咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 223 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 635 篇 工学
    • 536 篇 计算机科学与技术...
    • 447 篇 软件工程
    • 123 篇 信息与通信工程
    • 90 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 356 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 87 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 792 篇 英文
  • 31 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是521-530 订阅
排序:
Knowledge granulation in interval-valued information systems
Knowledge granulation in interval-valued information systems
收藏 引用
International Workshop on Intelligent systems and Applications
作者: Zhang, Nan Miao, Duoqian Gao, Can Department of Computer Science and Technology Tongji University Shanghai 201804 China Department of Computer Science University of Regina Regina SK S4S 0A2 Canada Key Lab. of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China Department of Electrical and Computer Engineering University of Alberta Edmonton AB T6R 2G4 Canada
Rough set theory, proposed by Pawlak, has been proved to be a mathematical tool to deal with vagueness and uncertainty in intelligent information processing. In this paper, we propose the concept of knowledge granulat... 详细信息
来源: 评论
FECG extraction using wavelet denoising and neural networks approach
收藏 引用
ICIC Express Letters 2011年 第3期5卷 667-673页
作者: Yin, Ying Ye, Mao Zhu, Yuanxiang Ren, Dongxiao School of Applied Mathematics School of Computer Science and Engineering University of Electronic Science and Technology of China No. 4 Sec. 2 Jianshe North Road Chengdu 610054 China State Key Lab. for Novel Software Technology Nanjing University 22 Hankou Road Nanjing 210093 China
Neural networks have received much attention in the extraction of fetal electrocardiogram signal in recent years. This paper provides a new method to extract the fetal electrocardiogram signal which uses wavelet denoi... 详细信息
来源: 评论
ISM: Intent-perceptible service migration model for IP network survivability
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2011年 第12期39卷 2768-2775页
作者: Zhao, Er-Hu Yang, Xiao-Long Xu, Jie Long, Ke-Ping Zhang, Dan Research Centre for Optical Internet and Mobile Information Networks University of Electronic Science and Technology of China Chengdu Sichuan 611731 China National Key Lab. of Integrated Information System Tech. Institute of Software Chinese Acad. of Sci. Beijing 100190 China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing 100083 China 706 Institute The Second Academy of China Aerospace Beijing 100854 China
The existing service migration methods bring the server cluster heavy burden, and their time spending is so high that seriously affects the service continuity. In order to enhance the survivability of IP network servi... 详细信息
来源: 评论
Emergency domain knowledge modeling based on ontology
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (science and Technology) 2011年 第SUPPL. 1期42卷 859-864页
作者: Yang, Yue-Hua Du, Jun-Ping Liang, Mei-Yu Beijing Key Lab. of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
Combining the universal law of emergency, the important concepts and conceptual relations were obtained through a variety of knowledge acquisition methods, and the emergency domain ontology modeling was studied and co... 详细信息
来源: 评论
Personalized intelligent semantic retrieval system based on domain knowledge
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (science and Technology) 2011年 第SUPPL. 1期42卷 865-869页
作者: Liang, Mei-Yu Du, Jun-Ping Gao, Tian Beijing Key Lab. of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
A personalized tourism intelligent semantic retrieval system based on domain ontology was studied and designed, and the system general framework and implementation of system functions were given. The domain ontology t... 详细信息
来源: 评论
Emergency evolution based on domain knowledge ontology
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (science and Technology) 2011年 第SUPPL. 1期42卷 847-852页
作者: Gao, Tian Du, Jun-Ping Wang, Su Beijing Key Lab. of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
Two major aspects of evolution law in emergencies were studied. One is the lifecycle phase;the other is the sequential relationship between sub events. The ontological knowledge model of incidents was established for ... 详细信息
来源: 评论
Particle swarm optimisation with simple and efficient neighbourhood search strategies
收藏 引用
International Journal of Innovative Computing and Applications 2011年 第2期3卷 97-104页
作者: Wang, Hui Wu, Zhijian Rahnamayan, Shahryar Li, Changhe Zeng, Sanyou Jiang, Dazhi State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China 2000 Simcoe Street North Oshawa ON L1H 7K4 Canada Department of Computer Science University of Leicester Leicester LE1 7RH United Kingdom School of Computer Sciences China University of Geosciences Wuhan 430074 China Department of Computer Science Shantou University Shantou 515063 China
This paper presents a novel particle swarm optimiser (PSO) called PSO with simple and efficient neighbourhood search strategies (NSPSO), which employs one local and two global neighbourhood search strategies. By this ... 详细信息
来源: 评论
Research on adaptive strategy for end-hopping system
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第11 A期32卷 51-57页
作者: Zhao, Chun-Lei Jia, Chun-Fu Weng, Chen Lin, Kai College of Information Technical Science Nankai University Tianjin 300071 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China
An adaptive strategy was proposed for EH system. Modules of attack detection, feedback transmission and adaptive control were added to original EH system. They could help to make threats analysis and adjust hopping st... 详细信息
来源: 评论
Detecting implicit exceptions of service-oriented application based on context
Detecting implicit exceptions of service-oriented applicatio...
收藏 引用
2010 International Conference on computer and Information Application, ICCIA 2010
作者: Jia, Xiangyang Ying, Shi Zhao, Kai Wu, Qing State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China
Implicit exceptions in service-oriented applications will result in uncertainty of system, incorrect business data, unexpected error pages, or even uncovered disaster situations. This paper proposes a context-based ap... 详细信息
来源: 评论
Heterogeneous multi-core parallel SGEMM performance testing and analysis on Cell/B.E processor
Heterogeneous multi-core parallel SGEMM performance testing ...
收藏 引用
IEEE International Conference on Networking, Architecture and Storage
作者: Li, Yan Zhang, Yunquan Wang, Ke Guan, Wenhua Lab. of Parallel Software and Computational Science ISCAS Beijing China State Key Lab. of Computer Science CAS Beijing China Graduate University Chinese Academy of Sciences Beijing China
Matrix multiplication is one of the most common and vital numerical operations in the field of scientific computing, which is the kernel routine of Level 3 BLAS. The STI CELL processor is a heterogeneous multiprocesso... 详细信息
来源: 评论