咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 639 篇 工学
    • 540 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 123 篇 信息与通信工程
    • 92 篇 控制科学与工程
    • 44 篇 电气工程
    • 44 篇 电子科学与技术(可...
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 260 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 89 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 29 篇 university of ch...
  • 28 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 20 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 795 篇 英文
  • 31 篇 中文
  • 12 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
838 条 记 录,以下是451-460 订阅
排序:
Design and integrated application of geological hazard information 3D visualization and analysis system in Three Gorges reservoir area
Design and integrated application of geological hazard infor...
收藏 引用
2nd Conference on Environmental science and Information Application Technology, ESIAT 2010
作者: Liu, Gang Wu, Chonglong Tian, Yiping Liu, Junqi Wu, Yong School of Computer Science and Technology China University of Geosciences Wuhan China Three Gorges Research Center for Geohazard Ministry of Education Wuhan China State Key Lab. of Geological Processes and Mineral Resources Wuhan China
In Three Gorges reservoir area of China, 3D visualization and analysis functions are widely needed in many works of geological hazard survey, inspection, pre-warning and treatment of local landslides and collapses, an... 详细信息
来源: 评论
A novel clustering algorithm based on multi-sampling max-min distance and dynamic tunneling method
收藏 引用
Journal of Information and Computational science 2009年 第2期6卷 637-642页
作者: Lv, Jia Chongqing Key Lab. of Operations Research and System Engineering College of Mathematics and Computer Science Chongqing Normal University Chongqing 400047 China
In view of the limitations that k-means clustering algorithm is sensitive to the initial points and liable to fall into local minimum point, a clustering algorithm based on multi-sampling max-min distance and dynamic ... 详细信息
来源: 评论
Research and implementation of distributed simulation and parallel rendering system based on grid
Research and implementation of distributed simulation and pa...
收藏 引用
International Conference on Networking and Distributed Computing
作者: Zhang, Yaping Peng, Haoyu Wang, Zonghui Shi, Jiaoying Faculty of Computer Science and Information Technology Yunnan Normal University Kunming China College of Computer Science and Information Engineering Zhejiang Gongshang University Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China State Key Lab. of CAD and CG Zhejiang University Hangzhou China
With the development of Grid technology and the extension of Grid application areas, it needs to provide core infrastructure platform and the necessary functional components for large-scale resources sharing and colla... 详细信息
来源: 评论
On the resistance of Boolean functions against fast algebraic attacks
On the resistance of Boolean functions against fast algebrai...
收藏 引用
14th International Conference on Information Security and Cryptology, ICISC 2011
作者: Du, Yusong Zhang, Fangguo Liu, Meicheng School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China Key Lab. of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
Boolean functions with large algebraic immunity resist algebraic attacks to a certain degree, but they may not resist fast algebraic attacks (FAA's). It is necessary to study the resistance of Boolean functions ag... 详细信息
来源: 评论
Privacy preserving personalized access control service at third service provider
Privacy preserving personalized access control service at th...
收藏 引用
2011 IEEE 9th International Conference on Web Services, ICWS 2011
作者: Tian, Xiuxia Sha, Chaofeng Wang, Xiaoling Zhou, Aoying School of Computer Science Fudan University Shanghai 200433 China School of Computer and Information Engineering Shanghai University of Electric Power Shanghai 200090 China Shanghai Key Lab. of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai 200062 China
With the convenient connection to network, more and more individual information including sensitive information, such as contact list in Mobile Phone or PDA, can be delegated to the professional third service provider... 详细信息
来源: 评论
Intracerebral hemorrhage (ICH) evaluation with a novel magnetic induction sensor: A preliminary study using the Chinese head model
Intracerebral hemorrhage (ICH) evaluation with a novel magne...
收藏 引用
作者: Zhang, Ziyi Liu, Peiguo Zhou, Dongming Zhang, Liang Lei, Hengdong College of Science National University of Defense Technology Changsha Hunan410073 China State Key Lab. of Complex Electromagnetic Environ. Effects on Electronics and Information System National University of Defense Technology Changsha Hunan410073 China
Biomedical magnetic induction measurement is a promising method for the detection of intracerebral hemorrhage (ICH), especially in China. Aiming at overcoming the problem of low sensitivity, a magnetic induction senso... 详细信息
来源: 评论
Adaptive and impulsive cluster synchronization of a general complex dynamical network
Adaptive and impulsive cluster synchronization of a general ...
收藏 引用
2010 International Conference on Networking, Sensing and Control, ICNSC 2010
作者: Shi, Bingxiong Lu, Junan Lü, Jinhu Yu, Xinghuo College of Mathematics and Statistics State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China Key Laboratory of Systems and Control Institute of Systems Science Chinese Academy of Sciences Beijing 100190 China School of Electrical and Computer Engineering RMIT University Melbourne 3000 Australia School of Electrical and Computer Engineering RMIT University Melbourne VIC 3001 Australia
Recently, cluster synchronization has attracted an increasing interest in various disciplines, includingmathematics, physics, and engineering sciences. This paper further investigates the cluster synchronization of a ... 详细信息
来源: 评论
Skull-closed autonomous development: Object-wise incremental learning
Skull-closed autonomous development: Object-wise incremental...
收藏 引用
9th International Symposium on Neural Networks, ISNN 2012
作者: Wang, Yuekai Wu, Xiaofeng Weng, Juyang State Key Lab. of ASIC and System Fudan University Shanghai 200433 China Department of Electronic Engineering Fudan University Shanghai 200433 China School of Computer Science Fudan University Shanghai 200433 China Dept. of Computer Sci. and Eng. Michigan State University East Lansing MI 48824 United States
The series of Where-What Networks (WWNs) is a brain-inspired developmental model that simulates the dorsal (where) stream and the ventral (what) stream that converge to the motor area in the frontal cortex. Since deve... 详细信息
来源: 评论
A biologically-inspired network for generic object recognition using CUDA
A biologically-inspired network for generic object recogniti...
收藏 引用
2009 11th IEEE International Conference on e-Health Networking, Applications and Services, Healthcom 2009
作者: Wang, Yuekai Wu, Xiaofeng Song, Xiaoying Zhang, Wenqiang Weng, Juyang State Key Lab. of ASIC and System Fudan University Shanghai 200433 China Department of Electronic Engineering Fudan University Shanghai 200433 China School of Computer Science Fudan University Shanghai 200433 China Dept. of Computer Sci. and Eng. Michigan State University East Lansing MI 48824 United States
Generic object recognition is one of the most important fields in the artificial intelligence. Some cortex-like networks for generic object recognition are proposed these years. But most of them concentrated on the di... 详细信息
来源: 评论
BIFI: Architectural support for information flow integrity measurement
BIFI: Architectural support for information flow integrity m...
收藏 引用
International Conference on computer science and software Engineering, CSSE 2008
作者: Hao, Hu Dengguo, Feng Dept. of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China The State Key Lab. of Information Security Institute of Software Chinese Academy of Sciences National Engineering Research Center for Information Security Beijing 100190 China
Information flow security has been an important security requirement of existing operating systems, especially for distributed applications. We are interested in protecting information flow security with an eye to inf... 详细信息
来源: 评论