咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 639 篇 工学
    • 540 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 123 篇 信息与通信工程
    • 92 篇 控制科学与工程
    • 44 篇 电气工程
    • 44 篇 电子科学与技术(可...
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 260 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 89 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 29 篇 university of ch...
  • 28 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 20 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 795 篇 英文
  • 31 篇 中文
  • 12 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
838 条 记 录,以下是421-430 订阅
排序:
Motion estimation for a mobile robot based on real-time stereo vision system
Motion estimation for a mobile robot based on real-time ster...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Zhongli, Wang Xueshan, Gao Baochang, Zhang Hao, Wu State Key Lab. of Robotics and System Harbin Institute of Technology Harbin China School of Computer Science Beijing Institute of Technology Beijing China Intelligent Robotics Institute Beijing Institute of Technology Beijing China School of Automation Science and Electric Engineering Beihang University Beijing China
Vision-based motion estimation is a key technique in autonomously mobile robot. This paper presents an integrated method for motion estimation of the mobile robot based on floor plane extraction. The whole processes i... 详细信息
来源: 评论
Attention-Based Knowledge-aware Multi-Interest Intelligent Model for Sequential Recommendation  19
Attention-Based Knowledge-aware Multi-Interest Intelligent M...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalab.e Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Li, Yang Li, Qianmu Meng, Shunmei Hou, Jun Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing China Wuyi University Intelligent Manufacturing Department Jiangmen China Nanjing University State Key Lab. for Novel Software Technology Nanjing China Nanjing Vocational University of Industry Technology School of Social Science Nanjing China
As a fundamental means of intelligent service, recommender systems have shown a trend of diversification. Sequential recommendation, a class of time-aware methods, aims to predict the user's next click. Multi-inte... 详细信息
来源: 评论
Concrete Structural Crack Damage Classification Using Nonlinear Dimension Reduction and Broad Learning system
Concrete Structural Crack Damage Classification Using Nonlin...
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Wang, Bingshu Lin, Jia Zhuang, Xiaodong Zhang, Guanghui Chen, C.L. Philip School of Software Northwestern Polytechnical University Xi'an China Shenzhen University Guangdong Key Lab. of Intelligent Info. Processing and Shenzhen Key Laboratory of Media Security Shenzhen China School of Computer Science and Technology Shandong University Qingdao China School of Computer Science and Engineering South China University of Technology Guangzhou China
Concrete structural crack damage classification is of importance for road safety. This paper proposes a new method based on broad neural network for crack damage classification in concrete structures. It includes thre... 详细信息
来源: 评论
Combing data filter and data sampling for cross- Company defect prediction: An empricial study  29
Combing data filter and data sampling for cross- Company def...
收藏 引用
29th International Conference on software Engineering and Knowledge Engineering, SEKE 2017
作者: Yu, Xiao Wu, Man Zhang, Yan Fu, Mandi State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China School of Computer Science and Information Engineering HuBei University Wuhan China Educational Informationalization Engineering Research Center of HuBei Province Wuhan China Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Wuhan China
Cross-company defect prediction (CCDP) is a practical way that trains a prediction model by exploiting one or multiple projects of a source company and then applies the model to target company. Unfortunately, larger i... 详细信息
来源: 评论
Quantified Dynamic Metric Temporal Logic for Dynamic Networks of Stochastic Hybrid Automata
Quantified Dynamic Metric Temporal Logic for Dynamic Network...
收藏 引用
International Conference on Application of Concurrency to system Design
作者: Alexandre David Kim G. Larsen Axel Legay Guangyuan Li Danny Bøgsted Poulsen Department of Computer Science Aalborg University State Key Lab. of Computer Science Chinese Academy of Sciences
Multiprocessing systems are capable of running multiple processes concurrently. By now such systems have established themselves as the defacto standard for operating systems. At the core of an operating system is the ... 详细信息
来源: 评论
Detecting infeasible traces in process models
Detecting infeasible traces in process models
收藏 引用
14th International Conference on Enterprise Information systems, ICEIS 2012
作者: Wang, Zhaoxia Wen, Lijie Zhu, Xiaochen Liu, Yingbo Wang, Jianmin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Lab. for Information System Security Ministry of Education Beijing 100084 China National Laboratory for Information Science and Technology Beijing 100084 China Logistical Engineering University Chongqing 400016 China
Workflow testing is an important method of workflow analysis in design time. A challenging problem with trace-oriented test data generation in particular and trace-based workflow analysis in general is the existence o... 详细信息
来源: 评论
Using class imbalance learning for cross-company defect prediction  29
Using class imbalance learning for cross-company defect pred...
收藏 引用
29th International Conference on software Engineering and Knowledge Engineering, SEKE 2017
作者: Yu, Xiao Zhou, Mingsong Chen, Xu Deng, Lijun Wang, Lu State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China Department of Information Science and Technology Beijing Normal University Beijing China College of Business City University of Hong Kong Kowloon Tong Hong Kong School of Computer Science and Information Engineering HuBei University Wuhan China
Cross-company defect prediction (CCDP) is a practical way that trains a prediction model by exploiting one or multiple projects of a source company and then applies the model to target company. Unfortunately, the perf... 详细信息
来源: 评论
Automatic semantic web service composition via agent intention execution in AgentSpeak  07
Automatic semantic web service composition via agent intenti...
收藏 引用
IEEE/WIC/ACM International Conference on Web Intelligence, WI 2007
作者: Li, Huan Yu, Fan Qin, Zheng Qin, Jun Yang, Bo Dep. of Computer Science and Technology Xian JiaoTong University Dongguan University of Technology Key Lab. for ISS of MOE Software School Tsinghua University Dep. of Computer Science and Technology Xian JiaoTong University Tsinghua University Manchester Business School Dep. of Computer Science and Technology Xian JiaoTong University
AI planning is the main stream method for automatic semantic web service composition (SWSC) research. However, planning based SWSC method can only return service composition upon user requirement description and lacks... 详细信息
来源: 评论
Dynamic Detection of AsyncTask Related Defects
Dynamic Detection of AsyncTask Related Defects
收藏 引用
IEEE International Conference on software Quality, Reliability and Security (QRS)
作者: Qing Liu Linjie Pan Baoquan Cui Jun Yan Jian Zhang State Key Lab. of Computer Science Institute of Software CAS University of Chinese Academy of Sciences Technology Center of Software Engineering Institute of Software CAS
As a widely used Android asynchronous component, AsyncTask is used to run time-consuming tasks. However, the misuse of AsyncTask will cause defects, i.e., crashes and memory leaks. Based on static analysis, existing a... 详细信息
来源: 评论
RFID Reader Planning for the Surveillance of Predictable Mobile Objects
收藏 引用
Procedia computer science 2018年 129卷 475-481页
作者: Weiping Zhu Mingzhe Li School of Computer Science Wuhan University P.R. China State Key Lab. for Novel Software Technology Nanjing University P.R. China
The surveillance of mobile objects is important for many applications in public security, logistics, traffic control, etc. Multiple RFID (Radio frequency identification) readers can be placed in the given region to fu... 详细信息
来源: 评论