咨询与建议

限定检索结果

文献类型

  • 2,171 篇 会议
  • 1,782 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,967 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,796 篇 工学
    • 2,086 篇 计算机科学与技术...
    • 1,714 篇 软件工程
    • 523 篇 信息与通信工程
    • 356 篇 控制科学与工程
    • 243 篇 生物工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 电气工程
    • 174 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 71 篇 建筑学
    • 69 篇 交通运输工程
    • 63 篇 土木工程
  • 1,282 篇 理学
    • 768 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 121 篇 化学
  • 758 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 345 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 104 篇 医学
    • 92 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 67 篇 computer science
  • 65 篇 training
  • 62 篇 computational mo...
  • 58 篇 deep learning
  • 58 篇 data mining
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 46 篇 clustering algor...
  • 45 篇 machine learning
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 39 篇 data models
  • 38 篇 accuracy
  • 37 篇 quality of servi...

机构

  • 298 篇 state key labora...
  • 216 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 89 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 71 篇 school of comput...
  • 69 篇 computer school ...
  • 65 篇 state key lab. f...
  • 57 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 45 篇 school of comput...
  • 43 篇 state key labora...
  • 40 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 huang di
  • 41 篇 xiao limin
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 27 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 tao dacheng
  • 22 篇 xu xiaolong
  • 21 篇 he keqing
  • 21 篇 zhao jian
  • 21 篇 qi lianyong
  • 21 篇 li yuanxiang
  • 21 篇 qi lei
  • 20 篇 shen furao
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 du bo

语言

  • 3,637 篇 英文
  • 226 篇 其他
  • 105 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3967 条 记 录,以下是3761-3770 订阅
排序:
An Energy-Aware Protocol for Data Gathering Applications in Wireless Sensor Networks
An Energy-Aware Protocol for Data Gathering Applications in ...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: M. Liu Y. Zheng J. Cao G. Chen L. Chen H. Gong School of Computer Science and Engineering University of Electronic Science and Technology China Internet and Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Hong Kong China State Key Laboratory for Novel Software Technology Nanjing University China
Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energy of sensor nodes while meeting the requ... 详细信息
来源: 评论
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymo...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Li Lu Jinsong Han Lei Hu Jinpeng Huai Yunhao Liu Lionel M. Ni State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China State Key Laboratory of Software Developing Environment Beihang University Beijing China
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence, there exists an inhere... 详细信息
来源: 评论
A New Data Protecting Scheme Based on TPM
A New Data Protecting Scheme Based on TPM
收藏 引用
ACIS International Conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Mingdi Xu Jian He Bo Zhang Huanguo Zhang School of Computer State Key Laboratory of Software Engineering Wuhan University of China China Informationization Construction Teaching and Research Section Commanding Communications Academy Computer Faculty Working Office Electronic Information Department Hubei Water Resource Technical College
Trusted platform model (TPM) is special-purpose integrated circuits built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to confident... 详细信息
来源: 评论
An Algorithm for 3D Image Segmentation
An Algorithm for 3D Image Segmentation
收藏 引用
International Conference on Image and Graphics (ICIG)
作者: Ding Zhi Dong Yu-ning College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Jiangsu Provincial Key Lab of Computer Information Processing Technology Suzhou University Suzhou China
We propose a new 3D image segmentation method based on prediction, block-matching and partial 3D constraint in this paper. The algorithm only needs to set a few key points in the first image. We use intensity informat... 详细信息
来源: 评论
Approximation of Circular Arcs by C2 Cubic Polynomial B-splines
Approximation of Circular Arcs by C2 Cubic Polynomial B-spli...
收藏 引用
10th IEEE International Conference on computer Aided Design and computer Graphics(第十届CAO/Graphics国际会议)
作者: Wu Yang Xiuzi Ye Laboratory of Image Science & Technology School of Computer Science & Engineering Southeast Universi College of Computer Science/State Key Lab of CAD&CG Zhejiang University Hangzhou310027P.R.China So
An algorithm to approximate circle/circular arc with C2 cubic B-spline curve is presented. Given a prescribed tolerance ∈,the algorithm can find a C2 cubic B-spline curve with minimal number of segments that approxim... 详细信息
来源: 评论
Optimal operating conditions and modulation format for 160 Gb/s signals in a fiber parametric amplifier used as a slow-light delay line element
Optimal operating conditions and modulation format for 160 G...
收藏 引用
OFC/NFOEC 2007 - Optical Fiber Communication and the National Fiber Optic Engineers Conference 2007
作者: Liu, Fangfei Su, Yikai Voss, Paul L. State Key Lab. of Advanced Optical Communication Systems and Networks Department of Electronic Engineering Shanghai Jiao Tong University 800 DongChuan Rd Shanghai 200240 China School of Electrical and Computer Engineering Georgia Institute of Technology 777 Atlantic Drive Atlanta GA 30332-0250 United States Georgia Tech Lorraine GT-CNRS UMI 2958 2-3 rue Marconi Metz F-57070 France
We study optimal operating conditions for 160-Gb/s signals traversing a slow-light delay line based on parametric amplification. Six phase modulated formats are investigated, including CSRZ, PAP-CSRZ, GAP-CSRZ, RZ duo... 详细信息
来源: 评论
A kind of fuzzy constructive neural network and its application
A kind of fuzzy constructive neural network and its applicat...
收藏 引用
26th Chinese Control Conference, CCC 2007
作者: Tao, Wu Liwei, Chen Junjun, Mao Ling, Zhang State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China Key Lab. IC and SP Anhui University Hefei 230039 China School of Mathematics and Computational Science Anhui University Hefei 230039 China
Support vector machine (SVM) has been studied and applied extensively for its high accuracy, but it must construct SVM decision tree to classify sample sets with multiclass for it just be applicable for binary classif... 详细信息
来源: 评论
Discovering Protein Complexes from Protein-Protein Interaction Data by Local Cluster Detecting Algorithm
Discovering Protein Complexes from Protein-Protein Interacti...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Juan Liu Bin Liu Deyi Li School of Computer Wuhan University of China Wuhan China Wuhan University Wuhan Hubei CN State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Institute of Computing Technology Chinese Academy and Sciences Beijing China
Proteins are usually grouped into complexes to perform functional tasks in organisms. So discovery of protein complexes is critical to understand principles of cellular organization and function. Recently high-through... 详细信息
来源: 评论
An efficient Method for Protein Secondary Structure Prediction
An efficient Method for Protein Secondary Structure Predicti...
收藏 引用
The 1st International Conference on Bioinformatics and Biomedical engineering(iCBBE 2007)(首届IEEE生物信息与生物医学工程国际会议)
作者: Tao WU Junjun MAO Ling ZHANG State Key Laboratory for Novel Software Technology Department of Computer Science & TechnologyNanj School of Mathematics and Computational Science Anhui University Hefei 230039 R.P.China Key Lab IC&SP Anhui University Hefei 230039 R.P.China
The secondary structure prediction of protein plays an important role to obtain its tertiary structure and function. In the past thirty years, a huge amount of algorithms have been employed to this task. The better pr... 详细信息
来源: 评论
Quantification of natural surveillance in urban areas for crime prevention using vehicle-borne laser scanners
Quantification of natural surveillance in urban areas for cr...
收藏 引用
10th International Conference on computers in Urban Planning and Urban Management, CUPUM 2007
作者: Tanaka, Hideto Zhao, Huijing Chen, Yuzhong Shibasaki, Ryosuke Japan Urban Security Research Institute P.O. Box 2517 Tokyo Opera City Tokyo 163-1408 Japan State Key Lab of Machine Perception School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Center for Spatial Information Science University of Tokyo 5-1-5 Kashiwanoha Kashiwa-shi Chiba 277-8568 Japan
This research aims to quantify natural surveillance in urban areas, an important factor for Crime Prevention Through Environmental Design (CPTED), with high resolution. This quantification considers the effect of deta... 详细信息
来源: 评论