咨询与建议

限定检索结果

文献类型

  • 1,193 篇 会议
  • 839 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,036 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,459 篇 工学
    • 1,174 篇 计算机科学与技术...
    • 984 篇 软件工程
    • 269 篇 信息与通信工程
    • 188 篇 控制科学与工程
    • 143 篇 生物工程
    • 93 篇 电子科学与技术(可...
    • 88 篇 电气工程
    • 83 篇 机械工程
    • 75 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 33 篇 建筑学
    • 32 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 640 篇 理学
    • 400 篇 数学
    • 151 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 117 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 435 篇 管理学
    • 262 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 51 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 37 篇 feature extracti...
  • 30 篇 optimization
  • 30 篇 software
  • 29 篇 software testing
  • 28 篇 data mining
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 software enginee...
  • 24 篇 testing
  • 23 篇 image segmentati...
  • 23 篇 monitoring
  • 23 篇 accuracy
  • 22 篇 task analysis

机构

  • 522 篇 state key labora...
  • 221 篇 department of co...
  • 129 篇 national key lab...
  • 107 篇 state key labora...
  • 77 篇 state key lab. f...
  • 55 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 49 篇 national key lab...
  • 39 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 22 篇 nanjing universi...
  • 21 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 23 篇 qi lianyong
  • 23 篇 chen guihai
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 palaiahnakote sh...
  • 21 篇 li xuandong

语言

  • 1,913 篇 英文
  • 61 篇 中文
  • 60 篇 其他
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2036 条 记 录,以下是221-230 订阅
排序:
Maximizing influence spread in a new propagation model
Maximizing influence spread in a new propagation model
收藏 引用
7th International Conference on Rough Sets and Knowledge technology, RSKT 2012
作者: Yang, Hongchao Wang, Chongjun Xie, Junyuan Department of Computer Science Nanjing University State Key Laboratory for Novel Software Technology Nanjing China
Study on information propagation in social networks has a long history. The influence maximization problem has become a popular research area for many scholars. Most of algorithms to solve the problem are based on the... 详细信息
来源: 评论
A decentralized storage scheme for multi-dimensional range queries over sensor networks
A decentralized storage scheme for multi-dimensional range q...
收藏 引用
15th International Conference on Parallel and Distributed Systems, ICPADS '09
作者: Xie, Lei Chen, Lijun Chen, Daoxu Xie, Li State Key Laboratory of Novel Software Technology Department of Computer Science Nanjing University Nanjing China
This paper presents the design of a decentralized storage scheme to support multi-dimensional range queries over sensor networks. We build a distributed k-d tree based index structure over sensor network, so as to eff... 详细信息
来源: 评论
TMAC: Taint-based memory protection via access control
TMAC: Taint-based memory protection via access control
收藏 引用
2009 2nd International Conference on Dependability, DEPEND 2009
作者: Lei, Wang Chen, Fang Bing, Mao Li, Xie State Key Laboratory for Novel Software Technology Department of Computer Science Nanjing University Nanjing China
Memory corruption attacks account for most parts of malicious attacks toward software security. Recently dynamic taint analysis is proposed and is gaining momentum. This proposed technique attempts to defeat attacks b... 详细信息
来源: 评论
Optical flow based dynamic curved video text detection
Optical flow based dynamic curved video text detection
收藏 引用
作者: Shivakuamra, Palaiahnakote Lubani, Mohamed Wong, Koksheik Lu, Tong Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia National Key Lab for Novel Software Technology Nanjing University Nanjing China
Text detection in video is a challenging problem as it is useful in several real time applications in the field of video indexing and retrieval. Unlike existing methods that generally focus on horizontal caption or gr... 详细信息
来源: 评论
Value based Curriculum Design for Engineering Studies  5
Value based Curriculum Design for Engineering Studies
收藏 引用
5th IEEE International Conference on MOOCs, Innovation and technology in Education (MITE)
作者: Subramanian, Shriram Dorairaju, Bharathi Pallavarapu, Mayur Department of Computer Science Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin China
Education apart from the basic needs of food, clothing and shelter, is another key factor to empower an individual. It acts as an enabler to elevate a person socially and from within. Education system has been evolvin... 详细信息
来源: 评论
Aspect-Oriented Modeling and Verification with Finite State Machines
收藏 引用
Journal of computer science & technology 2009年 第5期24卷 949-961页
作者: 徐殿祥 Omar El-Ariss 许巍峰 王林章 National Center for the Protection of the Financial Infrastructure Dakota State UniversityMadisonSD 57042 U.S.A. State Key Laboratory of Novel Software Technology Department of Computer Science and TechnologyNanjing University Department of Computer Science North Dakota State UniversityFargoND 58105 U.S.A Computer and Information Science Department Gannon University109 University SquareEriePA 16541 U.S.A
Aspect-oriented programming modularizes crosscutting concerns into aspects with the advice invoked at the specified points of program execution. Aspects can be used in a harmful way that invalidates desired properties... 详细信息
来源: 评论
Dynamical Trust Construction Schema with Fuzzy Decision in P2P Systems
收藏 引用
电子学报(英文版) 2009年 第3期18卷 417-421页
作者: WANG Yang WANG Ruchuan HAN Zhijie College of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China Department of Computer Anhui Normal University Wuhu 241000 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
The security problem for Peer-to-peer (P2P) systems has been gradually recognized as an important topic of P2P applications. Among existing solution for P2P security, how to establish trust relationship among peers is... 详细信息
来源: 评论
Specifying and Detecting Behavioral Changes in Source Code Using Abstract Syntax Tree Differencing
Specifying and Detecting Behavioral Changes in Source Code U...
收藏 引用
International Conference on Trustworthy Computing and Services, ISCTCS 2012
作者: Li, Yuankui Wang, Linzhang State Key Lab. for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
During the development of a software, its source code is continuously being modified. Even after the deployment, the maintenance work still involves changing the source code. Some of the modification performed on the ... 详细信息
来源: 评论
Symmetry features for license plate classification
收藏 引用
CAAI Transactions on Intelligence technology 2018年 第3期3卷 176-183页
作者: Karpuravalli Srinivas Raghunandan Palaiahnakote Shivakumara Lolika Padmanabhan Govindaraju Hemantha Kumar Tong Lu Umapada Pal Department of Studies in Computer Science University of Mysore Karnataka India Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia PES Institute of Technology Bangalore Karnataka India National Key Lab for Novel Software Technology Nanjing University Nanjing People's Republic of China Computer Vision and Pattern Recognition Unit Indian Statistical Institute Kolkata India
Achieving high recognition rate for license plate images is challenging due to multi-type images. We present new symmetry features based on stroke width for classifying each input license image as private, taxi, cursi... 详细信息
来源: 评论
MDE-Based Verification of SysML State Machine Diagram by UPPAAL
MDE-Based Verification of SysML State Machine Diagram by UPP...
收藏 引用
International Conference on Trustworthy Computing and Services, ISCTCS 2012
作者: Huang, Xiaopu Sun, Qingqing Li, Jiangwei Zhang, Tian State Key Lab. for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
State Machine Diagram (SMD) is one of the SysML behavior diagrams, but it is a kind of semi-formal model language. As a consequence, models can not be verified conveniently and efficiently, especially in real-time emb... 详细信息
来源: 评论