咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 639 篇 工学
    • 540 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 123 篇 信息与通信工程
    • 92 篇 控制科学与工程
    • 44 篇 电气工程
    • 44 篇 电子科学与技术(可...
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 260 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 89 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 29 篇 university of ch...
  • 28 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 20 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 795 篇 英文
  • 31 篇 中文
  • 12 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
838 条 记 录,以下是361-370 订阅
排序:
Sound and complete rules for data reification
收藏 引用
science in China, Series E: Technological sciences 1997年 第4期40卷 x7-386页
作者: Ju, Jian State Key Lab. Novel Software T. Institute of Computer Software Nanjing University Nanjing 210093 China
The sound and complete rules for data reification in the algebraic framework are discussed. Based on these rules, the retrieve function approach in VDM is extended and the biased model and non-determinacy can be treat... 详细信息
来源: 评论
FSCR:A Feature selection method for software defect prediction  29
FSCR:A Feature selection method for software defect predicti...
收藏 引用
29th International Conference on software Engineering and Knowledge Engineering, SEKE 2017
作者: Yu, Xiao Ma, Ziyi Ma, Chuanxiang Gu, Yi Liu, Ruiqi Zhang, Yan State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China School of Computer Science and Information Engineering HuBei University Wuhan China Educational Informationalization Engineering Research Center of HuBei Province Wuhan China International School of Software Wuhan University Wuhan China
Prediction the number of faults in software modules can be more helpful instead of predicting the modules being faulty or non-faulty. Some regression models have been used for predicting the number of faults. However,... 详细信息
来源: 评论
An efficient algorithm for finding frequent items in a stream
An efficient algorithm for finding frequent items in a strea...
收藏 引用
2nd International Symposium on Electronic Commerce and Security, ISECS 2009
作者: Tu, Li Chen, Ling Zhang, Shan Department of Computer Science Institute of Information Science and Technology Jiangyin Polytechnic College Nanjing Jiangyin China Department of Computer Science National Key Lab. of Novel Software Tech. Yangzhou University Yangzhou Nanjing China Department of Computer Science Yangzhou University Yangzhou China
Most of the existing algorithms for mining frequent items over data streams do not emphasis the importance of the more recent data items. We present an efficient algorithm where a fading factor λ is used for computin... 详细信息
来源: 评论
Adaptive resource allocation for preemptable jobs in cloud systems
Adaptive resource allocation for preemptable jobs in cloud s...
收藏 引用
2010 10th International Conference on Intelligent systems Design and Applications, ISDA'10
作者: Li, Jiayin Qiu, Meikang Niu, Jian-Wei Chen, Yu Ming, Zhong Department of Electrical and Computer Engineering University of Kentucky Lexington KY 40506 United States State Key Lab. of Software Develop. Environment Beihang University Beijing 100191 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China College of Computer Science and Software Shenzhen University Shenzhen 518060 China
In cloud computing, computational resources are provided to remote users in the form of leases. For a cloud user, he/she can request multiple cloud services simultaneously. In this case, parallel processing in the clo... 详细信息
来源: 评论
Hierarchical timed automata based verification of dynamic evolution process in open environments
Hierarchical timed automata based verification of dynamic ev...
收藏 引用
2014 International Conference on software and systems Process, ICSSP 2014
作者: Zhou, Yu Ge, Jidong Zhang, Pengcheng College of Computer Science Nanjing University of Aeronautics and Astronautics Nanjing 210016 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China College of Computer and Information Hohai University Xikang Road 1 Nanjing 210098 China
The paper proposes a novel approach based on the hierarchical timed automata to verify the consistency of dynamic evolution process. Different from traditional approaches, it investigates the problem from the behavior... 详细信息
来源: 评论
Tele-AR system based on real-time camera tracking
Tele-AR system based on real-time camera tracking
收藏 引用
2012 International Conference on Virtual Reality and Visualization, ICVRV 2012
作者: Wang, Yanke Zhong, Fan Li, Chao Xiang, Hui Peng, Qunsheng Qin, Xueying School of Computer Science and Technology Shandong University Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan China State Key Lab. of CAD and CG Zhejiang University Hangzhou China
We propose a visual tele-AR system, which is a combination of tele-existence and AR techniques. By wearing a video see-through HMD and moving his head, a user in this system is able to tele-operate a remote pan-tilt p... 详细信息
来源: 评论
Container lifecycle-aware scheduling for serverless computing
Container lifecycle-aware scheduling for serverless computin...
收藏 引用
作者: Wu, Song Tao, Zhiheng Fan, Hao Huang, Zhuo Zhang, Xinmin Jin, Hai Yu, Chen Cao, Chun National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Elastic scaling in response to changes on demand is a main benefit of serverless computing. When bursty workloads arrive, a serverless platform launches many new containers and initializes function environments (known... 详细信息
来源: 评论
A watermark-aware trusted running environment for software clouds
A watermark-aware trusted running environment for software c...
收藏 引用
5th Annual ChinaGrid Conference, ChinaGrid 2010
作者: Fu, Junning Wang, Chaokun Yu, Zhiwei Wang, Jianmin Sun, Jia-Guang School of Software Tsinghua University Beijing 100084 China Tsinghua University Key Lab. for Information System Security School of Software TNLIST Beijing 100084 China Dept. of Computer Sci. and Tech. Tsinghua University Beijing 100084 China
A software cloud is ready-made for software delivery or software as a Service (SaaS). As it becomes more and more popular, security problems of software running in the cloud also become an important issue. The threats... 详细信息
来源: 评论
Optimized strategies of grid information services
Optimized strategies of grid information services
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Fan, Qingfeng Wu, Qiongli He, Yanxiang Huang, Jingwei School of Computer Wuhan University China School of Computer City University of Hong Kong Hong Kong School of Electronic Information Engineering Wuhan University China State Key Lab. of Software Engineering Wuhan University China
Grid Computing receives growing attention from scientists and scholars these years, of which Grid Information Service is the highlight and one of the most difficult subjects. Grid Information Service is characterized ... 详细信息
来源: 评论
Transportation strategies of the data grid
Transportation strategies of the data grid
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Fan, Qingfeng Wu, Qiongli He, Yanxiang Huang, Jingwei School of Computer Wuhan University China School of Computer City University of Hong Kong Hong Kong School of Electronic Information Engineering Wuhan University China State Key Lab. of Software Engineering Wuhan University China
Data Grid is one of the important research fields for Grid Computing, To improve the system efficiency, this paper puts forward the strategies of ring replication and thread replication. Compared with many other repli... 详细信息
来源: 评论