咨询与建议

限定检索结果

文献类型

  • 1,212 篇 会议
  • 822 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,038 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,447 篇 工学
    • 1,159 篇 计算机科学与技术...
    • 963 篇 软件工程
    • 259 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 143 篇 生物工程
    • 92 篇 电子科学与技术(可...
    • 83 篇 机械工程
    • 83 篇 电气工程
    • 76 篇 光学工程
    • 62 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 35 篇 建筑学
    • 30 篇 土木工程
    • 29 篇 网络空间安全
    • 28 篇 安全科学与工程
  • 631 篇 理学
    • 390 篇 数学
    • 150 篇 生物学
    • 120 篇 物理学
    • 116 篇 统计学(可授理学、...
    • 86 篇 系统科学
    • 50 篇 化学
  • 428 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 42 篇 医学
    • 39 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 50 篇 semantics
  • 43 篇 laboratories
  • 39 篇 feature extracti...
  • 35 篇 wireless sensor ...
  • 31 篇 software
  • 30 篇 optimization
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 26 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 monitoring
  • 22 篇 task analysis
  • 22 篇 software enginee...

机构

  • 510 篇 state key labora...
  • 208 篇 department of co...
  • 129 篇 national key lab...
  • 109 篇 state key labora...
  • 78 篇 state key lab. f...
  • 57 篇 state key labora...
  • 56 篇 national key lab...
  • 52 篇 state key labora...
  • 51 篇 state key lab fo...
  • 47 篇 national key lab...
  • 38 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 department of co...
  • 28 篇 computer vision ...
  • 25 篇 department of co...
  • 25 篇 school of electr...
  • 22 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 30 篇 lu tong
  • 29 篇 zhao jian
  • 29 篇 tong lu
  • 26 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,826 篇 英文
  • 166 篇 其他
  • 45 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2038 条 记 录,以下是1261-1270 订阅
排序:
Co-metric: a metric learning algorithm for data with multiple views
收藏 引用
Frontiers of computer science 2013年 第3期7卷 359-369页
作者: Qiang QIAN Songcan CHEN Department of Computer Science and Engineering Nanjing University of Aeronautics and Astronautics Nanjing 210016 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
We address the problem of metric learning for multi-view data. Many metric learning algorithms have been proposed, most of them focus just on single view circumstances, and only a few deal with multi-view data. In thi... 详细信息
来源: 评论
Energy-aware multipath routing for data aggregation in wireless sensor networks
Energy-aware multipath routing for data aggregation in wirel...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yingyuan Xiao Xinrong Zhao Hongya Wang Ching-Hsien Hsu Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin P.R. China School of Computer Science and Technology Donghua University Shanghai P.R. China Department of Computer Science and Information Engineering Chung Hua University Hsinchu Taiwan R.O.C
Data aggregation in wireless sensor networks is widely used to collect data in an energy efficient manner to eliminate redundant data transmission so that prolong the network lifetime. To meet the data aggregation nee... 详细信息
来源: 评论
Scenario-Based Behavioral Nonexistent Consistency Checking for Cyber-Physical Systems
Scenario-Based Behavioral Nonexistent Consistency Checking f...
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Yan Zhang Xiangwei Liu Jin Shi Tian Zhang Zhuzhong Qian Department of Computer Science and Technology Beijing Electronic Science and Technology Institute Beijing P. R. China State Key Lab. for Novel Software TechnologyNanjing University Naniing P. R. China School of Information Management Nanjing University Nanjing P. R. China Department of Computer Science and Technology Nanjing University Nanjing P. R. China
Cyber-Physical Systems (CPS) play an important role in the safety-critical systems. It is very significant to verify whether some concerned behaviors exist in a CPS. Hybrid interface automata, extension of a non-hybri... 详细信息
来源: 评论
Low illumination image Retinex enhancement algorithm based on guided filtering
Low illumination image Retinex enhancement algorithm based o...
收藏 引用
IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS)
作者: Jingcao Yin Hongbo Li Junping Du Pengcheng He Beijing Key Lab of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
It has been shown by Retinex theory that the object's color in the image is determined by its reflectance. Under this frame work, several Retinex-based algorithms have been developed to uncover the real appearance... 详细信息
来源: 评论
Physically based parallel ray tracer for the Metropolis light transport algorithm on the Tianhe-2 supercomputer
Physically based parallel ray tracer for the Metropolis ligh...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Changmao Wu Yunquan Zhang Congli Yang Yutong Lu University of Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Architecture CAS Beijing China Laboratory of Parallel Software & Computational Science CAS Beijing China Department of Computer Science & Technology National University of Defense Technology Changsha Hunan China
Developing an efficient and highly scalable ray tracer for the Metropolis light transport algorithm is becoming increasingly important as the request for photorealistic images becomes a common trend. Although the Metr... 详细信息
来源: 评论
Data consistency enforcement on business process transactions
Data consistency enforcement on business process transaction...
收藏 引用
2012 International Conference on Service-Oriented Computing, ICSOC 2012
作者: Liu, Xi State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
Transactions are common in business processes (BPs). Consistency on data, which is defined as satisfaction of a set of data integrity constraints, is one of the basic properties for business process transactions (BPTs... 详细信息
来源: 评论
Multi-facet community detection from bipartite networks
收藏 引用
Journal of Applied sciences 2013年 第16期13卷 3137-3144页
作者: Xu, Yongcheng Chen, Ling Zou, Shengrong Department of Computer Science Yangzhou University Yangzhou 225009 China State Key Laboratory of Novel Software Technology Nanjing University Nanjing 210093 China
Detecting communities from networks is one of the important and challenging research topics in social network analysis, especially from bipartite network. In unipartite network, communities are usually represented as ... 详细信息
来源: 评论
Combating NBTI-induced aging in data caches  13
Combating NBTI-induced aging in data caches
收藏 引用
23rd ACM International Conference of the Great Lakes Symposium on VLSI, GLSVLSI 2013
作者: Wang, Shuai Duan, Guangshan Zheng, Chuanlei Jin, Tao State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
The negative bias temperature instability (NBTI) in CMOS devices is one of most prominent sources of aging mechanisms, which can induce severe threats to the reliability of modern processors at deep submicron semicond... 详细信息
来源: 评论
DroidAlarm: An all-sided static analysis tool for Android privilege-escalation malware  13
DroidAlarm: An all-sided static analysis tool for Android pr...
收藏 引用
8th ACM SIGSAC Symposium on Information, computer and Communications Security, ASIA CCS 2013
作者: Zhongyang, Yibing Xin, Zhi Mao, Bing Xie, Li State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Since smartphones have stored diverse sensitive privacy information, including credit card and so on, a great deal of malware are desired to tamper them. As one of the most prevalent platforms, Android contains sensit... 详细信息
来源: 评论
Planning with multi-valued landmarks
Planning with multi-valued landmarks
收藏 引用
27th AAAI Conference on Artificial Intelligence, AAAI 2013
作者: Zhang, Lei Wang, Chong-Jun Wu, Jun Liu, Meilin Xie, Jun-Yuan State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University 210023 China
Landmark heuristics are perhaps the most accurate current known admissible heuristics for optimal planning. A disjunctive action landmark can be seen a form of at-least-one constraint on the actions it contains. In ma...
来源: 评论