咨询与建议

限定检索结果

文献类型

  • 612 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 841 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 640 篇 工学
    • 540 篇 计算机科学与技术...
    • 448 篇 软件工程
    • 123 篇 信息与通信工程
    • 93 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 215 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 111 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 13 篇 web services
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 accuracy
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy

机构

  • 91 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 school of comput...
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 791 篇 英文
  • 32 篇 中文
  • 19 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
841 条 记 录,以下是441-450 订阅
排序:
Test effectiveness index: Integrating product metrics with process metrics
Test effectiveness index: Integrating product metrics with p...
收藏 引用
2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent systems, CYBER 2012
作者: Zhang, Yan Zhao, Xuying Zhang, Xiaokun Zhang, Tian Department of Computer Science and Technology Beijing Electronic Science and Technology Institute Beijing 100070 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Defect measurement is an important method in the improvement of software quality. Recent approaches of defect measurement are inappropriate to small software organizations by reason of their intricacy. This paper give... 详细信息
来源: 评论
Independent domination on tree convex bipartite graphs
Independent domination on tree convex bipartite graphs
收藏 引用
6th International Frontiers of Algorithmics Workshop, FAW 2012 and 8th International Conference on Algorithmic Aspects of Information and Management, AAIM 2012
作者: Song, Yu Liu, Tian Xu, Ke Key Laboratory of High Confidence Software Technologies School of Electronic Engineering and Computer Science Peking University Beijing 100871 China National Lab. of Software Development Environment Beihang University Beijing 100191 China
An independent dominating set in a graph is a subset of vertices, such that every vertex outside this subset has a neighbor in this subset (dominating), and the induced subgraph of this subset contains no edge (indepe... 详细信息
来源: 评论
Model driven configuration of fault tolerance solutions for component-based software system  12
Model driven configuration of fault tolerance solutions for ...
收藏 引用
15th International Conference on Model Driven Engineering Languages and systems, MODELS 2012
作者: Wu, Yihan Huang, Gang Song, Hui Zhang, Ying Key Lab. of High Confidence Software Technologies Ministry of Education China School of Electronic Engineering and Computer Science Peking University China Lero: the Irish Software Engineering Research Center Trinity College Dublin Ireland
Fault tolerance is very important for complex component-based software systems, but its configuration is complicated and challenging. In this paper, we propose a model driven approach to semi-automatic configuration o... 详细信息
来源: 评论
Fully secure unidirectional identity-based proxy re-encryption
Fully secure unidirectional identity-based proxy re-encrypti...
收藏 引用
14th International Conference on Information Security and Cryptology, ICISC 2011
作者: Luo, Song Shen, Qingni Chen, Zhong College of Computer Science and Engineering Chongqing University of Technology Chongqing China School of Software and Microelectronics MoE Key Lab. of Network and Software Assurance Peking University Beijing China Institute of Software School of Electronics Engineering and Computer Science Peking University China Ministry of Education China
Proxy re-encryption (PRE) allows the proxy to translate a ciphertext encrypted under Alice's public key into another ciphertext that can be decrypted by Bob's secret key. Identity-based proxy re-encryption (IB... 详细信息
来源: 评论
Memetic three-dimensional gabor feature extraction for hyperspectral imagery classification
Memetic three-dimensional gabor feature extraction for hyper...
收藏 引用
3rd International Conference on Swarm Intelligence, ICSI 2012
作者: Zhu, Zexuan Shen, Linlin Sun, Yiwen He, Shan Ji, Zhen City Key Laboratory of Embedded System Design College of Computer Science and Software Engineering Shenzhen University Shenzhen 518060 China Shenzhen Key Lab. of Biomedical Engineering School of Medicine Shenzhen University 518060 China School of Computer Science University of Birmingham Edgbaston Birmingham B15 2TT United Kingdom
This paper proposes a three-dimensional Gabor feature extraction for pixel-based hyperspectral imagery classification using a memetic algorithm. The proposed algorithm named MGFE combines 3-D Gabor wavelet feature gen... 详细信息
来源: 评论
Identifying CpG islands in genome using conditional random fields
Identifying CpG islands in genome using conditional random f...
收藏 引用
8th International Conference on Intelligent Computing Technology, ICIC 2012
作者: Liu, Wei Chen, Hanwu Chen, Ling Department of Computer Science and Engineering Southeast University Nanjing 210096 China Department of Computer Science Yangzhou University Yangzhou 225127 China National Key Lab. of Novel Software Tech. Nanjing University Nanjing 210093 China
This paper presents a novel method for CpG islands location identification based on conditional random fields (CRF) model. The method transforms CpG islands location identification into the problem of sequential data ... 详细信息
来源: 评论
Two new local search strategies for minimum vertex cover  26
Two new local search strategies for minimum vertex cover
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Cai, Shaowei Su, Kaile Sattar, Abdul Key Laboratory of High Confidence Software Technologies Peking University Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Institute for Integrated and Intelligent Systems Griffith University Brisbane QLD Australia ATOMIC Project Queensland Research Lab. NICTA Australia
In this paper, we propose two new strategies to design efficient local search algorithms for the minimum vertex cover (MVC) problem. There are two main drawbacks in state-of-the-art MVC local search algorithms: First,... 详细信息
来源: 评论
Tele-AR system based on real-time camera tracking
Tele-AR system based on real-time camera tracking
收藏 引用
2012 International Conference on Virtual Reality and Visualization, ICVRV 2012
作者: Wang, Yanke Zhong, Fan Li, Chao Xiang, Hui Peng, Qunsheng Qin, Xueying School of Computer Science and Technology Shandong University Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan China State Key Lab. of CAD and CG Zhejiang University Hangzhou China
We propose a visual tele-AR system, which is a combination of tele-existence and AR techniques. By wearing a video see-through HMD and moving his head, a user in this system is able to tele-operate a remote pan-tilt p... 详细信息
来源: 评论
Pick-up tree based route recommendation from taxi trajectories
Pick-up tree based route recommendation from taxi trajectori...
收藏 引用
13th International Conference on Web-Age Information Management, WAIM 2012
作者: Hu, Haoran Wu, Zhiang Mao, Bo Zhuang, Yi Cao, Jie Pan, Jingui State Key Lab. for Novel Software Technology Nanjing University Nanjing China Jiangsu Provincial Key Laboratory of E-Business Nanjing University of Finance and Economics Nanjing China College of Computer and Information Engineering Zhejiang Gongshang University Hangzhou China
Recommending suitable routes to taxi drivers for picking up passengers is helpful to raise their incomes and reduce the gasoline consumption. In this paper, a pick-up tree based route recommender system is proposed to... 详细信息
来源: 评论
COMBINING HAND-DRAWN CONCEPT MAPS WITH RFID TAGS
COMBINING HAND-DRAWN CONCEPT MAPS WITH RFID TAGS
收藏 引用
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence systems
作者: Yingying Jiang Feng Tian Hongan Wang Guozhong Dai Intelligence Engineering Lab Institute of SoftwareChinese Academy of Sciences State Key Lab. of Computer Science Institute of SoftwareChinese Academy of Sciences
As concept maps are useful for knowledge organization, representation and sharing, people used to draw concept maps by pen in their daily life. And some concept maps are closely related to physical world. In this pape... 详细信息
来源: 评论