咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 223 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 635 篇 工学
    • 535 篇 计算机科学与技术...
    • 446 篇 软件工程
    • 123 篇 信息与通信工程
    • 90 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 87 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 792 篇 英文
  • 31 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是431-440 订阅
排序:
Mining high utility itemsets without candidate generation  12
Mining high utility itemsets without candidate generation
收藏 引用
21st ACM International Conference on Information and Knowledge Management, CIKM 2012
作者: Liu, Mengchi Qu, Junfeng State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan 430072 China School of Computer Science Carleton University Ottawa ON K1S 5B6 Canada
High utility itemsets refer to the sets of items with high utility like profit in a database, and efficient mining of high utility itemsets plays a crucial role in many real-life applications and is an important resea... 详细信息
来源: 评论
Selection methods research based on stochastic ranking for constrained optimization
Selection methods research based on stochastic ranking for c...
收藏 引用
2012 International Conference on computer science and Electronics Engineering, ICCSEE 2012
作者: Jiang, Ling Zhao, Wei Li, Bo Qin, Yiwen Zhao, Xinchao School of Science Beijing University of Posts and Telecommunications Beijing 100876 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
This paper describes some general constrained optimization problem-solving methods at first, and then different ideas of combining particle swarm optimization with stochastic ranking are proposed. Accordingly, three a... 详细信息
来源: 评论
Stock market volatility prediction: A service-oriented multi-kernel learning approach
Stock market volatility prediction: A service-oriented multi...
收藏 引用
2012 IEEE 9th International Conference on Services Computing, SCC 2012
作者: Wang, Feng Liu, Ling Dou, Chenxiao State Key Lab. of Software Engineering Wuhan University Wuhan China College of Computing Georgia Institute of Technology Atlanta GA United States School of Computer Science Wuhan University Wuhan China
Stock market is an important and active part of nowadays financial markets. Stock time series volatility analysis is regarded as one of the most challenging time series forecasting due to the hard-to-predict volatilit... 详细信息
来源: 评论
Test effectiveness index: Integrating product metrics with process metrics
Test effectiveness index: Integrating product metrics with p...
收藏 引用
2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent systems, CYBER 2012
作者: Zhang, Yan Zhao, Xuying Zhang, Xiaokun Zhang, Tian Department of Computer Science and Technology Beijing Electronic Science and Technology Institute Beijing 100070 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Defect measurement is an important method in the improvement of software quality. Recent approaches of defect measurement are inappropriate to small software organizations by reason of their intricacy. This paper give... 详细信息
来源: 评论
Independent domination on tree convex bipartite graphs
Independent domination on tree convex bipartite graphs
收藏 引用
6th International Frontiers of Algorithmics Workshop, FAW 2012 and 8th International Conference on Algorithmic Aspects of Information and Management, AAIM 2012
作者: Song, Yu Liu, Tian Xu, Ke Key Laboratory of High Confidence Software Technologies School of Electronic Engineering and Computer Science Peking University Beijing 100871 China National Lab. of Software Development Environment Beihang University Beijing 100191 China
An independent dominating set in a graph is a subset of vertices, such that every vertex outside this subset has a neighbor in this subset (dominating), and the induced subgraph of this subset contains no edge (indepe... 详细信息
来源: 评论
Model driven configuration of fault tolerance solutions for component-based software system  12
Model driven configuration of fault tolerance solutions for ...
收藏 引用
15th International Conference on Model Driven Engineering Languages and systems, MODELS 2012
作者: Wu, Yihan Huang, Gang Song, Hui Zhang, Ying Key Lab. of High Confidence Software Technologies Ministry of Education China School of Electronic Engineering and Computer Science Peking University China Lero: the Irish Software Engineering Research Center Trinity College Dublin Ireland
Fault tolerance is very important for complex component-based software systems, but its configuration is complicated and challenging. In this paper, we propose a model driven approach to semi-automatic configuration o... 详细信息
来源: 评论
Fully secure unidirectional identity-based proxy re-encryption
Fully secure unidirectional identity-based proxy re-encrypti...
收藏 引用
14th International Conference on Information Security and Cryptology, ICISC 2011
作者: Luo, Song Shen, Qingni Chen, Zhong College of Computer Science and Engineering Chongqing University of Technology Chongqing China School of Software and Microelectronics MoE Key Lab. of Network and Software Assurance Peking University Beijing China Institute of Software School of Electronics Engineering and Computer Science Peking University China Ministry of Education China
Proxy re-encryption (PRE) allows the proxy to translate a ciphertext encrypted under Alice's public key into another ciphertext that can be decrypted by Bob's secret key. Identity-based proxy re-encryption (IB... 详细信息
来源: 评论
Memetic three-dimensional gabor feature extraction for hyperspectral imagery classification
Memetic three-dimensional gabor feature extraction for hyper...
收藏 引用
3rd International Conference on Swarm Intelligence, ICSI 2012
作者: Zhu, Zexuan Shen, Linlin Sun, Yiwen He, Shan Ji, Zhen City Key Laboratory of Embedded System Design College of Computer Science and Software Engineering Shenzhen University Shenzhen 518060 China Shenzhen Key Lab. of Biomedical Engineering School of Medicine Shenzhen University 518060 China School of Computer Science University of Birmingham Edgbaston Birmingham B15 2TT United Kingdom
This paper proposes a three-dimensional Gabor feature extraction for pixel-based hyperspectral imagery classification using a memetic algorithm. The proposed algorithm named MGFE combines 3-D Gabor wavelet feature gen... 详细信息
来源: 评论
Identifying CpG islands in genome using conditional random fields
Identifying CpG islands in genome using conditional random f...
收藏 引用
8th International Conference on Intelligent Computing Technology, ICIC 2012
作者: Liu, Wei Chen, Hanwu Chen, Ling Department of Computer Science and Engineering Southeast University Nanjing 210096 China Department of Computer Science Yangzhou University Yangzhou 225127 China National Key Lab. of Novel Software Tech. Nanjing University Nanjing 210093 China
This paper presents a novel method for CpG islands location identification based on conditional random fields (CRF) model. The method transforms CpG islands location identification into the problem of sequential data ... 详细信息
来源: 评论
Two new local search strategies for minimum vertex cover  26
Two new local search strategies for minimum vertex cover
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Cai, Shaowei Su, Kaile Sattar, Abdul Key Laboratory of High Confidence Software Technologies Peking University Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Institute for Integrated and Intelligent Systems Griffith University Brisbane QLD Australia ATOMIC Project Queensland Research Lab. NICTA Australia
In this paper, we propose two new strategies to design efficient local search algorithms for the minimum vertex cover (MVC) problem. There are two main drawbacks in state-of-the-art MVC local search algorithms: First,... 详细信息
来源: 评论