咨询与建议

限定检索结果

文献类型

  • 1,212 篇 会议
  • 822 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,038 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,447 篇 工学
    • 1,159 篇 计算机科学与技术...
    • 963 篇 软件工程
    • 259 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 143 篇 生物工程
    • 92 篇 电子科学与技术(可...
    • 83 篇 机械工程
    • 83 篇 电气工程
    • 76 篇 光学工程
    • 62 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 35 篇 建筑学
    • 30 篇 土木工程
    • 29 篇 网络空间安全
    • 28 篇 安全科学与工程
  • 631 篇 理学
    • 390 篇 数学
    • 150 篇 生物学
    • 120 篇 物理学
    • 116 篇 统计学(可授理学、...
    • 86 篇 系统科学
    • 50 篇 化学
  • 428 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 42 篇 医学
    • 39 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 50 篇 semantics
  • 43 篇 laboratories
  • 39 篇 feature extracti...
  • 35 篇 wireless sensor ...
  • 31 篇 software
  • 30 篇 optimization
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 26 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 monitoring
  • 22 篇 task analysis
  • 22 篇 software enginee...

机构

  • 510 篇 state key labora...
  • 208 篇 department of co...
  • 129 篇 national key lab...
  • 109 篇 state key labora...
  • 78 篇 state key lab. f...
  • 57 篇 state key labora...
  • 56 篇 national key lab...
  • 52 篇 state key labora...
  • 51 篇 state key lab fo...
  • 47 篇 national key lab...
  • 38 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 department of co...
  • 28 篇 computer vision ...
  • 25 篇 department of co...
  • 25 篇 school of electr...
  • 22 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 30 篇 lu tong
  • 29 篇 zhao jian
  • 29 篇 tong lu
  • 26 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,826 篇 英文
  • 166 篇 其他
  • 45 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2038 条 记 录,以下是1191-1200 订阅
排序:
Crashmaker: An improved binary concolic testing tool for vulnerability detection  14
Crashmaker: An improved binary concolic testing tool for vul...
收藏 引用
29th Annual ACM Symposium on Applied Computing, SAC 2014
作者: Chen, Bing Zeng, Qingkai Wang, Weiguang State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210023 China Department of Computer Science and Technology Nanjing University Nanjing 210023 China
Concolic testing is a popular method based on symbolic execution and constraint solving, designed for security testing of applications. Unfortunately, the current effectiveness of concolic testing tools are limited wh... 详细信息
来源: 评论
A pilot study of an inspection framework for automated usability guideline reviews of mobile health applications  14
A pilot study of an inspection framework for automated usabi...
收藏 引用
5th Conference on Wireless Health, WH 2014
作者: Xu, Jing Ding, Xiang Huang, Ke Chen, Guanling Department of Computer Science University of Massachusetts Lowell United States State Key Laboratory for Novel Software Technology Nanjing University China
Usability is of significant importance for any interactive software. In the mobile domain, applications face more challenges to deliver good experiences to end users due to the characteristics and usage of mobile devi... 详细信息
来源: 评论
Automatic XACML requests generation for testing access control policies  26
Automatic XACML requests generation for testing access contr...
收藏 引用
26th International Conference on software Engineering and Knowledge Engineering, SEKE 2014
作者: Li, Yongchao Li, You Wang, Linzhang Chen, Guanling State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China Department of Computer Science University of Massachusetts Lowell 1 University Avenue LowellMA United States
XACML has become increasingly popular for specifying access control policies in mission critical domains to protect sensitive resources. However, manually crafted XACML policies may contain errors which can only be id... 详细信息
来源: 评论
Construction and analysis of website intrusion forensics model
Construction and analysis of website intrusion forensics mod...
收藏 引用
2014 International Conference on Manufacturing technology and Electronics Applications, ICMTEA 2014
作者: Chen, Yu Liu, Pei Yu Department of Information Science and Engineering Shandong Normal University China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology China
According to the website security and judicial forensics demands, a new Website Intrusion Forensics Model is proposed foe research. The model can discovery the website intrusion and forensic in time. This paper first ... 详细信息
来源: 评论
Double anomaly detection algorithm based on dendritic cells
Double anomaly detection algorithm based on dendritic cells
收藏 引用
2014 International Conference on Materials science and Computational Engineering, ICMSCE 2014
作者: Xu, Lian Cheng Xu, Di Zhou, Guang Gang Hou, Xiu Yan Department of Information Science and Engineering Shandong Normal University China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology China
On the problem of data quantity in anomaly detection, traditional dendritic cell algorithms should be improved by proposing an antigen data preprocessing method which introduced suspected abnormal base. The abnormal d... 详细信息
来源: 评论
Joint channel assignment, stable routing and adaptive power control in mobile cognitive networks
Joint channel assignment, stable routing and adaptive power ...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Jin Zhou Feilong Tang Jie Li Wenchao Xu Minyi Guo School of Software Shanghai Jiao Tong University Shanghai China State Key Lab. for Novel Software Technology Nanjing University P. R. China Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai China Faculty of Engineering Information and Systems University of Tsukuba Japan Department of Communication Engineering East China Normal University Shanghai China
Most existing routing algorithms assume wireless nodes use maximal transmission power or set up the power at the beginning of the network configuration. These static approaches potentially introduce signal interferenc... 详细信息
来源: 评论
User guided automation for testing mobile apps  21
User guided automation for testing mobile apps
收藏 引用
21st Asia-Pacific software Engineering Conference, APSEC 2014
作者: Li, Xiujiang Jiang, Yanyan Liu, Yepang Xu, Chang Ma, Xiaoxing Lu, Jian State Key Lab for Novel Software Technology Nanjing University Nanjing China Dept. of Computer Science and Technology Nanjing University Nanjing China Dept. of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Hong Kong
Mobile devices are gradually taking over traditional computers' dominance in human lives. With the ever-increasing shipment of mobile apps running on these devices, their quality issues become a severe challenge. ... 详细信息
来源: 评论
novel synthesis method for image of materials texture
Novel synthesis method for image of materials texture
收藏 引用
2014 International Conference on Manufacturing technology and Electronics Applications, ICMTEA 2014
作者: Peng, Hong-Tao Zhang, De-Gan Song, Xiao-Dong Wang, Xiang Department of Computer CNPC Managers Training Institute Beijing China Tianjin Key Lab of Intelligent Computing and Novel software Technology Tianjin University of Technology China Ministry of Education China
Most patch-based texture synthesis algorithms using Markov Random Field for composite materials only considers color similarity between the corresponding pixels. The traditional algorithms are lack of adaptability, so... 详细信息
来源: 评论
Tournament selection based artificial bee colony algorithm with elitist strategy
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8916卷 387-396页
作者: Zhang, Meng-Dan Zhan, Zhi-Hui Li, Jing-Jing Zhang, Jun Department of Computer Science Sun Yat-sen University 510275 China Key Lab. Machine Intelligence and Advanced Computing Ministry of Education China Engineering Research Center of Supercomputing Engineering Software MOE China Key Lab. Software Technology Education Department of Guangdong Province China School of Computer Science South China Normal University China
Artificial bee colony (ABC) algorithm is a novel heuristic algorithm inspired from the intelligent behavior of honey bee swarm. ABC algorithm has a good performance on solving optimization problems of multivariable fu... 详细信息
来源: 评论
Using machine language model for mimimorphic malware detection
Using machine language model for mimimorphic malware detecti...
收藏 引用
17th International Conference on Information Security, ISC 2014
作者: Yuan, Pinghai Zeng, Qingkai Liu, Yao State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Department of Computer Science and Technology Nanjing University Nanjing210023 China
Binary obfuscation is widely employed by malware distributors against malware analysis and detection. Mimimorphism is a novel technique arising from this arms race and technically opens a new line of obfuscation. It a... 详细信息
来源: 评论