咨询与建议

限定检索结果

文献类型

  • 2,171 篇 会议
  • 1,782 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,967 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,796 篇 工学
    • 2,086 篇 计算机科学与技术...
    • 1,714 篇 软件工程
    • 523 篇 信息与通信工程
    • 356 篇 控制科学与工程
    • 243 篇 生物工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 电气工程
    • 174 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 71 篇 建筑学
    • 69 篇 交通运输工程
    • 63 篇 土木工程
  • 1,282 篇 理学
    • 768 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 121 篇 化学
  • 758 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 345 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 104 篇 医学
    • 92 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 67 篇 computer science
  • 65 篇 training
  • 62 篇 computational mo...
  • 58 篇 deep learning
  • 58 篇 data mining
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 46 篇 clustering algor...
  • 45 篇 machine learning
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 39 篇 data models
  • 38 篇 accuracy
  • 37 篇 quality of servi...

机构

  • 298 篇 state key labora...
  • 216 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 89 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 71 篇 school of comput...
  • 69 篇 computer school ...
  • 65 篇 state key lab. f...
  • 57 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 45 篇 school of comput...
  • 43 篇 state key labora...
  • 40 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 huang di
  • 41 篇 xiao limin
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 27 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 tao dacheng
  • 22 篇 xu xiaolong
  • 21 篇 he keqing
  • 21 篇 zhao jian
  • 21 篇 qi lianyong
  • 21 篇 li yuanxiang
  • 21 篇 qi lei
  • 20 篇 shen furao
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 du bo

语言

  • 3,637 篇 英文
  • 226 篇 其他
  • 105 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3967 条 记 录,以下是3711-3720 订阅
排序:
ANGEL: Optimal configuration for high available service composition
ANGEL: Optimal configuration for high available service comp...
收藏 引用
2007 IEEE International Conference on Web Services, ICWS 2007
作者: Huipeng, Guo Jinpeng, Huai Huan, Li Ting, Deng Yang, Li Zongxia, Du State Key Lab. of Software Development Environment School of Computer Beihang University Beijing China
With the fast development of Internet and rapid acceptance of Web Service technology, more and more service resources have emerged. Service composition which integrates the functionalities of different services is a p... 详细信息
来源: 评论
Geo-WDBMS: An improved DBMS with the function of watermarking geographical data
收藏 引用
12th International Conference on Database Systems for Advanced Applications, DASFAA 2007
作者: Min, Huang Xiang, Zhou Jiaheng, Cao Zhiyong, Peng Computer School Wuhan University Wuhan 430072 China State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China
This paper focuses on the issue of geographical data's copyrights protection. A Geo-WDBMS has been built by embedding the watermarking functions into the inner code of the open source DBMS PostgreSQL. And its core... 详细信息
来源: 评论
An approach to QoS-aware service selection in dynamic web service composition
An approach to QoS-aware service selection in dynamic web se...
收藏 引用
3rd International Conference on Networking and Services, ICNS 2007
作者: Yang, Yan Tang, Shengqun Xu, Youwei Zhang, Wentao Fang, Lina State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China Computer School Wuhan University Wuhan 430072 China
Web service composition has been recognized as a flexible way for resource sharing and application integration. For Web services providing similar functionality, Quality of Service (QoS) is the main factor to differen... 详细信息
来源: 评论
Interactive point cloud blending by drag-and-drop
收藏 引用
Journal of Zhejiang University-Science A(Applied Physics & engineering) 2007年 第10期8卷 1633-1641页
作者: ZOU Wan-hong?1, DING Zhan1, YE Xiu-zi1, CHEN Zhi-yang2 (1state key lab. of CAD and CG, school of computer Science and Technology, Zhejiang University, Hangzhou 310027, China) (2software College, Zhejiang University of Technology, Hangzhou 310014, China) State Key Lab. of CAD CG School of Computer Science Technology Zhejiang University Hangzhou 310027 China Software College Zhejiang University of Technology Hangzhou 310014 China
With the rapid development of 3D digital photography and 3D digital scanning devices, massive amount of point samples can be generated in acquisition of complex, real-world objects, and thus create an urgent need for ... 详细信息
来源: 评论
A steep thermodynamical selection rule for evolutionary algorithms
A steep thermodynamical selection rule for evolutionary algo...
收藏 引用
7th International Conference on Computational Science, ICCS 2007
作者: Ying, Weiqin Li, Yuanxiang Peng, Shujuan Wang, Weiwu State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China School of Computer Science Wuhan University Wuhan 430079 China
The genetic algorithm (GA) often suffers from the premature convergence because of the loss of population diversity at an early stage of searching. This paper proposes a steep thermodynamical evolutionary algorithm (S... 详细信息
来源: 评论
Polar: An efficient finding nearest neighbor algorithm for overlay network  2
Polar: An efficient finding nearest neighbor algorithm for o...
收藏 引用
2nd International Conference on Scalable Information Systems, InfoScale 2007
作者: Chen, Tan Sheng, Xiangzhi Shan, Baosong State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beijing University of Aeronautics and Astronautics Beijing China
Obviously, network proximity is an essential characteristic for overlay network construction. By selecting the nearest neighbor for the target node, large-scale distributed applications can decrease the communication ... 详细信息
来源: 评论
Optimization of grid resource allocation combining fuzzy theory with generalized assignment problem
Optimization of grid resource allocation combining fuzzy the...
收藏 引用
6th International Conference on Grid and Cooperative Computing, GCC 2007
作者: Mingbiao, Li Xinmeng, Chen Feng, Jiao Zhijian, Wu Computer School Wuhan University Wuhan 430079 China Computer School of Science and Engineering Wenzhou University Wenzhou 325035 China State Key Laboratory of Software Engineering Wuhan University Wuhan China
In the existing economy based models of grid resource allocation and management, just as commodity market model and posted price model, sharing resource is based on negotiating about the usage duration or time, the us... 详细信息
来源: 评论
UniNet Description of Dining Philosopher Problem
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第6期12卷 1008-1012页
作者: DU Zhuomin HE Yanxiang ZHOU Guofu School of Computer Wuhan University Wuhan 430072 Hubei China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 Hubei China
The UniNet specification of Dining Philosopher Problem we presents not only is graphic and intuitionistic but also explicitly indicates the In the specification, static semantics and the the static properties are dyna... 详细信息
来源: 评论
Interactive browsing of large images on multi-projector display wall system
Interactive browsing of large images on multi-projector disp...
收藏 引用
12th International Conference on Human-computer Interaction, HCI International 2007
作者: Zhongding, Jiang Xuan, Luo Yandong, Mao Binyu, Zang Hai, Lin Hujun, Bao Computer Graphics Lab. Software School Fudan University Shanghai China State Key Lab. of CAD and CG Zhejiang University Hangzhou China
With the precision of data acquisition increases, large images that may occupy terabytes, become common in research and industry fields. Since multi-projector display wall systems can provide higher resolution, they b... 详细信息
来源: 评论
Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols
Pseudo trust: Zero-knowledge based authentication in anonymo...
收藏 引用
21st International Parallel and Distributed Processing Symposium, IPDPS 2007
作者: Lu, Li Han, Jinsong Hu, Lei Huai, Jinpeng Liu, Yunhao Ni, Lionel M. State Key Lab. of Information Security Graduate School Chinese Academy of Sciences Beijing China Dept. of Computer Science and Engineering Hong Kong University of Science and Technology Kowloon Hong Kong School of Computer Science Beihang University Beijing China State Key Lab. of Software Developing Environment Beihang University Beijing China
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence, there exists an inhere... 详细信息
来源: 评论