咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 223 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 635 篇 工学
    • 536 篇 计算机科学与技术...
    • 447 篇 软件工程
    • 123 篇 信息与通信工程
    • 90 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 356 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 87 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 792 篇 英文
  • 31 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是441-450 订阅
排序:
Reach-avoid Verification using Lyapunov Densities
arXiv
收藏 引用
arXiv 2023年
作者: Xue, Bai State Key Lab. of Computer Science Institute of Software CAS Beijing China University of Chinese Academy of Sciences Beijing China
Reach-avoid analysis combines the construction of safety and specific progress guarantees, and is able to formalize many important engineering problems. In this paper we study the reach-avoid verification problem of s... 详细信息
来源: 评论
Safe Exit Controllers Synthesis for Continuous-time Stochastic systems
arXiv
收藏 引用
arXiv 2023年
作者: Xue, Bai State Key Lab. of Computer Science Institute of Software CAS Beijing China University of Chinese Academy of Sciences Beijing China
This paper tackles the problem of generating safe exit controllers for continuous-time systems described by stochastic differential equations (SDEs). The primary aim is to develop controllers that maximize the lower b... 详细信息
来源: 评论
Detection of behavioral contextual properties in asynchronous pervasive computing environments
Detection of behavioral contextual properties in asynchronou...
收藏 引用
16th IEEE International Conference on Parallel and Distributed systems, ICPADS 2010
作者: Huang, Yu Yu, Jianping Cao, Jiannong Tao, Xianping State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
Detection of contextual properties is one of the primary approaches to enabling context-awareness. In order to adapt to temporal evolution of the pervasive computing environment, context-aware applications often need ... 详细信息
来源: 评论
Integrated platform of artificial immune system for anomaly detection
收藏 引用
WSEAS Transactions on Information science and Applications 2005年 第2期2卷 144-149页
作者: Wu, Zejun Liang, Yiwen School of Computer State Key Lab. of Software Engineering Wuhan University Wuhan China School of Information Science Zhongnan University of Economics and Law Wuhan China
Originated from human immune system, artificial immune system has been widely applied in the computational fields, especially for the task of anomaly detection. Although intensively investigated in the literature, mos... 详细信息
来源: 评论
Guide background model update with object tracking
收藏 引用
Journal of Computational Information systems 2008年 第4期4卷 1635-1642页
作者: Yuan, Bo Sun, Zhengxing State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Background subtraction has been widely used as the first step in various computer vision applications. It aims at segmentation of current frame in a video sequence into background (the relatively stationary scene) and... 详细信息
来源: 评论
Sketch understanding for electric-circuit diagramming in e-learning
收藏 引用
Journal of Computational Information systems 2006年 第1期2卷 145-153页
作者: Feng, Guihuan Sun, Zhengxing Xie, Qiang Zheng, Wentao State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Owing to the fluent and lightweight nature, sketch-based user interface is becoming increasingly significant in graphical computing. This paper presents a strategy of sketch understanding for electric circuit diagramm... 详细信息
来源: 评论
Design and integrated application of geological hazard information 3D visualization and analysis system in Three Gorges reservoir area
Design and integrated application of geological hazard infor...
收藏 引用
2nd Conference on Environmental science and Information Application Technology, ESIAT 2010
作者: Liu, Gang Wu, Chonglong Tian, Yiping Liu, Junqi Wu, Yong School of Computer Science and Technology China University of Geosciences Wuhan China Three Gorges Research Center for Geohazard Ministry of Education Wuhan China State Key Lab. of Geological Processes and Mineral Resources Wuhan China
In Three Gorges reservoir area of China, 3D visualization and analysis functions are widely needed in many works of geological hazard survey, inspection, pre-warning and treatment of local landslides and collapses, an... 详细信息
来源: 评论
A novel clustering algorithm based on multi-sampling max-min distance and dynamic tunneling method
收藏 引用
Journal of Information and Computational science 2009年 第2期6卷 637-642页
作者: Lv, Jia Chongqing Key Lab. of Operations Research and System Engineering College of Mathematics and Computer Science Chongqing Normal University Chongqing 400047 China
In view of the limitations that k-means clustering algorithm is sensitive to the initial points and liable to fall into local minimum point, a clustering algorithm based on multi-sampling max-min distance and dynamic ... 详细信息
来源: 评论
Research and implementation of distributed simulation and parallel rendering system based on grid
Research and implementation of distributed simulation and pa...
收藏 引用
International Conference on Networking and Distributed Computing
作者: Zhang, Yaping Peng, Haoyu Wang, Zonghui Shi, Jiaoying Faculty of Computer Science and Information Technology Yunnan Normal University Kunming China College of Computer Science and Information Engineering Zhejiang Gongshang University Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China State Key Lab. of CAD and CG Zhejiang University Hangzhou China
With the development of Grid technology and the extension of Grid application areas, it needs to provide core infrastructure platform and the necessary functional components for large-scale resources sharing and colla... 详细信息
来源: 评论
On the resistance of Boolean functions against fast algebraic attacks
On the resistance of Boolean functions against fast algebrai...
收藏 引用
14th International Conference on Information Security and Cryptology, ICISC 2011
作者: Du, Yusong Zhang, Fangguo Liu, Meicheng School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China Key Lab. of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
Boolean functions with large algebraic immunity resist algebraic attacks to a certain degree, but they may not resist fast algebraic attacks (FAA's). It is necessary to study the resistance of Boolean functions ag... 详细信息
来源: 评论