咨询与建议

限定检索结果

文献类型

  • 1,192 篇 会议
  • 828 篇 期刊文献

馆藏范围

  • 2,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,448 篇 工学
    • 1,163 篇 计算机科学与技术...
    • 978 篇 软件工程
    • 267 篇 信息与通信工程
    • 186 篇 控制科学与工程
    • 143 篇 生物工程
    • 91 篇 电子科学与技术(可...
    • 85 篇 电气工程
    • 83 篇 机械工程
    • 75 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 33 篇 建筑学
    • 31 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 638 篇 理学
    • 400 篇 数学
    • 150 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 116 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 435 篇 管理学
    • 262 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 51 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 37 篇 feature extracti...
  • 30 篇 optimization
  • 30 篇 software
  • 28 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 testing
  • 23 篇 image segmentati...
  • 23 篇 monitoring
  • 23 篇 accuracy
  • 22 篇 task analysis
  • 22 篇 software enginee...

机构

  • 519 篇 state key labora...
  • 221 篇 department of co...
  • 126 篇 national key lab...
  • 106 篇 state key labora...
  • 75 篇 state key lab. f...
  • 55 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 48 篇 national key lab...
  • 39 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 21 篇 nanjing universi...
  • 21 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 23 篇 qi lianyong
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,899 篇 英文
  • 61 篇 中文
  • 58 篇 其他
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2020 条 记 录,以下是1951-1960 订阅
排序:
Reinforcement learning in simulation robocup soccer
Reinforcement learning in simulation robocup soccer
收藏 引用
Proceedings of 2004 International Conference on Machine Learning and Cybernetics
作者: Cheng, Xian-Yi Yuan, Xiao-Hua Pan, Ling-Han Xia, De-Shen Department of Computer Science NanJing Univ. of Sci. and Technology 210094 China State Key Lab. Novel Software T. Nanjing University Nianjing 210093 China Comp. Sci. and Commun. Eng. Inst. Jiangsu University 212013 China
In the next fifty years, the main problem of AI is "the solution of Mutil-Agent in the dynamic and un-forecast environment", the standard problem is the robot vs. robot or human vs. robot competition. This p... 详细信息
来源: 评论
A Method of Acquiring Ontology Information from Web Documents
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2004年 3314卷 1041-1046页
作者: Han, Lixin Chen, Guihai Xie, Li Department of Mathematics Nanjing University China State Key Laboratory of Novel Software Technology Nanjing University China Department of Computer Science and Engineering Hohai University China
Ontology plays an important role on the Semantic Web. In this paper, we propose a method, AOIWD, of acquiring ontology information from Web documents. The AOIWD method employs data mining techniques combined with infe... 详细信息
来源: 评论
A fast and scalable parallel algorithms for Euclidean distance transform on LARPBS
A fast and scalable parallel algorithms for Euclidean distan...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Ling Chen Y. Pan Xiao-hua Xu Department of Computer Science Yangzhou University Yangzhou China National Key Laboratory of Novel Software Technology Nanjing University Nanjing China Department of Computer Science Georgia State University Atlanta GA USA
Summary form only given. A parallel algorithm for EDT transform on linear array with reconfigurable pipeline bus system (LARPBS) is presented. For an image with n/spl times/n pixels, the algorithm can complete the EDT... 详细信息
来源: 评论
Multi-events analysis for anomaly intrusion detection
Multi-events analysis for anomaly intrusion detection
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jian Yin Gang Zhang Yi-Qun Chen Xian-Li Fan Department of Computer Science Zhongshan University Guangzhou China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Probabilistic methods are widely used in intrusion detection especially in computer audit data analysis. There are many famous probabilistic algorithm such as decision tree, Hotelling's T2, chi-square, first-order... 详细信息
来源: 评论
Reinforcement learning in simulation RoboCup soccer
Reinforcement learning in simulation RoboCup soccer
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Xian-Yi Cheng Xiao-Hua Yuan Ling-Han Pan De-Shen Xia State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Computer Science & Communication Engineering Institute of Jiangsu University China Department of Computer Science Nanjing University of Science and Technology of PLA China
In the next fifty years, the main problem of AI is "the solution of multi-agent in the dynamic and un-forecast environment", the standard problem is the robot vs. robot or human vs. robot competition. This w... 详细信息
来源: 评论
受囿单向函数及其性质
受囿单向函数及其性质
收藏 引用
第八届中国密码学学术会议
作者: Rui Xue Mei Han Jian Li Dengguo Feng State Key Lab.of Information Security Institute of SoftwareCASBeijingPRC100080 Department of Applied Mathematics University of Science and Technology of BeijingBeijingPRC100039 Department of Computer Science Guang Dong Zhao Qing UniversityzhaoqingPRC526000
为了适应密码学在各种实际应用中需要,提出了一种新的单向函数-受囿单向函数的概念,形成了一个单向函数的(分层)谱,这是新方案的一个基本概念。与现行的密码学不同,我们不是将所有多项式作为一个可行类,而是将部分多项式作为一个... 详细信息
来源: 评论
AN IMPROVED ANT COLONY ALGORITHM IN CONTINUOUS OPTIMIZATION
收藏 引用
Systems science and Systems Engineering 2003年 第2期12卷 224-235页
作者: LingCHEN JieSHEN LingQIN HongjianCHEN National Key Lab of Novel Software Tech.Nanjing Univ Nanjing 210093China Department of Computer Science & Engeering Yangzhou University Yangzhou 225009China
A modified ant colony algorithm for solving optimization problem with continuous parameters is presented. In the method, groups of candidate values of the components are constructed, and each value in the group has it... 详细信息
来源: 评论
Solving Integer Programming by Evolutionary Soft Agent
收藏 引用
Wuhan University Journal of Natural sciences 2003年 第S1期8卷 283-286页
作者: Yin Jiandepartment of computer science, Zhongshan University, Guangzhou 510275,Guangdong, ChinaState key laboratory for novel software technology, Nanjing University, Nanjing 210093, Jiangsu, China Department of Computer Science Zhongshan University Guangzhou Guangdong China State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu China
Many practical problems in commerce and industry involve finding the best way to allocate scarce resources a-mong competing activities. This paper focuses on the problem of integer programming, and describes an evolut... 详细信息
来源: 评论
Intrusion discovery with data mining on Honeynet
Intrusion discovery with data mining on Honeynet
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jian Yin Gang Zhang Yi-Qun Chen Department of Computer Science Zhongshan University Guangzhou China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
In order to construct a secure network, attack and intrusion mode of intruders are analyzed for improving the capability of IDS and firewall systems. This paper presents a method for constructing a network intrusion a... 详细信息
来源: 评论
Design of a parser for real-time process algebra
Design of a parser for real-time process algebra
收藏 引用
Canadian Conference on Electrical and computer Engineering (CCECE)
作者: Jianhua Zhao Yingxu Wang State Key Laboratory of Novel Software Technology Department of Computer Science and Technology University of Calgary Nanjing University Jiangsu China Theoretical and Empirical Software Engineering Research Centre Department of Electrical and Computer Engineering University of Calgary Calgary AB Canada
The real-time process algebra (RTFA) is a set of new mathematical notations for formally describing software system architectures, and static and dynamic behaviors. To bring RTPA into industrial software development p... 详细信息
来源: 评论