咨询与建议

限定检索结果

文献类型

  • 2,171 篇 会议
  • 1,782 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,967 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,796 篇 工学
    • 2,086 篇 计算机科学与技术...
    • 1,714 篇 软件工程
    • 523 篇 信息与通信工程
    • 356 篇 控制科学与工程
    • 243 篇 生物工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 电气工程
    • 174 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 71 篇 建筑学
    • 69 篇 交通运输工程
    • 63 篇 土木工程
  • 1,282 篇 理学
    • 768 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 121 篇 化学
  • 758 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 345 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 104 篇 医学
    • 92 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 67 篇 computer science
  • 65 篇 training
  • 62 篇 computational mo...
  • 58 篇 deep learning
  • 58 篇 data mining
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 46 篇 clustering algor...
  • 45 篇 machine learning
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 39 篇 data models
  • 38 篇 accuracy
  • 37 篇 quality of servi...

机构

  • 298 篇 state key labora...
  • 216 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 89 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 71 篇 school of comput...
  • 69 篇 computer school ...
  • 65 篇 state key lab. f...
  • 57 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 45 篇 school of comput...
  • 43 篇 state key labora...
  • 40 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 huang di
  • 41 篇 xiao limin
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 27 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 tao dacheng
  • 22 篇 xu xiaolong
  • 21 篇 he keqing
  • 21 篇 zhao jian
  • 21 篇 qi lianyong
  • 21 篇 li yuanxiang
  • 21 篇 qi lei
  • 20 篇 shen furao
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 du bo

语言

  • 3,637 篇 英文
  • 226 篇 其他
  • 105 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3967 条 记 录,以下是3751-3760 订阅
排序:
Support vector regression with feature selection for the multivariate calibration of spectrofluorimetric determination of aromatic amino acids
Support vector regression with feature selection for the mul...
收藏 引用
7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE
作者: Li, Guo-Zheng Meng, Hao-Hua Yang, Mary Qu Yang, Jack Y. State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China School of Computer Science and Engineering Shanghai University Shanghai 200072 China U.S. Department of Health and Human Services Bethesda MD 20852 United States Harvard Medical School Harvard University Cambridge MA 02140 United States
Several artificial intelligent methods, including Support Vector Regression (SVR), Artificial Neural Networks (ANNs), and Partial Least Square (PLS) are used for the multivariate calibration in the determination of th... 详细信息
来源: 评论
Simulation Optimization Based on the Hypothesis Testing and ITO Process
Simulation Optimization Based on the Hypothesis Testing and ...
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Wenyong Dong Dengyi Zhang Computer School Wuhan University of China Wuhan Hubei China State key Laboratory of Software Engineering Wuhan University of China Wuhan Hubei China
The ITO algorithm, which is a new kind of simulation optimization methods and is based on the hypothesis testing and Ito stochastic process, is proposed in this paper. The local strategies and global strategies can be... 详细信息
来源: 评论
Novel technique based on triangle decimation for tetrahedral simplification
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2007年 第12期35卷 2343-2346页
作者: Wang, Xuan-Ming Wu, Ju-Ying Wu, En-Hua State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China Graduate School Chinese Academy of Sciences Beijing 100080 China Air Force Engineering University Xi'an 710077 China
How to simplify a large scale tetrahedral dataset in order to use in the real time rendering is of more importance. A novel technique based on triangle decimation for tetrahedral simplification is described here. A tr... 详细信息
来源: 评论
Evaluation of SAT-based Bounded Model Checking of ACTL Properties
Evaluation of SAT-based Bounded Model Checking of ACTL Prope...
收藏 引用
Theoretical Aspects of software engineering (TASE)
作者: Yanyan Xu Wei Chen Liang Xu Wenhui Zhang School of Information Science and Engineering Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences China
Bounded model checking (BMC) based on SAT has been introduced as a complementary method to BDD based symbolic model checking of LTL and ACTL properties in recent years. For general LTL and ACTL properties, BMC has tra... 详细信息
来源: 评论
Applying Interface-Contract Mutation in Regression Testing of Component-Based software
Applying Interface-Contract Mutation in Regression Testing o...
收藏 引用
International Conference on software Maintenance (ICSM)
作者: Shan-Shan Hou Lu Zhang Tao Xie Hong Mei Jia-Su Sun Institute of Software School of Electronics Engineering and Computer Science Key Laboratory of High Confidence Software Technologies Ministry of Education Peking University Beijing China Department of Computer Science North Carolina State University Raleigh NC USA
Regression testing, which plays an important role in software maintenance, usually relies on test adequacy criteria to select and prioritize test cases. However, with the wide use and reuse of black-box components, su... 详细信息
来源: 评论
B-spline Surfaces of Clustered Point Sets with Normal Maps
B-spline Surfaces of Clustered Point Sets with Normal Maps
收藏 引用
10th IEEE International Conference on computer Aided Design and computer Graphics(第十届CAO/Graphics国际会议)
作者: Yanci Zhang Hanqiu Sun Enhua Wu State Key Lab.of Computer Science Institute of SoftwareChinese Academy of Sciences Department of Computer Science and EngineeringThe Chinese University of Hong Kong Faculty of Science and TechnologyUniversity of Macau
In this paper,we propose a novel method that represents the highly-complex point sets by clustering the points to normal-mapped B-spline surfaces (NBSs). The main idea is to construct elaborate normal maps on simple s... 详细信息
来源: 评论
Feature selection for co-training: A QSAR study
Feature selection for co-training: A QSAR study
收藏 引用
2007 International Conference on Artificial Intelligence, ICAI 2007
作者: Li, Guo-Zheng Li, Dan Lu, Wen-Cong Yang, Mary Q. Yang, Jack Y. School of Computer Science and Engineering Shanghai University Shanghai 200072 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Chemistry School of Science Shanghai University Shanghai 200444 China U.S. Department of Health and Human Services Bethesda MD 20852 United States Harvard Medical School Harvard University Cambridge MA 02140 United States
Activities of drug molecules can be predicted by QSAR (quantitative structure activity relationship) models, which overcomes the disadvantages of high cost and long cycle by employing the traditional experimental meth... 详细信息
来源: 评论
Solution of secure multi-party multi-data ranking problem based on El Gamal encryption
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第11期28卷 1-5页
作者: Liu, Wen Luo, Shou-Shan Chen, Ping School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Software Engineering Beijing University of Posts and Telecommunications Beijing 100876 China National Key Lab. of Integrated Service Networks Xidian University Xi'an 710071 China School of Telecommunication Engineering Beijing University of Posts and Telecommunications Beijing 100876 China
Based on El Gamal homomorphic encryption, a protocol of secure multi-party multi-data ranking problem was proposed. The problem extended millionaires' problem. Furthermore, the correctness and security of this pro... 详细信息
来源: 评论
A New Secure Data Forwarding Protocol with Fault Detection for Wireless Ad Hoc Networks
A New Secure Data Forwarding Protocol with Fault Detection f...
收藏 引用
第三届IEEE无线通讯、网络技术暨移动计算国际会议
作者: Si-Shen Chen Li Xu Yi Mu Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou Fujian PR China School of Computer Science and Software Engineering University of Wollongong Wollongong NSW 2522.A
In wireless ad hoc networks, the route discovery process or the data forwarding process is vulnerable to attackers. In this paper, we address the data forwarding security problem and propose a light-weight secure data... 详细信息
来源: 评论
Collaborative filtering recommendation algorithm based on cloud model
收藏 引用
Ruan Jian Xue Bao/Journal of software 2007年 第10期18卷 2403-2411页
作者: Zhang, Guang-Wei Li, De-Yi Li, Peng Kang, Jian-Chu Chen, Gui-Sheng State Key Laboratory of Software Development Environment Beihang University Beijing 100083 China Institute of Electronic System Engineering Beijing 100840 China Information Security Center Shenzhen Graduate School Harbin Institute of Technology Shenzhen 518055 China School of Computer Science and Technology Shandong Jianzhu University Ji'nan 250101 China
Recommendation system is one of the most important technologies applied in e-commerce. Similarity measuring method is fundamental to collaborative filtering algorithm, and traditional methods are inefficient especiall... 详细信息
来源: 评论