咨询与建议

限定检索结果

文献类型

  • 629 篇 期刊文献
  • 459 篇 会议
  • 3 册 图书

馆藏范围

  • 1,091 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 964 篇 工学
    • 747 篇 计算机科学与技术...
    • 670 篇 软件工程
    • 288 篇 信息与通信工程
    • 214 篇 控制科学与工程
    • 181 篇 电气工程
    • 168 篇 电子科学与技术(可...
    • 85 篇 光学工程
    • 48 篇 机械工程
    • 45 篇 化学工程与技术
    • 45 篇 生物医学工程(可授...
    • 43 篇 生物工程
    • 40 篇 材料科学与工程(可...
    • 38 篇 力学(可授工学、理...
    • 33 篇 网络空间安全
    • 31 篇 仪器科学与技术
    • 30 篇 建筑学
    • 29 篇 土木工程
    • 22 篇 动力工程及工程热...
    • 17 篇 冶金工程
    • 16 篇 交通运输工程
  • 677 篇 理学
    • 518 篇 数学
    • 229 篇 物理学
    • 108 篇 统计学(可授理学、...
    • 47 篇 化学
    • 45 篇 生物学
  • 248 篇 管理学
    • 159 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 91 篇 工商管理
  • 25 篇 医学
    • 21 篇 临床医学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 13 篇 法学
  • 10 篇 军事学
  • 9 篇 教育学
  • 7 篇 农学
  • 3 篇 艺术学
  • 2 篇 文学
  • 1 篇 哲学

主题

  • 16 篇 data mining
  • 15 篇 speech recogniti...
  • 13 篇 neural networks
  • 13 篇 image processing
  • 13 篇 parallel process...
  • 11 篇 distributed comp...
  • 10 篇 network protocol...
  • 10 篇 software enginee...
  • 10 篇 artificial intel...
  • 9 篇 learning systems
  • 9 篇 mobile robots
  • 9 篇 feature extracti...
  • 9 篇 computer softwar...
  • 9 篇 wireless telecom...
  • 8 篇 algorithms
  • 8 篇 security of data
  • 8 篇 pattern recognit...
  • 7 篇 world wide web
  • 7 篇 computer support...
  • 7 篇 medical imaging

机构

  • 55 篇 inst. of comp. t...
  • 33 篇 dept. of comp. s...
  • 31 篇 sch. of comp. sc...
  • 20 篇 graduate sch. ch...
  • 18 篇 dept. of elec. e...
  • 15 篇 dept. of comp. s...
  • 14 篇 jiangsu inst. of...
  • 13 篇 lab. of comp. sc...
  • 13 篇 dept. of elec. e...
  • 12 篇 inst. of softwar...
  • 11 篇 dept. of comp. s...
  • 10 篇 lab. of intellig...
  • 9 篇 dept. of comp. s...
  • 9 篇 comp. sci. and a...
  • 8 篇 dept. of elec. e...
  • 7 篇 speech and visio...
  • 6 篇 inst. of appl. p...
  • 6 篇 lab. of software...
  • 6 篇 coll. of comp. s...
  • 6 篇 lab. for comp. s...

作者

  • 18 篇 gao wen
  • 12 篇 hong bing-rong
  • 10 篇 shun-ren yang
  • 10 篇 yegnanarayana b.
  • 9 篇 fujimoto j.g.
  • 9 篇 xu xiao-fei
  • 9 篇 zhang tian-wen
  • 8 篇 xu bao-wen
  • 7 篇 shi zhong-zhi
  • 7 篇 feng yu-lin
  • 7 篇 phone lin
  • 6 篇 洪炳熔
  • 6 篇 xu baowen
  • 6 篇 jia yun-de
  • 6 篇 chang chin-chen
  • 6 篇 yu. t. struchkov
  • 6 篇 ippen e.p.
  • 5 篇 cho dong-ho
  • 5 篇 li jian-zhong
  • 5 篇 zhang bo

语言

  • 766 篇 英文
  • 308 篇 中文
  • 11 篇 其他
  • 6 篇 日文
检索条件"机构=Inst. for Algorithms/Sci. Comp."
1091 条 记 录,以下是441-450 订阅
排序:
Decryption of scramble algorithms
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2004年 第SUPPL.期15卷 149-156页
作者: Zhao, Yi-Ming Zhao, Xiao-Yu Gong, Song-Chun Dept. of Comp. Sci. and Technol. Ningbo Univ. Ningbo 315211 China Inst. of DSP and Software Techniques Ningbo Univ. Ningbo 315211 China
Scramble algorithms, which are also called pure-position permutation algorithms, are commonly used as an image encryption, are investigated in this paper. Unfortunately, they are frail under known-text attack. Accordi... 详细信息
来源: 评论
Algorithm of processor pre-allocation based on task duplication
收藏 引用
Jisuanji Xuebao/Chinese Journal of comp.ters 2004年 第2期27卷 216-223页
作者: Zhou, Shuang-E Yuan, You-Guang Xiong, Bing-Zhou Ou, Zhong-Hong Coll. of Comp. Sci. and Technol. Harbin Eng. Univ. Harbin 150001 China Wuhan Inst. of Digital Eng. Wuhan 430074 China
Scheduling algorithms based on task duplication are of better performance than non-duplication ones. The paper analyzes typical scheduling algorithms based on task duplication (e.g. TDS, OSA algorithm) and their assum... 详细信息
来源: 评论
Model checking algorithm for temporal logics of knowledge in multi-agent systems
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2004年 第7期15卷 1012-1020页
作者: Wu, Li-Jun Su, Kai-Le Dept. of Comp. Sci. and Technol. Zhongshan Univ. Guangzhou 510275 China Inst. of Electron. and Info. Eng. He'nan Univ. of Sci. and Technol. Luoyang 471003 China
Model checking is used mainly to check if a system satisfies the specifications expressed in temporal logic and people pay little attention to the model checking problem for logics of knowledge. However, in the distri... 详细信息
来源: 评论
Information flow model based on roles and applications
收藏 引用
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering sci.nce Edition) 2004年 第5期36卷 94-97页
作者: Liu, Yi-He Liu, Jia-Yong Inst. of Info. Security Sichuan Univ. Chengdu 610064 China Dept. of Comp. and Info. Sci. Neijiang Teachers Coll. Neijiang 641112 China
Role-based Access Control (RABC) is an important information security model. In order to describe the information flow based on this model, a new security information flow model based on roles is given. The object is ... 详细信息
来源: 评论
Overview of the core technology of JVT draft's
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2004年 第1期15卷 58-68页
作者: Zheng, Xiang Ye, Zhi-Yuan Zhou, Bing-Feng Inst. of Comp. Sci. and Technol. Peking Univ. Beijing 100871 China Technol. Dept. Wuhan Broadcast and Television Bur. Wuhan 430015 China
As one stream standard which will be produced by the ITU-T and ISO in the future, Draft JVT (joint video team) is a new video-audio coding standard. Its goal is to produce a significant comp.ession performance relativ... 详细信息
来源: 评论
Authenticated pairing-based group key agreement scheme
收藏 引用
Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University 2004年 第SUPPL. 2期38卷 200-203页
作者: Li, Ming Wang, Yong Gu, Da-Wu Bai, Ying-Cai Dept. of Comp. Sci. and Eng. Shanghai Jiaotong Univ. Shanghai 200030 China Software Sch. Beijing Inst. of Technol. Beijing 100081 China
To meet the increasing popularity of secure group-oriented comp.ting, this paper proposes an efficient group key agreement scheme-PAGKA. It combines the merit of key tree and Pairings-based key exchange, and involves ... 详细信息
来源: 评论
Planning algorithm based on constraints propagating
收藏 引用
Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence 2004年 第4期17卷 405-411页
作者: Zhao, Zhikun Shi, Zhongzhi Cao, Hu Sch. of Info. Sci. and Eng. Graduate Sch. Chinese Acad. of Sci. Beijing 100039 China Key Lab. of Intelligent Info. Proc. Inst. of Comp. Technol. Chinese Acad. of Sci. Beijing 100080 China
This paper presents a distributed multi-agent planning algorithm based on constraints propagating. In our algorithm, conflicts are detected and resolved through a special type of negotiation among agents, i.e. consist... 详细信息
来源: 评论
Enhancement to freeze-TCP to improve its performance
收藏 引用
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications 2004年 第6期27卷 69-73页
作者: Fan, Rui Cheng, Shi-Duan Lab. of Networking and Switching Beijing Univ. of Posts and Telecom. Beijing 100876 China Inst. of Comp. Technol. Chinese Acad. of Sci. Beijing 100080 China
A scheme called Freeze-TCP + is presented to improve the performance of transmission control protocol (TCP) in mobile environment. Freeze-TCP + is based on Freeze-TCP and incorporates network measurement mechanism. Da... 详细信息
来源: 评论
Semi-theoretical model of ogival nose rigid projectiles penetrating into thick targets
收藏 引用
Baozha Yu Chongji/Explosion and Shock Waves 2004年 第3期24卷 212-218页
作者: Wang, Zheng Ni, Yu-Shan Cao, Ju-Zhen Wang, Yuan-Shu Zhang, Wen Dept. of Mech. and Eng. Sci. Fudan Univ. Shanghai 200433 China Inst. of Appl. Phys. and Comp. Math. Beijing 100088 China
The problem of an ogival nose rigid projectile penetrating into a thick target has been considered based on a semi-theoretical model in order to determine the velocity potential and the velocity field in the target. T... 详细信息
来源: 评论
Penetration comp.tation and spherical cavity-expansion model of concrete targets with crushing effects
收藏 引用
Jisuan Lixue Xuebao/Chinese Journal of comp.tational Mechanics 2004年 第4期21卷 493-497页
作者: Zhang, Di Lin, Yihan Cao, Juzhen Dept. of Mech. and Eng. Sci. Fudan Univ. Shanghai 200433 China Inst. of Appl. Phys. and Comp. Math. Beijing 100088 China
This paper developed a spherical cavity-expansion penetration model for concrete targets. The hydrostatic pressure-volumetric strain relation of concrete targets expressed by different solid concrete models and porous... 详细信息
来源: 评论