咨询与建议

限定检索结果

文献类型

  • 612 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 841 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 640 篇 工学
    • 540 篇 计算机科学与技术...
    • 448 篇 软件工程
    • 123 篇 信息与通信工程
    • 93 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 215 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 111 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 13 篇 web services
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 accuracy
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy

机构

  • 91 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 school of comput...
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 791 篇 英文
  • 32 篇 中文
  • 19 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
841 条 记 录,以下是461-470 订阅
MOEA/D with iterative thresholding algorithm for sparse optimization problems
MOEA/D with iterative thresholding algorithm for sparse opti...
收藏 引用
12th International Conference on Parallel Problem Solving from Nature, PPSN 2012
作者: Li, Hui Su, Xiaolei Xu, Zongben Zhang, Qingfu Institute for Information and System Sciences Key Lab. for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi 710049 China School of Computer Science and Electronic Engineering University of Essex Wivenhoe Park Colchester CO4 3SQ United Kingdom
Currently, a majority of existing algorithms for sparse optimization problems are based on regularization framework. The main goal of these algorithms is to recover a sparse solution with k non-zero components(called ... 详细信息
来源: 评论
On-site determination of heavy metal in soil using electrochemical stripping analysis
On-site determination of heavy metal in soil using electroch...
收藏 引用
American Society of Agricultural and Biological Engineers Annual International Meeting 2012
作者: Wang, Zhiqiang Gang, Liu Yang, Xiaojing Key Lab. of Modern Precision Agriculture System Integration Research China Agricultural University 17 Qinghua Donglu Beijing China China Agricultural University 17 Qinghua Donglu Beijing China College of Computer Science and Technology Shandong University of Technology 12 Zhangzhou Road Zibo China
Heavy metals are considered to be hazardous pollutants with toxic effects on plant and/or human health. Different techniques and methods (e.g., AAS, ICP-MS, ICP-OES) have been utilized for trace metals determination i... 详细信息
来源: 评论
Computation of bilingual word similarities by metaphorical properties
Computation of bilingual word similarities by metaphorical p...
收藏 引用
2012 International Conference on Machine Learning and Cybernetics, ICMLC 2012
作者: Kuang, Hai-Bo Li, Bin Chen, Chen Jin, Peng Chen, Xiao-He Research Center of Language and Informatics Nanjing Normal University Nanjing 210000 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210000 China Department of English Language and Literature Graduate School of Shanghai International Studies University Shanghai 200000 China School of Computer Science Leshan Normal University Leshan 614000 China
Measuring word similarities is a fundamental issue in NLP, while the measuring procedure is always aided by dictionaries or corpus. However, when figurative or metaphor usages are considered, the situation becomes mor... 详细信息
来源: 评论
Resource-distortion modeling for video streaming over mesh networks with priority-based packet scheduling
Resource-distortion modeling for video streaming over mesh n...
收藏 引用
2012 13th IEEE International Conference on Multimedia and Expo, ICME 2012
作者: Zhang, Yongfei Zhang, Yunsheng Qin, Shiyin He, Zhihai Beijing Key Lab. of Digital Media School of Computer Science and Engineering Beihang University Beijing 100191 China State Key Laboratory of Virtual Reality Technology and Systems Beihang University Beijing 100191 China School of Automation Science and Electrical Engineering Beihang University Beijing 100191 China Graduate School at Shenzhen Tsinghua University Shenzhen 518055 China Department of Electrical and Computer Engineering University of Missouri Columbia MO 65211 United States
Video streaming over mesh networks operates under stringent network resource constraints, with a large number of video sessions competing for limited network resources. In this work, we aim to establish so-called reso... 详细信息
来源: 评论
DOTA: A Double Truthful Auction for spectrum allocation in dynamic spectrum access
DOTA: A Double Truthful Auction for spectrum allocation in d...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Qinhui Wang Baoliu Ye Tianyin Xu Sanglu Lu Song Guo National Key Lab. for Novel Software Technology Nanjing University China Department of Computer Science and Engineering U.C. San Diego USA School of Computer Science and Engineering University of Aizu Japan
Spectrum auctions have been proposed as an effective approach to fairly and efficiently trade the scarce spectrum resource among wireless users. The most significant challenge of the auction design to provide economic... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed Computing systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
Geese PSO optimization in geometric constraint solving
收藏 引用
Information Technology Journal 2012年 第4期11卷 504-507页
作者: Cao, Chun-Hong Wang, Li-Min Han, Chun-Yan Zhao, Da-Zhe Zhang, Bin College of Information Science and Engineering Northeastern University Shenyang 110819 China College of Computer Science and Technology Jilin University Changchun Jilin 130012 China State Key Lab. for Novel Software Technology Nanjing University China Key Laboratory of Medical Image Computing Ministry of Education Northeastern University Shenyang Liaoning 110819 China
Geometric constraint problem is equivalent to the problem of solving a set of nonlinear equations substantially. The constraint problem can be transformed to an optimization n problem. We can solve the problem with Ge... 详细信息
来源: 评论
Pattern mining, semantic lab.l identification and movement prediction using mobile phone data
Pattern mining, semantic label identification and movement p...
收藏 引用
8th International Conference on Advanced Data Mining and Applications, ADMA 2012
作者: Xie, Rong Luo, Jun Yue, Yang Li, Qingquan Zou, Xiaoqing International School of Software Wuhan University Wuhan 430079 China Shenzhen Institutes of Advanced Technology CAS Shenzhen 518055 China Shenzhen Key Laboratory of High Performance Data Mining Shenzhen 518055 China Shenzhen University Shenzhen China State Key Lab. of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan 430079 China Faculty of Land Resource Engineering Kunming University of Science and Technology Kunming China
Data collected from mobile phones have potential knowledge to provide with important behavior patterns of individuals. In this paper, we present approaches to discovering personal mobility and characteristics based on... 详细信息
来源: 评论
An enhanced group search optimizer using generalized opposition-based learning
收藏 引用
Journal of Computational Information systems 2012年 第13期8卷 5483-5490页
作者: Wang, Shenwen Ding, Lixin Yang, Hua Guo, Zhaolu Xie, Datong Xie, Chenwang State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China School of Information Engineering Shijiazhuang University of Economics Shijiazhuang 050031 China School of Mathematics and Computer Science Guizhou Normal University Guiyang 550001 China School of Software East China JiaoTong University Nanchang 330013 China
Group Search Optimizer (GSO) has been shown to yield good performance for solving various optimization problems. However, it tends to suffer from premature convergence when solving complex problems. At the same time, ... 详细信息
来源: 评论
Period distribution analysis of some linear maps
收藏 引用
Communications in Nonlinear science and Numerical Simulation 2012年 第10期17卷 3848-3856页
作者: Fei Chen Xiaofeng Liao Kwok-wo Wong Qi Han Yang Li State Key Lab. of Power Transmission Equipment and System Security College of Computer Science Chongqing University Chongqing 400044 PR China Department of Electronic Engineering City University of Hong Kong Hong Kong PR China Department of Automatic Control and Systems Engineering The University of Sheffield UK
This paper discusses period properties of some linear maps which are employed in various applications such as image encryption, public key cryptography and watermarking. Conditions for the bijectiveness of such maps a... 详细信息
来源: 评论