咨询与建议

限定检索结果

文献类型

  • 1,193 篇 会议
  • 839 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,036 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,459 篇 工学
    • 1,174 篇 计算机科学与技术...
    • 984 篇 软件工程
    • 269 篇 信息与通信工程
    • 188 篇 控制科学与工程
    • 143 篇 生物工程
    • 93 篇 电子科学与技术(可...
    • 88 篇 电气工程
    • 83 篇 机械工程
    • 75 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 33 篇 建筑学
    • 32 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 640 篇 理学
    • 400 篇 数学
    • 151 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 117 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 435 篇 管理学
    • 262 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 51 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 37 篇 feature extracti...
  • 30 篇 optimization
  • 30 篇 software
  • 29 篇 software testing
  • 28 篇 data mining
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 software enginee...
  • 24 篇 testing
  • 23 篇 image segmentati...
  • 23 篇 monitoring
  • 23 篇 accuracy
  • 22 篇 task analysis

机构

  • 522 篇 state key labora...
  • 221 篇 department of co...
  • 129 篇 national key lab...
  • 107 篇 state key labora...
  • 77 篇 state key lab. f...
  • 55 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 49 篇 national key lab...
  • 39 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 22 篇 nanjing universi...
  • 21 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 23 篇 qi lianyong
  • 23 篇 chen guihai
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 palaiahnakote sh...
  • 21 篇 li xuandong

语言

  • 1,913 篇 英文
  • 61 篇 中文
  • 60 篇 其他
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2036 条 记 录,以下是141-150 订阅
排序:
Massively parallel algorithms for fully dynamic all-pairs shortest paths
收藏 引用
Frontiers of computer science 2024年 第4期18卷 201-203页
作者: Chilei WANG Qiang-Sheng HUA Hai JIN Chaodong ZHENG National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China
1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the g... 详细信息
来源: 评论
Organization-Driven Business Process Configurable Modeling for Spatial Variability
收藏 引用
China Communications 2021年 第11期18卷 229-242页
作者: Guosheng Kang Liqing Yang Liang Zhang Jianxun Liu Yiping Wen Hunan Provincial Key Lab.for Services Computing and Novel Software Technology Hunan University of Science and TechnologyXiangtan 411201China School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan 411201China School of Computer Science Fudan UniversityShanghai 201203China
Nowadays,enterprises need to continually adjust their business processes to adapt to the changes of business environments,especially when one business needs to be deployed in different application scenarios,which is c... 详细信息
来源: 评论
Constraints on Extensions of a Default Theory
收藏 引用
Journal of computer science & technology 2001年 第4期16卷 329-340页
作者: 苏开乐 Department of Computer Science Zhongshan University Guangzhou P.R. China State Key Laboratory for Novel Software Technology Nanjing University Nanjing P.R. China
In this paper, the representability of a family of theories as the set of extensions of a default theory is studied. First, a new necessary condition is given for the representability by means of general default theor... 详细信息
来源: 评论
Statically-guided fork-based symbolic execution for vulnerability detection  27
Statically-guided fork-based symbolic execution for vulnerab...
收藏 引用
27th International Conference on software Engineering and Knowledge Engineering, SEKE 2015
作者: Wang, Yue Sun, Hao Zeng, Qingkai State Key Lab for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing210023 China
Fork-based symbolic execution would waste large amounts of computing time and resource on invulnerable paths when applied to vulnerability detection. In this paper, we propose a statically-guided fork-based symbolic e... 详细信息
来源: 评论
Checking Temporal Duration Properties of Timed Automata
收藏 引用
Journal of computer science & technology 2002年 第6期17卷 689-698页
作者: 李勇 Dang Van Hung State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 P.R. China International Institute for Software Technology The United Nations University P.O. Box 3058 Macao SAR P.R. China
In this paper, the problem of checking a timed automaton for a Duration Cal-culus formula of the form Temporal Duration Property is addressed. It is shown that TemporalDuration Properties are in the class of discretis... 详细信息
来源: 评论
Selecting queries from sample to crawl deep web data sources
收藏 引用
Web Intelligence and Agent Systems 2012年 第1期10卷 75-88页
作者: Wang, Yan Lu, Jianguo Liang, Jie Chen, Jessica Liu, Jiming School of Computer Science University of Windsor Windsor ON Canada Department of Computer Science Hong Kong Baptist University Hong Kong State Key Lab for Novel Software Technology Nanjing University Nanjing China
This paper studies the problem of selecting queries to efficiently crawl a deep web data source using a set of sample documents. Crawling deep web is the process of collecting data from search interfaces by issuing qu... 详细信息
来源: 评论
Predicted Robustness as QoS for Deep Neural Network Models
收藏 引用
Journal of computer science & technology 2020年 第5期35卷 999-1015页
作者: Yue-Huan Wang Ze-Nan Li Jing-Wei Xu Ping Yu Taolue Chen Xiao-Xing Ma State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science University of SurreyGuilfordGU27XHU.K.
The adoption of deep neural network(DNN)model as the integral part of real-world software systems necessitates explicit consideration of their quality-of-service(QoS).It is well-known that DNN models are prone to adve... 详细信息
来源: 评论
Timing analysis of MSC specifications with asynchronous concatenation
收藏 引用
International Journal on software Tools for technology Transfer 2012年 第6期14卷 639-651页
作者: Pan, Minxue Li, Xuandong State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu 210093 China Department of Computer Science and Technology Nanjing University Nanjing Jiangsu 210093 China
Message Sequence Chart (MSC) is a graphical and textual language for describing the interactions between system components, and MSC specifications (MSSs) are a combination of a set of basic MSCs (bMSCs) and a High-lev... 详细信息
来源: 评论
Reasoning about inheritance and cloning behaviors of software agents  31
Reasoning about inheritance and cloning behaviors of softwar...
收藏 引用
31st International Conference on technology of Object-Oriented Languages and Systems, TOOLS 1999
作者: Fan, Xiaocong Xu, Dianxiang Zheng, Guoliang National Key Laboratory for Novel Software Technology Department of Computer Science Nanjing University Nanjing210093 China
Agents being a kind of restricted intelligent objects, it is a natuml way to research the inheritance feature of software agents and integmte inheritance mechanisms into AOP. Based on BDI model of agents, this paper a... 详细信息
来源: 评论
TextLogger: Inferring longer inputs on touch screen using motion sensors  15
TextLogger: Inferring longer inputs on touch screen using mo...
收藏 引用
8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015
作者: Ping, Dan Sun, Xin Mao, Bing State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
Today's smartphones are equipped with precise motion sensors like accelerometer and gyroscope, which can measure tiny motion and rotation of devices. While they make mobile applications more functional, they also ... 详细信息
来源: 评论