咨询与建议

限定检索结果

文献类型

  • 1,212 篇 会议
  • 823 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,039 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,448 篇 工学
    • 1,160 篇 计算机科学与技术...
    • 964 篇 软件工程
    • 259 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 143 篇 生物工程
    • 92 篇 电子科学与技术(可...
    • 83 篇 机械工程
    • 83 篇 电气工程
    • 76 篇 光学工程
    • 62 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 35 篇 建筑学
    • 30 篇 土木工程
    • 29 篇 网络空间安全
    • 28 篇 安全科学与工程
  • 631 篇 理学
    • 390 篇 数学
    • 150 篇 生物学
    • 120 篇 物理学
    • 116 篇 统计学(可授理学、...
    • 86 篇 系统科学
    • 50 篇 化学
  • 428 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 42 篇 医学
    • 39 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 50 篇 semantics
  • 43 篇 laboratories
  • 39 篇 feature extracti...
  • 35 篇 wireless sensor ...
  • 31 篇 software
  • 30 篇 optimization
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 26 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 software enginee...
  • 23 篇 monitoring
  • 22 篇 task analysis

机构

  • 511 篇 state key labora...
  • 209 篇 department of co...
  • 129 篇 national key lab...
  • 109 篇 state key labora...
  • 77 篇 state key lab. f...
  • 57 篇 state key labora...
  • 56 篇 national key lab...
  • 52 篇 state key labora...
  • 50 篇 state key lab fo...
  • 46 篇 national key lab...
  • 38 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 department of co...
  • 28 篇 computer vision ...
  • 25 篇 department of co...
  • 25 篇 school of electr...
  • 22 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 26 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,827 篇 英文
  • 166 篇 其他
  • 45 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2039 条 记 录,以下是1081-1090 订阅
排序:
An empirical analysis of package-modularization metrics: Implications for software fault-proneness
An empirical analysis of package-modularization metrics: Imp...
收藏 引用
作者: Zhao, Yangyang Yang, Yibiao Lu, Hongmin Zhou, Yuming Song, Qinbao Xu, Baowen State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China Department of Computer Science and Technology Xi'An Jiaotong University China
Context: In a large object-oriented software system, packages play the role of modules which group related classes together to provide well-identified services to the rest of the system. In this context, it is widely ... 详细信息
来源: 评论
Detecting data races in interrupt-driven programs based on static analysis and dynamic simulation  15
Detecting data races in interrupt-driven programs based on s...
收藏 引用
7th Asia-Pacific Symposium on Internetware, Internetware 2015
作者: Wang, Yu Shi, Junjing Wang, Linzhang Zhao, Jianhua Li, Xuandong State Key Laboratory of Novel Computer Software Technology Nanjing University Nanjing 210023 China Jiangsu Novel Software Technology and Industrialization Nanjing 210023 China Department of Computer Science and Technology Nanjing University Nanjing 210023 China
Interrupt-driven programs are often embedded in safety-critical systems to perform hardware/resource dependent data operation tasks, such as data acquisition, processing, and transformation. The interrupt programs and... 详细信息
来源: 评论
NCov: A tool for measuring length-n subpath coverage  15
NCov: A tool for measuring length-n subpath coverage
收藏 引用
7th Asia-Pacific Symposium on Internetware, Internetware 2015
作者: Zhou, Yan Li, You Wang, Linzhang Li, Xuandong State Key Laboratory of Novel Computer Software Technology Nanjing University Nanjing210023 China Jiangsu Novel Software Technology and Industrialization Nanjing210023 China Department of Computer Science and Technology Nanjing University Nanjing210023 China
software test adequacy criteria are used to determine whether the test on a software system is sufficient. Code coverage shows how thoroughly a program is tested according to corresponding testing adequacy criteria. T... 详细信息
来源: 评论
Convergence of MCMC and Loopy BP in the Tree Uniqueness Region for the Hard-Core Model
Convergence of MCMC and Loopy BP in the Tree Uniqueness Regi...
收藏 引用
Annual IEEE Symposium on Foundations of computer science
作者: Charilaos Efthymiou Thomas P. Hayes Daniel Štefankovic Eric Vigoda Yitong Yin Mathematics Institute Goethe University Frankfurt am Main Germany Department Computer Science University of New Mexico Albuquerque NM USA Department of Computer Science University of Rochester Rochester NY USA School of Computer Science Georgia Institute of Technology Atlanta GA USA State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
We study the hard-core (gas) model defined on independent sets of an input graph where the independent sets are weighted by a parameter (aka fugacity) λ > 0. For constant Δ, previous work of Weitz (2006) establis... 详细信息
来源: 评论
Modeling and evaluating IaaS cloud using performance evaluation process algebra
Modeling and evaluating IaaS cloud using performance evaluat...
收藏 引用
Asia-Pacific Conference on Communications
作者: Jie Ding Leijie Sha Xiao Chen State Key Lab. for Novel Software Technology Nanjing University Nanjing China School of Information Engineering Yangzhou University Yangzhou China School of Computer Science and Telecommunication Engineering Jiangsu University Zheniian China
Infrastructure as a Service (IaaS) is a service mode of cloud, which provides Virtual Machines (VMs) to customers. With the increasingly fierce competition in market, cloud providers pay more attention to Quality of s... 详细信息
来源: 评论
ABC: Accelerated building of C/C++ projects  22
ABC: Accelerated building of C/C++ projects
收藏 引用
22nd Asia-Pacific software Engineering Conference, APSEC 2015
作者: Zhang, Ying Jiang, Yanyan Xu, Chang Ma, Xiaoxing Yu, Ping State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
software building is recurring and time-consuming. Based on the finding that a significant portion of compilations in incremental build is unnecessary, we propose bypath compilation, an efficient build technique that ... 详细信息
来源: 评论
Improing screen power usage model on android smartphones  22
Improing screen power usage model on android smartphones
收藏 引用
22nd Asia-Pacific software Engineering Conference, APSEC 2015
作者: Lu, Ziling Cao, Chun Tao, Xianping State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
With user experience becoming richer and richer on Android smartphones, limited battery capacity has become a major concern for users. It is a good practice for Android to tell users where the battery power has gone. ... 详细信息
来源: 评论
Efficient anonymous category-level joint Tag estimation
Efficient anonymous category-level joint Tag estimation
收藏 引用
International Conference on Network Protocols
作者: Min Chen Jia Liu Shigang Chen Qingjun Xiao Department of Computer & Information Science & Engineering University of Florida Gainesville FL USA State Key Laboratory for Novel Software Technology Nanjing University P.R. China Key Laboratory of Computer Network & Information Integration Southeast University P.R. China
Radio-frequency identification (RFID) technologies have been widely used in many applications, including inventory management, supply chain, product tracking, transportation, logistics, etc. Tag estimation, which is t... 详细信息
来源: 评论
Learning with privileged information using Bayesian networks
收藏 引用
Frontiers of computer science 2015年 第2期9卷 185-199页
作者: Shangfei WANG Menghua HE Yachen ZHU Shan HE Yue LIU Qiang JI School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Key Lab of Computing and Communicating Software of Anhui Province Hefei 230027 China School of Mathematical Sciences University of Science and Technology of China Hefei 230027 China Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute Troy NY 12180-3590 USA
For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged ... 详细信息
来源: 评论
Unleashing the performance potential of CPU-GPU platforms for the 3D atmospheric Euler solver
Unleashing the performance potential of CPU-GPU platforms fo...
收藏 引用
International Conference on Application Specific Systems (ASAP), Architectures and Processors
作者: Haohuan Fu Jingheng Xu Lin Gan Chao Yang Wei Xue Wenlai Zhao Wen Shi Xinliang Wang Guangwen Yang National Supercomputing Center in Wuxi Ministry of Education Key Lab. for Earth System Modeling Center for Earth System Science Tsinghua University Department of Computer Science & Technology Tsinghua University Institute of Software and State Key Laboratory of Computer Science Chinese Academy of Sciences Tsinghua University Beijing Beijing CN
As a traditional application on various supercomputers, atmospheric modeling has long been suffering from the low performance efficiency. In this paper, we pick the 3D Euler equation solver (the most essential dynamic... 详细信息
来源: 评论