咨询与建议

限定检索结果

文献类型

  • 271 篇 会议
  • 194 篇 期刊文献

馆藏范围

  • 465 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 306 篇 工学
    • 206 篇 计算机科学与技术...
    • 170 篇 软件工程
    • 77 篇 信息与通信工程
    • 36 篇 控制科学与工程
    • 31 篇 电气工程
    • 29 篇 生物工程
    • 27 篇 机械工程
    • 26 篇 电子科学与技术(可...
    • 22 篇 光学工程
    • 22 篇 生物医学工程(可授...
    • 17 篇 化学工程与技术
    • 14 篇 仪器科学与技术
    • 13 篇 交通运输工程
    • 11 篇 建筑学
    • 11 篇 土木工程
    • 11 篇 航空宇航科学与技...
    • 7 篇 材料科学与工程(可...
  • 141 篇 理学
    • 80 篇 数学
    • 40 篇 物理学
    • 34 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 15 篇 化学
    • 7 篇 系统科学
  • 92 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 16 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 8 篇 法学
    • 8 篇 社会学
  • 6 篇 经济学
  • 5 篇 教育学
  • 3 篇 文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 20 篇 feature extracti...
  • 19 篇 training
  • 14 篇 semantics
  • 12 篇 computer science
  • 11 篇 optimization
  • 11 篇 wireless sensor ...
  • 10 篇 laboratories
  • 10 篇 visualization
  • 10 篇 accuracy
  • 8 篇 tools
  • 8 篇 speech processin...
  • 8 篇 data mining
  • 7 篇 information syst...
  • 7 篇 signal processin...
  • 7 篇 electroencephalo...
  • 7 篇 monitoring
  • 7 篇 predictive model...
  • 7 篇 robustness
  • 6 篇 routing
  • 6 篇 support vector m...

机构

  • 44 篇 national enginee...
  • 26 篇 college of compu...
  • 22 篇 guangdong provin...
  • 16 篇 school of softwa...
  • 15 篇 university of ch...
  • 13 篇 department of co...
  • 13 篇 school of softwa...
  • 12 篇 school of inform...
  • 12 篇 school of cyber ...
  • 12 篇 state key labora...
  • 11 篇 hubei key labora...
  • 11 篇 school of comput...
  • 11 篇 guangdong key la...
  • 10 篇 national enginee...
  • 10 篇 shenzhen institu...
  • 10 篇 hubei engineerin...
  • 9 篇 cas center for e...
  • 9 篇 computer vision ...
  • 9 篇 services computi...
  • 9 篇 key laboratory o...

作者

  • 26 篇 shen linlin
  • 12 篇 wang jinbao
  • 12 篇 yunhao liu
  • 11 篇 gao can
  • 11 篇 linlin shen
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 zheng changwen
  • 9 篇 qiang wenwen
  • 9 篇 li minghui
  • 8 篇 yu zitong
  • 7 篇 zhou jie
  • 7 篇 bin hu
  • 7 篇 ming gu
  • 7 篇 si lingyu
  • 6 篇 li jiangmeng
  • 6 篇 dong hongwei
  • 6 篇 wang jianmin
  • 6 篇 xiong hui
  • 6 篇 zhou ziqi

语言

  • 421 篇 英文
  • 29 篇 其他
  • 15 篇 中文
检索条件"机构=Information System and Software Engineering Laboratory"
465 条 记 录,以下是421-430 订阅
排序:
Extracting Real-Life Log with Data Perspective in PLM system for Business Process Analysis
Extracting Real-Life Log with Data Perspective in PLM System...
收藏 引用
Computer Science and information engineering, CSIE, WRI World Congress on FLAGGED
作者: Wang Zhaoxia Wang Jianmin Wen Lijie Liu Yingbo School of Software Tsinghua University Beijing China Department of Logistical Information Engineering Logistical Engineering University Chongqing China Key Laboratory of Information System Security Ministry of Education China
Event log is the important starting point of any process analysis technique. Existent business process analysis techniques are applied mainly to manual or simulated logs, considering mainly information about control p... 详细信息
来源: 评论
Pathway-Based Microarray Analysis for Defining Statistical Significant Phenotype-Related Pathways: A Review of Common Approaches
Pathway-Based Microarray Analysis for Defining Statistical S...
收藏 引用
International Conference on information Management and engineering, ICIME
作者: M.F. Misman S. Deris S.Z.M. Hashim R. Jumali M.S. Mohamad Artificial Intelligence and Bioinformatics Laboratory Department of Software Engineering Faculty of Computer Science and Information System Universiti Teknologi Malaysia Skudai Johor Malaysia
In this review, we have discussed about approaches in pathway based microarray analysis. Commonly, there are two approaches in pathway based analysis, Enrichment Score and Supervised Machine Learning. These pathway ba... 详细信息
来源: 评论
Network traffic simulation based on Network Processor
Network traffic simulation based on Network Processor
收藏 引用
International Conference on Advanced Technologies for Communications, ATC
作者: Shuai Yuan Gang Zhou Baochao Tian Yi Jin State Key Laboratory of Software Development Environment Beihang University Beijing China National Digital Switching System Engineering & Technological Research Center Information Engineering University Zhengzhou China
Achievements of network traffic simulation provide realistic, feasible and accurate methods of measuring bandwidth, latency, jitter and so on. However as the development of networking technology, traditional manners a... 详细信息
来源: 评论
High Bandwidth Real-Time Network Traffic Generation with Self-Similarity
High Bandwidth Real-Time Network Traffic Generation with Sel...
收藏 引用
International Conference on Computational Intelligence and software engineering (CiSE)
作者: Shuai Yuan Gang Zhou Yi Jin State Key Laboratory of Software Development Environment Beihang University Beijing China National Digital Switching System Engineering & Technological Research Center Information and Engineering University Zhengzhou China
Network traffic generation has always been a hot spot in network measurement and simulation research. However, traditional methods of generating network traffic are either insufficient in fulfilling bandwidth requirem... 详细信息
来源: 评论
Comparing Three Algorithms of Implementing ON/OFF Aggregation Model
Comparing Three Algorithms of Implementing ON/OFF Aggregatio...
收藏 引用
International Conference on Computational Intelligence and software engineering (CiSE)
作者: Shuai Yuan Gang Zhou Yi Jin State Key Laboratory of Software Development Environment Beihang University Beijing China National Digital Switching System Engineering & Technological Research Center Information and Engineering University Zhengzhou China
ON/OFF aggregation model is one of the efficient and accurate models for self-similar network traffic generation. In this paper we propose and compare three algorithms of implementing ON/OFF aggregation model, based o... 详细信息
来源: 评论
A Portable and Efficient User Dispatching Mechanism for Multicore systems
A Portable and Efficient User Dispatching Mechanism for Mult...
收藏 引用
IEEE International Conference on Embedded and Real-Time Computing systems and Applications (RTCSA)
作者: Tang-Hsun Tu Chih-Wen Hsueh Rong-Guey Chang Embedded System and Wireless Network Laboratory Graduate Institute of Networking and Multimedia National Taiwan University Taipei Taiwan System Software Laboratory Graduate Institute of Computer Science and Information Engineering National Chung Cheng University Chiayi Taiwan
In multicore environment, using multiple threads is a common useful approach to improve application performance. Nevertheless, even in many simple applications, the performance might degrade when the number of threads... 详细信息
来源: 评论
A Bayesian Net Based Effort Estimation Model for Service Governance Processes
A Bayesian Net Based Effort Estimation Model for Service Gov...
收藏 引用
International Conference on information and Computing Science, ICIC
作者: Jun Liu Jianzhong Qiao Shukuan Lin Qian Li College of Information Science and Engineering Northeastern University Shenyang China Key Laboratory of Software System Application and Development Generic Technology Science and Technology Bureau Shenyang China
This paper presents a systematic way of making effort estimation for service oriented software. By outlining major governance processes identified from service oriented best practices, an effort estimation model based... 详细信息
来源: 评论
Dynamic Node Collaboration for Mobile Target Tracking in Wireless Camera Sensor Networks
Dynamic Node Collaboration for Mobile Target Tracking in Wir...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: L. Liu X. Zhang H. Ma Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Beijing China Networking and Information System Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX USA
Compared to the other types of sensor networks, the wireless camera sensor networks can offer much more comprehensive and accurate information in mobile target tracking applications. We propose a dynamic node collabor... 详细信息
来源: 评论
pService: Towards Similarity Search on Peer-to-Peer Web Services Discovery
pService: Towards Similarity Search on Peer-to-Peer Web Serv...
收藏 引用
International Conference on Advances in P2P systems (AP2PS)
作者: Gang Zhou Jianjun Yu National Digital Switching System Engineering and Technological Research and Development Center China State Key Laboratory of Software Development Environment Beihang University China Computer Network Information Center Chinese Academy and Sciences China
We present the design of pService system for P2P Web services discovery supporting similarity search with its locality-preserving feature based on modified Skip Graph. In pService, the most important property (e.g. se... 详细信息
来源: 评论
Model Checking Needham-Schroeder Security Protocol Based on Temporal Logic of Knowledge
Model Checking Needham-Schroeder Security Protocol Based on ...
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Xiangyu Luo Yan Chen Ming Gu Lijun Wu School of Software Key Laboratory of Security for Information System of Ministry of Education Tsinghua University Beijing China Department of Computer Science Guilin University of Electronic Technology Guilin China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the... 详细信息
来源: 评论