咨询与建议

限定检索结果

文献类型

  • 1,193 篇 会议
  • 839 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,036 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,459 篇 工学
    • 1,174 篇 计算机科学与技术...
    • 984 篇 软件工程
    • 269 篇 信息与通信工程
    • 188 篇 控制科学与工程
    • 143 篇 生物工程
    • 93 篇 电子科学与技术(可...
    • 88 篇 电气工程
    • 83 篇 机械工程
    • 75 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 33 篇 建筑学
    • 32 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 640 篇 理学
    • 400 篇 数学
    • 151 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 117 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 435 篇 管理学
    • 262 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 51 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 37 篇 feature extracti...
  • 30 篇 optimization
  • 30 篇 software
  • 29 篇 software testing
  • 28 篇 data mining
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 software enginee...
  • 24 篇 testing
  • 23 篇 image segmentati...
  • 23 篇 monitoring
  • 23 篇 accuracy
  • 22 篇 task analysis

机构

  • 522 篇 state key labora...
  • 221 篇 department of co...
  • 129 篇 national key lab...
  • 107 篇 state key labora...
  • 77 篇 state key lab. f...
  • 55 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 49 篇 national key lab...
  • 39 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 22 篇 nanjing universi...
  • 21 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 23 篇 qi lianyong
  • 23 篇 chen guihai
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 palaiahnakote sh...
  • 21 篇 li xuandong

语言

  • 1,913 篇 英文
  • 61 篇 中文
  • 60 篇 其他
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2036 条 记 录,以下是111-120 订阅
排序:
Infrastructure-Free Floor Localization Through Crowdsourcing
收藏 引用
Journal of computer science & technology 2015年 第6期30卷 1249-1273页
作者: 叶海波 顾涛 陶先平 吕建 State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210023 China Department of Computer Science Nanjing University Nanjing 210023 China School of Computer Science and Information Technology RMIT University Melbourne Victoria 3001 Australia
Mobile phone localization plays a key role in the fast-growing location-based applications domain. Most of the existing localization schemes rely on infrastructure support such as GSM, Wi-Fi or GPS. In this paper, we ... 详细信息
来源: 评论
Automatic Detection and Repair Recommendation for Missing Checks
收藏 引用
Journal of computer science & technology 2019年 第5期34卷 972-992页
作者: Ling-Yun Situ Lin-Zhang Wang Yang Liu Bing Mao Xuan-Dong Li State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore
Missing checks for untrusted inputs used in security-sensitive operations is one of the major causes of various vulnerabilities. Efficiently detecting and repairing missing checks are essential for prognosticating pot... 详细信息
来源: 评论
Automatic Buffer Overflow Warning Validation
收藏 引用
Journal of computer science & technology 2020年 第6期35卷 1406-1427页
作者: Feng-Juan Gao Yu Wang Lin-Zhang Wang Zijiang Yang Xuan-Dong Li State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China Department of Computer Science Western Michigan UniversityKalamazoo 49008-5466U.S.A.
Static buffer overflow detection techniques tend to report too many false positives fundamentally due to the lack of software execution information. It is very time consuming to manually inspect all the static warning... 详细信息
来源: 评论
Model Checking over Paraconsistent Temporal Logic
收藏 引用
Journal of Donghua University(English Edition) 2008年 第5期25卷 571-580页
作者: 陈冬火 王林章 崔家林 State Key Laboratory of Novel Software Technology Nanjing University School of Computer Science and Technology Soochow University Department of Information Science and Engineering Ningbo Institute of TechnologyZhejiang University
Classical logic cannot be used to effectively reason about concurrent systems with inconsistencies (inconsistencies often occur, especially in the early stage of the development, when large and complex concurrent syst... 详细信息
来源: 评论
Energy Efficient Backoff Hierarchical Clustering Algorithms for Multi-Hop Wireless Sensor Networks
收藏 引用
Journal of computer science & technology 2011年 第2期26卷 283-291页
作者: 王珺 曹涌涛 谢俊元 陈世福 State Key Lab for Novel Software Technology at Nanjing University Department of Computer Science and Technology Nanjing University Institute of Communication and Information Engineering Nanjing University of Posts and Telecommunications China Development Center Trend Micro Corp.
Compared with flat routing protocols, clustering is a fundamental performance improvement technique in wireless sensor networks, which can increase network scalability and lifetime. In this paper, we integrate the mul... 详细信息
来源: 评论
Grey-box Adversarial Attack on Communication in Multi-agent Reinforcement Learning  22
Grey-box Adversarial Attack on Communication in Multi-agent ...
收藏 引用
22nd International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2023
作者: Ma, Xiao Li, Wu-Jun National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Although research on communication in multi-agent reinforcement learning (MARL) has achieved some progress, the vulnerability of the communication mechanism in MARL caused by adversarial communication messages generat... 详细信息
来源: 评论
Multi-view Multi-label Learning with Dual-Attention Networks for Stroke Screen
Multi-view Multi-label Learning with Dual-Attention Networks...
收藏 引用
2020 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2020
作者: Shen, Jundong Zhang, Yi Yu, Cheng Wang, Chongjun National Key Laboratory for Novel Software Technology Nanjing University Department of Computer Science and Technology Nanjing China
With the acceleration of urbanization, there is an explosive growth trend of the stroke burden in China. Consequently, it is necessary to adopt a regular screen to reduce brain damage and other complications. For one ... 详细信息
来源: 评论
Research on complex structure-oriented accurate web information extraction rules
Research on complex structure-oriented accurate web informat...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Xie, Tao Shi, Shengsheng Quan, Fuliang Yuan, Chunfeng Huang, Yihua Department of Computer Science and Technology National Key Laboratory of Novel Software Technology Nanjing University Nanjing China
With the rapid growth of web information, there is an increasing need to easily and efficiently acquire accurate information from the massive and heterogamous web. Web information extraction is such a research area to... 详细信息
来源: 评论
Link communities detection via local approach
Link communities detection via local approach
收藏 引用
7th International Conference on Rough Sets and Knowledge technology, RSKT 2012
作者: Pan, Lei Wang, Chongjun Xie, Junyuan National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
The traditional community detection algorithms were always focusing on the node community, while some recent studies have shown great advantage of link community approach which partitions links instead of nodes into c... 详细信息
来源: 评论
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论