咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 222 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 637 篇 工学
    • 537 篇 计算机科学与技术...
    • 447 篇 软件工程
    • 123 篇 信息与通信工程
    • 91 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 交通运输工程
    • 17 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 9 篇 航空宇航科学与技...
  • 358 篇 理学
    • 260 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 213 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 109 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 89 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 20 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 793 篇 英文
  • 31 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是41-50 订阅
排序:
Heterogeneous multi-core parallel SGEMM performance testing and analysis on Cell/B.E processor
Heterogeneous multi-core parallel SGEMM performance testing ...
收藏 引用
IEEE International Conference on Networking, Architecture and Storage
作者: Li, Yan Zhang, Yunquan Wang, Ke Guan, Wenhua Lab. of Parallel Software and Computational Science ISCAS Beijing China State Key Lab. of Computer Science CAS Beijing China Graduate University Chinese Academy of Sciences Beijing China
Matrix multiplication is one of the most common and vital numerical operations in the field of scientific computing, which is the kernel routine of Level 3 BLAS. The STI CELL processor is a heterogeneous multiprocesso... 详细信息
来源: 评论
Interactive browsing of large images on multi-projector display wall system
Interactive browsing of large images on multi-projector disp...
收藏 引用
12th International Conference on Human-computer Interaction, HCI International 2007
作者: Zhongding, Jiang Xuan, Luo Yandong, Mao Binyu, Zang Hai, Lin Hujun, Bao Computer Graphics Lab. Software School Fudan University Shanghai China State Key Lab. of CAD and CG Zhejiang University Hangzhou China
With the precision of data acquisition increases, large images that may occupy terabytes, become common in research and industry fields. Since multi-projector display wall systems can provide higher resolution, they b... 详细信息
来源: 评论
High level architecture evolved modular federation object model
收藏 引用
Journal of systems Engineering and Electronics 2009年 第3期20卷 625-635页
作者: Wang Wenguang Xu Yongping Chen Xinx Chen Xin Li Qun Wang Weiping Coll. of Information System and Management National Univ. of Defense Technology Changsha 410073 P. R. China Beijing Key Lab. of Intelligent Telecommunications Software and Multimedia Beijing Univ. of Posts and Telecommunications Beijing 100876 P. R. China State Key Lab. for Complex Systems Simulation Beijing 100101 P. R. China
To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved p... 详细信息
来源: 评论
Extensions of standard Z refinement relation for multiple viewpoints oriented requirements method
Extensions of standard Z refinement relation for multiple vi...
收藏 引用
39th International Conference of Object-Oriented Languages and systems (TOOLS 39)
作者: Yanxiang, H. Qiang, S. Qian, H. School of Computer State Key Lab. of Software Eng. Wuhan University Wuhan 430072 China
This paper we extend the standard Z refinement relation for maltiple viewpoints oriented requirements method (MVORM). The original motivation is that we found the standard Z refinement is not adequate or correct when ... 详细信息
来源: 评论
Unistroke gestures on multi-touch interaction: Supporting flexible touches with key stroke extraction  12
Unistroke gestures on multi-touch interaction: Supporting fl...
收藏 引用
2012 17th ACM International Conference on Intelligent User Interfaces, IUI'12
作者: Jiang, Yingying Tian, Feng Zhang, Xiaolong Liu, Wei Dai, Guozhong Wang, Hongan Intelligence Engineering Lab. Institute of Software Chinese Academy of Sciences Beijing China Pennsylvania State University United States State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
Gesture inputs on multi-touch tabletops usually involve multiple fingers (more than two) and casual touchdowns or liftoffs of fingers. This flexibility of touch gestures allows more natural user interaction, but also ... 详细信息
来源: 评论
A method for avoiding the searching bias in ACO deceptive problem solving
收藏 引用
Web Intelligence and Agent systems 2014年 第1期12卷 51-62页
作者: Chen, Bolun Chen, Ling Sun, Haiying Department of Computer Science Nanjing University of Aeronautics and Astronautics Nanjing 210016 China Department of Computer Science and Engineering Yangzhou University Yangzhou 225127 China State Key Lab. of Novel Software Tech Nanjing University Nanjing 210093 China
Ant colony optimization (ACO), an intelligential optimization algorithm, has been widely used to solve combinational optimization problems. One of the obstacles in applying ACO is that its search process is sometimes ... 详细信息
来源: 评论
Social-aware relay node selection in delay tolerant networks
Social-aware relay node selection in delay tolerant networks
收藏 引用
2013 IEEE 2013 22nd International Conference on computer Communication and Networks, ICCCN 2013
作者: Wei, Kaimin Zeng, Deze Guo, Song Xu, Ke State Key Lab. of Software Development Environment Beihang University China School of Computer Science and Engineering University of Aizu Japan
In Delay Tolerant Networks (DTNs), the connections between mobile nodes are intermittent and constant end-to-end paths rarely exist. In order to achieve high delivery ratio, most existing DTN routing algorithms favor ... 详细信息
来源: 评论
Rationale management challenges in requirements engineering
Rationale management challenges in requirements engineering
收藏 引用
作者: Liang, Peng Avgeriou, Paris He, Keqing State Key Lab. of Software Engineering Computer School Wuhan University China Department of Computing Science University of Groningen Netherlands
Rationale and rationale management have been playing an increasingly prominent role in software system development mainly due to the knowledge demand during system evaluation, maintenance, and evolution, especially fo... 详细信息
来源: 评论
The optimized key distribution scheme in threshold RSA  04
The optimized key distribution scheme in threshold RSA
收藏 引用
3rd International Conference on Information Security, InfoSecu '04
作者: Jing-Song, Cui Rong, Peng Li-Na, Wang School of Computer Science Wuhan University Wuhan 430072 China State Key Lab. of Software Engineering Wuhan 430072 China
The (t, n) threshold RSA algorithm enables the system to keep the security and availab.lity of the private key without a trusted dealer when parts of system are already under attack. In the traditional threshold RSA s... 详细信息
来源: 评论
Constructing the robust and efficient small world overlay network for P2P systems
Constructing the robust and efficient small world overlay ne...
收藏 引用
3rd International Symposium on Parallel and Distributed Processing and Applications, ISPA 2005
作者: Feng, Guofu Mao, Ying-Chi Chen, Dao-Xu Department of Computer Science and Technology Nanjing University State Key Lab. for Novel Software Technology Nanjing Jiangsu 210093 China
The current P2P application protocols are usually constructed over the application-level overlay network. However, because the users in the P2P systems always follow a very dynamic mode, the overlay network with poor ... 详细信息
来源: 评论