咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 223 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 635 篇 工学
    • 535 篇 计算机科学与技术...
    • 446 篇 软件工程
    • 123 篇 信息与通信工程
    • 90 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 87 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 792 篇 英文
  • 31 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是671-680 订阅
排序:
Active BSVM learning for relevance feedback in content-based sketch retrieval
Active BSVM learning for relevance feedback in content-based...
收藏 引用
5th IASTED International Conference on Signal Processing, Pattern Recognition, and Applications, SPPRA 2008
作者: Liang, Shuang Sun, Zhengxing State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
The availab.lity of relevance feedback is held back by the problem of the imbalance and limited size of lab.led training data, as well as the real-time requirement of online interaction demands. In this paper, we prop... 详细信息
来源: 评论
Intrusion detection based on improved fuzzy C-means algorithm
Intrusion detection based on improved fuzzy C-means algorith...
收藏 引用
2008 International Symposium on Information science and Engineering, ISISE 2008
作者: Wei, Jiang Yao, Min Yan, Jun College of Computer Zhejiang University Wuhan 430072 China State Key Lab. for Software Engineering Wuhan University Hangzhou 310027 China
Clustering is one of the important means of Intrusion detection. In order to overcome the disadvantages of fuzzy C-means algorithm, this paper presents a kind of improved fuzzy C-means algorithm (IFCM for short). IFCM... 详细信息
来源: 评论
Mining frequent subgraph by incidence matrix normalization
Mining frequent subgraph by incidence matrix normalization
收藏 引用
作者: Wu, Jia Chen, Ling Department of Computer Science Yangzhou University Yangzhou China National Key Lab. of Novel Software Tech. Nanjing University Nanjing China
Existing frequent subgraph mining algorithms can operate efficiently on graphs that are sparse, have vertices with low and bounded degrees, and contain well-lab.led vertices and edges. However, there are a number of a... 详细信息
来源: 评论
An all-normal-dispersion Yb-doped fiber laser without the spectral filtering
An all-normal-dispersion Yb-doped fiber laser without the sp...
收藏 引用
Advanced Solid-state Photonics, ASSP 2008
作者: Zhou, Chun Li, Peng Dai, Yongheng Zhang, Zhigang Institute of Quantum Electronics School of Electronics Engineering and Computer Science State Key Lab. of Advanced Optical Communication System and Networks University of Beijing 5 Yiheyuan Rd Beijing 100871 China
We demonstrated a simple all-normal-dispersion Yb-doped femtosecond fiber laser, which delivers a pulse with 8.9 nJ and 33 MHz. After the extracavity compression with a grating pair, the pulse was compressed to 210 fs... 详细信息
来源: 评论
Program Verification by Reduction to Semi-algebraic systems Solving
Program Verification by Reduction to Semi-algebraic Systems ...
收藏 引用
作者: Xia, Bican Yang, Lu Zhan, Naijun LMAM and School of Mathematical Sciences Peking University China Shanghai Key Lab. of Trustworthy Computing East China Normal University China Lab. of Computer Science Institute of Software Chinese Academy of Sciences China
The discovery of invariants and ranking functions plays a central role in program verification. In our previous work, we investigated invariant generation and non-linear ranking function discovering of polynomial prog... 详细信息
来源: 评论
An analysis of the behavior of original discrete binary particle swarm optimization on trap functions
An analysis of the behavior of original discrete binary part...
收藏 引用
International Conference on computer science and software Engineering, CSSE 2008
作者: Xu, Xing Li, Yuanxiang Wu, Yu Fang, Shenlin Hu, Hao State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China Computer School Wuhan University Wuhan 430072 China School of Information Science and Engineering Jiangsu Polytechnic University Changzhou 213016 China
Binary particle swarm optimization (BPSO) is the discrete binary version of particle swarm optimization (PSO) which is based on a metaphor of social behavior of birds and is a new kind of evolutionary computation para... 详细信息
来源: 评论
Stochastic stabilization of networked control systems with time-varying sampling periods
Stochastic stabilization of networked control systems with t...
收藏 引用
2008 11th IEEE International Conference on Communication Technology, ICCT 2008
作者: Wang, Yan Sun, Zeng Qi School of Automation Science and Electrical Engineering Beihang University Beijing 100084 China State Key Lab. of Intelligent Technology and Systems Department of Computer Science Tsinghua University Beijing 100084 China
This paper presents a stochastic control method for networked control systems(NCSs) with time-varying sampling periods and random delay. The random delay of the NCS is modelled as intervals governed by a Markov chain.... 详细信息
来源: 评论
A generic model for multi-dimensional separation of concerns at architecture level
A generic model for multi-dimensional separation of concerns...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Zhang, Lin-Lin Ying, Shi Ni, You-Cong Wen, Jing Zhao, Kai Ye, Peng State Key Lab. of Software Engineering Wuhan University Wuhan China School of Information Science and Engineering Xinjiang University Urumqi China Department of Mathematics and Physics Anhui Institute of Architecture and Industry Hefei China College of Computer Science Wuhan University of Science and Engineering Wuhan China
software architecture design is an important stage in the whole software development lifecycle. There are so many various concerns at architecture level which relate to all kinds of stakeholders and describe the all f... 详细信息
来源: 评论
GEMI: A high performance and high flexibility memory interface architecture for complex embedded SOC
GEMI: A high performance and high flexibility memory interfa...
收藏 引用
International Conference on computer science and software Engineering, CSSE 2008
作者: Hualong, Zhao Hongshi, Sang Tianxu, Zhang Yebin, Fan State Key Lab. for Multi-spectral Information Processing Technologies Institute for Pattern Recognition and Artificial Intelligence Huazhong University of Science and Technology Wuhan China Department of Computer Science Huazhong University of Science and Technology Wuhan China
Two of the most significant factors in the success of today's system-on-chip (SoC) designs are the ability to deliver efficient access to off-chip high speed memory and the ability to be compatible with several di... 详细信息
来源: 评论
A probabilistic approach to consistency checking for pervasive context
A probabilistic approach to consistency checking for pervasi...
收藏 引用
5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
作者: Huang, Yu Ma, Xiang Tao, Xianping Cao, Jiannong Lu, Jian State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflicting contexts and cannot decide how to ad... 详细信息
来源: 评论