咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 223 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 635 篇 工学
    • 536 篇 计算机科学与技术...
    • 447 篇 软件工程
    • 123 篇 信息与通信工程
    • 90 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 356 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 87 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 792 篇 英文
  • 31 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是341-350 订阅
排序:
Identifying CpG islands in genome using conditional random fields
Identifying CpG islands in genome using conditional random f...
收藏 引用
8th International Conference on Intelligent Computing Technology, ICIC 2012
作者: Liu, Wei Chen, Hanwu Chen, Ling Department of Computer Science and Engineering Southeast University Nanjing 210096 China Department of Computer Science Yangzhou University Yangzhou 225127 China National Key Lab. of Novel Software Tech. Nanjing University Nanjing 210093 China
This paper presents a novel method for CpG islands location identification based on conditional random fields (CRF) model. The method transforms CpG islands location identification into the problem of sequential data ... 详细信息
来源: 评论
An interface model of software components
An interface model of software components
收藏 引用
10th International Colloquium on Theoretical Aspects of Computing, ICTAC 2013
作者: Dong, Ruzhen Zhan, Naijun Zhao, Liang Dipartmento di Informatica Università di Pisa Italy UNU-IIST China State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences China Institute of Computing Theory and Technology Xidian University China
We present an automata-based model for describing the behaviors of software components. This extends our previous work by allowing internal behaviors. In order to improve the techniques for checking if two component c... 详细信息
来源: 评论
On sweep coverage with minimum mobile sensors
On sweep coverage with minimum mobile sensors
收藏 引用
16th IEEE International Conference on Parallel and Distributed systems, ICPADS 2010
作者: Du, Junzhao Li, Yawei Liu, Hui Sha, Kewei Software Engineering Institute Xidian University Xi'an ShaanXi China State Key Lab. of ISN Xidian University Xi'an ShaanXi China Department of Computer Science Oklahoma City University Oklahoma City OK United States
For some sensor network applications, the problem of sweep coverage, which periodically covers POIs (Points of Interest) to sense events, is of importance. How to schedule minimum number of mobile sensors to achieve t... 详细信息
来源: 评论
Sleep-wakeup algorithms for virtual barriers of wireless sensor networks in 3D space
Sleep-wakeup algorithms for virtual barriers of wireless sen...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks
作者: Du, Junzhao Liu, Chang Liu, Hui Sha, Kewei Software Engineering Institute Xidian University Xi'an ShaanXi China State Key Lab. of ISN Xidian University Xi'an ShaanXi China Department of Computer Science Oklahoma City University Oklahoma City OK United States
In order to maximize the lifetime of wireless sensor networks, while ensuring the monitoring quality for specific applications, we develop the sleep-wakeup algorithms for the sensor networks. Firstly, for the three-di... 详细信息
来源: 评论
Flow based clustering algorithm for tourism search engine
Flow based clustering algorithm for tourism search engine
收藏 引用
作者: Liu, Jie Du, Junping Sun, Zengqi Jia, Yingming Beijing Key Lab. of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing China Department of Computer Science Tsinghua University Beijing China Beijing China
This paper introduces a flow based clustering algorithm for tourism search engine. Unlike the general tourism search engines such as ***, *** and *** etc. to return the users' queries huge amount of web page links... 详细信息
来源: 评论
Collab.rative Reversing of Input Formats and Program Data Structures for Security Applications
收藏 引用
China Communications 2014年 第9期11卷 135-147页
作者: ZHAO Lei Key Laboratory of Aerospace Information Security and Trust Computing Wuhan China Computer School of Wuhan University Wuhan China State Key Lab. for Novel Software Technology Nanjing University China
Reversing the syntactic format of program inputs and data structures in binaries plays a vital role for understanding program behaviors in many security *** this paper,we propose a collab.rative reversing technique by... 详细信息
来源: 评论
A Code Completion Approach Combining Pointer Network and Transformer-XL Network  19th
A Code Completion Approach Combining Pointer Network and Tr...
收藏 引用
19th EAI International Conference on Collab.rative Computing: Networking, Applications and Worksharing, Collab.rateCom 2023
作者: Zhang, Xiangping Liu, Jianxun Long, Teng Hu, Haize School of Computer Science and Engineering Hunan University of Science and Technology Hunan Xiangtan411100 China Hunan Key Lab. for Services Computing and Novel Software Technology Hunan University of Science and Technology Hunan Xiangtan411100 China
Code completion is an integral component of modern integrated development environments, as it not only facilitates the software development process but also enhances the quality of software products. By leveraging lar... 详细信息
来源: 评论
A dynamic marking method for implicit information flow in dynamic taint analysis  8
A dynamic marking method for implicit information flow in dy...
收藏 引用
8th International Conference on Security of Information and Networks, SIN 2015
作者: Wang, Xuefei Ma, Hengtai Jing, Lisha Sci. and Tech. on Integrated Information System Lab Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
Dynamic taint analysis is an important technique for tracking information flow in software and it has been widely applied in the field of software testing, debugging and vulnerability detection. However, most of the d... 详细信息
来源: 评论
The applications of generalized learning in RSIRS
The applications of generalized learning in RSIRS
收藏 引用
2004 7th International Conference on Signal Processing Proceedings, ICSP
作者: Yao, Min Shou, Zhou-Xiang Wu, Ming Zhao, Xiaoming College of Computer Zhejiang University Hangzhou 310027 China State Key Lab. Novel Software T. Nanjing University Nanjing 210093 China Dept. of Computer Taizhou University Taizhou 317000 China
Generalized learning is a kind of integrated machine learning methods, which combines symbolic learning with connective learning, fuzzy learning and evolutionlearning. This paper discusses the fundamental principle fo... 详细信息
来源: 评论
Sleep scheduling method based on half-sleep state in the distributed sensor network  9
Sleep scheduling method based on half-sleep state in the dis...
收藏 引用
9th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2014
作者: Deng, Pan Chen, Feng Yan, Biying Zhang, Jianwei Zhao, Long Wan, Jiafu Lab. of Parallel Software and Computational Science Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory of Software Development Environment Beihang University Beijing China College of Electrical Engineering and Automation Jiangxi University of Science and Technology Ganzhou China
In order to extend the sensor’s lifetime, this paper researched deeply into the sleep scheduling mechanism in the distributed sensor network. Now, the commonly used sleep scheduling methods based on the coverage have... 详细信息
来源: 评论