咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 222 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 833 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 634 篇 工学
    • 534 篇 计算机科学与技术...
    • 445 篇 软件工程
    • 123 篇 信息与通信工程
    • 90 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 87 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 school of comput...
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 791 篇 英文
  • 31 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
833 条 记 录,以下是711-720 订阅
排序:
The tilt cursor: Enhancing stimulus-response compatibility by providing 3D orientation cue of pen
Conference on Human Factors in Computing Systems - Proceedin...
收藏 引用
Conference on Human Factors in Computing systems - Proceedings 2007年 303-306页
作者: Tian, Feng Ao, Xiang Wang, Hongan Setlur, Vidya Dai, Guozhong Intelligence Engineering Lab. Institute of Software Chinese Academy of Sciences P.O.Box 8718 Beijing China State Key Lab. of Computer Science P.O.Box 8718 Beijing China Nokia Research Palo Alto 975 Page Mill Road Palo Alto CA United States
In order to improve stimulus-response compatibility of touchpad in pen-based user interface, we present the tilt cursor, i.e. a cursor dynamically reshapes itself to providing the 3D orientation cue of pen. We also pr... 详细信息
来源: 评论
An access control model in lager-scale P2P file sharing systems
An access control model in lager-scale P2P file sharing syst...
收藏 引用
7th International Conference on Computational science (ICCS 2007)
作者: Yue Guang-xue Yu Fei Chen Li-ping Chen Yi-jun College of Information Engineering Jiaxing University 314000 China Department of Computer Science and Technology Huaihua University 418000 China State Key Lab. for Novel Software Technology Nanjing University 210093 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University 2150063 China
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonym... 详细信息
来源: 评论
Approximation to the minimum rooted star cover problem
Approximation to the minimum rooted star cover problem
收藏 引用
4th International Conference on Theory and Applications of Models of Computation, TAMC 2007
作者: Wenbo, Zhao Peng, Zhang State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences P.O.Box 8718 Beijing 100080 China Graduate University Chinese Academy of Sciences Beijing China
In this paper, we study the following minimum rooted star cover problem: given a complete graph G = (V, E) with a length function l : E &rarr + that satisfies the triangle inequality, a designated root vertex r ∈... 详细信息
来源: 评论
A new group rekeying scheme based on t-packing designs for ad hoc networks  2
A new group rekeying scheme based on t-packing designs for a...
收藏 引用
2nd International Conference on Scalab.e Information systems, InfoScale 2007
作者: Chen, Jianwei Xu, Li Mu, Yi Key Lab. of Network Security and Cryptology Fujian Normal University Fuzhou350007 China School of Computer Science and Software Engineering University of Wollongong WollongongNSW2522 Australia
Secure group key distribution and efficient rekeying is one of the most challenging security issues in ad hoc networks at present. In this paper, Latin squares are used to construct orthogonal arrays in order to quick... 详细信息
来源: 评论
An energy-aware protocol for data gathering applications in wireless sensor networks
An energy-aware protocol for data gathering applications in ...
收藏 引用
IEEE International Conference on Communications (ICC 2007)
作者: Liu, Ming Zheng, Yuan Cao, Jiannong Chen, Guihai Chen, Lijun Gong, Haigang School of Computer Science and Engineering University of Electronic and Technology of China China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong State Key Laboratory for Novel Software Technology Nanjing University China
Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energy of sensor nodes while meeting the requ... 详细信息
来源: 评论
Improved H.264 GOP-level bit allocation by incremental PID algorithm
Improved H.264 GOP-level bit allocation by incremental PID a...
收藏 引用
IET Conference on Wireless, Mobile and Sensor Networks 2007, CCWMSN'07
作者: Shen, Liquan Zhang, Zhaoyang Li, Ying Liu, Zhi Key Lab. of Advanced Display and System Application Ministry of Education Shanghai Univ. Shanghai 200072 China School of Computer Engineering and Science Shanghai University Shanghai 200072 China
Since the current rate control schemes in H.264 do not present the capability of efficient GOP-level bit allocation, the video quality varies greatly for sequences with the scene change or the scene complexity varying... 详细信息
来源: 评论
The soundness and completeness proof of agent intention in AgentSpeak  07
The soundness and completeness proof of agent intention in A...
收藏 引用
IEEE/WIC/ACM International Conference on Web Intelligence, WI 2007
作者: Yang, Bo Qin, Zheng Yu, Fan Qin, Jun Dep. of Computer Science and Technology Xi'an Jiaotong University Dep. of Computer Science and Technology Xi'an Jiaotong University Tsinghua University Key Lab. for ISS Software School Tsinghua University Manchester Business School
Autonomy is one of the characteristics that agent has which distinguish agent systems from the other conceptualisations within computer science. To prove the validity of intention execution in AgentSpeak, according to... 详细信息
来源: 评论
Real-time component composition using hierarchical timed automata
Real-time component composition using hierarchical timed aut...
收藏 引用
7th International Conference on Quality software, QSIC 2007
作者: Jin, Xianli Huadong, Ma. Gu, Zonghua Beijing Key Lab. of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Engineering Hong Kong University of Science and Technology HKG Hong Kong
In component-based software development, it is important to use formal models to describe component composition. However, the existing component composition models generally ignore real-time issues. We present a forma... 详细信息
来源: 评论
ReCoDa: Reliable forwarding of correlated data in sensor networks with low latency  07
ReCoDa: Reliable forwarding of correlated data in sensor net...
收藏 引用
IWCMC 2007: 2007 International Wireless Communications and Mobile Computing Conference
作者: Luo, Hong Zhang, Zengjun Liu, Yonghe Beijing Key Lab. of Intelligent Telecom Software and Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Engineering University of Texas at Arlington Arlington TX 76019
The method of using in-network aggregation for energy efficient data collection often results in processing delay and additional time for gathering related data at an intermediate node. This unfortunately may make the... 详细信息
来源: 评论
A new data protecting scheme based on TPM
A new data protecting scheme based on TPM
收藏 引用
SNPD 2007: 8th ACIS International Conference on software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Mingdi, Xu Jian, He Bo, Zhang Huanguo, Zhang School of Computer State Key Lab. of Software Engineering Wuhan University Informationization Construction Teaching and Research Section Commanding Communications Academy Computer Faculty Working Office Electronic Information Department Hubei Water Resources Technical College
Trusted platform model (TPM) is special-purpose integrated circuits built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to confident... 详细信息
来源: 评论