咨询与建议

限定检索结果

文献类型

  • 1,193 篇 会议
  • 839 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,036 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,459 篇 工学
    • 1,174 篇 计算机科学与技术...
    • 984 篇 软件工程
    • 269 篇 信息与通信工程
    • 188 篇 控制科学与工程
    • 143 篇 生物工程
    • 93 篇 电子科学与技术(可...
    • 88 篇 电气工程
    • 83 篇 机械工程
    • 75 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 33 篇 建筑学
    • 32 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 640 篇 理学
    • 400 篇 数学
    • 151 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 117 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 435 篇 管理学
    • 262 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 51 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 37 篇 feature extracti...
  • 30 篇 optimization
  • 30 篇 software
  • 29 篇 software testing
  • 28 篇 data mining
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 software enginee...
  • 24 篇 testing
  • 23 篇 image segmentati...
  • 23 篇 monitoring
  • 23 篇 accuracy
  • 22 篇 task analysis

机构

  • 522 篇 state key labora...
  • 221 篇 department of co...
  • 129 篇 national key lab...
  • 107 篇 state key labora...
  • 77 篇 state key lab. f...
  • 55 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 49 篇 national key lab...
  • 39 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 22 篇 nanjing universi...
  • 21 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 23 篇 qi lianyong
  • 23 篇 chen guihai
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 palaiahnakote sh...
  • 21 篇 li xuandong

语言

  • 1,913 篇 英文
  • 61 篇 中文
  • 60 篇 其他
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2036 条 记 录,以下是151-160 订阅
排序:
Path-oriented bounded reachability analysis of composed linear hybrid systems
收藏 引用
International Journal on software Tools for technology Transfer 2011年 第4期13卷 307-317页
作者: Bu, Lei Li, Xuandong State Key Laboratory of Novel Software Technology Nanjing University Nanjing Jiangsu 210093 China Department of Computer Science and Technology Nanjing University Nanjing Jiangsu 210093 China
The existing techniques for reachability analysis of linear hybrid systems do not scale well to the problem size of practical interest. The performance of existing techniques is even worse for reachability analysis of... 详细信息
来源: 评论
SkipStream: A clustered skip graph based on-demand streaming scheme over ubiquitous environments
SkipStream: A clustered skip graph based on-demand streaming...
收藏 引用
38th International Conference on Parallel Processing, ICPP-2009
作者: Yu, Qifeng Xu, Tianyin Ye, Baoliu Lu., Sanglu Chen, Daoxu Department of Computer Science and Technology State Key Laboratory for Novel Software and Technology Nanjing University China
Providing continuous on-demand streaming services with VCR functionality over ubiquitous environments is challenging due to the stringent QoS requirements of streaming service as well as the dynamic characteristics of... 详细信息
来源: 评论
Identifying key features from app user reviews  21
Identifying key features from app user reviews
收藏 引用
43rd IEEE/ACM International Conference on software Engineering, ICSE 2021
作者: Wu, Huayao Deng, Wenjun Niu, Xintao Nie, Changhai State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
Due to the rapid growth and strong competition of mobile application (app) market, app developers should not only offer users with attractive new features, but also carefully maintain and improve existing features bas... 详细信息
来源: 评论
Data consistency enforcement on business process transactions
Data consistency enforcement on business process transaction...
收藏 引用
2012 International Conference on Service-Oriented Computing, ICSOC 2012
作者: Liu, Xi State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
Transactions are common in business processes (BPs). Consistency on data, which is defined as satisfaction of a set of data integrity constraints, is one of the basic properties for business process transactions (BPTs... 详细信息
来源: 评论
Model-driven indoor scenes modeling from a single image  41
Model-driven indoor scenes modeling from a single image
收藏 引用
41st Graphics Interface 2015, GI 2015
作者: Liu, Zicheng Zhang, Yan Wu, Wentao Liu, Kai Sun, Zhengxing State Key Lab for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China
In this paper, we present a new approach of 3D indoor scenes modeling on single image. With a single input indoor image (including sofa, tea table, etc.), a 3D scene can be reconstructed using existing model library i... 详细信息
来源: 评论
Optimal data scheduling for P2P VoD streaming systems
Optimal data scheduling for P2P VoD streaming systems
收藏 引用
16th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2010
作者: Yu, Qifeng Chen, Daoxu Department of Computer Science and Technology State Key Laboratory for Novel Software and Technology Nanjing University China
Media streaming services have been much more popular nowadays, and these services consume lots of network bandwidth. Peer-to-Peer(P2P) technology has been employed in the streaming systems to save the server bandwidth... 详细信息
来源: 评论
Traffic adaptive MAC protocol for wireless sensor network
Traffic adaptive MAC protocol for wireless sensor network
收藏 引用
Third International Conference on computer Network and Mobile Computing, ICCNMC 2005
作者: Gong, Haigang Liu, Ming Mao, Yinchi Chen, Li-Jun Xie, Li State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
In this paper, we propose TA-MAC, a traffic load adaptive Medium Access Control protocol for wireless sensor network. TA-MAC modified the contention window mechanism of S-MAC. It adjusts the initial contention window ... 详细信息
来源: 评论
Balancing resource utilization for continuous virtual machine requests in clouds
Balancing resource utilization for continuous virtual machin...
收藏 引用
6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
作者: Li, Xin Qian, Zhuzhong Chi, Ruiqing Zhang, Bolei Lu, Sanglu State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
The placement of virtual machines (VMs) on a cluster of physical machines (PMs) is a primary task in clouds. We can benefit a lot from appropriate placement policy, e.g. cost saving. In this paper, we raise a continuo... 详细信息
来源: 评论
Graphology based handwritten character analysis for human behaviour identification
收藏 引用
CAAI Transactions on Intelligence technology 2020年 第1期5卷 55-65页
作者: Subhankar Ghosh Palaiahnakote Shivakumara Prasun Roy Umapada Pal Tong Lu Indian Statistical Institute Kolkata 700108India Faculty of Computer Science and Information Technology University of Malaya50603 Kuala LumpurMalaysia National Key Lab for Novel Software Technology Nanjing University210093 NanjingPeople’s Republic of China
Graphology-based handwriting analysis to identify human behavior,irrespective of applications,is *** existing methods that use characters,words and sentences for behavioural analysis with human intervention,we propose... 详细信息
来源: 评论
"re-ID BUFF": An enhanced similarity measurement based on genetic programming for person re-identification  21
"re-ID BUFF": An enhanced similarity measurement based on ge...
收藏 引用
2021 Genetic and Evolutionary Computation Conference, GECCO 2021
作者: Li, Yiming Shang, Lin State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
Person re-identification (re-ID) is a fundamental link to ensure successful cross-camera tracking. Its overall process is divided into two stages, feature extraction and matching. In the matching stage, the simple Euc... 详细信息
来源: 评论