咨询与建议

限定检索结果

文献类型

  • 612 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 841 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 640 篇 工学
    • 540 篇 计算机科学与技术...
    • 448 篇 软件工程
    • 123 篇 信息与通信工程
    • 93 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 215 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 111 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 13 篇 web services
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 accuracy
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy

机构

  • 91 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 school of comput...
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 791 篇 英文
  • 32 篇 中文
  • 19 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
841 条 记 录,以下是431-440 订阅
排序:
Modeling the locality in graph traversals
Modeling the locality in graph traversals
收藏 引用
41st International Conference on Parallel Processing, ICPP 2012
作者: Yuan, Liang Ding, Chen Štefankovič, Daniel Zhang, Yunquan Lab. of Parallel Software and Computational Science Institute of Software Chinese Academy of Sciences China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China Graduate University of Chinese Academy of Sciences China Computer Science Department University of Rochester United States
An increasing number of applications in physical and social sciences require the analysis of large graphs. The efficiency of these programs strongly depends on their memory usage especially the locality of graph data ... 详细信息
来源: 评论
RGH: An efficient RSU-aided group-based hierarchical privacy enhancement protocol for VANETs
RGH: An efficient RSU-aided group-based hierarchical privacy...
收藏 引用
13th International Conference on Web-Age Information Management, WAIM 2012
作者: Yang, Tao Kong, Lingbo Yu, Liangwen Hu, Jianbin Chen, Zhong MoE Key Lab. of High Confidence Software Technologies Peking University 100871 Beijing China MoE Key Lab. of Computer Networks and Information Security Peking University 100871 Beijing China School of Electronics Engineering and Computer Science Peking University 100871 Beijing China School of Software Engineering Beijing Jiaotong University 100044 Beijing China
VANETs are gaining significant prominence from both academia and industry in recent years. In this paper, we introduce an Efficient RSU-aided Group-based Hierarchical Privacy Enhancement Protocol for VANETs. The proto... 详细信息
来源: 评论
Business rule engine-based framework for SaaS application development
Business rule engine-based framework for SaaS application de...
收藏 引用
2nd International Conference on Cloud Computing and Services science, CLOSER 2012
作者: Zhang, Xiuwei He, Keqing Wang, Jian Wang, Chong Li, Zheng State Key Lab. of Software Engineering Wuhan University Wuhan China Computer School Wuhan University Wuhan China 94005 Troops of PLA Jiuquan China
software as a Service (SaaS) is becoming a new direction of software industry in the new cloud computing era. In order to satisfy business policy changes and personalized requirements from different tenants in SaaS ap... 详细信息
来源: 评论
Tag ranking by propagating relevance over tag and image graphs  12
Tag ranking by propagating relevance over tag and image grap...
收藏 引用
4th International Conference on Internet Multimedia Computing and Service, ICIMCS 2012
作者: Li, Minxian Tang, Jinhui Li, Haojie Zhao, Chunxia School of Computer Science and Technology Nanjing University of Science and Technology Nan Jing China State Key Lab. for Novel Software Technology Nanjing University Nan Jing China School of Software Dalian University of Technology Dalian China
In this paper, we explore the problem of tag ranking by propagating relevance over community-contributed images and their associated tags. To rank the tags more accurately, we propose a novel tag ranking scheme throug... 详细信息
来源: 评论
Immune - Difference algorithm
Immune - Difference algorithm
收藏 引用
2012 International Conference on computer science and Electronics Engineering, ICCSEE 2012
作者: Fu, Xuan Liu, Hao Fan, Yaoqun Zhao, Xinchao School of Science Beijing University of Posts and Telecommunications Beijing 100876 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
This paper introduces difference mutation idea for diversified search to elitist search-based immune optimization algorithm for function optimization. The idea of difference mutation is merged into the process of clon... 详细信息
来源: 评论
Mining frequent itemsets using node-sets of a prefix-tree
Mining frequent itemsets using node-sets of a prefix-tree
收藏 引用
23rd International Conference on Database and Expert systems Applications, DEXA 2012
作者: Qu, Jun-Feng Liu, Mengchi State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan 430072 China School of Computer Science Carleton University Ottawa ON K1S 5B6 Canada
Frequent itemsets are important information about databases, and efficiently mining frequent itemsets is a core problem in data mining area. The divide-and-conquer strategy is very applicable to the problem. Most algo... 详细信息
来源: 评论
A fast algorithm for frequent itemset mining using Patricia* structures
A fast algorithm for frequent itemset mining using Patricia*...
收藏 引用
14th International Conference on Data Warehousing and Knowledge Discovery, DaWaK 2012
作者: Qu, Jun-Feng Liu, Mengchi State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan 430072 China School of Computer Science Carleton University Ottawa ON K1S 5B6 Canada
Efficient mining of frequent itemsets from a database plays an essential role in many data mining tasks such as association rule mining. Many algorithms use a prefix-tree to represent a database and mine frequent item... 详细信息
来源: 评论
Mining high utility itemsets without candidate generation  12
Mining high utility itemsets without candidate generation
收藏 引用
21st ACM International Conference on Information and Knowledge Management, CIKM 2012
作者: Liu, Mengchi Qu, Junfeng State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan 430072 China School of Computer Science Carleton University Ottawa ON K1S 5B6 Canada
High utility itemsets refer to the sets of items with high utility like profit in a database, and efficient mining of high utility itemsets plays a crucial role in many real-life applications and is an important resea... 详细信息
来源: 评论
Selection methods research based on stochastic ranking for constrained optimization
Selection methods research based on stochastic ranking for c...
收藏 引用
2012 International Conference on computer science and Electronics Engineering, ICCSEE 2012
作者: Jiang, Ling Zhao, Wei Li, Bo Qin, Yiwen Zhao, Xinchao School of Science Beijing University of Posts and Telecommunications Beijing 100876 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
This paper describes some general constrained optimization problem-solving methods at first, and then different ideas of combining particle swarm optimization with stochastic ranking are proposed. Accordingly, three a... 详细信息
来源: 评论
Stock market volatility prediction: A service-oriented multi-kernel learning approach
Stock market volatility prediction: A service-oriented multi...
收藏 引用
2012 IEEE 9th International Conference on Services Computing, SCC 2012
作者: Wang, Feng Liu, Ling Dou, Chenxiao State Key Lab. of Software Engineering Wuhan University Wuhan China College of Computing Georgia Institute of Technology Atlanta GA United States School of Computer Science Wuhan University Wuhan China
Stock market is an important and active part of nowadays financial markets. Stock time series volatility analysis is regarded as one of the most challenging time series forecasting due to the hard-to-predict volatilit... 详细信息
来源: 评论