咨询与建议

限定检索结果

文献类型

  • 612 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 841 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 640 篇 工学
    • 540 篇 计算机科学与技术...
    • 448 篇 软件工程
    • 123 篇 信息与通信工程
    • 93 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 215 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 111 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 13 篇 web services
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 accuracy
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy

机构

  • 91 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 school of comput...
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 791 篇 英文
  • 32 篇 中文
  • 19 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
841 条 记 录,以下是351-360 订阅
Specifying and Detecting Behavioral Changes in Source Code Using Abstract Syntax Tree Differencing
Specifying and Detecting Behavioral Changes in Source Code U...
收藏 引用
International Conference on Trustworthy Computing and Services, ISCTCS 2012
作者: Li, Yuankui Wang, Linzhang State Key Lab. for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
During the development of a software, its source code is continuously being modified. Even after the deployment, the maintenance work still involves changing the source code. Some of the modification performed on the ... 详细信息
来源: 评论
Timing Aspects Construction Using UML-MARTE Profile
Timing Aspects Construction Using UML-MARTE Profile
收藏 引用
International Conference on Trustworthy Computing and Services, ISCTCS 2012
作者: Sun, Qingqing Huang, Xiaopu Li, Jiangwei Zhang, Tian State Key Lab. for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
Modern real time embedded systems are typically composed of multiple functional and nonfunctional concerns with nonfunctional concerns affect the former in many aspects. MARTE, an extension profile of UML2, aims to be... 详细信息
来源: 评论
MDE-Based Verification of SysML state Machine Diagram by UPPAAL
MDE-Based Verification of SysML State Machine Diagram by UPP...
收藏 引用
International Conference on Trustworthy Computing and Services, ISCTCS 2012
作者: Huang, Xiaopu Sun, Qingqing Li, Jiangwei Zhang, Tian State Key Lab. for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
state Machine Diagram (SMD) is one of the SysML behavior diagrams, but it is a kind of semi-formal model language. As a consequence, models can not be verified conveniently and efficiently, especially in real-time emb... 详细信息
来源: 评论
A rate region for the interference channel with point-to-point codes
收藏 引用
International Journal of Applied Mathematics and Statistics 2013年 第24期51卷 556-565页
作者: Li, Yong Song, Xiaoxia Bai, Baoming State Key Lab. of ISN Xidian University Xi'an 710071 Shaanxi China School of Mathematics and Computer Science Shanxi Datong University Datong 037009 Shanxi China
As point-to-point codes are widely exploited by most communication systems, it's performance limits under all kinds of communication channels are very important for the communication system. In this paper, we deri... 详细信息
来源: 评论
Design and implementation of journal manuscript submission and review system based on SaaS  11
Design and implementation of journal manuscript submission a...
收藏 引用
11th IEEE International Symposium on Autonomous Decentralized systems, ISADS 2013
作者: Lai, Han Peng, Rong Cui, Jingsong Ni, Yuze Huang, Ying State Key Lab. of Software Engineering Wuhan University Wuhan China Computer School Wuhan University Wuhan China
With the pervasiveness of the success cases of SaaS applications, outsourcing the manuscript submission and review system of periodical presses to SaaS providers becomes a new trend. This study proposes a solution for... 详细信息
来源: 评论
Layered depth-of-field rendering using color spreading
Layered depth-of-field rendering using color spreading
收藏 引用
12th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2013
作者: Yu, Kai Wu, Shang Sheng, Bin Ma, Lizhuang Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
Depth of field (DoF) is a depth range outside of which objects are blurred. DoF has been widely used in photography and films by artists and is expected to be applied to realistic image rendering and virtual reality a... 详细信息
来源: 评论
Scenario-Based Behavioral Nonexistent Consistency Checking for Cyber-Physical systems
Scenario-Based Behavioral Nonexistent Consistency Checking f...
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Yan Zhang Xiangwei Liu Jin Shi Tian Zhang Zhuzhong Qian Department of Computer Science and Technology Beijing Electronic Science and Technology Institute Beijing P. R. China State Key Lab. for Novel Software TechnologyNanjing University Naniing P. R. China School of Information Management Nanjing University Nanjing P. R. China Department of Computer Science and Technology Nanjing University Nanjing P. R. China
Cyber-Physical systems (CPS) play an important role in the safety-critical systems. It is very significant to verify whether some concerned behaviors exist in a CPS. Hybrid interface automata, extension of a non-hybri... 详细信息
来源: 评论
Research on Simulation Technology Application on Higher Education for Deaf/hard-of-hearing Students in China
Research on Simulation Technology Application on Higher Educ...
收藏 引用
2014 3rd International Conference on science and Social Research
作者: Dengfeng Yao Zhili Liu Junxia Yan Yunfeng Qiu Beijing Key Laboratory of Information Service Engineering Beijing Union University Lab. of Computational Linguistics School of HumanitiesTsinghua University Special Education College Beijing Union University College of Computer Wuhan Vocational College of Software and Engineering Foreign Language College Jing Chu University of Science and Technology
In teaching of computer language, how can we improve their hearing of hearing-impaired students featured with special physiological characteristics and reduce the inconvenience and obstacles caused during teaching kno... 详细信息
来源: 评论
Tumor gene expressive data classification based on locally linear representation Fisher criterion
收藏 引用
9th International Conference on Intelligent Computing, ICIC 2013
作者: Li, Bo Tian, Bei-Bei Liu, Jin School of Computer Science and Technology Wuhan University of Science and Technology 430081 Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China State Key Lab. of Software Engineering Wuhan China
In this paper, a discriminant manifold learning method based on Locally Linear Embedding (LLE), which is named Locally Linear Representation Fisher Criterion (LLRFC), is proposed for the classification of tumor gene e... 详细信息
来源: 评论
Detecting community structure in bipartite networks based on matrix factorisation
收藏 引用
International Journal of Wireless and Mobile Computing 2013年 第6期6卷 599-607页
作者: Chen, Bo-Lun Chen, Ling Zou, Sheng-Rong Xu, Xiu-Lian Department of Computer Science Nanjing University of Aeronautics and Astronautics Nanjing 210016 China Department of Computer Science Yangzhou University Yangzhou 225009 China State Key Lab. of Novel Software Technology Nanjing University Nanjing 210093 China College of Physics Science and Technology Yangzhou University Yangzhou 225009 China
Community detection in bipartite network is very important in the research on the theory and applications of complex network analysis. In this paper, an algorithm for detecting community structure in bipartite network... 详细信息
来源: 评论