咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 639 篇 工学
    • 540 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 123 篇 信息与通信工程
    • 92 篇 控制科学与工程
    • 44 篇 电气工程
    • 44 篇 电子科学与技术(可...
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 260 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 89 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 29 篇 university of ch...
  • 28 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 20 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 795 篇 英文
  • 31 篇 中文
  • 12 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
838 条 记 录,以下是291-300 订阅
排序:
Stream data classification using improved fisher discriminate analysis
Stream data classification using improved fisher discriminat...
收藏 引用
作者: Chen, Ling Zou, Ling-Jun Li, Tu Department of Computer Science Yangzhou University Yangzhou China State Key Lab. of Novel Software Tech. Nanjing University Nanjing China College of Information Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China
A modified Fisher discriminate analysis method for classifying stream data is presented. To satisfy the real-time demand in classifying stream data, this method defines a new criterion for Fisher discriminate analysis... 详细信息
来源: 评论
Independent domination on tree convex bipartite graphs
Independent domination on tree convex bipartite graphs
收藏 引用
6th International Frontiers of Algorithmics Workshop, FAW 2012 and 8th International Conference on Algorithmic Aspects of Information and Management, AAIM 2012
作者: Song, Yu Liu, Tian Xu, Ke Key Laboratory of High Confidence Software Technologies School of Electronic Engineering and Computer Science Peking University Beijing 100871 China National Lab. of Software Development Environment Beihang University Beijing 100191 China
An independent dominating set in a graph is a subset of vertices, such that every vertex outside this subset has a neighbor in this subset (dominating), and the induced subgraph of this subset contains no edge (indepe... 详细信息
来源: 评论
Circular convex bipartite graphs: Feedback vertex set
Circular convex bipartite graphs: Feedback vertex set
收藏 引用
7th International Conference on Combinatorial Optimization and Applications, COCOA 2013
作者: Lu, Zhao Lu, Min Liu, Tian Xu, Ke Key Laboratory of High Confidence Software Technologies School of Electronic Engineering and Computer Science Peking University Beijing 100871 China National Lab. of Software Development Environment Beihang University Beijing 100191 China
A feedback vertex set is a subset of vertices, such that the removal of this subset renders the remaining graph cycle-free. The weight of a feedback vertex set is the sum of weights of its vertices. Finding a minimum ... 详细信息
来源: 评论
Extending the nested parallel model to the nested dataflow model with provably efficient schedulers  16
Extending the nested parallel model to the nested dataflow m...
收藏 引用
28th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2016
作者: Dinh, David Simhadri, Harsha Vardhan Tang, Yuan Computer Science Division Univ. of California Berkeley BerkeleyCA94720 United States Computer Science Dept. Lawrence Berkeley National Lab. BerkeleyCA94720 United States School of Software Fudan Univ. Shanghai Key Lab. of Intelligent Information Processing Shanghai200433 China
The nested parallel (a.k.a. fork-join) model is widely used for writing parallel programs. However, the two composition constructs, i.e. "k" (parallel) and "k" (serial), that comprise the nested-pa... 详细信息
来源: 评论
An energy-aware protocol for data gathering applications in wireless sensor networks
An energy-aware protocol for data gathering applications in ...
收藏 引用
IEEE International Conference on Communications (ICC 2007)
作者: Liu, Ming Zheng, Yuan Cao, Jiannong Chen, Guihai Chen, Lijun Gong, Haigang School of Computer Science and Engineering University of Electronic and Technology of China China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong State Key Laboratory for Novel Software Technology Nanjing University China
Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energy of sensor nodes while meeting the requ... 详细信息
来源: 评论
Hybrid annex: An AADL extension for continuous behavior and cyber-physical interaction modeling
Hybrid annex: An AADL extension for continuous behavior and ...
收藏 引用
ACM SIGAda's Annual International Conference High Integrity Language Technology, HILT 2014
作者: Ahmad, Ehsan Larson, Brian R. Barrett, Stephen C. Zhan, Naijun Dong, Yunwei State Key Lab. of Comput. Sci. Inst. of Software Northwestern Polytechnical University Chinese Academy of Sciences China Computing and Information Systems Kansas State University ManhattanKS66506 United States State Key Lab. of Comput. Sci. Inst. of Software Chinese Academy of Sciences Beijing100190 China School of Computer Science Northwestern Polytechnical University Xi'an710129 China
Correct design, and system-level dependability prediction of highly-integrated systems demand the collocation of requirements and architectural artifacts within an integrated development environment. Hybrid systems, h... 详细信息
来源: 评论
The Embedding Path Order for Lambda-Free Higher-Order Terms
Journal of Applied Logics
收藏 引用
Journal of Applied Logics 2021年 第10期8卷 2447-2470页
作者: Bentkamp, Alexander Vrije Universiteit Amsterdam Netherlands State Key Lab. of Computer Science Institute of Software CAS Beijing China
The embedding path order, introduced in this article, is a variant of the recursive path order (RPO) for untyped λ-free higher-order terms (also called applicative first-order terms). Unlike other higher-order varian... 详细信息
来源: 评论
Dynamics of a congestion control model in a wireless access network
收藏 引用
Nonlinear Analysis: Real World Applications 2013年 第1期14卷 671-683页
作者: Dong, Tao Liao, Xiaofeng Huang, Tingwen State Key Lab. of Power Transmission Equipment and System Security College of Computer Science Chongqing University Chongqing 400044 China College of Software and Engineering Chongqing University of Posts and Telecommunications Chongqing 400065 China Texas AandM University at Qatar Doha P.O. Box 23874 Qatar
In this paper, a congestion control algorithm with heterogeneous delays in a wireless access network is considered. We regard the communication time delay as a bifurcating parameter to study the dynamical behaviors, i... 详细信息
来源: 评论
Detecting Exception Handling Bugs in C++ Programs  23
Detecting Exception Handling Bugs in C++ Programs
收藏 引用
45th IEEE/ACM International Conference on software Engineering, ICSE 2023
作者: Zhang, Hao Luo, Ji Hu, Mengze Yan, Jun Zhang, Jian Qiu, Zongyan Institute of Software Cas China Univ. of Chinese Academy of Sciences State Key Lab. of Computer Science Beijing China Univ. of Chinese Academy of Sciences Tech. Center of Softw. Eng. Beijing China Hangzhou Institute for Advanced Study Univ. of Chinese Academy of Sciences State Key Lab. of Computer Science Beijing China School of Mathematical Sciences Peking University Beijing China
Exception handling is a mechanism in modern programming languages. Studies have shown that the exception handling code is error-prone. However, there is still limited research on detecting exception handling bugs, esp... 详细信息
来源: 评论
Theory and Applications of Models of Computation  1
收藏 引用
丛书名: Lecture Notes in computer science
1000年
作者: Jin-Yi Cai S. Barry Cooper Angsheng Li
来源: 评论