咨询与建议

限定检索结果

文献类型

  • 2,171 篇 会议
  • 1,782 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,967 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,796 篇 工学
    • 2,086 篇 计算机科学与技术...
    • 1,714 篇 软件工程
    • 523 篇 信息与通信工程
    • 356 篇 控制科学与工程
    • 243 篇 生物工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 电气工程
    • 174 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 71 篇 建筑学
    • 69 篇 交通运输工程
    • 63 篇 土木工程
  • 1,282 篇 理学
    • 768 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 121 篇 化学
  • 758 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 345 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 104 篇 医学
    • 92 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 67 篇 computer science
  • 65 篇 training
  • 62 篇 computational mo...
  • 58 篇 deep learning
  • 58 篇 data mining
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 46 篇 clustering algor...
  • 45 篇 machine learning
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 39 篇 data models
  • 38 篇 accuracy
  • 37 篇 quality of servi...

机构

  • 298 篇 state key labora...
  • 216 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 89 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 71 篇 school of comput...
  • 69 篇 computer school ...
  • 65 篇 state key lab. f...
  • 57 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 45 篇 school of comput...
  • 43 篇 state key labora...
  • 40 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 huang di
  • 41 篇 xiao limin
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 27 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 tao dacheng
  • 22 篇 xu xiaolong
  • 21 篇 he keqing
  • 21 篇 zhao jian
  • 21 篇 qi lianyong
  • 21 篇 li yuanxiang
  • 21 篇 qi lei
  • 20 篇 shen furao
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 du bo

语言

  • 3,637 篇 英文
  • 226 篇 其他
  • 105 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3967 条 记 录,以下是3671-3680 订阅
排序:
An Introduction to Data Capturing
An Introduction to Data Capturing
收藏 引用
International Symposium on Electronic Commerce and Security
作者: Liqiang Zhang Huanguo Zhang Computer School Wuhan University of China Hubei China State Key Laboratory of Software Engineering Wuhan University of China Hubei China
Data capturing has been the foundation of many network critical application, such as intrusion detection system and network management application. This paper introduces how to implement data capturing in different ne... 详细信息
来源: 评论
Functional Ontology of Routing Reputation for MANET
Functional Ontology of Routing Reputation for MANET
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Wei Guo Zhong-Wei Xiong Ren-Zuo Xu College of Computer Science Wuhan University Wuhan China State Key Lab. of Software Engineering Wuhan University Wuhan China
The nature of mobile ad hoc networks make the routing is highly dependent on cooperate behavior between nodes, and using reputation mechanism can enforce cooperation among the nodes to prevent selfish behavior. This a... 详细信息
来源: 评论
Study on adaptive intrusion detection engine based on gene expression programming rules
Study on adaptive intrusion detection engine based on gene e...
收藏 引用
International Conference on computer Science and software engineering, CSSE 2008
作者: Wan, Tang Yang, Xi-Min Yang, Cao So, Won-Ho School of Electronic Information Wuhan Univ. Wuhan 430070 China State Key Laboratory Software Engineering Wuhan 430070 China Dept. of Computer Science South-Central Univ. for Nationalities Wuhan 430074 China Dept. of Computer Education Sunchon National Univ. Sunchon 540-742 Korea Republic of
High false alarm rate and time-space cost of rule extraction and detection limit the application of machine learning in real Intrusion Detection System (IDS), and IDS cannot satisfy most system performance requirement... 详细信息
来源: 评论
一种基于粒子的牛顿流体与粘弹性流体统一模拟方法
一种基于粒子的牛顿流体与粘弹性流体统一模拟方法
收藏 引用
第六届智能CAD与数字娱乐学术会议
作者: Chang Yuanzhang 常元章 Liu Youquan 柳有权 Bao Kai 鲍凯 Zhu Jian 朱鉴 Wu Enhua 吴恩华 中国科学院软件研究所计算机科学国家重点实验室 北京 100190 School of Information Engineering Chang'an University Xi'an 710064 China 澳门大学科技学院电脑与资讯科学系 澳门 State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China Department of Computer and Information Science University of Macau Macao China 长安大学信息工程学院 西安710064
在越来越受到人们关注的基于物理流体的动画领域中,目前分别模拟牛顿流体或粘弹性流体的方法很多,但很少有统一模拟两者的方法。文中基于光滑粒子流体的动力学方法,通过对传统纳维-斯托克斯方程添加弹性应力项,提出了一种新的统一... 详细信息
来源: 评论
A Grid and Density-Based Clustering Algorithm for Processing Data Stream
A Grid and Density-Based Clustering Algorithm for Processing...
收藏 引用
International Conference on Genetic and Evolutionary Computing (WGEC)
作者: Chen Jia ChengYu Tan Ai Yong State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Computer School Wuhan University of China Wuhan Hubei China
This paper proposes DD-Stream, a framework for density-based clustering stream data. The algorithm adopts a density decaying technique to capture the evolving data stream and extracts the boundary point of grid by the... 详细信息
来源: 评论
SpecVAT: Enhanced Visual Cluster Analysis
SpecVAT: Enhanced Visual Cluster Analysis
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Liang Wang Xin Geng James Bezdek Christopher Leckie Ramamohanarao Kotagiri School of Engineering University of Melbourne VIC Australia School of Computer Science & Engineering South-East University China State Key Laboratory for Novel Software Technology Nanjing University China
Given a pairwise dissimilarity matrix D of a set of objects, visual methods such as the VAT algorithm (for visual analysis of cluster tendency) represent (D macr )as an image (D macr ) where the objects are reordered ... 详细信息
来源: 评论
Steady states and Critical Behavior of Epidemic Spreading on Complex Networks
Steady States and Critical Behavior of Epidemic Spreading on...
收藏 引用
7th World Congress on Intelligent Control and Automation (WCICA 2008), vol.9
作者: Shujuan Peng Yuanxiang Li Bojin Zheng Department of Computer School State Key Laboratory of Software Engineering Wuhan University of China Wuhan Hubei China Department of Computer School South Central University of Nationalities Wuhan Hubei China
In this paper, we derive the interaction Markov chains (IMC) mean-field equations for dynamics of the epidemic spreading susceptible-infected-recovery (SIR) model that takes place on top of complex homogeneous and het... 详细信息
来源: 评论
Mitigating energy holes based on transmission range adjustment in wireless sensor networks  5
Mitigating energy holes based on transmission range adjustme...
收藏 引用
5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008
作者: Song, Chao Cao, Jiannong Liu, Ming Zheng, Yuan Gong, Haigang Chen, Guihai School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610054 China Department of Computing Internet and Mobile Computing Laboratory Hong Kong Polytechnic University Hong Kong Hong Kong State Key Laboratory for Novel Software Technology Nanjing University Nanjing210093 China
In a wireless sensor network (WSN), the energy hole problem is a key factor which affects the lifetime of the networks. In a WSN with circular multi-hop deployment (modeled as concentric coronas), sensors in one coron... 详细信息
来源: 评论
Constructing a Degree-Constrained Low Delay Application Layer Multicast Tree
Constructing a Degree-Constrained Low Delay Application Laye...
收藏 引用
The 4th International Conference on Wireless Communications, Networking and Mobile Computing(第四届IEEE无线通信、网络技术及移动计算国际会议)
作者: Tan Chen Baosong Shan Xin Xiong State Key Laboratory of Software Development Environment Beijing University of Aeronautics and Astro State Key Laboratory of Software Development Environment Beijing University of Aeronautics and Astro School of Computer Science and Engineering Zhengzhou University of Light Industry Zhengzhou China
Application layer multicast is probably the most efficient scheme to sustain the group communication for delay sensitive applications in Internet due to its rapid deployment. However, the problem of building a degree-... 详细信息
来源: 评论
Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform
Design and Implementation of an Integrity Measurement System...
收藏 引用
International Conference for Young computer Scientists, ICYCS
作者: Yang Yang Huanguo Zhang Li Wan Bingyu Zou School of Computer Wuhan University of China Wuhan China State Key Lab of Software Engineering Wuhan University of China Wuhan China Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan China
This paper presents the design and implementation of an integrity measurement system based on Windows trusted computing platform. The trust chain is established from the BIOS up to the application layer, where the exe... 详细信息
来源: 评论