咨询与建议

限定检索结果

文献类型

  • 612 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 841 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 640 篇 工学
    • 540 篇 计算机科学与技术...
    • 448 篇 软件工程
    • 123 篇 信息与通信工程
    • 93 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 215 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 111 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 13 篇 web services
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 accuracy
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy

机构

  • 91 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 school of comput...
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 791 篇 英文
  • 32 篇 中文
  • 19 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
841 条 记 录,以下是661-670 订阅
Motion estimation for a mobile robot based on real-time stereo vision system
Motion estimation for a mobile robot based on real-time ster...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Zhongli, Wang Xueshan, Gao Baochang, Zhang Hao, Wu State Key Lab. of Robotics and System Harbin Institute of Technology Harbin China School of Computer Science Beijing Institute of Technology Beijing China Intelligent Robotics Institute Beijing Institute of Technology Beijing China School of Automation Science and Electric Engineering Beihang University Beijing China
Vision-based motion estimation is a key technique in autonomously mobile robot. This paper presents an integrated method for motion estimation of the mobile robot based on floor plane extraction. The whole processes i... 详细信息
来源: 评论
An adaptive physically-based deformation on distance fields
收藏 引用
Journal of Information and Computational science 2009年 第6期6卷 2263-2270页
作者: Wu, Xiaoxiao Liang, Xiaohui Xu, Qidi State Key Lab. of Virtual Reality Technology School of Computer Science Beihang University Beijing 100191 China
This paper presents a novel adaptive deformation algorithm by integrating the representations of ADFs and physically based deformable models. The octree-based adaptively sampled distance fields (ADFs) are employed as ... 详细信息
来源: 评论
A novel clustering algorithm based on multi-sampling max-min distance and dynamic tunneling method
收藏 引用
Journal of Information and Computational science 2009年 第2期6卷 637-642页
作者: Lv, Jia Chongqing Key Lab. of Operations Research and System Engineering College of Mathematics and Computer Science Chongqing Normal University Chongqing 400047 China
In view of the limitations that k-means clustering algorithm is sensitive to the initial points and liable to fall into local minimum point, a clustering algorithm based on multi-sampling max-min distance and dynamic ... 详细信息
来源: 评论
Program Verification by Reduction to Semi-algebraic systems Solving
Communications in Computer and Information Science
收藏 引用
Communications in computer and Information science 2009年 17卷 277-291页
作者: Xia, Bican Yang, Lu Zhan, Naijun LMAM and School of Mathematical Sciences Peking University China Shanghai Key Lab. of Trustworthy Computing East China Normal University China Lab. of Computer Science Institute of Software Chinese Academy of Sciences China
The discovery of invariants and ranking functions plays a central role in program verification. In our previous work, we investigated invariant generation and non-linear ranking function discovering of polynomial prog... 详细信息
来源: 评论
Construct pairwise test suites based on the Bak-Sneppen model of biological evolution
收藏 引用
World Academy of science, Engineering and Technology 2009年 35卷 224-229页
作者: Yuan, Jianjun Jiang, Changjun Department of Computer Science and Technology The Key Lab. of 'Embedded System and Service Computing' Ministry of Education of China Tongji University Shanghai 201804 China
Pairwise testing, which requires that every combination of valid values of each pair of system factors be covered by at lease one test case, plays an important role in software testing since many faults are caused by ... 详细信息
来源: 评论
L-UCON: Towards layered access control with UCON
L-UCON: Towards layered access control with UCON
收藏 引用
7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2009
作者: Hu, Hao Li, Hao Feng, Dengguo Dept. of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China State Key Lab. of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China National Engineering Research Center for Information Security Beijing 100190 China
Traditional access control solutions suffer from difficulties in access rights authorization and usage policy enforcement, especially in highly distributed environments. The layered nature of common digital content sh... 详细信息
来源: 评论
Investigation and analysis of the weakness and efficiency of generalized cycling attacks on RSA modulus
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第6期30卷 70-74页
作者: Jiang, Zheng-Tao Huai, Jin-Peng Wang, Yu-Min School of Computer Science Communication University of China Beijing 100024 China School of Computer Science and Technology Beijing University of Aeronautics and Astronautics Beijing 100083 China National Lab. of Software Development Environment Beijing University of Aeronautics and Astronautics Beijing 100083 China National Key Lab. of Integrated Service Networks Xidian Univ. Xi'an 710071 China
The efficiency of attacking methods on secure RSA modulus was investigated. It was pointed out by analysis that since the success probability of some attack methods was neglectable, these methods could not be regarded... 详细信息
来源: 评论
Structuring and manipulating hand-drawn concept maps  09
Structuring and manipulating hand-drawn concept maps
收藏 引用
13th International Conference on Intelligent User Interfaces, IUI'09
作者: Jiang, Yingying Tian, Feng Wang, Xugang Zhang, Xiaolong Dai, Guozhong Wang, Hongan State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Intelligence Engineering Lab. Institute of Software Chinese Academy of Sciences China Pennsylvania State University United States
Concept maps are an important tool to knowledge organization, representation, and sharing. Most current concept map tools do not provide full support for hand-drawn concept map creation and manipulation, largely due t... 详细信息
来源: 评论
Asymmetric group key agreement
Asymmetric group key agreement
收藏 引用
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009
作者: Qianhong, Wu Yi, Mu Susilo, Willy Bo, Qin Domingo-Ferrer, Josep Universitat Rovira i Virgili Dept. of Comp. Eng. and Maths UNESCO Department of Data Privacy Tarragona Catalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing School of Computer Wuhan University China Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Australia Dept. of Maths School of Science Xi'an University of Technology China
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish a confiDential channel among group m... 详细信息
来源: 评论
Resource-Aware Test Suite Optimization
Resource-Aware Test Suite Optimization
收藏 引用
International Conference on Quality software
作者: Xiaofang Zhang Huamao Shan Ju Qian State Key Lab. for Novel Software Technology Nanjing University China school of Computer Science & Technology Soochow University China School of Computer Science & Engineering Southeast University China College of Information Science & Technology Nanjing University of Aeronautics and Astronautics China
Regression testing is an expensive and frequently executed activity, which is often performed in a resource constrained execution environment. As resource-aware test suite optimization problem can be reduced to the 0-... 详细信息
来源: 评论