咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 639 篇 工学
    • 540 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 123 篇 信息与通信工程
    • 92 篇 控制科学与工程
    • 44 篇 电气工程
    • 44 篇 电子科学与技术(可...
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 260 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 89 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 29 篇 university of ch...
  • 28 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 20 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 795 篇 英文
  • 31 篇 中文
  • 12 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
838 条 记 录,以下是251-260 订阅
排序:
Immune - Difference algorithm
Immune - Difference algorithm
收藏 引用
2012 International Conference on computer science and Electronics Engineering, ICCSEE 2012
作者: Fu, Xuan Liu, Hao Fan, Yaoqun Zhao, Xinchao School of Science Beijing University of Posts and Telecommunications Beijing 100876 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
This paper introduces difference mutation idea for diversified search to elitist search-based immune optimization algorithm for function optimization. The idea of difference mutation is merged into the process of clon... 详细信息
来源: 评论
Image retargeting quality assessment
Image retargeting quality assessment
收藏 引用
32nd Annual Conference on European Association for computer Graphics, EUROGRAPHICS 2011
作者: Liu, Yong-Jin Luo, Xi Xuan, Yu-Ming Chen, Wen-Feng Fu, Xiao-Lan TNList Department of Computer Science and Technology Tsinghua University China State Key Lab. of Brain and Cognitive Science Institute of Psychology Chinese Academy of Sciences China
Content-aware image retargeting is a technique that can flexibly display images with different aspect ratios and simultaneously preserve salient regions in images. Recently many image retargeting techniques have been ... 详细信息
来源: 评论
View-space meta-ball approximation by depth-independent accumulative fields  16
View-space meta-ball approximation by depth-independent accu...
收藏 引用
2016 SIGGRAPH ASIA Technical Briefs, SA 2016
作者: Xu, Tian-Chen Wu, En-Hua University of Macau China Faculty of Science and Technology University of Macau China State Key Lab. of CS Institute of Software Chinese Academy of Sciences Beijing China
This paper presents a novel approach to fast rendering realistic meta-balls in view space. Meta-ball rendering is widely used in computer graphics to represent liquid drops, and especially important to particle-based ... 详细信息
来源: 评论
Mining frequent itemsets using node-sets of a prefix-tree
Mining frequent itemsets using node-sets of a prefix-tree
收藏 引用
23rd International Conference on Database and Expert systems Applications, DEXA 2012
作者: Qu, Jun-Feng Liu, Mengchi State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan 430072 China School of Computer Science Carleton University Ottawa ON K1S 5B6 Canada
Frequent itemsets are important information about databases, and efficiently mining frequent itemsets is a core problem in data mining area. The divide-and-conquer strategy is very applicable to the problem. Most algo... 详细信息
来源: 评论
Program slicing based web-service generation and composition
Program slicing based web-service generation and composition
收藏 引用
5th IEEE International Symposium on Service-Oriented system Engineering, SOSE 2010
作者: Fu, Wei Zhang, Yingzhou Han, Wei Fan, Xiaowei Yang, Geng College of Computer Nanjing Univ. of Posts and Telecomm. Nanjing 210003 China State Key Lab. of Networking and Switching Technology Beijing Univ. of Posts and Telecomm. Beijing 100876 China State Key Lab. of Novel Software Technology Nanjing Univ. Nanjing 210093 China
As the development of web services, much attention has been drawn to web service because of its convenience and platform-independence. However, how to discover, generate and compose services has become an open issue r... 详细信息
来源: 评论
A fast algorithm for frequent itemset mining using Patricia* structures
A fast algorithm for frequent itemset mining using Patricia*...
收藏 引用
14th International Conference on Data Warehousing and Knowledge Discovery, DaWaK 2012
作者: Qu, Jun-Feng Liu, Mengchi State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan 430072 China School of Computer Science Carleton University Ottawa ON K1S 5B6 Canada
Efficient mining of frequent itemsets from a database plays an essential role in many data mining tasks such as association rule mining. Many algorithms use a prefix-tree to represent a database and mine frequent item... 详细信息
来源: 评论
Mining high utility itemsets without candidate generation  12
Mining high utility itemsets without candidate generation
收藏 引用
21st ACM International Conference on Information and Knowledge Management, CIKM 2012
作者: Liu, Mengchi Qu, Junfeng State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan 430072 China School of Computer Science Carleton University Ottawa ON K1S 5B6 Canada
High utility itemsets refer to the sets of items with high utility like profit in a database, and efficient mining of high utility itemsets plays a crucial role in many real-life applications and is an important resea... 详细信息
来源: 评论
Selection methods research based on stochastic ranking for constrained optimization
Selection methods research based on stochastic ranking for c...
收藏 引用
2012 International Conference on computer science and Electronics Engineering, ICCSEE 2012
作者: Jiang, Ling Zhao, Wei Li, Bo Qin, Yiwen Zhao, Xinchao School of Science Beijing University of Posts and Telecommunications Beijing 100876 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
This paper describes some general constrained optimization problem-solving methods at first, and then different ideas of combining particle swarm optimization with stochastic ranking are proposed. Accordingly, three a... 详细信息
来源: 评论
Research on semantic-based Web services registry federation
收藏 引用
4th International Conference on Grid and Cooperative Computing - GCC 2005
作者: Li, Bing He, Fei Liu, Wudong He, Keqing Liu, Jin State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China Graduate School of Science and Engineering Waseda University Tokyo 169-8555 Japan
Meta modeling is an effective approach to implement interoperability among distributed and heterogeneous information sources on Web. MMFI (Framework for Metamodel Interoperability) is a set of meta objects and Metamod... 详细信息
来源: 评论
A New Method for Meet-in-the-Middle Attacks on Reduced AES
收藏 引用
China Communications 2011年 第2期8卷 21-25页
作者: 董晓丽 胡予濮 韦永壮 陈杰 Key Lab. of Computer Networks & Information Security Ministry of EducationXidian University School of Information and Communication Guilin University of Electronic Technology State Key Lab. of Information Security Institute of SoftwareChinese Academy of Sciences
A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering ... 详细信息
来源: 评论