咨询与建议

限定检索结果

文献类型

  • 612 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 841 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 640 篇 工学
    • 540 篇 计算机科学与技术...
    • 448 篇 软件工程
    • 123 篇 信息与通信工程
    • 93 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 215 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 111 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 13 篇 web services
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 accuracy
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy

机构

  • 91 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 school of comput...
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 791 篇 英文
  • 32 篇 中文
  • 19 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
841 条 记 录,以下是521-530 订阅
排序:
Defending P2P networks based on benign worms
收藏 引用
Journal of Computational Information systems 2011年 第7期7卷 2532-2539页
作者: Liu, Xin Hu, Zhichao Liu, Guoyou Wang, Zhi Jia, Chunfu College of Information Technical Science Nankai University Tianjin 300071 China State Key Lab. for Novel Software Technology Nanjing University China
Malicious worms can be exploited to destroy the user system and launch DDoS attack against computer networks. We proposed a method of forming secure P2P network using benign worms against malicious worms. The correspo... 详细信息
来源: 评论
A kind of SND-based algorithm for self-adapting network congestion control
收藏 引用
Journal of Information and Computational science 2011年 第11期8卷 2033-2044页
作者: Zhang, Degan Hu, Yuxia Liang, Yanpin Liu, Zhaojing Tianjin Key Lab. of Intelligent Computing and Novel software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
A kind of SND-based algorithm for self-adapting network congestion control has been presented in this paper, which is for the complicated and integrated network environment that the Internet of Things (IOT) to face in... 详细信息
来源: 评论
Web service schema matching based on invocation instance duplicates
Web service schema matching based on invocation instance dup...
收藏 引用
2011 7th International Conference on Next Generation Web Services Practices, NWeSP 2011
作者: Wang, Ke Ou, Wei-Jie Zeng, Cheng Li, De-Yi Peng, Zhi-Yong National Science Library Chinese Academy of Sciences Beijing 100190 China State Key Lab of Software Engineering Wuhan University Wuhan 430072 China China Institute of Electronic System Engineering Beijing 100840 China School of Computer Wuhan University Wuhan 430072 China
Web service schema matching is the preliminary phase of service composition and service Mashup. With the entry of large numbers of services on the Internet, it will be difficult to find and suggest the most relevant s... 详细信息
来源: 评论
Phoenix: Peer-to-peer location based notification in mobile networks
Phoenix: Peer-to-peer location based notification in mobile ...
收藏 引用
8th IEEE International Conference on Mobile Ad-hoc and Sensor systems, MASS 2011
作者: Xiong, Yongping He, Wenbo Chen, Canfeng Ma, Jian Sun, Limin State Key Lab. of Networking and Switching Tech. Beijing Univ. of Posts and Telecomm. China Department of Computer Science University of New Mexico Albuquerque NM United States Nokia Research Center Beijing China Wuxi SensingNet Industrialization Research Institute Wuxi China Institute of Software Chinese Academy of Sciences Beijing China
Location Based Notification (LBN) aims to alert the users in a target area with the information of interest to them. With a wide range of applications, LBN has been gaining more and more attraction among wireless user... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing Technology and science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
A study on educational data clustering approach based on improved particle swarm optimizer
A study on educational data clustering approach based on imp...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Xiangwei Zheng Yuanjiang Jia School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Lab. for Distributed Computer Software Novel Technology Jinan China
More and more clustering approaches are used in educational data mining for too many data are generated by web-based educational systems. To deal with the problem of premature convergence of the traditional K-means al... 详细信息
来源: 评论
Flash based WebGIS system and its application in monitoring and evaluating China's regional development
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2011年 第5期5卷 285-295页
作者: Zhang, Jinqu Zhu, YunQiang Wang, Juanle Sun, Jiulin Xu, Yuyue Computer School South China Normal University China State Key Lab. of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences China
WebGIS applications are avidly gaining popularity with extensively development and use of GIS technology. By analyzing the current status of WebGIS, a Flash based WebGIS framework was developed. By converting the trad... 详细信息
来源: 评论
Knowledge granulation in interval-valued information systems
Knowledge granulation in interval-valued information systems
收藏 引用
International Workshop on Intelligent systems and Applications
作者: Zhang, Nan Miao, Duoqian Gao, Can Department of Computer Science and Technology Tongji University Shanghai 201804 China Department of Computer Science University of Regina Regina SK S4S 0A2 Canada Key Lab. of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China Department of Electrical and Computer Engineering University of Alberta Edmonton AB T6R 2G4 Canada
Rough set theory, proposed by Pawlak, has been proved to be a mathematical tool to deal with vagueness and uncertainty in intelligent information processing. In this paper, we propose the concept of knowledge granulat... 详细信息
来源: 评论
FECG extraction using wavelet denoising and neural networks approach
收藏 引用
ICIC Express Letters 2011年 第3期5卷 667-673页
作者: Yin, Ying Ye, Mao Zhu, Yuanxiang Ren, Dongxiao School of Applied Mathematics School of Computer Science and Engineering University of Electronic Science and Technology of China No. 4 Sec. 2 Jianshe North Road Chengdu 610054 China State Key Lab. for Novel Software Technology Nanjing University 22 Hankou Road Nanjing 210093 China
Neural networks have received much attention in the extraction of fetal electrocardiogram signal in recent years. This paper provides a new method to extract the fetal electrocardiogram signal which uses wavelet denoi... 详细信息
来源: 评论
ISM: Intent-perceptible service migration model for IP network survivability
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2011年 第12期39卷 2768-2775页
作者: Zhao, Er-Hu Yang, Xiao-Long Xu, Jie Long, Ke-Ping Zhang, Dan Research Centre for Optical Internet and Mobile Information Networks University of Electronic Science and Technology of China Chengdu Sichuan 611731 China National Key Lab. of Integrated Information System Tech. Institute of Software Chinese Acad. of Sci. Beijing 100190 China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing 100083 China 706 Institute The Second Academy of China Aerospace Beijing 100854 China
The existing service migration methods bring the server cluster heavy burden, and their time spending is so high that seriously affects the service continuity. In order to enhance the survivability of IP network servi... 详细信息
来源: 评论