咨询与建议

限定检索结果

文献类型

  • 1,212 篇 会议
  • 822 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,038 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,447 篇 工学
    • 1,159 篇 计算机科学与技术...
    • 963 篇 软件工程
    • 259 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 143 篇 生物工程
    • 92 篇 电子科学与技术(可...
    • 83 篇 机械工程
    • 83 篇 电气工程
    • 76 篇 光学工程
    • 62 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 35 篇 建筑学
    • 30 篇 土木工程
    • 29 篇 网络空间安全
    • 28 篇 安全科学与工程
  • 631 篇 理学
    • 390 篇 数学
    • 150 篇 生物学
    • 120 篇 物理学
    • 116 篇 统计学(可授理学、...
    • 86 篇 系统科学
    • 50 篇 化学
  • 428 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 42 篇 医学
    • 39 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 50 篇 semantics
  • 43 篇 laboratories
  • 39 篇 feature extracti...
  • 35 篇 wireless sensor ...
  • 31 篇 software
  • 30 篇 optimization
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 26 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 monitoring
  • 22 篇 task analysis
  • 22 篇 software enginee...

机构

  • 510 篇 state key labora...
  • 208 篇 department of co...
  • 129 篇 national key lab...
  • 109 篇 state key labora...
  • 78 篇 state key lab. f...
  • 57 篇 state key labora...
  • 56 篇 national key lab...
  • 52 篇 state key labora...
  • 51 篇 state key lab fo...
  • 47 篇 national key lab...
  • 38 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 department of co...
  • 28 篇 computer vision ...
  • 25 篇 department of co...
  • 25 篇 school of electr...
  • 22 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 30 篇 lu tong
  • 29 篇 zhao jian
  • 29 篇 tong lu
  • 26 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,826 篇 英文
  • 166 篇 其他
  • 45 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2038 条 记 录,以下是1241-1250 订阅
排序:
Towards context consistency by concurrent checking for Internetware applications
收藏 引用
science China(Information sciences) 2013年 第8期56卷 69-88页
作者: XU Chang LIU YePang CHEUNG S.C. CAO Chun LV Jian State Key Laboratory for Novel Software Technology Nanjing University Department of Computer Science and Technology Nanjing University Department of Computer Science and Engineering The Hong Kong University of Science and Technology
Internetware applications are emerging and being widely *** can adapt their behavior based on environmental contexts and deliver smart *** contexts can be subject to various noises,which cause them to be inaccurate,in... 详细信息
来源: 评论
Combining Text Mining and Data Mining for Bug Report Classification
Combining Text Mining and Data Mining for Bug Report Classif...
收藏 引用
International Conference on software Maintenance (ICSM)
作者: Yu Zhou Yanxiang Tong Ruihang Gu Harald Gall College of Computer Science Nanjing University of Aeronautics and Astronautics State Key Lab. of Novel Software Technology Nanjing University China Department of Informatics University of Zurich Switzerland
Misclassification of bug reports inevitably sacrifices the performance of bug prediction models. Manual examinations can help reduce the noise but bring a heavy burden for developers instead. In this paper, we propose... 详细信息
来源: 评论
Fast and fine-grained counting and identification via constructive interference in WSNs
Fast and fine-grained counting and identification via constr...
收藏 引用
International Symposium on Information Processing in Sensor Networks (IPSN)
作者: Dingming Wu Chao Dong Shaojie Tang Haipeng Dai Guihai Chen State Key Laboratory for Novel Software Technology Nanjing University Nanjing China PLA University of Science and Technology Nanjing China Department of Computer and Information Science Temple University Philadelphia PA
Counting and identifying neighboring active nodes are two fundamental operations in wireless sensor networks (WSNs). In this paper, we propose two mechanisms, Power based Counting (Poc) and Power based Identification ... 详细信息
来源: 评论
User Guided Automation for Testing Mobile Apps
User Guided Automation for Testing Mobile Apps
收藏 引用
Asia-Pacific Conference on software Engineering
作者: Xiujiang Li Yanyan Jiang Yepang Liu Chang Xu Xiaoxing Ma Jian Lu Dept. of Computer Science and Technology Nanjing University Nanjing China Dept. of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong China State Key Lab for Novel Software Technology Nanjing University Nanjing China
Mobile devices are gradually taking over traditional computers' dominance in human lives. With the ever-increasing shipment of mobile apps running on these devices, their quality issues become a severe challenge. ... 详细信息
来源: 评论
A method of computing the hot topics' popularity on the internet combined with the features of the microblogs
A method of computing the hot topics' popularity on the inte...
收藏 引用
5th International Symposium on IT in Medicine and Education, ITME 2013
作者: Wei, Yongqing Zhang, Zhen Fei, Shaodong Du, Wentao Basic Education Department Shandong Police College Jinan 250014 China School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China Shandong University of Finance and Economics Jinan 250014 China
The article puts forward a new formula of computing the popularity of the topics, which is based on the stream of the news on the internet. What's more, the features of the microblogs should be also considered and... 详细信息
来源: 评论
Efficiently Collecting Histograms Over RFID Tags
Efficiently Collecting Histograms Over RFID Tags
收藏 引用
IEEE International Conference on computer Communications
作者: Lei Xie Hao Han Qun Li Jie Wu Sanglu Lu State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science College of William and Mary USA Department of Computer Information and Sciences Temple University USA
Collecting histograms over RFID tags is an essential premise for effective aggregate queries and analysis in large-scale RFID-based applications. In this paper we consider efficient collection of histograms from the m... 详细信息
来源: 评论
FACIAL ACTION UNIT RECOGNITION BY RELATION MODELING FROM BOTH QUALITATIVE KNOWLEDGE AND QUANTITATIVE DATA
FACIAL ACTION UNIT RECOGNITION BY RELATION MODELING FROM BOT...
收藏 引用
IEEE International Conference on Multimedia and Expo Workshops
作者: Zhen Gao Shangfei Wang Chongliang Wu Jun Wang Qiang Ji Key Lab of Computing and Communication Software of Anhui Province School of Computer Science and Technology University of Science and Technology of China Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute
In this paper, we propose to capture Action Unit (AU) relations existing in both qualitative knowledge and quantitative data through Credal Networks (CN). Each node of the CN represents an AU label, and the links and ... 详细信息
来源: 评论
Thermal-Aware Task Placement with Dynamic Thermal Model in an Established Datacenter
Thermal-Aware Task Placement with Dynamic Thermal Model in a...
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Zhigang Jiang Wei Huang Ilsun You Zhuzhong Qian Sanglu Lu School of Computer Engineering Nanjing Institute of Technology China State Key Lab. for Novel Software Technology Nanjing University China School of Information Science Korean Bible University South Korea
Cooling system is one of the key components in data centers and consumes nearly half of the total energy. For the safety and efficiency of a data enter, cooling system should guarantee all the servers running in a sui... 详细信息
来源: 评论
Intactness verification in anonymous RFID systems
Intactness verification in anonymous RFID systems
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Kai Bu Jia Liu Bin Xiao Xuan Liu Shigeng Zhang College Computer Science and Technology Zhejiang University State Key Laboratory for Novel Software Technology Nanjing University Department of Computing The Hong Kong Polytechnic University School of Information Science and Engineering Central South University
Radio-Frequency Identification (RFID) technology has fostered many object monitoring systems. Along with this trend, tagged objects' value and privacy become a primary concern. A corresponding important problem is... 详细信息
来源: 评论
A Spin-Glass Model based Local Community Detection Method in Social Networks
A Spin-Glass Model based Local Community Detection Method in...
收藏 引用
25th International Conference on Tools with Artificial Intelligence (ICTAI)
作者: Pan, Lei Wang, Chongjun Xie, Junyuan National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Mining community structures has become a general problem which exists in many fields including: computer-science, Mathematics, Physics, Biology, Sociology and so on. It has developed rapidly and been used widely in ma... 详细信息
来源: 评论