咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 222 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 637 篇 工学
    • 537 篇 计算机科学与技术...
    • 447 篇 软件工程
    • 123 篇 信息与通信工程
    • 91 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 交通运输工程
    • 17 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 9 篇 航空宇航科学与技...
  • 358 篇 理学
    • 260 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 213 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 109 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 89 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 20 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 793 篇 英文
  • 31 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是131-140 订阅
排序:
A method for avoiding the feedback searching bias in ant colony optimization
A method for avoiding the feedback searching bias in ant col...
收藏 引用
3rd International Conference on Swarm Intelligence, ICSI 2012
作者: Chen, Bolun Chen, Ling Department of Computer Science Yangzhou University Yangzhou 225127 China State Key Lab. of Novel Software Tech. Nanjing University Nanjing 210093 China
One of the obstacles in applying ant colony optimization (ACO) to the combinatorial optimization is that the search process is sometimes biased by algorithm features such as the pheromone model and the solution constr... 详细信息
来源: 评论
Image structure adaptive gradient vector flow for active contours
Image structure adaptive gradient vector flow for active con...
收藏 引用
2009 International Conference on Information Engineering and computer science, ICIECS 2009
作者: Li, Kun Wang, Yuanquan Tianjin Key Lab. of Intelligent Computing and Novel Software Technology School of Computer Science Tianjin University of Technology Tianjin 300191 China
The gradient vector flow (GVF) is an effective external force for active contours, but it's smoothness constraint doesn't take any image structure into account and the resulting diffusion equation is isotropic... 详细信息
来源: 评论
High speed architecture of arithmetic coder
High speed architecture of arithmetic coder
收藏 引用
IEEE International Conference on computer science and Automation Engineering (CSAE)
作者: Liu, Kai Xu, Chao School of Computer Science and Technology Xidian University Xi'an 710071 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
A high speed arithmetic coder architecture is proposed in this paper. An out-of-order execution mechanism for different types of context is used that can allocate the context symbol to the idle arithmetic coding core ... 详细信息
来源: 评论
Active BSVM learning for relevance feedback in content-based sketch retrieval
Active BSVM learning for relevance feedback in content-based...
收藏 引用
5th IASTED International Conference on Signal Processing, Pattern Recognition, and Applications, SPPRA 2008
作者: Liang, Shuang Sun, Zhengxing State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
The availab.lity of relevance feedback is held back by the problem of the imbalance and limited size of lab.led training data, as well as the real-time requirement of online interaction demands. In this paper, we prop... 详细信息
来源: 评论
Research and implementation on Web Image Cleaning
Research and implementation on Web Image Cleaning
收藏 引用
2002 IEEE International Conference on systems, Man and Cybernetics
作者: Zheng, Gang Wang, Ji-Cheng Zhou, Yuan Yuan Zhang, Fu-Yan Stt. Key Lab. Novell Software T. Department of Computer Science Nanjing University Nanjing Jiangsu 210093 China
For special purposes such as improving accuracy of Web image retrieval and indexing, it is worth dwelling on how to separate different types of images from Web pages. In this paper, we put forward the concept of Web I... 详细信息
来源: 评论
Web opinion mining based on sentiment phrase classification vector
Web opinion mining based on sentiment phrase classification ...
收藏 引用
2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010
作者: Han, Pengcheng Du, Junping Chen, Liping Beijing Key Lab. of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
Opinion mining is an important research area of web data mining. As it is related to natural language process and data mining, opinion mining is very challenging. This paper presents a web opining mining algorithm bas... 详细信息
来源: 评论
Test case generation based on program invariant and adaptive random algorithm
Test case generation based on program invariant and adaptive...
收藏 引用
2011 International Conference on computer science and Education, CSE 2011
作者: Yuan, Yuan Fanping, Zeng Guanmiao, Zhu Chaoqiang, Deng Neng, Xiong Department of Computer University of Science and Technology of China China Anhui Province Key Lab. of Software in Computing and Communication Hefei Anhui China
Testing is a critical activity to find software errors. And choosing an effective test suite is the key problem in software testing area. Program invariant, as an attribute of program, can record the implementation st... 详细信息
来源: 评论
A simulative platform that evaluates the energy save rate of the street lamp system based on JiST/STRAW
A simulative platform that evaluates the energy save rate of...
收藏 引用
1st International Conference on Instrumentation and Measurement, computer, Communication and Control, IMCCC2011
作者: Yang, Tao Wang, Yinyang Xiong, Hu Yu, Liangwen Deng, Yong Hu, Jianbin Chen, Zhong School of Electronics Engineering and Computer Science Peking University Beijing 100871 China MoE Key Lab. of High Confidence Software Technologies Peking University Beijing 100871 China MoE Key Lab. of Network and Software Assurance Peking University Beijing 100871 China
With the society's advocacy of "low-carbon energy-saving" way of life, saving energy has been a heated topic. Although the street lamp is an indispensable part of the basic facilities of a city, its larg... 详细信息
来源: 评论
Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols
Pseudo trust: Zero-knowledge based authentication in anonymo...
收藏 引用
21st International Parallel and Distributed Processing Symposium, IPDPS 2007
作者: Lu, Li Han, Jinsong Hu, Lei Huai, Jinpeng Liu, Yunhao Ni, Lionel M. State Key Lab. of Information Security Graduate School Chinese Academy of Sciences Beijing China Dept. of Computer Science and Engineering Hong Kong University of Science and Technology Kowloon Hong Kong School of Computer Science Beihang University Beijing China State Key Lab. of Software Developing Environment Beihang University Beijing China
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence, there exists an inhere... 详细信息
来源: 评论
VLSP: Enabling location privacy in vehicular location based services
VLSP: Enabling location privacy in vehicular location based ...
收藏 引用
1st International Conference on Instrumentation and Measurement, computer, Communication and Control, IMCCC2011
作者: Yang, Tao Tang, Cong Yu, Liangwen Xin, Wei Deng, Yong Hu, Jianbin Chen, Zhong School of Electronics Engineering and Computer Science Peking University Beijing 100871 China MoE Key Lab. of High Confidence Software Technologies Peking University Beijing 100871 China MoE Key Lab. of Network and Software Assurance Peking University Beijing 100871 China
In this paper, we present VLSP, a Vehicular Location based Service with Privacy grantees. In VLSP, we assume the service provider is untrusted and users do not have pre-established social relationships with each other... 详细信息
来源: 评论