咨询与建议

限定检索结果

文献类型

  • 1,217 篇 会议
  • 829 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,458 篇 工学
    • 1,168 篇 计算机科学与技术...
    • 970 篇 软件工程
    • 263 篇 信息与通信工程
    • 191 篇 控制科学与工程
    • 143 篇 生物工程
    • 94 篇 电子科学与技术(可...
    • 87 篇 电气工程
    • 85 篇 机械工程
    • 79 篇 光学工程
    • 63 篇 生物医学工程(可授...
    • 48 篇 动力工程及工程热...
    • 44 篇 化学工程与技术
    • 43 篇 仪器科学与技术
    • 34 篇 建筑学
    • 30 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 639 篇 理学
    • 394 篇 数学
    • 151 篇 生物学
    • 123 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 系统科学
    • 52 篇 化学
  • 430 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 190 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 45 篇 医学
    • 42 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 50 篇 semantics
  • 43 篇 laboratories
  • 39 篇 feature extracti...
  • 35 篇 wireless sensor ...
  • 31 篇 software
  • 30 篇 optimization
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 26 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 monitoring
  • 22 篇 task analysis
  • 22 篇 software enginee...

机构

  • 512 篇 state key labora...
  • 210 篇 department of co...
  • 129 篇 national key lab...
  • 107 篇 state key labora...
  • 79 篇 state key lab. f...
  • 57 篇 national key lab...
  • 56 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 47 篇 national key lab...
  • 38 篇 department of co...
  • 38 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 department of co...
  • 28 篇 computer vision ...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 23 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 shen furao
  • 31 篇 zhang lijun
  • 30 篇 zhao jian
  • 30 篇 lu tong
  • 29 篇 tong lu
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,784 篇 英文
  • 220 篇 其他
  • 45 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2050 条 记 录,以下是1281-1290 订阅
排序:
DroidAlarm: An all-sided static analysis tool for Android privilege-escalation malware  13
DroidAlarm: An all-sided static analysis tool for Android pr...
收藏 引用
8th ACM SIGSAC Symposium on Information, computer and Communications Security, ASIA CCS 2013
作者: Zhongyang, Yibing Xin, Zhi Mao, Bing Xie, Li State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Since smartphones have stored diverse sensitive privacy information, including credit card and so on, a great deal of malware are desired to tamper them. As one of the most prevalent platforms, Android contains sensit... 详细信息
来源: 评论
Planning with multi-valued landmarks
Planning with multi-valued landmarks
收藏 引用
27th AAAI Conference on Artificial Intelligence, AAAI 2013
作者: Zhang, Lei Wang, Chong-Jun Wu, Jun Liu, Meilin Xie, Jun-Yuan State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University 210023 China
Landmark heuristics are perhaps the most accurate current known admissible heuristics for optimal planning. A disjunctive action landmark can be seen a form of at-least-one constraint on the actions it contains. In ma...
来源: 评论
A layered filtering method based on multi-resolution geometric model
收藏 引用
Journal of Computational Information Systems 2013年 第14期9卷 5651-5658页
作者: Zou, Zhiwen Wang, Zhenghui Chen, Jiming Pan, Jingui Li, Gen School of Computer Science and Telecommunications Engineering Jiangsu University Zhenjiang 212013 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
In order to reduce network traffic in distributed virtual environment, combined LOD techniques with active interest management based on layered interest management, a layered filtering method based on multi-resolution... 详细信息
来源: 评论
Specifying and Detecting Behavioral Changes in Source Code Using Abstract Syntax Tree Differencing
Specifying and Detecting Behavioral Changes in Source Code U...
收藏 引用
International Conference on Trustworthy Computing and Services, ISCTCS 2012
作者: Li, Yuankui Wang, Linzhang State Key Lab. for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
During the development of a software, its source code is continuously being modified. Even after the deployment, the maintenance work still involves changing the source code. Some of the modification performed on the ... 详细信息
来源: 评论
MDE-Based Verification of SysML State Machine Diagram by UPPAAL
MDE-Based Verification of SysML State Machine Diagram by UPP...
收藏 引用
International Conference on Trustworthy Computing and Services, ISCTCS 2012
作者: Huang, Xiaopu Sun, Qingqing Li, Jiangwei Zhang, Tian State Key Lab. for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
State Machine Diagram (SMD) is one of the SysML behavior diagrams, but it is a kind of semi-formal model language. As a consequence, models can not be verified conveniently and efficiently, especially in real-time emb... 详细信息
来源: 评论
Timing Aspects Construction Using UML-MARTE Profile
Timing Aspects Construction Using UML-MARTE Profile
收藏 引用
International Conference on Trustworthy Computing and Services, ISCTCS 2012
作者: Sun, Qingqing Huang, Xiaopu Li, Jiangwei Zhang, Tian State Key Lab. for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
Modern real time embedded systems are typically composed of multiple functional and nonfunctional concerns with nonfunctional concerns affect the former in many aspects. MARTE, an extension profile of UML2, aims to be... 详细信息
来源: 评论
Dynamics of Interacting Diseases
收藏 引用
Physical Review X 2014年 第4期4卷 041005-041005页
作者: Joaquín Sanz Cheng-Yi Xia Sandro Meloni Yamir Moreno Institute for Biocomputation and Physics of Complex Systems (BIFI) University of Zaragoza Zaragoza 50018 Spain Department of Theoretical Physics University of Zaragoza Zaragoza 50009 Spain Key Laboratory of Computer Vision and System (Ministry of Education) and Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 People’s Republic of China Complex Networks and Systems Lagrange Lab Institute for Scientific Interchange Turin 10126 Italy
Current modeling of infectious diseases allows for the study of complex and realistic scenarios that go from the population to the individual level of description. However, most epidemic models assume that the spreadi... 详细信息
来源: 评论
Detecting community structure in bipartite networks based on matrix factorisation
收藏 引用
International Journal of Wireless and Mobile Computing 2013年 第6期6卷 599-607页
作者: Chen, Bo-Lun Chen, Ling Zou, Sheng-Rong Xu, Xiu-Lian Department of Computer Science Nanjing University of Aeronautics and Astronautics Nanjing 210016 China Department of Computer Science Yangzhou University Yangzhou 225009 China State Key Lab. of Novel Software Technology Nanjing University Nanjing 210093 China College of Physics Science and Technology Yangzhou University Yangzhou 225009 China
Community detection in bipartite network is very important in the research on the theory and applications of complex network analysis. In this paper, an algorithm for detecting community structure in bipartite network... 详细信息
来源: 评论
Fast connection recovery against region failures with landmark-based source routing
Fast connection recovery against region failures with landma...
收藏 引用
2013 9th International Conference on the Design of Reliable Communication Networks, DRCN 2013
作者: Wang, Xiaoliang Jiang, Xiaohong Nguyen, Cam-Tu Zhang, Xiao Lu, Sanglu National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University 210093 Nanjing China Future University Hakodate Hokkaido Japan
Communication networks are vulnerable to the natural disasters or malicious attacks, which may cause a large area of corruptions and long term disconnection of network services. Such significant outage has become a se... 详细信息
来源: 评论
Predicting employee relations in enterprises by bi-directional link mining
Predicting employee relations in enterprises by bi-direction...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Wang Hong Sun Yanshen Institute of Information Science and Engineering Shandong Normal University Jinan Shandong Province China Computer Software Novel Technology Shandong Provincial Key Laboratory for Distributed Jinan Shandong Province China Department of Earth Sciences ZheJiang University Hangzhou Zhejiang Province China
By using link mining method, we can understand associations among persons in enterprises. In this paper, we propose a link mining model called a bi-directional link mining, which is capable of predicting edges that do... 详细信息
来源: 评论