咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 223 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 635 篇 工学
    • 535 篇 计算机科学与技术...
    • 446 篇 软件工程
    • 123 篇 信息与通信工程
    • 90 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 87 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 792 篇 英文
  • 31 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是651-660 订阅
排序:
Boosting for learning a similarity measure in 2DPCA based face recognition
Boosting for learning a similarity measure in 2DPCA based fa...
收藏 引用
2009 WRI World Congress on computer science and Information Engineering, CSIE 2009
作者: Zhijie, Xu Jianqin, Zhang Xiwu, Dai School of Science Beijing University of Civil Engineering and Architecture Beijing 100044 China Institute of Geographical Sciences and Natural Resources Research State Key Lab. of Resources and Environmental Information System Beijing 100044 China
In this paper we address the problem of identifying the similarity measure for face recognition. The similarity measure plays an important role in pattern classification. However, with reference to 2D image matrix bas... 详细信息
来源: 评论
CED: A community-based event delivery protocol in publish/subscribe systems for Delay Tolerant Sensor Network (DTSN)
CED: A community-based event delivery protocol in publish/su...
收藏 引用
38th International Conference on Parallel Processing, ICPP-2009
作者: Zhu, Jinqi Liu, Ming Cao, Jiannong Chen, Guihai Gong, Haigang Xu, Fulong Dept. of Computer Science and Engineering University of Electronic Science and Technology of China Cheng du China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong State Key Laboratory for Novel Software Technology Nanjing University China
The basic operation of Delay Tolerant Sensor Network (DTSN) is to finish pervasive data gathering in networks with intermittent connectivity, while the publish/subscribe (Pub/Sub for short) paradigm is used to deliver... 详细信息
来源: 评论
Face image modeling by multilinear subspace analysis with missing values  09
Face image modeling by multilinear subspace analysis with mi...
收藏 引用
17th ACM International Conference on Multimedia, MM'09, with Co-located Workshops and Symposiums
作者: Geng, Xin Smith-Miles, Kate Zhou, Zhi-Hua Wang, Liang School of Mathematical Sciences Monash University VIC 3800 Australia School of Computer Science and Engineering Southeast University Nanjing 210096 China National Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Dept. of Computer Science and Software Eng. University of Melbourne VIC 3010 Australia
The main difficulty in face image modeling is to decompose those semantic factors contributing to the formation of the face images, such as identity, illumination and pose. One promising way is to organize the face im... 详细信息
来源: 评论
Motion estimation for a mobile robot based on real-time stereo vision system
Motion estimation for a mobile robot based on real-time ster...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Zhongli, Wang Xueshan, Gao Baochang, Zhang Hao, Wu State Key Lab. of Robotics and System Harbin Institute of Technology Harbin China School of Computer Science Beijing Institute of Technology Beijing China Intelligent Robotics Institute Beijing Institute of Technology Beijing China School of Automation Science and Electric Engineering Beihang University Beijing China
Vision-based motion estimation is a key technique in autonomously mobile robot. This paper presents an integrated method for motion estimation of the mobile robot based on floor plane extraction. The whole processes i... 详细信息
来源: 评论
An adaptive physically-based deformation on distance fields
收藏 引用
Journal of Information and Computational science 2009年 第6期6卷 2263-2270页
作者: Wu, Xiaoxiao Liang, Xiaohui Xu, Qidi State Key Lab. of Virtual Reality Technology School of Computer Science Beihang University Beijing 100191 China
This paper presents a novel adaptive deformation algorithm by integrating the representations of ADFs and physically based deformable models. The octree-based adaptively sampled distance fields (ADFs) are employed as ... 详细信息
来源: 评论
A novel clustering algorithm based on multi-sampling max-min distance and dynamic tunneling method
收藏 引用
Journal of Information and Computational science 2009年 第2期6卷 637-642页
作者: Lv, Jia Chongqing Key Lab. of Operations Research and System Engineering College of Mathematics and Computer Science Chongqing Normal University Chongqing 400047 China
In view of the limitations that k-means clustering algorithm is sensitive to the initial points and liable to fall into local minimum point, a clustering algorithm based on multi-sampling max-min distance and dynamic ... 详细信息
来源: 评论
Program Verification by Reduction to Semi-algebraic systems Solving
Communications in Computer and Information Science
收藏 引用
Communications in computer and Information science 2009年 17卷 277-291页
作者: Xia, Bican Yang, Lu Zhan, Naijun LMAM and School of Mathematical Sciences Peking University China Shanghai Key Lab. of Trustworthy Computing East China Normal University China Lab. of Computer Science Institute of Software Chinese Academy of Sciences China
The discovery of invariants and ranking functions plays a central role in program verification. In our previous work, we investigated invariant generation and non-linear ranking function discovering of polynomial prog... 详细信息
来源: 评论
Construct pairwise test suites based on the Bak-Sneppen model of biological evolution
收藏 引用
World Academy of science, Engineering and Technology 2009年 35卷 224-229页
作者: Yuan, Jianjun Jiang, Changjun Department of Computer Science and Technology The Key Lab. of 'Embedded System and Service Computing' Ministry of Education of China Tongji University Shanghai 201804 China
Pairwise testing, which requires that every combination of valid values of each pair of system factors be covered by at lease one test case, plays an important role in software testing since many faults are caused by ... 详细信息
来源: 评论
L-UCON: Towards layered access control with UCON
L-UCON: Towards layered access control with UCON
收藏 引用
7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2009
作者: Hu, Hao Li, Hao Feng, Dengguo Dept. of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China State Key Lab. of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China National Engineering Research Center for Information Security Beijing 100190 China
Traditional access control solutions suffer from difficulties in access rights authorization and usage policy enforcement, especially in highly distributed environments. The layered nature of common digital content sh... 详细信息
来源: 评论
Investigation and analysis of the weakness and efficiency of generalized cycling attacks on RSA modulus
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第6期30卷 70-74页
作者: Jiang, Zheng-Tao Huai, Jin-Peng Wang, Yu-Min School of Computer Science Communication University of China Beijing 100024 China School of Computer Science and Technology Beijing University of Aeronautics and Astronautics Beijing 100083 China National Lab. of Software Development Environment Beijing University of Aeronautics and Astronautics Beijing 100083 China National Key Lab. of Integrated Service Networks Xidian Univ. Xi'an 710071 China
The efficiency of attacking methods on secure RSA modulus was investigated. It was pointed out by analysis that since the success probability of some attack methods was neglectable, these methods could not be regarded... 详细信息
来源: 评论