咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 223 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 635 篇 工学
    • 536 篇 计算机科学与技术...
    • 447 篇 软件工程
    • 123 篇 信息与通信工程
    • 90 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 356 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 87 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 792 篇 英文
  • 31 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是561-570 订阅
排序:
Research on the adaptable reputation-based scheduling for storage resources in data grids
Research on the adaptable reputation-based scheduling for st...
收藏 引用
International Conference on Internet Technology and Applications, ITAP 2010
作者: Liu, Wei Huang, Xun Du, Wei Department of Computer Science Wuhan University of Technology Wuhan 430063 China State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Institute of Computer Science Huazhong University of Science and Technology Wuhan 430074 China
Data grids provide the data-intensive applications with a large virtual stroage framework. We use a reputation-based trust aggregation approach for data providers to quantitatively predict and calculate whether or not... 详细信息
来源: 评论
A kind of service-aware computing method for Web-based mobile application with uncertainty
A kind of service-aware computing method for Web-based mobil...
收藏 引用
2010 IEEE 5th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2010
作者: Zhang, De-Gan Kang, Xue-Jing Dai, Wen-Bo Chen, Ying Fayek, Moaty Tianjin Key Lab. of Lntelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 Tiajin China Department of Computer Science California State University Chico CA 95929 United States
As we know, service-aware computing is an important part of pervasive computing for Web-based mobile application with uncertainty. We modified the fusion method of evidence information after considering context's ... 详细信息
来源: 评论
The optimal replica distribution to minimize the search size in the unstructured overlay
The optimal replica distribution to minimize the search size...
收藏 引用
IEEE International Conference on High Performance Computing and Communication
作者: Feng, Guofu Li, Wenzhong Lu, Sanglu Chen, Daoxu School of Information Science Nanjing Audit University Nanjing 210029 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
Replication is a widely used technique in unstructured overlays to improve the content availab.lity or the system performance. Among the prior work on replication, a fundamental question is often addressed: how many r... 详细信息
来源: 评论
An Adaptive Bandwidth-Aware Overlay for the maximum throughput in the unstructured peer-to-peer
An Adaptive Bandwidth-Aware Overlay for the maximum throughp...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
作者: Feng, Guofu Sun, Yuxing Li, WenZhong Lu, Sanglu School of Information Science Nanjing Audit University Nanjing 210029 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
Heterogeneity among users is the main concern in building the unstructured P2P topology. However, the related algorithms either only pay attention to the weight heterogeneity in hitting the queries to improve the sear... 详细信息
来源: 评论
Program slicing based web-service generation and composition
Program slicing based web-service generation and composition
收藏 引用
5th IEEE International Symposium on Service-Oriented system Engineering, SOSE 2010
作者: Fu, Wei Zhang, Yingzhou Han, Wei Fan, Xiaowei Yang, Geng College of Computer Nanjing Univ. of Posts and Telecomm. Nanjing 210003 China State Key Lab. of Networking and Switching Technology Beijing Univ. of Posts and Telecomm. Beijing 100876 China State Key Lab. of Novel Software Technology Nanjing Univ. Nanjing 210093 China
As the development of web services, much attention has been drawn to web service because of its convenience and platform-independence. However, how to discover, generate and compose services has become an open issue r... 详细信息
来源: 评论
D-TDMA: An approach of dynamic TDMA scheduling for target tracking in wireless sensor networks
D-TDMA: An approach of dynamic TDMA scheduling for target tr...
收藏 引用
2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010
作者: Wang, Yun Shi, Peizhong Li, Kai Chen, Zhikui Department of Computer Science and Engineering Southeast University Key Lab. of Computer Network and Information Integration Nanjing 210096 China School of Software Technology Dalian University of Technology Dalian 116024 China
In the application of target tracking based on dynamic convey tree-based collab.ration (DCTC) in wireless sensor networks, collisions and interferences among nodes pose a challenge for data aggregation. In this paper,... 详细信息
来源: 评论
Coherent depth test scheme in FreePipe
Coherent depth test scheme in FreePipe
收藏 引用
作者: Liu, Fang Huang, Mengcheng Liu, Xuehui Wu, En-Hua SuperComputing Center Computer Network Information Center Chinese Academy of Sciences China State Key Lab. of Computer Sciences Institute of Software Chinese Academy of Sciences China University of Macau China
This paper presents a rasterization rendering pipeline namely FreePipe. The system builds a bridge between the traditional graphics pipelines and the general purpose computing architecture CUDA by taking advantages of... 详细信息
来源: 评论
GA-based container terminal stockpile block plan optimization and simulation
GA-based container terminal stockpile block plan optimizatio...
收藏 引用
2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010
作者: Li, Li Hu, Wenbin Hu, Zhengbing Sun, Ni Min, Zhenyu Cheng, Yuheng Zhanghai Lu, Bin Computer School Wuhan University Wuhan 430079 China State Key Lab. for Novel Software Technology Nanjing University China Department of Information Technology Huazhong Normal University China
In the stockpile schedule, a reasonable block allocation plan was a good foundation for the bay allocation plans, location choices for coming containers, containers turning schedule, and the shipments. This paper has ... 详细信息
来源: 评论
An improved algorithm to optimize the access time of data broadcast in mobile computing environments
An improved algorithm to optimize the access time of data br...
收藏 引用
2nd International Workshop on Education Technology and computer science, ETCS 2010
作者: Xu, Long Hu, Wenbin Hu, Zhengbing Tan, Xinlong Xia, Chang Computer School Wuhan University Wuhan 430079 China State Key Lab. for Novel Software Technology Nanjing University China Department of Information Technology Huazhong Normal University China
With its large market potential and large amounts of clients, mobile data broadcasting has been a very essential part of nowadays communication. As mobile data broadcasting become more important, the algorithm to make... 详细信息
来源: 评论
Mixed-row-based space allocation strategy for outbound containers
Mixed-row-based space allocation strategy for outbound conta...
收藏 引用
2nd International Conference on Information Engineering and computer science, ICIECS 2010
作者: Min, Zhenyu Hu, Wenbin Hu, Zhengbing Li, Li Sun, Ni Lu, Bin Computer School Wuhan University Wuhan 430079 China State Key Lab. for Novel Software Technology Nanjing University China Department of Information Technology Huazhong Normal University China
In this paper, a model is built to solve the problem of finding an optimal location for the outbound container when it will be loaded. And also a mixed-row-based strategy is put forward, together with a multiple-decis... 详细信息
来源: 评论