咨询与建议

限定检索结果

文献类型

  • 370 篇 期刊文献
  • 304 篇 会议

馆藏范围

  • 674 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 484 篇 工学
    • 363 篇 计算机科学与技术...
    • 275 篇 软件工程
    • 98 篇 信息与通信工程
    • 47 篇 控制科学与工程
    • 44 篇 生物工程
    • 39 篇 电子科学与技术(可...
    • 35 篇 机械工程
    • 29 篇 电气工程
    • 22 篇 光学工程
    • 20 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 18 篇 仪器科学与技术
    • 16 篇 生物医学工程(可授...
    • 13 篇 建筑学
    • 12 篇 土木工程
  • 226 篇 理学
    • 124 篇 数学
    • 57 篇 物理学
    • 48 篇 生物学
    • 33 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
    • 10 篇 大气科学
  • 133 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 19 篇 法学
    • 10 篇 社会学
    • 9 篇 法学
  • 17 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 7 篇 教育学
  • 5 篇 农学
  • 3 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 19 篇 semantics
  • 15 篇 computer science
  • 15 篇 data mining
  • 14 篇 deep learning
  • 14 篇 feature extracti...
  • 12 篇 cloud computing
  • 11 篇 data privacy
  • 11 篇 software testing
  • 10 篇 steganography
  • 10 篇 federated learni...
  • 10 篇 training
  • 9 篇 reinforcement le...
  • 9 篇 computational mo...
  • 9 篇 blockchain
  • 8 篇 internet of thin...
  • 8 篇 optimization
  • 8 篇 servers
  • 8 篇 wireless sensor ...
  • 8 篇 software quality
  • 8 篇 clustering algor...

机构

  • 127 篇 school of comput...
  • 63 篇 jiangsu engineer...
  • 53 篇 state key labora...
  • 30 篇 school of comput...
  • 28 篇 jiangsu collabor...
  • 23 篇 jiangsu institut...
  • 20 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 jiangsu engineer...
  • 15 篇 school of comput...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 school of softwa...
  • 11 篇 college of compu...
  • 10 篇 school of inform...
  • 10 篇 collaborative in...
  • 10 篇 school of comput...

作者

  • 35 篇 wang jin
  • 23 篇 sun xingming
  • 19 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xu xiaolong
  • 17 篇 xingming sun
  • 16 篇 baowen xu
  • 16 篇 shen jian
  • 15 篇 xu baowen
  • 12 篇 xiaolong xu
  • 12 篇 liu wenjie
  • 11 篇 yongjun ren
  • 10 篇 xia zhihua
  • 10 篇 wenjie liu
  • 10 篇 sunil kumar jha
  • 9 篇 qi lianyong
  • 9 篇 ma tinghuai
  • 9 篇 wei fang
  • 9 篇 ma li
  • 8 篇 liu qi

语言

  • 637 篇 英文
  • 24 篇 其他
  • 13 篇 中文
检索条件"机构=School of Computer and Software and Jiangsu Engineering"
674 条 记 录,以下是61-70 订阅
排序:
Thread-sensitive pointer analysis for. inter-thread dataflow detection
Thread-sensitive pointer analysis for. inter-thread dataflow...
收藏 引用
11th IEEE International Workshop on Future Trends of Distributed Computing Systems
作者: Qian, Ju Xu, Baowen School of Computer Science and Engineering Southeast University Nanjing 210096 China Jiangsu Institution of Software Quality Nanjing 210096 China
Inter-thread dataflows are of great importance in analyzing concurrent programs. Suffering from the complexity of currency, it is still difficult to identify them from Java programs precisely and efficiently. A fundam... 详细信息
来源: 评论
Research on Bayesian Network Based User's Interest Model
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第5期12卷 809-813页
作者: ZHANG Weifeng XU Baowen CUI Zifeng XU Lei Department of Computer Science and Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 JiangsuChina School of Computer Science and Engineering Southeast University Nanjing 210096 Jiangsu China Jiangsu Institute of Software Quality Nanjing 210096 Jiangsu China
It has very realistic significance for improving the quality of users' accessing information to filter and selectively retrieve the large number of information on the Internet. On the basis of analyzing the existing ... 详细信息
来源: 评论
Research on C5.0 algorithm improvement and the test in lightning disaster statistics
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2014年 第1期7卷 181-190页
作者: Hou, Shuonan Hou, Rongtao Shi, Xinming Wang, Jun Yuan, Chengshang College of Information Science and Engineering Northeastern University ShenYang 110819 Liaoning China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 Jiangsu China
After analysis the importance of continuous attributes in the C5.0 algorithm processing, and consider the shortcomings of discretization method of C5 algorithm, this paper proposes a new method based on Rough set theo... 详细信息
来源: 评论
An effective scheme for biometric cryptosystems  2
An effective scheme for biometric cryptosystems
收藏 引用
2nd IEEE International Conference on computer and Communications, ICCC 2016
作者: Zhou, Yu Zhao, Bo Han, Jin Jun, Zheng School of Computer Science and Software Engineering East China Normal University Shanghai China School of Software and Microelectronics Peking University Beijing China Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology China
Compared with traditional cryptography, biometric cryptosystems provide more convenient and safe protection of keys. In this paper, an effective scheme for biometric cryptosystems based on the intersections of hyper-p... 详细信息
来源: 评论
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
收藏 引用
China Communications 2016年 第7期13卷 92-99页
作者: Zhihua Xia Liangao Zhang Dandan Liu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Computer and Software Nanjing University of Information Science & Technology Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted *** some common designs,attributes are managed by an attribute authority that is supposed to be fully *** concept implies that the attribu... 详细信息
来源: 评论
A Survey of Image Super Resolution Based on CNN  9th
A Survey of Image Super Resolution Based on CNN
收藏 引用
9th EAI International Conference on Cloud Computing, CloudComp 2019 and the 4th EAI International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019
作者: Xu, Qianxiong Zheng, Yu School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology NanjingJiangsu210044 China
With the advent of the information age in contemporary society, images are everywhere, no matter in military use or in daily life. Therefore, as a medium for people to obtain information, images have become more and m... 详细信息
来源: 评论
UniL: Point Cloud Novelty Detection through Multimodal Pre-training  24
UniL: Point Cloud Novelty Detection through Multimodal Pre-t...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wang, Yuhan Song, Mofei College of Software Engineering Southeast University Jiangsu Nanjing China Ministry of Education Jiangsu Nanjing China School of Computer Science and Engineering Southeast University Jiangsu Nanjing China
3D novelty detection plays a crucial role in various real-world applications, especially in safety-critical fields such as autonomous driving and intelligent surveillance systems. However, existing 3D novelty detectio... 详细信息
来源: 评论
A Testing Method for Web Services Composition Based on Data-Flow
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第4期13卷 455-460页
作者: HOU Jun XU Baowen XU Lei WANG Di XU Junling School of Computer Science and Engineering SoutheastUniversity Nanjing 211189 Jiangsu China State Key Laboratory of Software Engineering WuhanUniversity Wuhan 430072 Hubei China
This paper proposes a method of data-flow testing for Web services composition. Firstly, to facilitate data flow analysis and constraints collecting, the existing model representation of business process execution lan... 详细信息
来源: 评论
Analysis and Improvement of Steganography Protocol Based on Bell States in Noise Environment
收藏 引用
computers, Materials & Continua 2019年 第5期59卷 607-624页
作者: Zhiguo Qu Shengyao Wu Wenjie Liu Xiaojun Wang Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer&Software Nanjing University of Information Science and TechnologyNanjing210044China School of Electronic Engineering Dublin City UniversityDublinIreland
In the field of quantum communication,quantum steganography is an important branch of quantum information *** a realistic quantum communication system,quantum noises are unavoidable and will seriously impact the safet... 详细信息
来源: 评论
Vehicle Classification Based on Deep Convolutional Neural Networks Model for Traffic Surveillance Systems  15
Vehicle Classification Based on Deep Convolutional Neural Ne...
收藏 引用
15th International computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2018
作者: Zakria Cai, Jingye Deng, Jianhua Khokhar, Muhammad Saddam Umar Aftab, Muhammad School of Information and Software Engineering University of Electronic Science and Technology of China China School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China
Due to growth of vehicles in urban cities, such problems are increases traffic control systems, security and crime investigation, intelligent parking and electronic toll collection. Moreover, Logistics access manageme... 详细信息
来源: 评论