咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 222 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 637 篇 工学
    • 537 篇 计算机科学与技术...
    • 447 篇 软件工程
    • 123 篇 信息与通信工程
    • 91 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 交通运输工程
    • 17 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 9 篇 航空宇航科学与技...
  • 358 篇 理学
    • 260 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 213 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 109 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 89 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 20 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 793 篇 英文
  • 31 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是121-130 订阅
排序:
Detecting Metadata-Related Logic Bugs in Database systems via Raw Database Construction  50th
Detecting Metadata-Related Logic Bugs in Database Systems vi...
收藏 引用
50th International Conference on Very Large Data Bases, VLDB 2024
作者: Song, Jiansen Dou, Wensheng Gao, Yu Cui, Ziyu Zheng, Yingying Wang, Dong Wang, Wei Wei, Jun Huang, Tao Key Lab of System Software at CAS State Key Lab of Computer Science at Institute of Software at CAS University of CAS Beijing China Nanjing Institute of Software Technology University of CAS Nanjing China Institute of Software at CAS China
Database Management systems (DBMSs) are widely used to efficiently store and retrieve data. DBMSs usually support various metadata, e.g., integrity constraints for ensuring data integrity and indexes for locating data... 详细信息
来源: 评论
Research on unified network access control architecture
Research on unified network access control architecture
收藏 引用
IEEE 9th International Conference on computer and Information Technology, CIT 2009
作者: Liu, Yabin Zhang, Huanguo Zhang, Liqiang Zhao, Bo Computer School Wuhan University Wuhan Hubei China Key Lab. of Aerospace Information Security and Trusted Computing MOE Wuhan Hubei China State Key Lab. of Software Engineering Wuhan University Wuhan Hubei China
Border access control, network security mechanism and system access control are three separately access control procedures when user accessing the resource on network. Network access control mechanism, which adding th... 详细信息
来源: 评论
Emotional music generation using interactive genetic algorithm
Emotional music generation using interactive genetic algorit...
收藏 引用
International Conference on computer science and software Engineering, CSSE 2008
作者: Zhu, Hua Wang, Shangfei Wang, Zhen Key Lab. of Computing and Communicating Software of Anhui Province Department of Computer Science University of Science and Technology of China Hefei Anhui 230027 China
This paper proposes an approach to generate emotional music using Interactive Genetic Algorithm. Performance rules are described by the KTH rule system. Different emotional expressions can be modeled by using selectio... 详细信息
来源: 评论
Modeling and control of networked control systems with random delays
Modeling and control of networked control systems with rando...
收藏 引用
8th International Workshop on Hybrid systems: Computation and Control, HSCC 2005
作者: Wang, Yan Sun, Zeng Qi Sun, Fu Chun State Key Lab. of Intelligent Technology and Systems Department of Computer Science Tsinghua University Beijing 100084 China
This paper discusses the problems of control design and stability analysis of the networked control systems(NCSs) with random delays. The network-induced delays of the NCS are considered as interval variables governed... 详细信息
来源: 评论
A real-time attitude recognition by eye-tracking  11
A real-time attitude recognition by eye-tracking
收藏 引用
3rd International Conference on Internet Multimedia Computing and Service, ICIMCS 2011
作者: Lv, Yanpeng Wang, Shangfei Shen, Peijia Key Lab. of Computing and Communicating Software of Anhui Province School of Computer Science and Technology University of Science and Technology of China Hefei Anhui China
Attitude, which is the outward manifestation of human psychology information, is inevitable in everyday situation. Attitude recognition by artificial intelligence has become a hotspot and produced promising results in... 详细信息
来源: 评论
FedCrowd: Towards Promoting the Concurrency of the Server in Asynchronous Federated Learning  2
FedCrowd: Towards Promoting the Concurrency of the Server in...
收藏 引用
2nd International Symposium on Electrical, Electronics and Information Engineering, ISEEIE 2022
作者: Xi, Wen Liao, Yuying Zhou, Bin Wang, Haiyang Gao, Liqun College of Computer Science and Technology National University of Defence Technology Changsha China National University of Defence Technology Key Lab. of Software Engineering for Complex System Changsha China
Federated learning is a privacy-preserving machine learning paradigm where a global model is trained collab.ratively across resource-limited devices such as mobile phones, wearable devices, and sensors while the train... 详细信息
来源: 评论
Tumor gene expressive data classification based on locally linear representation Fisher criterion
Tumor gene expressive data classification based on locally l...
收藏 引用
9th International Conference on Intelligent Computing, ICIC 2013
作者: Li, Bo Tian, Bei-Bei Liu, Jin School of Computer Science and Technology Wuhan University of Science and Technology 430081 Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China State Key Lab. of Software Engineering Wuhan China
In this paper, a discriminant manifold learning method based on Locally Linear Embedding (LLE), which is named Locally Linear Representation Fisher Criterion (LLRFC), is proposed for the classification of tumor gene e... 详细信息
来源: 评论
Competition and cooperation in mainstream software evolution
Competition and cooperation in mainstream software evolution
收藏 引用
1st IEEE International Workshop on Semantic Computing and systems, WSCS 2008
作者: Chen, Guisheng Liu, Jin Wang, Junfeng Li, Bing Li, Xuhui Institute of Electronic System and Engineering of China 100039 China State Key Lab. of Software Engineering Wuhan University 430072 China School of Computer Sichuan University 430072 China
software features can be the perception of the influence of the human factors on software artifacts. This paper tends to investigate mainstream software evolution and perceive primary criterions of competition and coo... 详细信息
来源: 评论
Multi-events analysis for anomaly intrusion detection
Multi-events analysis for anomaly intrusion detection
收藏 引用
Proceedings of 2004 International Conference on Machine Learning and Cybernetics
作者: Yin, Jian Zhang, Gang Chen, Yi-Qun Fan, Xian-Li. Department of Computer Science Zhongshan University Guangzhou 510275 China State Key Lab. Novel Software T. Nanjing University Nanjing 210093 China
Probabilistic methods are widely used in intrusion detection especially in computer audit data analysis. There are many famous probabilistic algorithm such as Decision Tree, Hotelling's T2, Chi-Square, first-order... 详细信息
来源: 评论
A graph transformation based approach for modeling component-level migration in mobile environments
A graph transformation based approach for modeling component...
收藏 引用
36th Annual IEEE International computer software and Applications Conference Workshops, COMPSACW 2012
作者: Zhou, Yu Yan, Xuefeng Huang, Zhiqiu College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Component-level application migration is a lightweight solution to provide continuous services in mobile and pervasive environments. Current practices mainly leverage UMLlike notations to model the architecture and th... 详细信息
来源: 评论