咨询与建议

限定检索结果

文献类型

  • 2,171 篇 会议
  • 1,782 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,967 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,796 篇 工学
    • 2,086 篇 计算机科学与技术...
    • 1,714 篇 软件工程
    • 523 篇 信息与通信工程
    • 356 篇 控制科学与工程
    • 243 篇 生物工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 电气工程
    • 174 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 71 篇 建筑学
    • 69 篇 交通运输工程
    • 63 篇 土木工程
  • 1,282 篇 理学
    • 768 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 121 篇 化学
  • 758 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 345 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 104 篇 医学
    • 92 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 67 篇 computer science
  • 65 篇 training
  • 62 篇 computational mo...
  • 58 篇 deep learning
  • 58 篇 data mining
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 46 篇 clustering algor...
  • 45 篇 machine learning
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 39 篇 data models
  • 38 篇 accuracy
  • 37 篇 quality of servi...

机构

  • 298 篇 state key labora...
  • 216 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 89 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 71 篇 school of comput...
  • 69 篇 computer school ...
  • 65 篇 state key lab. f...
  • 57 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 45 篇 school of comput...
  • 43 篇 state key labora...
  • 40 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 huang di
  • 41 篇 xiao limin
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 27 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 tao dacheng
  • 22 篇 xu xiaolong
  • 21 篇 he keqing
  • 21 篇 zhao jian
  • 21 篇 qi lianyong
  • 21 篇 li yuanxiang
  • 21 篇 qi lei
  • 20 篇 shen furao
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 du bo

语言

  • 3,637 篇 英文
  • 226 篇 其他
  • 105 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3967 条 记 录,以下是3581-3590 订阅
排序:
A Hybrid Particle Swarm Optimization Algorithm for Multimodal Function Optimization
A Hybrid Particle Swarm Optimization Algorithm for Multimoda...
收藏 引用
International Workshop on Intelligent Systems and Applications, ISA
作者: Jirong Gu Lin Lin Hui Wang College of Geography and Resources Sciences Sichuan Normal University China Department of Computer Science Yili Normal School Yining China State Key Laboratory of Software Engineering Wuhan University of China China
Particle swarm optimization (PSO) has shown its good performance on numerical function problems. However, on some multimodal functions the PSO easily suffers from premature convergence because of the rapid decline in ... 详细信息
来源: 评论
Multi-attributes controlled point-based rendering architecture for mobile devices
Multi-attributes controlled point-based rendering architectu...
收藏 引用
11th IEEE International Conference on computer-Aided Design and computer Graphics(第11届IEEE国际计算机辅助设计与图形学学术会议 IEEE CAD/GRAPHICS 2009)
作者: Zhiying He Xiaohui Liang State Key Lab. of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang UniversityBeijing 100191 P.R. China
Taking the characteristics of mobile devices and the demands for graphics rendering into account, this paper gives a set of definitions of attributes to express the performance of mobile terminals and algorithm pe... 详细信息
来源: 评论
Prediction of interspecies transmission for avian influenza a virus based on BP neural network
Prediction of interspecies transmission for avian influenza ...
收藏 引用
International Conference on Bio-Inspired Computing: Theories and Applications, BICTA
作者: Xiaoli Qiang Zheng Kou School of Electronic Engineering and Computer Science Key Laboratory of High Confidence Software Technologies of Ministry of Education Peking University Beijing China State Key Laboratory of Virology Wuhan Institute of Virology Chinese Academy and Sciences Wuhan China
The prediction of the transmissibility of avian influenza A viruses from birds to humans is very important for the public health. Recently, two categories of molecular patterns, which were associated with the phenotyp... 详细信息
来源: 评论
Solving Global Unconstrained Optimization Problems by Symmetry-Breaking
Solving Global Unconstrained Optimization Problems by Symmet...
收藏 引用
International Conference on computer and Information Science (ACIS)
作者: Xiaohui Ji Feifei Ma Jian Zhang School of Information Engineering China University of Geoscience Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China Chinese Academy of Sciences Beijing Beijing CN
Global optimization has many real-world applications. Most methods for solving it are based on search,so decreasing its search space can increase the efficiency for their solving. Symmetry-breaking is an important tec... 详细信息
来源: 评论
A Model-Based Fuzz Framework to the Security Testing of TCG software Stack Implementations
A Model-Based Fuzz Framework to the Security Testing of TCG ...
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Yang Yang Huanguo Zhang Mi Pan Jian Yang Fan He Zhide Li School of Computer Wuhan University of China Wuhan China School of Computer State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan China Guangdong Dongguan Supervision Testing Institute of Quality and Metrology Dongguan China
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally fuzz testing tools use random inputs and watch the resulting values. In this paper, we present a model-based fuzz ... 详细信息
来源: 评论
A RFID Anti-Collision Algorithm Based on Pipeline and Pre-Detecting Mechanism
A RFID Anti-Collision Algorithm Based on Pipeline and Pre-De...
收藏 引用
IEEE International Symposium on computer Network and Multimedia Technology, CNMT
作者: Wenbin Hu Zhengbing Hu Ya Liu Wen Su Mao Ding Ziyao Pan Computer School Wuhan University Wuhan China State Key Lab. For Novel Software Technology Nanjing University P. R. China Department of Information Technology Huazhong Normal University China
This paper is going to present a new algorithm called "PP" (a RFID anti-collision algorithm based on pipeline and pre-detecting mechanism) to solve the problem of collisions among the tags in RFID system. Th... 详细信息
来源: 评论
Multi-objective Optimization about Functions of the East Lake in Wuhan
Multi-objective Optimization about Functions of the East Lak...
收藏 引用
第十三届世界湖泊大会
作者: 李新民 李蓉 Editorial Office of Central China Normal University Hankou Branch Department of Computer Science Central China Normal University Department of Geography Central China Normal University State Key Lab of Software Engineering Wuhan University
After multiple-objective optimized decision about the East Lake in Wuhan,combining of expert system 's identification and adjustment,we get weights of F(tourism function),F(flood storage function),F(water sup...
来源: 评论
DFTT4CWS: A Testing Tool for Composite Web Services Based on Data-Flow
DFTT4CWS: A Testing Tool for Composite Web Services Based on...
收藏 引用
Web Information Systems and Applications Conference (WISA)
作者: Jun Hou Lei Xu School of Computer Science and Engineering South-East University Nanjing China China Telecom Jiangsu Hongxin System Integration Company Limited Nanjing China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
For large and complex composite Web services which are composed by BPEL and a set of WSDL and XSD documents, we urgently need the aid of the tools in designing and selecting test cases. However, most of mature testing... 详细信息
来源: 评论
Facilitating effective resource publishing and searching in DHT networks
收藏 引用
HKIE Transactions Hong Kong Institution of Engineers 2009年 第3期16卷 32-41页
作者: Xu, Quanqing Hou, Xiaoxiao Cui, Bin Shen, Heng Tao Dai, Yafei State Key Lab for Adv Opt Commun Syst and Networks Peking University China Department of Computer Science and Technology Stony Brook University United States School of Information Technology and Electrical Engineering University of Queensland Australia
As a structured overlay network, DHT (Distributed Hash Table) has been widely used in P2P systems. Existing resource publishing algorithms, including One-step publishing in eMule, do not completely exploit features of... 详细信息
来源: 评论
Combining opportunistic routing with dynamic source routing for wireless mesh networks
Combining opportunistic routing with dynamic source routing ...
收藏 引用
IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2009)
作者: Qiang Shen Xuming Fang Sunmyeng Kim Rong He High Performance Network Lab Institute of Acoustics Chinese Academy and Sciences Beijing China Provincial Key Laboratory of Information Coding and Transmission Southwest Jiaotong University Chengdu China School of Computer and Software Engineering Kumoh National Institute of Technology Gyeongbuk South Korea
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro...
来源: 评论