咨询与建议

限定检索结果

文献类型

  • 1,212 篇 会议
  • 822 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,038 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,447 篇 工学
    • 1,159 篇 计算机科学与技术...
    • 963 篇 软件工程
    • 259 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 143 篇 生物工程
    • 92 篇 电子科学与技术(可...
    • 83 篇 机械工程
    • 83 篇 电气工程
    • 76 篇 光学工程
    • 62 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 35 篇 建筑学
    • 30 篇 土木工程
    • 29 篇 网络空间安全
    • 28 篇 安全科学与工程
  • 631 篇 理学
    • 390 篇 数学
    • 150 篇 生物学
    • 120 篇 物理学
    • 116 篇 统计学(可授理学、...
    • 86 篇 系统科学
    • 50 篇 化学
  • 428 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 42 篇 医学
    • 39 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 50 篇 semantics
  • 43 篇 laboratories
  • 39 篇 feature extracti...
  • 35 篇 wireless sensor ...
  • 31 篇 software
  • 30 篇 optimization
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 26 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 monitoring
  • 22 篇 task analysis
  • 22 篇 software enginee...

机构

  • 510 篇 state key labora...
  • 208 篇 department of co...
  • 129 篇 national key lab...
  • 109 篇 state key labora...
  • 78 篇 state key lab. f...
  • 57 篇 state key labora...
  • 56 篇 national key lab...
  • 52 篇 state key labora...
  • 51 篇 state key lab fo...
  • 47 篇 national key lab...
  • 38 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 department of co...
  • 28 篇 computer vision ...
  • 25 篇 department of co...
  • 25 篇 school of electr...
  • 22 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 30 篇 lu tong
  • 29 篇 zhao jian
  • 29 篇 tong lu
  • 26 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,826 篇 英文
  • 166 篇 其他
  • 45 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2038 条 记 录,以下是1041-1050 订阅
排序:
SLA-Aware and Green Resource Management of IaaS Clouds
SLA-Aware and Green Resource Management of IaaS Clouds
收藏 引用
IEEE International Conference on High Performance Computing and Communications
作者: Shuo Cheng Chun Cao Ping Yu Xiaoxing Ma State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
Cloud computing has become a most popular computing pattern in both industry and academia. Infrastructure as a Service (IaaS) cloud platform provides an elastic way to require computing resources in a pay-as-you-go pa... 详细信息
来源: 评论
Tracking slowly moving clairvoyant: Optimal dynamic regret of online learning with true and noisy gradient  33
Tracking slowly moving clairvoyant: Optimal dynamic regret o...
收藏 引用
33rd International Conference on Machine Learning, ICML 2016
作者: Yang, Tianbao Zhang, Lijun Jin, Rong Yi, Jinfeng Department of Computer Science University of Iowa Iowa CityIA52242 United States National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Institute of Data Science and Technologies Alibaba Group Seattle United States IBM Thomas J. Watson Research Center Yorktown HeightsNY10598 United States
This work focuses on dynamic regret of online convex optimization that compares the performance of online learning to a clairvoyant who knows the sequence of loss functions in advance and hence selects the minimizer o... 详细信息
来源: 评论
New Tampered Features for Scene and Caption Text Classification in Video Frame
New Tampered Features for Scene and Caption Text Classificat...
收藏 引用
International Workshop on Frontiers in Handwriting Recognition
作者: Sangheeta Roy Palaiahnakote Shivakumara Umapada Pal Tong Lu Chew Lim Tan Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia Computer Vision and Pattern Recognition Unit Indian Statistical Institute Kolkata India National Key Lab for Novel Software Technology Nanjing University Nanjing China Department of Computer Science National University of Singapore
The presence of both caption/graphics/superimposed and scene texts in video frames is the major cause for the poor accuracy of text recognition methods. This paper proposes an approach for identifying tampered informa... 详细信息
来源: 评论
An Improved Genetic Algorithm for Degree Constrained Minimum Spanning Trees
An Improved Genetic Algorithm for Degree Constrained Minimum...
收藏 引用
第28届中国控制与决策会议
作者: Kai Shi Qingfeng Song Sheng Lin Guangping Xu Zhanxu Cao Key Lab of Intelligent Computing and Novel Software Technology Key Laboratory of Computer Vision and System Ministry of Education School of Science Tianjin Chengjian University
The Minimum Spanning Tree(MST) is of crucial importance for Communication Networks(CNs),which can solve problems of unconstrained CNs ***,in practical CNs,the degree of the spanning tree is *** such a case,the problem... 详细信息
来源: 评论
Securing big data in the Cloud by protected mapping over multiple providers
Securing big data in the Cloud by protected mapping over mul...
收藏 引用
Digital Media Industry & Academic Forum (DMIAF)
作者: Chunming Rong Hongbing Cheng Martin Gilje Jaatun Department of Electronic Engineering & Computer Science University of Stavanger Norway State Key Laboratory for Novel Software Technology Nanjing University China
The Cloud is increasingly being used to store and process big data, and conventional security mechanisms using encryption are either not sufficiently efficient or not suited to the task of protecting big data in the C... 详细信息
来源: 评论
Recommendations Based on LDA Topic Model in Android Applications
Recommendations Based on LDA Topic Model in Android Applicat...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security Companion (QRS-C)
作者: Tianhao Pan Weifeng Zhang Ziyuan Wang Lei Xu School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
With the popularity of smart phones, mobile applications have become an essential element in people's lives. Wherever you are, the Android market can allow people to download these applications. When you open Andr... 详细信息
来源: 评论
OpenFunction: An extensible data plane abstraction protocol for platform-independent software-defined middleboxes
OpenFunction: An extensible data plane abstraction protocol ...
收藏 引用
International Conference on Network Protocols
作者: Chen Tian Alex X. Liu Ali Munir Jie Yang State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Engineering Michigan State University USA
We propose OpenFunction, an extensible data plane abstraction protocol for platform-independent software-defined middleboxes. The main challenge is how to abstract packet operations, flow states and event generations ... 详细信息
来源: 评论
Macroflow: A fine-grained networking abstraction for job completion time oriented scheduling in datacenters
Macroflow: A fine-grained networking abstraction for job com...
收藏 引用
International Conference on Network Protocols
作者: Chen Tian Junhua Yan Alex X. Liu Yizhou Tang Yuankun Zhong Zi Li State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Engineering Michigan State University USA
For a datacenter running a data-parallel analytic framework, minimizing job completion time (JCT) is crucial for application performance. The key observation is that JCT could be improved, if network scheduling can ex... 详细信息
来源: 评论
Secure Big Data Storage and Sharing Scheme for Cloud Tenants
收藏 引用
China Communications 2015年 第6期12卷 106-115页
作者: CHENG Hongbing RONG Chunming HWANG Kai WANG Weihong LI Yanyan College of Computer Science Zhejiang University of Technology State Key Laboratory for Novel Software Technology Nanjing University Department of Electronic Engineering & Computer Science University of Stavanger Electrical Engineering and Computer Science University of Southern California
The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in... 详细信息
来源: 评论
GB-RC4: Effective brute force attacks on RC4 algorithm using GPU  7
GB-RC4: Effective brute force attacks on RC4 algorithm using...
收藏 引用
7th International Green and Sustainable Computing Conference, IGSC 2016
作者: Xue, Pei Li, Tao Dong, Han Liu, Chunbo Ma, Wenjing Pei, Songwen College of Computer and Control Engineering Nankai University Tianjin300071 China Information Security Evaluation Center Civil Aviation University of China Tianjin300300 China Laboratory of Parallel Software and Computational Science State Key Laboratory of Computing Science Institute of Software CAS Beijing China Shanghai Key Lab of Modern Optical Systems Department of Computer Science and Engineering University of Shanghai for Science and Technology Shanghai200093 China
Encryption algorithms are applied to a variety of fields and the security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space search. RC4 algorithm has an extensive appl... 详细信息
来源: 评论