咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 639 篇 工学
    • 540 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 123 篇 信息与通信工程
    • 92 篇 控制科学与工程
    • 44 篇 电气工程
    • 44 篇 电子科学与技术(可...
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 260 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 89 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 29 篇 university of ch...
  • 28 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 20 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 795 篇 英文
  • 31 篇 中文
  • 12 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
838 条 记 录,以下是371-380 订阅
排序:
Adversarial Recovery Network for Low-Light Person Re-Identification  23
Adversarial Recovery Network for Low-Light Person Re-Identif...
收藏 引用
6th International Conference on Image and Graphics Processing, ICIGP 2023
作者: Xu, Liu Wang, Xiao Yuan, Xin Mao, Zhu Xu, Xin School of Computer Science and Technology Wuhan University of Science and Technology China School of Computer Science and Technology Wuhan University of Science and Technology ChinaHubei Prov. Key Lab. of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology China
Person re-identification (re-ID), which is to connect pedestrians with the same identity in different scenarios, has been more widely used in case detection of security. The re-ID datasets and technology have contribu... 详细信息
来源: 评论
Safe Exit Controllers Synthesis for Continuous-time Stochastic systems
Safe Exit Controllers Synthesis for Continuous-time Stochast...
收藏 引用
IEEE Conference on Decision and Control
作者: Bai Xue Key Laboratory of System Software (Chinese Academy of Sciences) and State Key Lab. of Computer Science Institute of Software CAS Beijing China University of Chinese Academy of Sciences Beijing China
This paper tackles the problem of generating safe exit controllers for continuous-time systems described by stochastic differential equations (SDEs). The primary aim is to develop controllers that maximize the lower b... 详细信息
来源: 评论
Applying the value/petri process to ERP software development in China  06
Applying the value/petri process to ERP software development...
收藏 引用
28th International Conference on software Engineering 2006, ICSE '06
作者: Huang, LiGuo Boehm, Barry Hu, Hao Ge, Jidong Lü, Jian Qian, Cheng Computer Science Department University of Southern California Los Angeles CA 90089-0781 United States State Key Lab. of Novel Software Tech. Institute of Computer Software Nanjing University 210093 China Neusoft Co. Ltd. Neusoft Park Shenyang 110179 China
Commercial organizations increasingly need software processes sensitive to business value, quick to apply, and capable of early analysis for subprocess consistency and compatibility. This paper presents experience in ... 详细信息
来源: 评论
Modeling parameter interactions in ranking SVM  15
Modeling parameter interactions in ranking SVM
收藏 引用
24th ACM International Conference on Information and Knowledge Management, CIKM 2015
作者: Zhang, Yaogong Xu, Jun Lan, Yanyan Guo, Jiafeng Xie, Maoqiang Huang, Yalou Cheng, Xueqi College of Computer and Control Engineering Nankai University China CAS Key Lab. of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China College of Software Nankai University China
Ranking SVM, which formalizes the problem of learning a ranking model as that of learning a binary SVM on preference pairs of documents, is a state-of-the-art ranking model in information retrieval. The dual form solu... 详细信息
来源: 评论
3D model comparison through kernel density matching
3D model comparison through kernel density matching
收藏 引用
International Conference on Pattern Recognition
作者: Wang, Yiming Lu, Tong Gao, Rongjun Liu, Wenyin State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong JiangYin High Technology and Information Institute Nanjing University China
A novel 3D shape matching method is proposed in this paper. We first extract angular and distance feature pairs from pre-processed 3D models, then estimate their kernel densities after quantifying the feature pairs in... 详细信息
来源: 评论
A naive feature selection method and its application in network intrusion detection
A naive feature selection method and its application in netw...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Chen, Tieming Pan, Xiaoming Xuan, Yiguang Ma, Jixia Jiang, Jie College of Computer Sci. and Tech. Zhejiang University of Technology Hangzhou 310023 China State Key Lab. of Software Development Environment Beihang University Beijing 100191 China Zhejiang Key Laboratory of Information Security Hangzhou310012 China
Network intrusion detection system needs to handle huge data selected from network environments which usually contain lots of irrelevant or redundant features. It makes intrusion detection with high resource consumpti... 详细信息
来源: 评论
Pick-up tree based route recommendation from taxi trajectories
Pick-up tree based route recommendation from taxi trajectori...
收藏 引用
13th International Conference on Web-Age Information Management, WAIM 2012
作者: Hu, Haoran Wu, Zhiang Mao, Bo Zhuang, Yi Cao, Jie Pan, Jingui State Key Lab. for Novel Software Technology Nanjing University Nanjing China Jiangsu Provincial Key Laboratory of E-Business Nanjing University of Finance and Economics Nanjing China College of Computer and Information Engineering Zhejiang Gongshang University Hangzhou China
Recommending suitable routes to taxi drivers for picking up passengers is helpful to raise their incomes and reduce the gasoline consumption. In this paper, a pick-up tree based route recommender system is proposed to... 详细信息
来源: 评论
Feature-oriented writing process reproduction of Chinese calligraphic artwork  14
Feature-oriented writing process reproduction of Chinese cal...
收藏 引用
SIGGRAPH Asia 2014 Technical Briefs, SA 2014
作者: Yang, Li-Jie Xu, Tian-Chen Li, Xiao-Shan Wu, En-Hua Faculty of Science and Technology University of Macau Macao China International College Xiamen University Xiamen Fujian China State Key Lab. of CS Institute of Software Chinese Academy of Sciences Beijing China
Reproducing the writing process of ancient handwritten artworks is a popular way to appreciating and learning the expert skills of Chinese calligraphy. This paper presents a system for reappearing the writing processe... 详细信息
来源: 评论
Improved continuation power flow method for AC/DC power system
Improved continuation power flow method for AC/DC power syst...
收藏 引用
2011 IEEE Electrical Power and Energy Conference, EPEC 2011
作者: Liu, Chongru Bose, Anjan Han, Minxiao Chen, Xiuyu School of Electrical and Electronic Engineering North China Electric Power University Beijing China State Key Lab. of Power System Tsinghua University Beijing China School of Electrical Engineering and Computer Science Washington State University Pullman WA United States
An improved continuation power flow method for the AC/DC system is proposed in this paper. The three level control strategies and the coordination of the control modes for DC systems are presented. Firstly, the load-t... 详细信息
来源: 评论
An evolutionary computational method for N-connection subgraph discovery
An evolutionary computational method for N-connection subgra...
收藏 引用
18th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2006
作者: Chen, Enhong Chen, Xujia Sheu, Phillip C.-Y. Qian, Tieyun Department of CS University of Science and Technology of China Hefei Anhui China State Key Lab. of Software Engineering Wuhan University China Department of EECS University of California Irvine CA 92697 Department of Computer Science Huazhong University of Science and Technology Wuhan Hubei China
The Problem of n-connection subgraph discovery (n- CSDP for short) is to find a small sized subgraph that can well capture the relationship among the n given nodes in a large graph. However there have been very few re... 详细信息
来源: 评论