咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 222 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 637 篇 工学
    • 537 篇 计算机科学与技术...
    • 447 篇 软件工程
    • 123 篇 信息与通信工程
    • 91 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 交通运输工程
    • 17 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 9 篇 航空宇航科学与技...
  • 358 篇 理学
    • 260 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 213 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 109 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 89 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 20 篇 xue bai
  • 15 篇 liu jin
  • 13 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 9 篇 jianxun liu
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 793 篇 英文
  • 31 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是21-30 订阅
排序:
A facial expression model for human-like agent
A facial expression model for human-like agent
收藏 引用
2006 IEEE Conference on Robotics, Automation and Mechatronics
作者: Bin, Yang Peifa, Jia State Key Lab. of Intelligent Technology and System Department of Computer Science Tsinghua University Beijing China
A major unsolved problem in human-like agent is the construction and application of realistic human facial expression models. Human-like agents should interact with human by recognizing human facial expression and syn... 详细信息
来源: 评论
Interactive point cloud blending by drag-and-drop
收藏 引用
Journal of Zhejiang University-science A(Applied Physics & Engineering) 2007年 第10期8卷 1633-1641页
作者: ZOU Wan-hong?1, DING Zhan1, YE Xiu-zi1, CHEN Zhi-yang2 (1state key lab. of CAD and CG, School of computer science and Technology, Zhejiang University, Hangzhou 310027, China) (2software College, Zhejiang University of Technology, Hangzhou 310014, China) State Key Lab. of CAD CG School of Computer Science Technology Zhejiang University Hangzhou 310027 China Software College Zhejiang University of Technology Hangzhou 310014 China
With the rapid development of 3D digital photography and 3D digital scanning devices, massive amount of point samples can be generated in acquisition of complex, real-world objects, and thus create an urgent need for ... 详细信息
来源: 评论
Defending P2P networks based on benign worms
收藏 引用
Journal of Computational Information systems 2011年 第7期7卷 2532-2539页
作者: Liu, Xin Hu, Zhichao Liu, Guoyou Wang, Zhi Jia, Chunfu College of Information Technical Science Nankai University Tianjin 300071 China State Key Lab. for Novel Software Technology Nanjing University China
Malicious worms can be exploited to destroy the user system and launch DDoS attack against computer networks. We proposed a method of forming secure P2P network using benign worms against malicious worms. The correspo... 详细信息
来源: 评论
Detecting implicit exceptions of service-oriented application based on context
Detecting implicit exceptions of service-oriented applicatio...
收藏 引用
2010 International Conference on computer and Information Application, ICCIA 2010
作者: Jia, Xiangyang Ying, Shi Zhao, Kai Wu, Qing State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China
Implicit exceptions in service-oriented applications will result in uncertainty of system, incorrect business data, unexpected error pages, or even uncovered disaster situations. This paper proposes a context-based ap... 详细信息
来源: 评论
Automatic classification of non-functional requirements from augmented app user reviews  17
Automatic classification of non-functional requirements from...
收藏 引用
21st International Conference on Evaluation and Assessment in software Engineering, EASE 2017
作者: Lu, Mengmeng Liang, Peng State Key Lab. of Software Engineering School of Computer Science Wuhan University Luojiasha Wuhan430072 China
Context: The leading App distribution platforms, Apple App Store, Google Play, and Windows Phone Store, have over 4 million Apps. Research shows that user reviews contain abundant useful information which may help dev... 详细信息
来源: 评论
Ant routing algorithm for mobile ad-hoc networks based on adaptive improvement
Ant routing algorithm for mobile ad-hoc networks based on ad...
收藏 引用
2005 International Conference on Wireless Communications, Networking and Mobile Computing, WCNM 2005
作者: Zeng, Yuan-Yuan He, Yan-Xiang State Key Lab. of Software Engineering School of Computer Science Wuhan University Wuhan Hubei Province China
A mobile ad-hoc network is a collection of mobile nodes without any existing infrastructure or central administrator. A lot of research work has been developed to find a path between end points, which is aggravated th... 详细信息
来源: 评论
FIFAWC:a dataset with detailed annotation and rich semantics for group activity recognition
收藏 引用
Frontiers of computer science 2024年 第6期18卷 271-272页
作者: Duoxuan PEI Di HUANG Yunhong WANG State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Intelligent Recognition and Image Processing Lab. School of Computer Science and EngineeringBeihang UniversityBeijing 100191China
1 *** Activity Recognition(GAR),which aims to identify activities performed collectively in videos,has gained significant attention *** conventional action recognition centered on single individuals,GAR explores the c... 详细信息
来源: 评论
Mining the impact factors of threads and participators on usenet using link analysis
Mining the impact factors of threads and participators on us...
收藏 引用
11th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2007
作者: Hongbo, Liu Jiaxin, Wang Yannan, Zhao Zehong, Yang State Key Lab. of Intelligent Technology and System Department of Computer Science and Technology Tsinghua University Beijing China
Usenet is a world-wide distributed discussion system, and it is one of the representative resources on Internet. The structure of newsgroup on Usenet forms gradually along with the evolution of the newsgroup and could... 详细信息
来源: 评论
A kind of SND-based algorithm for self-adapting network congestion control
收藏 引用
Journal of Information and Computational science 2011年 第11期8卷 2033-2044页
作者: Zhang, Degan Hu, Yuxia Liang, Yanpin Liu, Zhaojing Tianjin Key Lab. of Intelligent Computing and Novel software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
A kind of SND-based algorithm for self-adapting network congestion control has been presented in this paper, which is for the complicated and integrated network environment that the Internet of Things (IOT) to face in... 详细信息
来源: 评论
A high-performance algorithm for frequent itemset mining
A high-performance algorithm for frequent itemset mining
收藏 引用
13th International Conference on Web-Age Information Management, WAIM 2012
作者: Qu, Jun-Feng Liu, Mengchi State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan 430072 China
Frequent itemsets, also called frequent patterns, are important information about databases, and mining efficiently frequent itemsets is a core problem in data mining area. Pattern growth approaches, such as the class... 详细信息
来源: 评论