咨询与建议

限定检索结果

文献类型

  • 1,692 篇 会议
  • 1,340 篇 期刊文献
  • 68 册 图书

馆藏范围

  • 3,100 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,018 篇 工学
    • 1,534 篇 计算机科学与技术...
    • 1,264 篇 软件工程
    • 449 篇 信息与通信工程
    • 255 篇 生物工程
    • 232 篇 控制科学与工程
    • 211 篇 电气工程
    • 162 篇 光学工程
    • 150 篇 电子科学与技术(可...
    • 147 篇 机械工程
    • 141 篇 生物医学工程(可授...
    • 72 篇 动力工程及工程热...
    • 72 篇 化学工程与技术
    • 70 篇 仪器科学与技术
    • 68 篇 安全科学与工程
    • 67 篇 网络空间安全
  • 1,024 篇 理学
    • 562 篇 数学
    • 284 篇 生物学
    • 272 篇 物理学
    • 169 篇 统计学(可授理学、...
    • 96 篇 系统科学
    • 88 篇 化学
  • 595 篇 管理学
    • 370 篇 管理科学与工程(可...
    • 250 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 148 篇 医学
    • 132 篇 临床医学
    • 111 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 108 篇 法学
    • 84 篇 社会学
  • 56 篇 经济学
    • 55 篇 应用经济学
  • 55 篇 教育学
  • 32 篇 农学
  • 17 篇 军事学
  • 12 篇 文学
  • 6 篇 艺术学
  • 2 篇 哲学

主题

  • 79 篇 computer science
  • 77 篇 machine learning
  • 71 篇 software enginee...
  • 69 篇 deep learning
  • 63 篇 training
  • 61 篇 feature extracti...
  • 53 篇 data mining
  • 53 篇 computational mo...
  • 52 篇 artificial intel...
  • 46 篇 accuracy
  • 42 篇 semantics
  • 41 篇 cloud computing
  • 39 篇 internet of thin...
  • 37 篇 predictive model...
  • 36 篇 software
  • 35 篇 data models
  • 34 篇 optimization
  • 34 篇 authentication
  • 32 篇 neural networks
  • 31 篇 support vector m...

机构

  • 71 篇 college of compu...
  • 64 篇 state key labora...
  • 46 篇 sri lanka instit...
  • 44 篇 school of comput...
  • 43 篇 school of inform...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 sri lanka instit...
  • 30 篇 institute of inf...
  • 30 篇 department of co...
  • 28 篇 shenzhen institu...
  • 28 篇 national enginee...
  • 26 篇 university of ch...
  • 25 篇 department of in...
  • 25 篇 guangdong key la...
  • 23 篇 school of comput...
  • 23 篇 school of comput...
  • 23 篇 shanghai key lab...
  • 23 篇 institute of sof...
  • 22 篇 software enginee...

作者

  • 51 篇 shen linlin
  • 32 篇 das ashok kumar
  • 25 篇 mohammad s. obai...
  • 25 篇 du bo
  • 24 篇 fan guisheng
  • 23 篇 chen liqiong
  • 22 篇 obaidat mohammad...
  • 19 篇 mahmood khalid
  • 18 篇 ashok kumar das
  • 17 篇 yu huiqun
  • 16 篇 kasthurirathna d...
  • 16 篇 xie weicheng
  • 15 篇 tao dacheng
  • 15 篇 qiu daowen
  • 15 篇 linlin shen
  • 14 篇 wang wei
  • 13 篇 dharshana kasthu...
  • 13 篇 wei sun
  • 13 篇 xiaorui zhang
  • 13 篇 zhang liangpei

语言

  • 2,843 篇 英文
  • 208 篇 其他
  • 54 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Software and Theory of Information Science and Engineering Institute"
3100 条 记 录,以下是2771-2780 订阅
排序:
Designing Simulated Context-Aware Telephone in Pervasive Spaces
Designing Simulated Context-Aware Telephone in Pervasive Spa...
收藏 引用
IEEE Annual International computer software and Applications Conference (COMPSAC)
作者: Qi Yong Zhang Qingsheng He Hui Niu Yujie Institute of Computer Software and Theory School of Electronics and Information Engineering Xi''an Jiaotong University Xi'an China
Personal context information is important to enable context-aware applications in pervasive spaces. As privacy, many investigators have pointed out that it must be in the controllable state by using personal privacy p... 详细信息
来源: 评论
Towards multi-dimensional separating of NFRs in software architecture
Towards multi-dimensional separating of NFRs in software arc...
收藏 引用
International Conference on computer science and software engineering, CSSE 2008
作者: Zhang, Lin-Lin Ying, Shi Ni, You-Cong Wen, Jing Zhao, Kai Ye, Peng The State Key Lab of Software Engineering Wuhan University Wuhan China School of Information Science and Engineering Xinjiang University Urumqi China Department of Mathematics and Physics Anhui Institute of Architecture and Industry Hefei China College of Computer Science Wuhan University of Science and Engineering Wuhan China
software architecture design is an important stage in the whole software development lifecycle. Yet non-functional requirements (NFRs) have been afflicted architects for a long time and how to efficiently design and a... 详细信息
来源: 评论
A generic model for multi-dimensional separation of concerns at architecture level
A generic model for multi-dimensional separation of concerns...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Zhang, Lin-Lin Ying, Shi Ni, You-Cong Wen, Jing Zhao, Kai Ye, Peng State Key Lab. of Software Engineering Wuhan University Wuhan China School of Information Science and Engineering Xinjiang University Urumqi China Department of Mathematics and Physics Anhui Institute of Architecture and Industry Hefei China College of Computer Science Wuhan University of Science and Engineering Wuhan China
software architecture design is an important stage in the whole software development lifecycle. There are so many various concerns at architecture level which relate to all kinds of stakeholders and describe the all f... 详细信息
来源: 评论
一种基于粒子的牛顿流体与粘弹性流体统一模拟方法
一种基于粒子的牛顿流体与粘弹性流体统一模拟方法
收藏 引用
第六届智能CAD与数字娱乐学术会议
作者: Chang Yuanzhang 常元章 Liu Youquan 柳有权 Bao Kai 鲍凯 Zhu Jian 朱鉴 Wu Enhua 吴恩华 中国科学院软件研究所计算机科学国家重点实验室 北京 100190 School of Information Engineering Chang'an University Xi'an 710064 China 澳门大学科技学院电脑与资讯科学系 澳门 State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China Department of Computer and Information Science University of Macau Macao China 长安大学信息工程学院 西安710064
在越来越受到人们关注的基于物理流体的动画领域中,目前分别模拟牛顿流体或粘弹性流体的方法很多,但很少有统一模拟两者的方法。文中基于光滑粒子流体的动力学方法,通过对传统纳维-斯托克斯方程添加弹性应力项,提出了一种新的统一... 详细信息
来源: 评论
Applications of SOM2W network for stock companies comprehensive assessment
Applications of SOM2W network for stock companies comprehens...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Xuming, Han Wanli, Zuo Limin, Wang Jing, Zhang Hongzhi, Wang Jiaqiao, Liu College of Computer Science and Technology Jilin University Changchun 130012 China Institute of Information and Spreading Engineering Changchun University of Technology Changchun 130012 China Department of Information Changchun Taxation College Changchun 130117 China Software College Jilin University Changchun 130012 China
An improved model based on Kohonen neural network, called Self-Organizing Map neural network with two winners (SOM2W), is applied to assess stock companies in this paper. In addition, in order to improve the precision... 详细信息
来源: 评论
Probabilistic analysis and verification of the ASW protocol using PRISM
收藏 引用
International Journal of Network Security 2008年 第3期7卷 388-396页
作者: Islam, Salekul Abu Zaid, Mohammad Department of Computer Science and Software Engineering Concordia University 1455 De Maisonneuve Blvd. West Montreal QC H3G 1M8 Canada Concordia Institute for Information Systems Engineering Concordia University 1455 De Maisonneuve Blvd. West Montreal QC H3G 1M8 Canada
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the aid of a trusted third party in case o... 详细信息
来源: 评论
Solving Sum and Product Riddle via BDD-based model checking
Solving Sum and Product Riddle via BDD-based model checking
收藏 引用
2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Workshops, WI-IAT Workshops 2008
作者: Luo, Xiangyu Su, Kaile Sattar, Abdul Chen, Yan Tsinghua National Laboratory for Information Science and Technology School of Software Tsinghua University Beijing 100084 China Department of Computer Science Guilin University of Electronic Technology Guilin 541004 China School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Institute for Integrated and Intelligent Systems Griffith University Brisbane QLD 4111 Australia
We model the Sum and Product Riddle inpublic announcement logic, which is interpreted on an epistemic Kripke model. The model is symbolically represented as a finite state program with n agents. A model checking metho... 详细信息
来源: 评论
Functional role of pulse pressure of blood in the transcapillary exchange
Functional role of pulse pressure of blood in the transcapil...
收藏 引用
International Conference on Actual Problems of Electronic Instrument engineering (APEIE)
作者: S.N. Bagayev V.N. Zakharov V.A. Orlov S.V. Panov A.S. Ratushnyak T.A. Zapara Computer and Software Institute Nanjing University of Information Science ' Technology Nanjing Jiangsu China Department of Computer Engineering Huaiyin Institute of Technology Huaiyin Jiangsu China
In this paper, the physical mechanisms of transcapillary exchange of the living organism are investigated. Laboratory animals are the object of this investigation, and original laser and electrophysiological methods a... 详细信息
来源: 评论
Covert channel mitigation method for secure real-time database using capacity metric
收藏 引用
Tongxin Xuebao/Journal on Communications 2008年 第8期29卷 46-56页
作者: Zeng, Hai-Tao Wang, Yong-Ji Ruan, Li Zu, W. Cai, Jia-Yong Lab for Internet Software Technology Institute of Software Chinese Academy of Science Beijing 100190 China Key Laboratory for Computer Science Chinese Academy of Sciences Beijing 100190 China Graduate University Chinese Academy of Sciences Beijing 100049 China National Engineering Research Center for Fundamental Software Institute of Software Chinese Academy of Science Beijing 100190 China Integrate Information System Research Center Institute of Automation Chinese Academy of Science Beijing 100190 China
A capacity using covert channel mitigation method (CUCCMM) was proposed. This method uses capacity as metric for channel danger measure according to trusted computer system evaluation criteria (TCSEC) and multiple pro... 详细信息
来源: 评论
Goal-Driven Alignment of Services and Business Requirements
Goal-Driven Alignment of Services and Business Requirements
收藏 引用
Service-Oriented Computing: Consequences for engineering Requirements, SOCCER
作者: Andreas Gehlert Nadine Bramsiepe Klaus Pohl Software Systems Engineering Institute for Computer Science and Business Information Systems (ICB) University of Duisburg-Essen Essen Germany
The independence of services in service oriented architectures allows different providers to provide different business functionalities. As services can be used independently from each other the requirements engineer ... 详细信息
来源: 评论