咨询与建议

限定检索结果

文献类型

  • 669 篇 期刊文献
  • 459 篇 会议
  • 3 册 图书

馆藏范围

  • 1,131 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,007 篇 工学
    • 798 篇 计算机科学与技术...
    • 695 篇 软件工程
    • 298 篇 信息与通信工程
    • 214 篇 控制科学与工程
    • 182 篇 电气工程
    • 159 篇 电子科学与技术(可...
    • 85 篇 光学工程
    • 53 篇 机械工程
    • 46 篇 生物医学工程(可授...
    • 44 篇 材料科学与工程(可...
    • 43 篇 化学工程与技术
    • 43 篇 生物工程
    • 39 篇 力学(可授工学、理...
    • 38 篇 网络空间安全
    • 28 篇 仪器科学与技术
    • 27 篇 建筑学
    • 27 篇 土木工程
    • 22 篇 动力工程及工程热...
    • 17 篇 交通运输工程
  • 684 篇 理学
    • 527 篇 数学
    • 229 篇 物理学
    • 109 篇 统计学(可授理学、...
    • 46 篇 生物学
    • 45 篇 化学
  • 247 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 94 篇 工商管理
    • 93 篇 图书情报与档案管...
  • 26 篇 医学
    • 21 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 12 篇 法学
  • 9 篇 教育学
  • 8 篇 农学
  • 7 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 16 篇 data mining
  • 15 篇 speech recogniti...
  • 13 篇 neural networks
  • 13 篇 image processing
  • 13 篇 parallel process...
  • 12 篇 distributed comp...
  • 11 篇 network protocol...
  • 11 篇 software enginee...
  • 10 篇 feature extracti...
  • 10 篇 artificial intel...
  • 9 篇 learning systems
  • 9 篇 security of data
  • 9 篇 mobile robots
  • 9 篇 computer softwar...
  • 9 篇 wireless telecom...
  • 8 篇 medical imaging
  • 8 篇 algorithms
  • 8 篇 pattern recognit...
  • 7 篇 world wide web
  • 7 篇 computer support...

机构

  • 57 篇 inst. of comp. t...
  • 33 篇 sch. of comp. sc...
  • 29 篇 dept. of comp. s...
  • 25 篇 graduate sch. ch...
  • 16 篇 dept. of comp. s...
  • 16 篇 lab. of comp. sc...
  • 15 篇 dept. of elec. e...
  • 14 篇 inst. of softwar...
  • 14 篇 jiangsu inst. of...
  • 13 篇 dept. of elec. e...
  • 11 篇 lab. of intellig...
  • 11 篇 dept. of comp. s...
  • 9 篇 dept. of comp. s...
  • 9 篇 comp. sci. and a...
  • 8 篇 dept. of elec. e...
  • 8 篇 dept. of comp. s...
  • 7 篇 speech and visio...
  • 6 篇 lab. of software...
  • 6 篇 inst. of comp. s...
  • 6 篇 coll. of comp. s...

作者

  • 19 篇 gao wen
  • 12 篇 hong bing-rong
  • 10 篇 shun-ren yang
  • 10 篇 yegnanarayana b.
  • 9 篇 fujimoto j.g.
  • 9 篇 xu xiao-fei
  • 9 篇 zhang tian-wen
  • 8 篇 xu bao-wen
  • 7 篇 shi zhong-zhi
  • 7 篇 feng yu-lin
  • 7 篇 phone lin
  • 6 篇 li jian-zhong
  • 6 篇 xu baowen
  • 6 篇 jia yun-de
  • 6 篇 chang chin-chen
  • 6 篇 li wei
  • 6 篇 yu. t. struchkov
  • 6 篇 ippen e.p.
  • 5 篇 cho dong-ho
  • 5 篇 zhang bo

语言

  • 788 篇 英文
  • 331 篇 中文
  • 6 篇 日文
  • 6 篇 其他
检索条件"机构=Inst. for Algorithms/Sci. Comp."
1131 条 记 录,以下是461-470 订阅
排序:
Information entropy based multi-population genetic algorithm
收藏 引用
Dalian Ligong Daxue Xuebao/Journal of Dalian University of Technology 2004年 第4期44卷 589-593页
作者: Li, Chun-Lian Wang, Xi-Cheng Zhao, Jin-Cheng Wu, Jin-Ying Dept. of Comp. Sci. and Eng. Dalian Univ. of Technol. Dalian 116024 China Inst. of Comp. Sci. and Technol. Changchun Univ. Changchun 130022 China Lab. of Structure Analysis Dalian Univ. of Technol. Dalian 116024 China Inst. of Bio-info. Dalian Univ. Dalian 116622 China
An evolutionary design model for constraint optimization problems through transformation of optimization models is constructed, and then a multi-population genetic algorithm with narrowing of the search space is prese... 详细信息
来源: 评论
Method to automatically acquire the discussion clues in texts
收藏 引用
Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural sci.nce) 2004年 第SUPPL.期32卷 96-98页
作者: Gu, Yi-Jun Fan, Xiao-Zhong Huang, Wei-Jin Yu, Jiang-De Dept. of Comp. Sci. Beijing Inst. of Technol. Beijing 100081 China Dept. of Network Security Security Univ. Beijing 100033 China
A repository-based method to acquire the discussion clues in the text is presented in this paper. In this method, the topic concepts of the text and each paragraph are found out on the basis of the relevance between t... 详细信息
来源: 评论
Algorithm for extracting rule-generating sets based on concept lattice
收藏 引用
Jisuanji Yanjiu yu Fazhan/comp.ter Research and Development 2004年 第8期41卷 1339-1344页
作者: Liang, Ji-Ye Wang, Jun-Hong Lab. of Intelligent Info. Proc. Inst. of Comp. Technol. Chinese Acad. of Sci. Beijing 100080 China Sch. of Comp. and Info. Technol. Shanxi Univ. Taiyuan 030006 China
The rule sets extracted by traditional algorithm are usually very large, because it includes many redundant rules. The number of rules can be reduced using closed item sets. The relationship of generalization and spec... 详细信息
来源: 评论
Teamwork protocol for multi-agent
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2004年 第5期15卷 689-696页
作者: Sheng, Qiu-Jian Zhao, Zhi-Kun Liu, Shao-Hui Shi, Zhong-Zhi Lab. of Intelligent Info. Proc. Inst. of Comp. Technol. Chinese Acad. of Sci. Beijing 100080 China Graduate Sch. Chinese Acad. of Sci. Beijing 100039 China
Teamwork is an effective way of cooperative problem solving in dynamic and unpredictable application contexts. The concept of joint intention is the key of teamwork. How various speech actions can be used by software ... 详细信息
来源: 评论
New group key management framework for mobile ad-hoc networks
收藏 引用
Jisuanji Yanjiu yu Fazhan/comp.ter Research and Development 2004年 第4期41卷 704-709页
作者: Kuang, Xiao-Hui Hu, Hua-Ping Lu, Xi-Cheng Inst. of Network Technol. Sch. of Comp. Sci. Natl. Univ. of Defense Technol. Changsha 410007 China Beijing Inst. of Syst. Eng. Beijing 100101 China
Many emerging mobile wireless applications for emergency and military situations depend upon secure group communications. But group key management in mobile ad-hoc networks faces a great challenge because of mobility,... 详细信息
来源: 评论
Network intrusion detection strategies based on MIB-II
收藏 引用
Beijing Ligong Daxue Xuebao/Transaction of Beijing inst.tute of Technology 2004年 第8期24卷 696-700页
作者: Yu, Cheng-Zhi Wang, Shu-Jing Song, Han-Tao Dept. of Comp. Sci. and Eng. Sch. of Info. Sci. and Technol. Beijing Inst. of Technol. Beijing 100081 China China Aviation Accounting Ctr. Beijing 100028 China
A network intrusion detection strategy based on MIB-I is proposed. It solves the security problems of SNMPvl and SNMPv2, and avoids using SNMPv3 that is comp.icated and only partly supported by manufacturers. SNMPvl i... 详细信息
来源: 评论
News event detection and tracking algorithm based on dynamic evolution model
收藏 引用
Jisuanji Yanjiu yu Fazhan/comp.ter Research and Development 2004年 第7期41卷 1273-1280页
作者: Jia, Zi-Yan He, Qing Zhang, Hai-Jun Li, Jia-You Shi, Zhong-Zhi Lab. of Intelligent Info. Proc. Inst. of Comp. Technol. Chinese Acad. of Sci. Beijing 100080 China Graduate Sch. Chinese Acad. of Sci. Beijing 100039 China
Via analyzing news data on the Internet, an algorithm is presented for news event detection and tracking based on a dynamic evolution model, which borrows the idea of single-pass clustering and combines the specialtie... 详细信息
来源: 评论
Agent-based self-adaptive software process model
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2004年 第3期15卷 348-359页
作者: Zhao, Xin-Pei Li, Ming-Shu Wang, Qing Chan, Keith Leung, Hareton Inst. of Software Chinese Acad. of Sci. Beijing 100080 China Dept. of Comp. Hong Kong Polytech. Univ. Hong Kong Hong Kong
Traditional software process models are mostly static, mechanical, and passive. Traditional approach requires modeler to determine all the possible conditions the software process will encounter and to define explicit... 详细信息
来源: 评论
Decryption of scramble algorithms
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2004年 第SUPPL.期15卷 149-156页
作者: Zhao, Yi-Ming Zhao, Xiao-Yu Gong, Song-Chun Dept. of Comp. Sci. and Technol. Ningbo Univ. Ningbo 315211 China Inst. of DSP and Software Techniques Ningbo Univ. Ningbo 315211 China
Scramble algorithms, which are also called pure-position permutation algorithms, are commonly used as an image encryption, are investigated in this paper. Unfortunately, they are frail under known-text attack. Accordi... 详细信息
来源: 评论
Algorithm of processor pre-allocation based on task duplication
收藏 引用
Jisuanji Xuebao/Chinese Journal of comp.ters 2004年 第2期27卷 216-223页
作者: Zhou, Shuang-E Yuan, You-Guang Xiong, Bing-Zhou Ou, Zhong-Hong Coll. of Comp. Sci. and Technol. Harbin Eng. Univ. Harbin 150001 China Wuhan Inst. of Digital Eng. Wuhan 430074 China
Scheduling algorithms based on task duplication are of better performance than non-duplication ones. The paper analyzes typical scheduling algorithms based on task duplication (e.g. TDS, OSA algorithm) and their assum... 详细信息
来源: 评论