咨询与建议

限定检索结果

文献类型

  • 1,193 篇 会议
  • 839 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,036 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,459 篇 工学
    • 1,174 篇 计算机科学与技术...
    • 984 篇 软件工程
    • 269 篇 信息与通信工程
    • 188 篇 控制科学与工程
    • 143 篇 生物工程
    • 93 篇 电子科学与技术(可...
    • 88 篇 电气工程
    • 83 篇 机械工程
    • 75 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 33 篇 建筑学
    • 32 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 640 篇 理学
    • 400 篇 数学
    • 151 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 117 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 435 篇 管理学
    • 262 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 51 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 37 篇 feature extracti...
  • 30 篇 optimization
  • 30 篇 software
  • 29 篇 software testing
  • 28 篇 data mining
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 software enginee...
  • 24 篇 testing
  • 23 篇 image segmentati...
  • 23 篇 monitoring
  • 23 篇 accuracy
  • 22 篇 task analysis

机构

  • 522 篇 state key labora...
  • 221 篇 department of co...
  • 129 篇 national key lab...
  • 107 篇 state key labora...
  • 77 篇 state key lab. f...
  • 55 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 49 篇 national key lab...
  • 39 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 22 篇 nanjing universi...
  • 21 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 23 篇 qi lianyong
  • 23 篇 chen guihai
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 palaiahnakote sh...
  • 21 篇 li xuandong

语言

  • 1,913 篇 英文
  • 61 篇 中文
  • 60 篇 其他
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2036 条 记 录,以下是261-270 订阅
排序:
B-spline surface fitting to mesh vertices
收藏 引用
science China(Information sciences) 2017年 第7期60卷 259-261页
作者: Yang LU Junhai YONG Kanle SHI Hejin GU Ping ZHENG Jean-Claude PAUL School of Software Tsinghua University Department of Computer Science and Technology Tsinghua University Key Laboratory for Information System Security Ministry of Education of China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Department of Research & Development Jiangxi Academy of Science Department of Mathematics and Computer Science Nanchang Normal University
Here we propose a novel method of fitting B-spline surfaces to input mesh *** a mesh model that is difficult to fit with one B-spline surface,we divide it into several patches that form a tree structure(which is calle... 详细信息
来源: 评论
Design and Realization of software for Guard Against DDoS Based on Self-Similar and Optimization Filter
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2006年 第1期13卷 44-48页
作者: REN Xun-yi WANG Ru-chuan WANG Hai-yan Department of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 P.R. China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 P.R. China
This paper proposes a distributed denial-of-service attack detection method based on self similar and wavelet analysis. This method adopts an optimized transmission control protocol cookie technology for filter optimi... 详细信息
来源: 评论
Probabilistic verification of hierarchical leader election protocol in dynamic systems
收藏 引用
Frontiers of computer science 2018年 第4期12卷 763-776页
作者: Yu ZHOU Nvqi ZHOU Tingting HAN Jiayi GU Weigang WU College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Information Systems Birkbeck University of London London WC1E 7HX UK Department of Computer Science Sun Yat-sen University Guangzhou 510006 China
Leader election protocols are fundamental for coordination problems--such as consensus--in distributed computing. Recently, hierarchical leader election protocols have been proposed for dynamic systems where processes... 详细信息
来源: 评论
How far are we to GPT-4V?Closing the gap to commercial multimodal models with open-source suites
收藏 引用
science China(Information sciences) 2024年 第12期67卷 5-22页
作者: Zhe CHEN Weiyun WANG Hao TIAN Shenglong YE Zhangwei GAO Erfei CUI Wenwen TONG Kongzhi HU Jiapeng LUO Zheng MA Ji MA Jiaqi WANG Xiaoyi DONG Hang YAN Hewei GUO Conghui HE Botian SHI Zhenjiang JIN Chao XU Bin WANG Xingjian WEI Wei LI Wenjian ZHANG Bo ZHANG Pinlong CAI Licheng WEN Xiangchao YAN Min DOU Lewei LU Xizhou ZHU Tong LU Dahua LIN Yu QIAO Jifeng DAI Wenhai WANG State Key Laboratory for Novel Software Technology Nanjing University Shanghai AI Laboratory School of Computer Science Fudan University SenseTime Research Department of Information Engineering The Chinese University of Hong Kong Department of Electronic Engineering Tsinghua University
In this paper, we introduce InternVL 1.5, an open-source multimodal large language model(MLLM) to bridge the capability gap between open-source and proprietary commercial models in multimodal understanding. We introdu... 详细信息
来源: 评论
Fast connection recovery against region failures with landmark-based source routing
Fast connection recovery against region failures with landma...
收藏 引用
2013 9th International Conference on the Design of Reliable Communication Networks, DRCN 2013
作者: Wang, Xiaoliang Jiang, Xiaohong Nguyen, Cam-Tu Zhang, Xiao Lu, Sanglu National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University 210093 Nanjing China Future University Hakodate Hokkaido Japan
Communication networks are vulnerable to the natural disasters or malicious attacks, which may cause a large area of corruptions and long term disconnection of network services. Such significant outage has become a se... 详细信息
来源: 评论
CORE: A trust model for agent coalition formation
CORE: A trust model for agent coalition formation
收藏 引用
5th International Conference on Natural Computation, ICNC 2009
作者: Zhou, Qing-Hua Wang, Chong-Jun Xie, Jun-Yuan National Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
CORE, a trust model is proposed trying to solve agent coalition formation problem. The model characterizes an agent's trust from two aspects of competence and reputation. In the paper, the Euclidean distance formu... 详细信息
来源: 评论
MSEs Credit Risk Assessment Model Based on Federated Learning and Feature Selection
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5573-5595页
作者: Zhanyang Xu Jianchun Cheng Luofei Cheng Xiaolong Xu Muhammad Bilal School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory Novel Software Technology Nanjing UniversityNanjing210023China Department of Computer and Electronics Systems Engineering Hankuk University of Foreign StudiesYongin-siGyeonggi-do17035Korea
Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asym... 详细信息
来源: 评论
Data flow analysis on android platform with fragment lifecycle modeling  12th
Data flow analysis on android platform with fragment lifecyc...
收藏 引用
12th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2016
作者: Li, Yongfeng Ouyang, Jinbin Guo, Shanqing Mao, Bing State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China School of Computer Science and Technology Shandong University Jinan China
Smartphones carry a large quantity of sensitive information to satisfy people’s various requirements, but the way of using information is important to keep the security of users’ privacy. There are two kinds of misu... 详细信息
来源: 评论
NBGVF: Normally biased gradient vector flow external force for active contours
NBGVF: Normally biased gradient vector flow external force f...
收藏 引用
2009 International Conference on Information Engineering and computer science, ICIECS 2009
作者: Lu, Shaopei Wang, Yuanquan Tianjin Key Lab of Intelligent Computing and Novel Software Technology School of Computer Science Tianjin University of Technology Tianjin 300191 China
Gradient vector flow (GVF) has been one effective external force for active contours, but it is based on isotropic diffusion. The recently proposed NGVF external force just took into account the diffusion along normal... 详细信息
来源: 评论
Point attention network for point cloud semantic segmentation
收藏 引用
science China(Information sciences) 2022年 第9期65卷 99-112页
作者: Dayong REN Zhengyi WU Jiawei LI Piaopiao YU Jie GUO Mingqiang WEI Yanwen GUO National Key Lab for Novel Software Technology Nanjing University School of Computer Science and Technology Nanjing University of Aeronautics and Astronautics
We address the point cloud semantic segmentation problem through modeling long-range dependencies based on the self-attention mechanism. Existing semantic segmentation models generally focus on local feature aggregati... 详细信息
来源: 评论