhao Yong, Li Tao, Zheng Guoliang, Zheng State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University NanjingJiangsu210093 China
In this paper, we show that for a class of linear hybrid automata called zero loop-closed automata, the satisfaction problem for linear duration properties can be solved efficiently by linear programming. We give an a... 详细信息
来源: 评论
A system on visualization of program executive path and extraction of path sets
A system on visualization of program executive path and extr...
收藏 引用
23rd International Conference on Information technology Interfaces, ITI 2001
作者: Zhimin, Cai Guoping, Rong Peng, Zhou Jingui, Pan State Key Laboratory for Novel Software Technology Computer Science and Technology Dept. Nanjing University Nanjing 210093 China
This article goes into the analysis of program executive path at length, performs a system of program executive path visualization, compares several aspects of different path coverage criteria and discusses the implem... 详细信息
来源: 评论
Verify UML statecharts with SMV
收藏 引用
Wuhan University Journal of Natural sciences 2001年 第Z1期6卷 183-190页
作者: Chen Hai yan 1, Dong Wei 1, Wang Ji 1,2 , Chen Huo wang 1 1 department of computer science, National University of Defense technology, Changsha 410073, China 2 state key laboratory for software Engineering, Wuhan University, Wuhan 430072, C Department of Computer Science National University of Defense Technology Changsha China State Key Laboratory for Software Engineering Wuhan University Wuhan China
Formal verification has been widely needed in the development of safety critical systems. In order to introduce the design verification activity in UML developing process, we have developed a verifier of UML statechar... 详细信息
来源: 评论
A system on visualization of program executive path and extraction of path sets
收藏 引用
Journal of Computing and Information technology 2001年 第3期9卷 239-246页
作者: Zhimin, Cai Guoping, Rong Peng, Zhou Jingui, Pan State Key Laboratory for Novel Software Technology Computer Science and Technology Dept Nanjing University 210093 China
This article goes into the analysis of program executive path at length, performs a system of program executive path visualization, compares several aspects of different path coverage criteria and discusses the implem... 详细信息
来源: 评论
Distance-vector routing protocols for networks with unidirectional link
Distance-vector routing protocols for networks with unidirec...
收藏 引用
International Conference on Parallel Processing Workshops, ICPPW 2001
作者: Chen, G. Lau, F.C.M. Du, Peng Xie, Li State Key Lab. for Novel Software Technology Nanjing University China Department of Computer Science and Information Systems University of Hong Kong Hong Kong Hong Kong
We first introduce a simple distance-vector protocol for routing in networks having unidirectional links. The protocol can be seen as an adaptation for these networks of the strategy as used in the popular RIP protoco... 详细信息
来源: 评论
Dimension recognition and geometry reconstruction in vectorization of engineering drawings
Dimension recognition and geometry reconstruction in vectori...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Feng Su Jiqiang Song Chiew-Lan Tai Shijie Cai State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science Hong Kong University of Science and Technology Hong Kong China
This paper presents a novel approach for recognizing and interpreting dimensions in engineering drawings. It starts by detecting potential dimension frames, each comprising only the line and text components of a dimen... 详细信息
来源: 评论
An efficient mailbox-based algorithm for message delivery in mobile agent systems  5th
收藏 引用
5th International Conference on Mobile Agents, MA 2001
作者: Feng, Xinyu Cao, Jiannong Lü, Jian Chan, Henry State Key Laboratory for Novel Software Technology Dept. of Computer Science Nanjing Univ. Nanjing China Internet Computing and E-Commerce Lab Dept. of Computing Hong Kong Polytechnic Univ Hung Hom Kowloon Hong Kong
Agent mobility presents challenges to the design of efficient message transport protocols for mobile agent communications. A practical mobile agent communication protocol should provide location transparency to the pr... 详细信息
来源: 评论