咨询与建议

限定检索结果

文献类型

  • 1,210 篇 会议
  • 845 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,060 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,471 篇 工学
    • 1,179 篇 计算机科学与技术...
    • 984 篇 软件工程
    • 270 篇 信息与通信工程
    • 192 篇 控制科学与工程
    • 143 篇 生物工程
    • 91 篇 电子科学与技术(可...
    • 87 篇 电气工程
    • 83 篇 机械工程
    • 78 篇 光学工程
    • 62 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 35 篇 建筑学
    • 31 篇 土木工程
    • 31 篇 网络空间安全
    • 29 篇 安全科学与工程
  • 643 篇 理学
    • 401 篇 数学
    • 150 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 120 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 438 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 193 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 42 篇 医学
    • 39 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 51 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 39 篇 feature extracti...
  • 31 篇 optimization
  • 30 篇 software
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 software enginee...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 monitoring
  • 23 篇 training

机构

  • 527 篇 state key labora...
  • 222 篇 department of co...
  • 131 篇 national key lab...
  • 108 篇 state key labora...
  • 79 篇 state key lab. f...
  • 56 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 48 篇 national key lab...
  • 40 篇 department of co...
  • 37 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 23 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 shen furao
  • 31 篇 zhang lijun
  • 30 篇 zhao jian
  • 30 篇 lu tong
  • 29 篇 gao yang
  • 29 篇 tong lu
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,903 篇 英文
  • 94 篇 其他
  • 62 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2060 条 记 录,以下是1011-1020 订阅
排序:
Dynamic regret of strongly adaptive methods
arXiv
收藏 引用
arXiv 2017年
作者: Zhang, Lijun Yang, Tianbao Jin, Rong Zhou, Zhi-Hua National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Department of Computer Science University of Iowa Iowa CityIA52242 United States Alibaba Group Seattle United States
To cope with changing environments, recent developments in online learning have introduced the concepts of adaptive regret and dynamic regret independently. In this paper, we illustrate an intrinsic connection between... 详细信息
来源: 评论
A utility-driven scheduling algorithms in cloud computing
收藏 引用
Revista Tecnica de la Facultad de Ingenieria Universidad del Zulia 2016年 第2期39卷 282-287页
作者: Chen, Tao School of Management Science and Engineering Anhui University of Finance and Economics Bengbu Anhui233030 China Department of Computer Science and Technology Tongji University Shanghai201804 China State Key Laboratoryfor Novel Software Technology Nanjing University China
Cloud computing is a successful business model and utility paradigm which enables people to use computing power via Internet at anytime anywhere. How to schedule a task to cloud computing is an important issue. In clo... 详细信息
来源: 评论
Improved dynamic regret for non-degenerate functions  17
Improved dynamic regret for non-degenerate functions
收藏 引用
Proceedings of the 31st International Conference on Neural Information Processing Systems
作者: Lijun Zhang Tianbao Yangt Jinfeng Yi Rong Jin Zhi-Hua Zhou National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science The University of Iowa Iowa City AI Foundations Lab IBM Thomas J. Watson Research Center Yorktown Heights NY Alibaba Group Seattle
Recently, there has been a growing research interest in the analysis of dynamic regret, which measures the performance of an online learner against a sequence of local minimizers. By exploiting the strong convexity, p...
来源: 评论
Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks
收藏 引用
Applied Intelligence 2018年 第7期48卷 1891-1891页
作者: Shujuan Ji Haiyan Ma Yongquan Liang Hofung Leung Chunjin Zhang Shandong Provincial Key Laboratory of Wisdom Mine Information Technology Shandong University of Science and Technology Qingdao China Shandong Provincial Key Laboratory of Novel Distributed Computer Software Technology Shandong Normal University Jinan China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China Center of Network Shandong University of Science and Technology Qingdao China
The article A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks, written by Shujuan Ji, Haiyan Ma, Yongquan Liang, Hofung Leung and Chunjin Zhang, was originally p...
来源: 评论
Game-theoretic design of optimal two-sided rating protocols for service exchange dilemma in crowdsourcing
arXiv
收藏 引用
arXiv 2017年
作者: Lu, Jianfeng Xin, Yun Zhang, Zhao Liu, Xinwang Li, Kenli Department of Computer Science and Engineering Zhejiang Normal University Jinhua Zhejiang China State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu China school of of Computer National University of Defense Technology Changsha China College of Computer Science and Electronic Engineering Hunan University Changsha Hunan China National Supercomputing Center in Changsha Changsha Hunan410082 China
Despite the increasing popularity and successful examples of crowdsourcing, it is stripped of aureole when collective efforts are derailed or severely hindered by elaborate sabotage. A service exchange dilemma arises ... 详细信息
来源: 评论
A Low Complexity SCMA Detector based on Stochastic Computation
A Low Complexity SCMA Detector based on Stochastic Computati...
收藏 引用
IEEE Pulsed Power Conference
作者: Kaining Han Jianhao Hu Jienan Chen Gerald E. Sobelman National key Lab. of Communications University of Electronic Science and Technology of China Department of Electronic and Computer Engineering The University of Minnesota
Sparse Code Multiple Access (SCMA) is a promising multiple access technology candidate for 5G wireless communication systems. The high detection complexity is its bottleneck. Stochastic computation is an ultra-low com... 详细信息
来源: 评论
An efficient algorithm to identify minimal failure-causing schemas from exhaustive test suite  28
An efficient algorithm to identify minimal failure-causing s...
收藏 引用
28th International Conference on software Engineering and Knowledge Engineering, SEKE 2016
作者: Qi, Yuanchao Wang, Qi Xu, Chiya He, Tieke Wang, Ziyuan School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China State Key Lab for Novel Software Technology Nanjing University Nanjing China
Combinatorial testing is widely used to detect failures caused by interactions among parameters for its efficiency and effectiveness. Fault localization plays an important role in this testing technique. And minimal f... 详细信息
来源: 评论
An attention-based syntax-tree and tree-LSTM model for sentence summarization
收藏 引用
International Journal of Performability Engineering 2017年 第5期13卷 775-782页
作者: Liu, Wenfeng Liu, Peiyu Yang, Yuzhen Gao, Yaling Yi, Jing School of Information Science and Engineering Shandong Normal University Jinan250014 China Department of Computer and Information Engineering Heze University Heze274015 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014 China Ruipu Peony Industrial Technology Development Co. Ltd 274015 China School of Computer Science and Technology Shandong Jianzhu University Jinan250101 China
Generative Summarization is of great importance in understanding large-scale textual data. In this work, we propose an attention-based Tree-LSTM model for sentence summarization, which utilizes an attention-based synt... 详细信息
来源: 评论
Rating protocol design for extortion and cooperation in the crowdsourcing contest dilemma
arXiv
收藏 引用
arXiv 2017年
作者: Lu, Jianfeng Xin, Yun Zhang, Zhao Tang, Shaojie Yan, Songyuan Tang, Changbing Department of Computer Science and Engineering Zhejiang Normal University Jinhua Zhejiang China State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu China Department of Information Systems University of Texas at Dallas RichardsonTX75080 United States
Crowdsourcing has emerged as a paradigm for leveraging human intelligence and activity to solve a wide range of tasks. However, strategic workers will find enticement in their self-interest to free-ride and attack in ... 详细信息
来源: 评论
Density Based Self Organizing Incremental Neural Network For Data Stream Clustering
Density Based Self Organizing Incremental Neural Network For...
收藏 引用
International Joint Conference on Neural Networks
作者: Baile Xu Furao Shen Jinxi Zhao National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University
Clustering is an important technique widely used in many areas such as machine learning, pattern recognition, data analysis etc. Data stream clustering is a branch of clustering that draws much attention in recent yea... 详细信息
来源: 评论