咨询与建议

限定检索结果

文献类型

  • 1,193 篇 会议
  • 839 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,036 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,459 篇 工学
    • 1,174 篇 计算机科学与技术...
    • 984 篇 软件工程
    • 269 篇 信息与通信工程
    • 188 篇 控制科学与工程
    • 143 篇 生物工程
    • 93 篇 电子科学与技术(可...
    • 88 篇 电气工程
    • 83 篇 机械工程
    • 75 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 33 篇 建筑学
    • 32 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 640 篇 理学
    • 400 篇 数学
    • 151 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 117 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 435 篇 管理学
    • 262 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 51 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 37 篇 feature extracti...
  • 30 篇 optimization
  • 30 篇 software
  • 29 篇 software testing
  • 28 篇 data mining
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 software enginee...
  • 24 篇 testing
  • 23 篇 image segmentati...
  • 23 篇 monitoring
  • 23 篇 accuracy
  • 22 篇 task analysis

机构

  • 522 篇 state key labora...
  • 221 篇 department of co...
  • 129 篇 national key lab...
  • 107 篇 state key labora...
  • 77 篇 state key lab. f...
  • 55 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 49 篇 national key lab...
  • 39 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 22 篇 nanjing universi...
  • 21 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 23 篇 qi lianyong
  • 23 篇 chen guihai
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 palaiahnakote sh...
  • 21 篇 li xuandong

语言

  • 1,913 篇 英文
  • 61 篇 中文
  • 60 篇 其他
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2036 条 记 录,以下是171-180 订阅
排序:
Detection, classification and characterization of android malware using API data dependency  11th
Detection, classification and characterization of android ma...
收藏 引用
11th International Conference Security and Privacy in Communication Networks, SecureComm 2015
作者: Li, Yongfeng Shen, Tong Sun, Xin Pan, Xuerui Mao, Bing State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
With the popularity of Android devices, more and more Android malware are manufactured every year. How to filter out malicious app is a serious problem for app markets. In this paper, we propose DroidADDMiner, an effi... 详细信息
来源: 评论
Combating NBTI-induced aging in data caches  13
Combating NBTI-induced aging in data caches
收藏 引用
23rd ACM International Conference of the Great Lakes Symposium on VLSI, GLSVLSI 2013
作者: Wang, Shuai Duan, Guangshan Zheng, Chuanlei Jin, Tao State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
The negative bias temperature instability (NBTI) in CMOS devices is one of most prominent sources of aging mechanisms, which can induce severe threats to the reliability of modern processors at deep submicron semicond... 详细信息
来源: 评论
Ontology-based metadata matching for emergency decision-making using MapReduce
收藏 引用
International Journal of Metadata, Semantics and Ontologies 2015年 第2期10卷 75-83页
作者: Zhu, Li Hu, Wei School of Economics and Management Nanjing University of Information Science and Technology Nanjing Jiangsu210044 China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu210023 China
Ontology matching techniques can help improve the accuracy of emergency decisionmaking on heterogeneous data. In this paper, we propose a practical approach to leverage ontology and MapReduce for matching metadata of ... 详细信息
来源: 评论
VDoc+:a virtual document based approach for matching large ontologies using MapReduce
收藏 引用
Journal of Zhejiang University-science C(computers and Electronics) 2012年 第4期13卷 257-267页
作者: Hang ZHANG Wei HU Yu-zhong QU State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210093China Department of Computer Science and Technology Nanjing UniversityNanjing 210093China
Many ontologies have been published on the Semantic Web,to be shared to describe *** them,large ontologies of real-world areas have the scalability problem in presenting semantic technologies such as ontology matching... 详细信息
来源: 评论
Exploring overall opinions for document level sentiment classification with structural SVM
Exploring overall opinions for document level sentiment clas...
收藏 引用
作者: Pu, Xiaojia Wu, Gangshan Yuan, Chunfeng State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
As a fundamental task of sentiment analysis, document level sentiment classification aims to predict user’s overall sentiment (e.g., positive or negative) towards the target in a document. The document usually consis... 详细信息
来源: 评论
DroidAlarm: An all-sided static analysis tool for Android privilege-escalation malware  13
DroidAlarm: An all-sided static analysis tool for Android pr...
收藏 引用
8th ACM SIGSAC Symposium on Information, computer and Communications Security, ASIA CCS 2013
作者: Zhongyang, Yibing Xin, Zhi Mao, Bing Xie, Li State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Since smartphones have stored diverse sensitive privacy information, including credit card and so on, a great deal of malware are desired to tamper them. As one of the most prevalent platforms, Android contains sensit... 详细信息
来源: 评论
A binary graph reduction algorithm for multi-constrained QoS routing  10
A binary graph reduction algorithm for multi-constrained QoS...
收藏 引用
Proceedings of the Second Asia-Pacific Symposium on Internetware
作者: Zhang, Sheng Qian, Zhuzhong Lu, Sanglu Chen, Daoxu State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology China
A lot of network services and applications are being designed to support quality-of-service (QoS) routing. One of the key problems is to find a feasible path that satisfies multiple QoS requirements, i.e., Multi-Const... 详细信息
来源: 评论
Static detection of un-trusted variables in PHP web applications
Static detection of un-trusted variables in PHP web applicat...
收藏 引用
2009 International Conference on E-Business and Information System Security, EBISS 2009
作者: Shushen, Peng Qing, Gu Daoxu, Chen State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Web applications support more and more our daily activities, it's important to improve their reliability and security. The content which users input to web applications' server-side is named un-trusted content... 详细信息
来源: 评论
Planning with multi-valued landmarks
Planning with multi-valued landmarks
收藏 引用
27th AAAI Conference on Artificial Intelligence, AAAI 2013
作者: Zhang, Lei Wang, Chong-Jun Wu, Jun Liu, Meilin Xie, Jun-Yuan State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University 210023 China
Landmark heuristics are perhaps the most accurate current known admissible heuristics for optimal planning. A disjunctive action landmark can be seen a form of at-least-one constraint on the actions it contains. In ma...
来源: 评论
Coordinated placement and replacement for grid-based hierarchical web caches
收藏 引用
4th International Conference on Grid and Cooperative Computing - GCC 2005
作者: Li, Wenzhong Wu, Kun Ping, Xu Tao, Ye Lu, Sanglu Chen, Daoxu State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University 210093 China
Web caching has been well accepted as a viable method for saving network bandwidth and reducing user access latency. To provide cache sharing on a large scale, hierarchical web caching has been widely deployed to impr... 详细信息
来源: 评论