咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 223 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 635 篇 工学
    • 535 篇 计算机科学与技术...
    • 446 篇 软件工程
    • 123 篇 信息与通信工程
    • 90 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 87 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 792 篇 英文
  • 31 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是641-650 订阅
排序:
A novel two-step-deformation active contour with application to facial features extraction
A novel two-step-deformation active contour with application...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Hua, Zhang Yuanquan, Wang Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
In allusion to the boundary leaking problem of traditional active contours when used to extract facial features, two kinds of local information are introduced to enhance the weak boundary, then to build new external f... 详细信息
来源: 评论
Multi quay crane scheduling problem based on ACO in container terminals
Multi quay crane scheduling problem based on ACO in containe...
收藏 引用
International Conference on Management and Service science, MASS 2009
作者: Su, Wang Wenbin, Hu Computer Center School of Information Science and Technology East China Normal University Shang Hai China State Key Lab. for Novel Software Technology Nanjing University Nan Jing China
Quay crane scheduling problem is a very important multi resource scheduling problem in container terminals. This paper gives the general model of quay crane scheduling and introduces a heuristic method Ant Colony Opti... 详细信息
来源: 评论
Realization of GPS information real-time marking system
Realization of GPS information real-time marking system
收藏 引用
ICCAS-SICE 2009 - ICROS-SICE International Joint Conference 2009
作者: Yan, Zhiwei Du, Junping Xu, Feng Beijing Key Lab. of Intelligent Telecommunication Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China
Multimedia tourism intelligent navigation system requires that the third party identifies and displays the location of GPS information receiver. A comprehensive method is presented to realize a GPS information real ti... 详细信息
来源: 评论
Stream data classification using improved fisher discriminate analysis
Stream data classification using improved fisher discriminat...
收藏 引用
作者: Chen, Ling Zou, Ling-Jun Li, Tu Department of Computer Science Yangzhou University Yangzhou China State Key Lab. of Novel Software Tech. Nanjing University Nanjing China College of Information Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China
A modified Fisher discriminate analysis method for classifying stream data is presented. To satisfy the real-time demand in classifying stream data, this method defines a new criterion for Fisher discriminate analysis... 详细信息
来源: 评论
Internet service fault management using active probing in uncertain and noisy environment
Internet service fault management using active probing in un...
收藏 引用
2009 4th International Conference on Communications and Networking in China, CHINACOM 2009
作者: Chu, L.W. Zou, S.H. Cheng, S.D. Wang, W.D. Tian, C.Q. State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Computer Science and Technology Tongji University Shanghai China
The great challenges of Internet service fault management are uncertainty and noise. To address these challenges, we model the service scenario through a multi-layer management model, and propose an approach using act... 详细信息
来源: 评论
pService: Towards similarity search on peer-to-peer web services discovery
pService: Towards similarity search on peer-to-peer web serv...
收藏 引用
1st International Conference on Advances in P2P systems, AP2PS 2009
作者: Zhou, Gang Yu, Jianjun National Digital Switching System Engineering and Technological Research Center 450002 France State Key Lab. of Software Development Environment Beihang University 100191 China Computer Network Information Center Chinese Academy of Sciences 100190 China
We present the design of pService system for P2P Web services discovery supporting similarity earch with its locality-preserving feature based on modified Skip Graph. In pService, the most important property (e.g. ser... 详细信息
来源: 评论
Dynamic allocation and scheduling of multi-resources based on multi-agent ant colony algorithm
Dynamic allocation and scheduling of multi-resources based o...
收藏 引用
2009 International Conference on Information Engineering and computer science, ICIECS 2009
作者: Hu, Wenbin Hu, Zhengbing Cheng, Yuheng Sun, Ni Le, Yu Li, Li Yang, Renkai Computer School Wuhan University Wuhan 430079 China State Key Lab. for Novel Software Technology Nanjing University China Department of Information Technology Huazhong Normal University China
Resource-constrained project scheduling and configuration determine the progress of the construction and quality. This paper constructs a model for dynamic resources allocation and scheduling based on priority and fuz... 详细信息
来源: 评论
An efficient algorithm for finding frequent items in a stream
An efficient algorithm for finding frequent items in a strea...
收藏 引用
2nd International Symposium on Electronic Commerce and Security, ISECS 2009
作者: Tu, Li Chen, Ling Zhang, Shan Department of Computer Science Institute of Information Science and Technology Jiangyin Polytechnic College Nanjing Jiangyin China Department of Computer Science National Key Lab. of Novel Software Tech. Yangzhou University Yangzhou Nanjing China Department of Computer Science Yangzhou University Yangzhou China
Most of the existing algorithms for mining frequent items over data streams do not emphasis the importance of the more recent data items. We present an efficient algorithm where a fading factor λ is used for computin... 详细信息
来源: 评论
A reference model based adaptive fuzzy controller for nonlinear dynamic systems
A reference model based adaptive fuzzy controller for nonlin...
收藏 引用
6th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2009
作者: Li, Li Sun, Fuchun College of Computer and Information Engineering Tianjin Normal University Tianjin 300387 China Dept. of Computer Science and Technology State Key Lab. of Intelligent Technology and Systems Tsinghua University Beijing 100084 China
In this paper, we first present some dynamic TS fuzzy subsystems to approximate a nonlinear system. To make the subsystems asymptotically stable, the reference model with the same fuzzy sets of the system rule is esta... 详细信息
来源: 评论
Anomaly detection by clustering in the network
Anomaly detection by clustering in the network
收藏 引用
2009 International Conference on Computational Intelligence and software Engineering, CiSE 2009
作者: Guo, Feng Yang, Yingzhen Duan, Lian Pervasive Computing Lab. College of Computer Science Zhejiang University Hangzhou China State Key Lab. of CAD and CG Zhejiang University Iowa City IA United States Department of Management Science Henry B. Tippie College of Business University of Iowa Iowa City IA United States
Intrusions impose serious security threat to network environment, so it is necessary to detect and cope with them. Many intrusion detection methods focus on signature detection, where models are built to recognize kno... 详细信息
来源: 评论