咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 639 篇 工学
    • 540 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 123 篇 信息与通信工程
    • 92 篇 控制科学与工程
    • 44 篇 电气工程
    • 44 篇 电子科学与技术(可...
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 260 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 89 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 29 篇 university of ch...
  • 28 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 20 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 795 篇 英文
  • 31 篇 中文
  • 12 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
838 条 记 录,以下是391-400 订阅
排序:
Shape context with bilinear interpolation
Shape context with bilinear interpolation
收藏 引用
2010 2nd International Conference on Signal Processing systems, ICSPS 2010
作者: Yan, Bin Li, Shao-Zi Su, Song-Zhi Dept. of Cognitive Science Xiamen University Fujian 361005 China Fujian Key Lab. of Brain-Like Intelligent System Xiamen Fujian 361005 China Dept. of Computer Science Xiamen University Fujian 361005 China
Shape context is intended to be a way of describing shapes that allows for measuring shape similarity and recovering point correspondences. It is widely used in object recognition, and gets encouraging performance. Bu... 详细信息
来源: 评论
A generic model for multi-dimensional separation of concerns at architecture level
A generic model for multi-dimensional separation of concerns...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Zhang, Lin-Lin Ying, Shi Ni, You-Cong Wen, Jing Zhao, Kai Ye, Peng State Key Lab. of Software Engineering Wuhan University Wuhan China School of Information Science and Engineering Xinjiang University Urumqi China Department of Mathematics and Physics Anhui Institute of Architecture and Industry Hefei China College of Computer Science Wuhan University of Science and Engineering Wuhan China
software architecture design is an important stage in the whole software development lifecycle. There are so many various concerns at architecture level which relate to all kinds of stakeholders and describe the all f... 详细信息
来源: 评论
Reach-avoid differential games based on invariant generation
arXiv
收藏 引用
arXiv 2018年
作者: Xue, Bai Wang, Qiuye Zhan, Naijun Fränzle, Martin Feng, Shenghua State Key Lab. of Computer Science Institute of Software Cas Carl von Ossietzky Universität Oldenburg
Reach-avoid differential games play an important role in collision avoidance, motion planning and control of aircrafts, and related applications. The central problem is the computation of the set of initial states fro... 详细信息
来源: 评论
Evaluating coverage quality through best covered pathes in wireless sensor networks
Evaluating coverage quality through best covered pathes in w...
收藏 引用
IEEE/ACM International Symposium on Quality of Service
作者: Tang, ShaoJie Mao, XuFei Li, Xiang-Yang Dai, Guojun Dept. of Computer Science Illinois Institute of Technology Chicago IL United States Beijing Key Lab. of Intelligent Telecommunications Software and Multimedia BUPT Beijing China Institute of Computer Application Technology Hangzhou Dianzi University Hangzhou China
Coverage quality is one critical metric to evaluate the Quality of Service (QoS) provided by wireless sensor networks. In this paper, we address maximum support coverage problem (a.k.a. best case coverage) in wireless... 详细信息
来源: 评论
An insightful program performance tuning chain for GPU computing
An insightful program performance tuning chain for GPU compu...
收藏 引用
12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012
作者: Jia, Haipeng Zhang, Yunquan Long, Guoping Yan, Shengen Lab. of Parallel Software and Computational Science Institute of Software Chinese Academy of Sciences China College of Information Science and Engineering Ocean University of China China State Key Laboratory of Computing Science Chinese Academy of Sciences China Graduate University of Chinese Academy of Sciences China
It is challenging to optimize GPU kernels because this progress requires deep technical knowledge of the underlying hardware. Modern GPU architectures are becoming more and more diversified, which further exacerbates ... 详细信息
来源: 评论
Success factors in Mobile Social Networking application development: Case study of instagram  14
Success factors in Mobile Social Networking application deve...
收藏 引用
29th Annual ACM Symposium on Applied Computing, SAC 2014
作者: Peng, Rong Sun, Dong Tsai, Wei-Tek State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan City Hubei Province 470032 China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ 85287 United States
The distinguished features of mobile computing bring both opportunities and challenges to the development of Mobile Social Networking (MSN) applications. Learning the successful experiences from existing MSN applicati... 详细信息
来源: 评论
Energy and thermal aware mapping for mesh-based NoC architectures using multi-objective ant colony algorithm
Energy and thermal aware mapping for mesh-based NoC architec...
收藏 引用
IEEE International Conference on computer Research and Development
作者: Liu, Yanhua Ruan, Ying Lai, Zongsheng Jing, Weiping Dept. of Electronic Computer and Software Systems Institute of Microelectronics Circuit and System East China Normal University Shanghai China Dept. of Electronic Engineering Jiangsu Provincial Key Lab. of ASIC Design Nantong University Nantong China
Where IP cores to be mapped must be carefully solved for any given application in order to optimize different performance metrics in Network-on-Chip (NoC) design flow. The optimization of different performance metrics... 详细信息
来源: 评论
Anomaly detection by clustering in the network
Anomaly detection by clustering in the network
收藏 引用
2009 International Conference on Computational Intelligence and software Engineering, CiSE 2009
作者: Guo, Feng Yang, Yingzhen Duan, Lian Pervasive Computing Lab. College of Computer Science Zhejiang University Hangzhou China State Key Lab. of CAD and CG Zhejiang University Iowa City IA United States Department of Management Science Henry B. Tippie College of Business University of Iowa Iowa City IA United States
Intrusions impose serious security threat to network environment, so it is necessary to detect and cope with them. Many intrusion detection methods focus on signature detection, where models are built to recognize kno... 详细信息
来源: 评论
Reduction criteria for probabilistic models with spatial restrictions on states
Reduction criteria for probabilistic models with spatial res...
收藏 引用
2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010
作者: Jun, Niu Zeng, Guosun Department of Computer Science and Technology Tongji University Shanghai China College of Information Engineering Zhejiang Business Technology Institute Ningbo China Embedded System and Service Computing Key Lab. of Ministry of Education Shanghai China
Partial order reduction techniques have been used to combat the state explosion problem in model checking procedures for concurrent systems with probabilistic behaviors. There are some results that give criteria on ap... 详细信息
来源: 评论
An integrated algorithm based on artificial bee colony and particle swarm optimization
An integrated algorithm based on artificial bee colony and p...
收藏 引用
International Conference on Natural Computation
作者: Shi, Xiaohu Li, Yanwen Li, Haijun Guan, Renchu Wang, Liupu Liang, Yanchun College of Computer Science and Technology Jilin University Jilin Changchun 130012 China State Key Lab. for Novel Software Technology Nanjing University Jiangsu Nanjing 210093 China College of Computer Northeast Normal University Changchun 130117 China School of Computer Science Yantai University Shandong Yantai 264005 China
Based on particle swarm optimization (PSO) and artificial bee colony (ABC), a novel hybrid swarm intelligent algorithm is developed in this paper. Two information exchanging processes are introduced to share valuable ... 详细信息
来源: 评论