咨询与建议

限定检索结果

文献类型

  • 612 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 841 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 640 篇 工学
    • 540 篇 计算机科学与技术...
    • 448 篇 软件工程
    • 123 篇 信息与通信工程
    • 93 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 215 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 111 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 13 篇 web services
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 accuracy
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy

机构

  • 91 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 school of comput...
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 791 篇 英文
  • 32 篇 中文
  • 19 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
841 条 记 录,以下是691-700 订阅
GEMI: A high performance and high flexibility memory interface architecture for complex embedded SOC
GEMI: A high performance and high flexibility memory interfa...
收藏 引用
International Conference on computer science and software Engineering, CSSE 2008
作者: Hualong, Zhao Hongshi, Sang Tianxu, Zhang Yebin, Fan State Key Lab. for Multi-spectral Information Processing Technologies Institute for Pattern Recognition and Artificial Intelligence Huazhong University of Science and Technology Wuhan China Department of Computer Science Huazhong University of Science and Technology Wuhan China
Two of the most significant factors in the success of today's system-on-chip (SoC) designs are the ability to deliver efficient access to off-chip high speed memory and the ability to be compatible with several di... 详细信息
来源: 评论
A probabilistic approach to consistency checking for pervasive context
A probabilistic approach to consistency checking for pervasi...
收藏 引用
5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
作者: Huang, Yu Ma, Xiang Tao, Xianping Cao, Jiannong Lu, Jian State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflicting contexts and cannot decide how to ad... 详细信息
来源: 评论
Framework of multi-source Web service discovery
收藏 引用
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of science and Technology (Natural science Edition) 2008年 第5期9卷 431-435页
作者: Ou, Wei-Jie Wang, Ke Zeng, Cheng Li, De-Yi Peng, Zhi-Yong State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China China Institute of Electronic System Engineering Beijing 100840 China Computer School Wuhan University Wuhan 430073 China
In an attempt to enhance the efficiency of searching Web services across multiple sources, a discovery approach based on information retrieval technology was proposed, which was designed for multi-source web service. ... 详细信息
来源: 评论
Functional Ontology of Routing Reputation for MANET
Functional Ontology of Routing Reputation for MANET
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Wei Guo Zhong-Wei Xiong Ren-Zuo Xu College of Computer Science Wuhan University Wuhan China State Key Lab. of Software Engineering Wuhan University Wuhan China
The nature of mobile ad hoc networks make the routing is highly dependent on cooperate behavior between nodes, and using reputation mechanism can enforce cooperation among the nodes to prevent selfish behavior. This a... 详细信息
来源: 评论
BIFI: Architectural support for information flow integrity measurement
BIFI: Architectural support for information flow integrity m...
收藏 引用
International Conference on computer science and software Engineering, CSSE 2008
作者: Hao, Hu Dengguo, Feng Dept. of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China The State Key Lab. of Information Security Institute of Software Chinese Academy of Sciences National Engineering Research Center for Information Security Beijing 100190 China
Information flow security has been an important security requirement of existing operating systems, especially for distributed applications. We are interested in protecting information flow security with an eye to inf... 详细信息
来源: 评论
Color face recognition based on 2DPCA
Color face recognition based on 2DPCA
收藏 引用
作者: Wang, Chengzhang Yin, Baocai Bai, Xiaoming Sun, Yanfeng Multimedia and Intelligent Software Technology Beijing Municipal Key Lab. College of Computer Science and Technology Beijing University of Technology Beijing 100124 China Information College Capital University of Economics and Business Beijing 100070 China
This paper presents a novel color face recognition approach based on 2DPCA. A matrix-representation model, which encodes the color information directly, is proposed to describe the color face image. The matrix-represe... 详细信息
来源: 评论
Mesh-guided optimized retexturing for image and video
Mesh-guided optimized retexturing for image and video
收藏 引用
作者: Guo, Yanwen Sun, Hanqiu Peng, Qunsheng Jiang, Zhongding IEEE National Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Engineering Chinese University of Hong Kong Shatin N.T. Hong Kong State Key Lab. CAD and CG Zhejiang University Hangzhou 310058 China Software School Fudan University Shanghai 201203 China
This paper presents a novel approach for replacing textures of specified regions in the input image and video using stretch-based mesh optimization. The retexturing results have the similar distortion and shading effe... 详细信息
来源: 评论
Formal semantics for component assembly pattern of software architecture
Formal semantics for component assembly pattern of software ...
收藏 引用
IEEE International Conference on Industrial Engineering and Engineering Management
作者: Wei Guo Sheng Xu Ren Zuo Xu College of Computer Science Wuhan University Wuhan China International Software School Wuhan University Wuhan China State Key Lab. of Software Engineering Wuhan University Wuhan China
The performance and reliability of component-based software architectures rely fundamentally on the quality of the components and the configuration that the system is composed. This paper analysis the assembly pattern... 详细信息
来源: 评论
Format-compliant entropy coding encryption algorithms for wireless video system
Format-compliant entropy coding encryption algorithms for wi...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Li-Feng, Wang Jian, Ma Wen-Dong, Wang Kong-Qiao, Wang Chen, Xiao State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Electronic and Information Engineering Beijing Electronic Science and Technology Institute Beijing China Nokia Research Center Beijing China School of Computer Science and Technology Bei Hang University Beijing China
Wireless video security becomes an important challenge for commercial applications. Two efficient encryption algorithms for video system, Signed Integer Exponential-Golomb Coded (SE) Encryption Algorithm and Context-A... 详细信息
来源: 评论
Network Security Evaluation Algorithm Based on Access Level Vectors
Network Security Evaluation Algorithm Based on Access Level ...
收藏 引用
The 9th International Conference for Young computer Scientists(第九届国际青年计算机大会)
作者: Kai Li Naijie Gu Kun Bi Hongzhu Ji Department of Computer Science and Technology University of Science and Technology of China Hefei China 230027 Anhui Province Key Lab. of Computing and Communication Software Hefei China 230027
The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper pres... 详细信息
来源: 评论