咨询与建议

限定检索结果

文献类型

  • 615 篇 会议
  • 227 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 845 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 539 篇 计算机科学与技术...
    • 446 篇 软件工程
    • 124 篇 信息与通信工程
    • 92 篇 控制科学与工程
    • 48 篇 电子科学与技术(可...
    • 47 篇 电气工程
    • 41 篇 生物工程
    • 37 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 24 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 20 篇 安全科学与工程
    • 19 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 257 篇 数学
    • 61 篇 物理学
    • 55 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 28 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 109 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 12 篇 web services
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 quality of servi...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 federated learni...
  • 7 篇 accuracy
  • 7 篇 cloud computing

机构

  • 91 篇 state key lab. f...
  • 55 篇 state key lab. o...
  • 29 篇 university of ch...
  • 28 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 21 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 14 篇 school of comput...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 hunan provincial...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 13 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 9 篇 jianxun liu
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 760 篇 英文
  • 56 篇 其他
  • 30 篇 中文
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
845 条 记 录,以下是741-750 订阅
ReCoDa: Reliable forwarding of correlated data in sensor networks with low latency  07
ReCoDa: Reliable forwarding of correlated data in sensor net...
收藏 引用
IWCMC 2007: 2007 International Wireless Communications and Mobile Computing Conference
作者: Luo, Hong Zhang, Zengjun Liu, Yonghe Beijing Key Lab. of Intelligent Telecom Software and Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Engineering University of Texas at Arlington Arlington TX 76019
The method of using in-network aggregation for energy efficient data collection often results in processing delay and additional time for gathering related data at an intermediate node. This unfortunately may make the... 详细信息
来源: 评论
Research on trusted storage based on trusted computing platform
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第SUPPL.期28卷 117-120页
作者: Xu, Ming-Di Zhang, Huan-Guo School of Computer Wuhan University Wuhan 430072 China State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China
As an information carrier in trusted computing platform, the security issues about disk storage directly effected system security, dependability and data confidentiality. Therefore, introduced concept of trusted stora... 详细信息
来源: 评论
A new data protecting scheme based on TPM
A new data protecting scheme based on TPM
收藏 引用
SNPD 2007: 8th ACIS International Conference on software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Mingdi, Xu Jian, He Bo, Zhang Huanguo, Zhang School of Computer State Key Lab. of Software Engineering Wuhan University Informationization Construction Teaching and Research Section Commanding Communications Academy Computer Faculty Working Office Electronic Information Department Hubei Water Resources Technical College
Trusted platform model (TPM) is special-purpose integrated circuits built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to confident... 详细信息
来源: 评论
Automatic semantic web service composition via agent intention execution in AgentSpeak  07
Automatic semantic web service composition via agent intenti...
收藏 引用
IEEE/WIC/ACM International Conference on Web Intelligence, WI 2007
作者: Li, Huan Yu, Fan Qin, Zheng Qin, Jun Yang, Bo Dep. of Computer Science and Technology Xian JiaoTong University Dongguan University of Technology Key Lab. for ISS of MOE Software School Tsinghua University Dep. of Computer Science and Technology Xian JiaoTong University Tsinghua University Manchester Business School Dep. of Computer Science and Technology Xian JiaoTong University
AI planning is the main stream method for automatic semantic web service composition (SWSC) research. However, planning based SWSC method can only return service composition upon user requirement description and lacks... 详细信息
来源: 评论
Study on remote sensing image classification based on fractal theory and ridgelet neural network
收藏 引用
Guangzi Xuebao/Acta Photonica Sinica 2007年 第SUPPL.期36卷 342-345页
作者: Yan, He Pan, Ying-Jun Wu, Gang Li, Lei-Lei Dong, Shi-Dou Key Lab. of Optoelectronic Technology and System Department of Optoelectronic Engineering Chongqing University Chongqing 400044 China Department of Computer Science Chongqing Institute of Technology Chongqing 400050 China
Through comprehensively utilizing color spectrum, texture and shape feature of the remote sensing images, a novel method of image classification is presented based on the fractal theory and ridgelet neural network. Th... 详细信息
来源: 评论
An intelligent system for chinese calligraphy
An intelligent system for chinese calligraphy
收藏 引用
AAAI-07/IAAI-07 Proceedings: 22nd AAAI Conference on Artificial Intelligence and the 19th Innovative Applications of Artificial Intelligence Conference
作者: Xu, Songhua Jiang, Hao Lau, Francis C. M. Pan, Yunhe CAD and CG State Key Lab. of China Zhejiang University Hangzhou Zhejiang 310027 China Department of Computer Science Yale University New Haven CT 06511 United States Department of Computer Science University of Hong Kong Hong Kong Hong Kong Chinese Academy of Engineering Beijing 100088 China
Our work links Chinese calligraphy to computer science through an integrated intelligence approach. We first extract strokes of existent calligraphy using a semi-automatic, two-phase mechanism: the first phase tries t... 详细信息
来源: 评论
A long-distance control platform on environment urgency incident based on GSM\GPRS and 3S technology
A long-distance control platform on environment urgency inci...
收藏 引用
2007 IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2007
作者: Wenzheng, Li Su, Li Jianjun, Zhou Dafang, Zhuang Computer College Beijing Technology and Business University Beijing 100037 China College of Information and Electrical Engineering China Agricultural University Beijing 100083 China State Key Lab. of Resource and Environmental Information System Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing 100101 China
Applying modern information management technology to traditional environment field is the sign of making environment protection work modern and the necessitous task that environment protection departments are confront... 详细信息
来源: 评论
Improved H.264 GOP-level bit allocation by incremental PID algorithm
Improved H.264 GOP-level bit allocation by incremental PID a...
收藏 引用
2007 IET Conference on Wireless, Mobile and Sensor Networks (CCWMSN07)
作者: Liquan Shen Zhaoyang Zhang Ying Li Zhi Liu Key Lab. of Advanced Display and System Application Ministry of Education Shanghai Univ. 200072 China School of Computer Engineering and Science Shanghai University Shanghai China
Since the current rate control schemes in H.264 do not present the capability of efficient GOP-level bit allocation, the video quality varies greatly for sequences with the scene change or the scene complexity varying...
来源: 评论
A kind of fuzzy constructive neural network and its application
A kind of fuzzy constructive neural network and its applicat...
收藏 引用
26th Chinese Control Conference, CCC 2007
作者: Tao, Wu Liwei, Chen Junjun, Mao Ling, Zhang State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China Key Lab. IC and SP Anhui University Hefei 230039 China School of Mathematics and Computational Science Anhui University Hefei 230039 China
Support vector machine (SVM) has been studied and applied extensively for its high accuracy, but it must construct SVM decision tree to classify sample sets with multiclass for it just be applicable for binary classif... 详细信息
来源: 评论
Solution of secure multi-party multi-data ranking problem based on El Gamal encryption
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第11期28卷 1-5页
作者: Liu, Wen Luo, Shou-Shan Chen, Ping School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Software Engineering Beijing University of Posts and Telecommunications Beijing 100876 China National Key Lab. of Integrated Service Networks Xidian University Xi'an 710071 China School of Telecommunication Engineering Beijing University of Posts and Telecommunications Beijing 100876 China
Based on El Gamal homomorphic encryption, a protocol of secure multi-party multi-data ranking problem was proposed. The problem extended millionaires' problem. Furthermore, the correctness and security of this pro... 详细信息
来源: 评论