咨询与建议

限定检索结果

文献类型

  • 615 篇 会议
  • 227 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 845 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 539 篇 计算机科学与技术...
    • 446 篇 软件工程
    • 124 篇 信息与通信工程
    • 92 篇 控制科学与工程
    • 48 篇 电子科学与技术(可...
    • 47 篇 电气工程
    • 41 篇 生物工程
    • 37 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 24 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 20 篇 安全科学与工程
    • 19 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 257 篇 数学
    • 61 篇 物理学
    • 55 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 28 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 109 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 12 篇 web services
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 quality of servi...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 federated learni...
  • 7 篇 accuracy
  • 7 篇 cloud computing

机构

  • 91 篇 state key lab. f...
  • 55 篇 state key lab. o...
  • 29 篇 university of ch...
  • 28 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 21 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 14 篇 school of comput...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 hunan provincial...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 13 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 9 篇 jianxun liu
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 760 篇 英文
  • 56 篇 其他
  • 30 篇 中文
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
845 条 记 录,以下是791-800 订阅
排序:
Application of multi-class SVM for Kansei landscape image retrieval using colour and Kansei factors
Application of multi-class SVM for Kansei landscape image re...
收藏 引用
MIPPR 2005: SAR and Multispectral Image Processing
作者: Shen, Bin Yao, Min Zhang, Yan-Gu Yi, Wen-Sheng College of Computer Zhejiang University Hangzhou 310027 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China School of Computer Science and Engineering Wenzhou Normal College Wenzhou 325027 China
In this paper, a Kansei landscape image retrieval system named KIRCK is proposed, which is based on color feature and Kansei factors. Color feature is extracted in HSV color space and the similarity of color feature i... 详细信息
来源: 评论
On the security of a digital signature with message recovery using self-certified public key
收藏 引用
Informatica (Ljubljana) 2005年 第3期29卷 343-346页
作者: Zhang, Jianhong Zou, Wei Chen, Dan Wang, Yumin Institution of Computer Science and Technology Peking University Beijing 100087 China College of Sciences North China University of Technology Beijing 10041 China State Key Lab. ISN Xidian University Xi'an Shaanxi 70071 China
Self-certified public keys are proposed to eliminate the burden of verifying the public key before using. To alleviate reliance on system authority and strengthen the security of system, Chang et al propose a new digi... 详细信息
来源: 评论
SAN virtualization study and implementation based on FC switches
SAN virtualization study and implementation based on FC swit...
收藏 引用
Network Architectures, Management, and Applications III
作者: Yang, Yi Cao, Mingcui Luo, Zhixiang Dept. of Computer Science Wuhan University of Technology Wuhan Hubei 430063 China State Key Lab. of Laser Technology Huazhong University of Science and Technology Wuhan Hubei 430074 China
Currently the mainstream technology of SAN is SAN storage virtualization and its implementation. The switch-based storage virtualization embeds the virtualizer in the core of the storage networking fabric in an "... 详细信息
来源: 评论
Optimized strategies of grid information services
Optimized strategies of grid information services
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Fan, Qingfeng Wu, Qiongli He, Yanxiang Huang, Jingwei School of Computer Wuhan University China School of Computer City University of Hong Kong Hong Kong School of Electronic Information Engineering Wuhan University China State Key Lab. of Software Engineering Wuhan University China
Grid Computing receives growing attention from scientists and scholars these years, of which Grid Information Service is the highlight and one of the most difficult subjects. Grid Information Service is characterized ... 详细信息
来源: 评论
Transportation strategies of the data grid
Transportation strategies of the data grid
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Fan, Qingfeng Wu, Qiongli He, Yanxiang Huang, Jingwei School of Computer Wuhan University China School of Computer City University of Hong Kong Hong Kong School of Electronic Information Engineering Wuhan University China State Key Lab. of Software Engineering Wuhan University China
Data Grid is one of the important research fields for Grid Computing, To improve the system efficiency, this paper puts forward the strategies of ring replication and thread replication. Compared with many other repli... 详细信息
来源: 评论
The optimized key distribution scheme in threshold RSA  04
The optimized key distribution scheme in threshold RSA
收藏 引用
3rd International Conference on Information Security, InfoSecu '04
作者: Jing-Song, Cui Rong, Peng Li-Na, Wang School of Computer Science Wuhan University Wuhan 430072 China State Key Lab. of Software Engineering Wuhan 430072 China
The (t, n) threshold RSA algorithm enables the system to keep the security and availab.lity of the private key without a trusted dealer when parts of system are already under attack. In the traditional threshold RSA s... 详细信息
来源: 评论
Recovery of material under complex illumination conditions
Recovery of material under complex illumination conditions
收藏 引用
Proceedings GRAPHITE 2004 - 2nd International Conference on computer Graphics and Interactive Techniques in Australasia and South East Asia
作者: Wu, Enhua Sun, Qimin Liu, Xuehui Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences China Dept. of Computer Science University of Macau Macao China Dept. of Computer Science Qufu Normal University Shandong China Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
To calculate the inter-reflection between real objects and virtual ones in augmented reality, recovery of material for the real objects is necessary. In this paper, an approach is proposed to recover the material prop... 详细信息
来源: 评论
Modeling the behavior of Ada tasks and verifying its safety
Modeling the behavior of Ada tasks and verifying its safety
收藏 引用
Proceedings - The Fourth International Conference on computer and Information Technology (CIT 2004)
作者: Fu, Jianming Yi, Xian Zhang, Huanguo State Key Lab. of Software Eng. 430072 Wuhan China School of Computer Science Wuhan University 430072 Wuhan China
This paper models the behavior of Ada tasks with Petri nets according to the semantics and the syntax of them, and this net is called an Ada net. Moreover our Ada net can improve the rendezvous model proposed by the *... 详细信息
来源: 评论
Multi-events analysis for anomaly intrusion detection
Multi-events analysis for anomaly intrusion detection
收藏 引用
Proceedings of 2004 International Conference on Machine Learning and Cybernetics
作者: Yin, Jian Zhang, Gang Chen, Yi-Qun Fan, Xian-Li. Department of Computer Science Zhongshan University Guangzhou 510275 China State Key Lab. Novel Software T. Nanjing University Nanjing 210093 China
Probabilistic methods are widely used in intrusion detection especially in computer audit data analysis. There are many famous probabilistic algorithm such as Decision Tree, Hotelling's T2, Chi-Square, first-order... 详细信息
来源: 评论
Automatic generation of artistic chinese calligraphy
Automatic generation of artistic chinese calligraphy
收藏 引用
Proceedings - Nineteenth National Conference on Artificial Intelligence (AAAI-2004): Sixteenth Innovative Applications of Artificial Intelligence Conference (IAAI-2004)
作者: Xu, Songhua Lau, Francis C. M. Cheung, Kwok-Wai Pan, Yunhe CAD and CG State Key Lab. of China Zhejiang University Department of Computer Science University of Hong Kong Department of Computer Science Hong Kong Baptist University
We introduce a novel intelligent system which can generate new Chinese calligraphic artwork that meets certain aesthetic requirements automatically. In the machine learning phase, parametric representations of existen... 详细信息
来源: 评论