咨询与建议

限定检索结果

文献类型

  • 1,192 篇 会议
  • 833 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,453 篇 工学
    • 1,168 篇 计算机科学与技术...
    • 978 篇 软件工程
    • 267 篇 信息与通信工程
    • 186 篇 控制科学与工程
    • 143 篇 生物工程
    • 91 篇 电子科学与技术(可...
    • 85 篇 电气工程
    • 83 篇 机械工程
    • 75 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 33 篇 建筑学
    • 31 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 638 篇 理学
    • 400 篇 数学
    • 150 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 116 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 435 篇 管理学
    • 262 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 51 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 37 篇 feature extracti...
  • 30 篇 optimization
  • 30 篇 software
  • 28 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 software enginee...
  • 24 篇 testing
  • 23 篇 image segmentati...
  • 23 篇 monitoring
  • 23 篇 accuracy
  • 22 篇 task analysis

机构

  • 522 篇 state key labora...
  • 221 篇 department of co...
  • 129 篇 national key lab...
  • 107 篇 state key labora...
  • 75 篇 state key lab. f...
  • 55 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 48 篇 national key lab...
  • 39 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 21 篇 nanjing universi...
  • 21 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 23 篇 qi lianyong
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,908 篇 英文
  • 61 篇 中文
  • 58 篇 其他
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2029 条 记 录,以下是271-280 订阅
排序:
Supervised hashing with latent factor models  14
Supervised hashing with latent factor models
收藏 引用
37th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2014
作者: Zhang, Peichao Zhang, Wei Li, Wu-Jun Guo, Minyi Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University China National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
Due to its low storage cost and fast query speed, hashing has been widely adopted for approximate nearest neighbor search in large-scale datasets. Traditional hashing methods try to learn the hash codes in an unsuperv... 详细信息
来源: 评论
AZCVN: A novel energy equilibrium routing algorithm for WSNs
AZCVN: A novel energy equilibrium routing algorithm for WSNs
收藏 引用
2010 IEEE 12th International Conference on Communication technology, ICCT'2010
作者: Gu, Yueyue Bai, Guangwei Cao, Lei Department of Computer Science and Technology Nanjing University of Technology Nanjing 210009 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
This paper, based on the existing LEACH routing algorithm, proposes a novel adaptive zone-crossed and virtual node for multi-hop routing algorithm for large-scale wireless sensor networks. At first, we introduce the c... 详细信息
来源: 评论
Ackermann Functions --A Survey and Empirical Study
收藏 引用
计算机科学 2002年 第z1期29卷 103-105页
作者: Li Yunpeng State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China Institute of Command PLA University of Science and Technology Nanjing 210007 China
Ackermann functions are examples of nonprimitive recursive function which grow so fast with respect to their arguments. In this paper, we present Ackermann functions in detail and introduce its influence on theoretica... 详细信息
来源: 评论
Data dependence analysis in presence of inheritance and polymorphism  4
Data dependence analysis in presence of inheritance and poly...
收藏 引用
4th International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region, HPC-Asia 2000
作者: Li, Xiaoming Chen, Daoxu Xie, Li State Key Laboratory of Novel Software Technology Department of Computer Science Nanjing University Nanjing210093 China
The data dependence analysis is a hard problem, particularly in the presence of data structures similar to the pointer. The inheritance and the polymorphism in object-oriented languages provide program design and soft... 详细信息
来源: 评论
Detecting data races in interrupt-driven programs based on static analysis and dynamic simulation  15
Detecting data races in interrupt-driven programs based on s...
收藏 引用
7th Asia-Pacific Symposium on Internetware, Internetware 2015
作者: Wang, Yu Shi, Junjing Wang, Linzhang Zhao, Jianhua Li, Xuandong State Key Laboratory of Novel Computer Software Technology Nanjing University Nanjing 210023 China Jiangsu Novel Software Technology and Industrialization Nanjing 210023 China Department of Computer Science and Technology Nanjing University Nanjing 210023 China
Interrupt-driven programs are often embedded in safety-critical systems to perform hardware/resource dependent data operation tasks, such as data acquisition, processing, and transformation. The interrupt programs and... 详细信息
来源: 评论
An empirical analysis of package-modularization metrics: Implications for software fault-proneness
An empirical analysis of package-modularization metrics: Imp...
收藏 引用
作者: Zhao, Yangyang Yang, Yibiao Lu, Hongmin Zhou, Yuming Song, Qinbao Xu, Baowen State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China Department of Computer Science and Technology Xi'An Jiaotong University China
Context: In a large object-oriented software system, packages play the role of modules which group related classes together to provide well-identified services to the rest of the system. In this context, it is widely ... 详细信息
来源: 评论
NCov: A tool for measuring length-n subpath coverage  15
NCov: A tool for measuring length-n subpath coverage
收藏 引用
7th Asia-Pacific Symposium on Internetware, Internetware 2015
作者: Zhou, Yan Li, You Wang, Linzhang Li, Xuandong State Key Laboratory of Novel Computer Software Technology Nanjing University Nanjing210023 China Jiangsu Novel Software Technology and Industrialization Nanjing210023 China Department of Computer Science and Technology Nanjing University Nanjing210023 China
software test adequacy criteria are used to determine whether the test on a software system is sufficient. Code coverage shows how thoroughly a program is tested according to corresponding testing adequacy criteria. T... 详细信息
来源: 评论
Emotion recognition from thermal infrared images using deep Boltzmann machine
收藏 引用
Frontiers of computer science 2014年 第4期8卷 609-618页
作者: Shangfei WANG Menghua HE Zhen GAO Shan HE Qiang JI School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Key Lab of Computing and Communicating Software of Anhui Province Hefei 230027 China Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute Troy NY 12180-3590 USA
Facial expression and emotion recognition from thermal infrared images has attracted more and more attentions in recent years. However, the features adopted in current work are either temperature statistical parameter... 详细信息
来源: 评论
Incorporating latent semantic indexing into spectral graph transducer for text classification
Incorporating latent semantic indexing into spectral graph t...
收藏 引用
21th International Florida Artificial Intelligence Research Society Conference, FLAIRS-21
作者: Xinyu, Dai Baoming, Tian Junsheng, Zhou Jiajun, Chen State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University 210093 China Department of Computer Science Nanjing Normal University 210097 China
Spectral Graph Transducer(SGT) is one of the superior graph-based transductive learning methods for classification. As for the Spectral Graph Transducer algorithm, a good graph representation for data to be processed ... 详细信息
来源: 评论
Detecting source code changes to maintain the consistence of behavioral model  12
Detecting source code changes to maintain the consistence of...
收藏 引用
4th Asia-Pacific Symposium on Internetware, Internetware 2012
作者: Li, Yuankui Wang, Linzhang Li, Xuandong Cai, Yuanfang Department of Computer Science and Technology State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science Drexel University Philadelphia PA United States
It is well-known that as software system evolves, the source code tends to deviate from its design model so that main- taining their consistence is challenging. Our objective is to detect code changes that inuence des... 详细信息
来源: 评论