咨询与建议

限定检索结果

文献类型

  • 2,140 篇 会议
  • 1,755 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,909 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,742 篇 工学
    • 2,039 篇 计算机科学与技术...
    • 1,699 篇 软件工程
    • 519 篇 信息与通信工程
    • 322 篇 控制科学与工程
    • 242 篇 生物工程
    • 212 篇 电子科学与技术(可...
    • 206 篇 电气工程
    • 172 篇 机械工程
    • 162 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 77 篇 网络空间安全
    • 68 篇 交通运输工程
    • 67 篇 建筑学
    • 59 篇 土木工程
  • 1,280 篇 理学
    • 768 篇 数学
    • 272 篇 生物学
    • 245 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 131 篇 系统科学
    • 120 篇 化学
  • 755 篇 管理学
    • 455 篇 管理科学与工程(可...
    • 343 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 104 篇 医学
    • 92 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 66 篇 computer science
  • 64 篇 training
  • 62 篇 computational mo...
  • 57 篇 data mining
  • 56 篇 deep learning
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 45 篇 machine learning
  • 45 篇 clustering algor...
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 39 篇 data models
  • 37 篇 quality of servi...
  • 36 篇 authentication

机构

  • 293 篇 state key labora...
  • 213 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 90 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 70 篇 school of comput...
  • 69 篇 computer school ...
  • 61 篇 state key lab. f...
  • 56 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 43 篇 state key labora...
  • 43 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 xiao limin
  • 39 篇 huang di
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 26 篇 dou wanchun
  • 22 篇 tao dacheng
  • 22 篇 bai xiao
  • 21 篇 he keqing
  • 21 篇 zhao jian
  • 21 篇 li yuanxiang
  • 21 篇 qi lei
  • 20 篇 shen furao
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 du bo
  • 19 篇 qi lianyong
  • 19 篇 xu baowen

语言

  • 3,676 篇 英文
  • 131 篇 其他
  • 103 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3909 条 记 录,以下是3831-3840 订阅
排序:
An evolutionary algorithm for solving parameter identification problems in elliptic systems
An evolutionary algorithm for solving parameter identificati...
收藏 引用
Congress on Evolutionary Computation
作者: Zhijian Wu Zhilong Tang Jun Zou Lishan Kang Mingbiao Li State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Department of Mathematics Chinese University of Hong Kong New Territories Hong Kong China School of Computer Science and Engineering Wenzhou Normal College Wenzhou Zhejiang China
In this paper, we construct an evolutionary algorithm. It yields good performance on a collection of elliptic parameter identification problems. The evolutionary algorithm has a good tolerability for the noise in the ... 详细信息
来源: 评论
Benchmarking algorithms for dynamic travelling salesman problems
Benchmarking algorithms for dynamic travelling salesman prob...
收藏 引用
Congress on Evolutionary Computation
作者: Lishan Kang Aimin Zhou B. McKay Yan Li Zhuo Kang State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Department of Computer Science & Technology China University of Geoscience Wuhan China School of IT & EE University of New South Wales Canberra Australia Computer Center Wuhan University Wuhan China
Dynamic optimisation problems are becoming increasingly important; meanwhile, progress in optimisation techniques and in computational resources are permitting the development of effective systems for dynamic optimisa... 详细信息
来源: 评论
Optimal ramped-gate soft programming of over-erased flash EEPROM cells at given current
Optimal ramped-gate soft programming of over-erased flash EE...
收藏 引用
2004 7th International Conference on Solid-state and Integrated Circuits Technology Proceedings, ICSICT 2004
作者: Quan, Wu-Yun Baek, Chang-Ki Kim, Dae M. Gang, Ruan Huang, Yiping ASIC and System State-Key Research Lab. Department of Microelectronics Fudan University 220 Handan-road 200433 Shanghai China School of Electrical Engineering and Computer Science ISRC Seoul National University Kwanak P.O. Box 34 Seoul 151-744 Korea Republic of Korea Institute for Advanced Study 207-43 Cheongryangri Seoul Korea Republic of
Presented herein is an efficient simulation technique enabling systematic investigation of the soft programming over-erased flash EEPROM cells. The simulation provides a method by which to find the optimal soft progra... 详细信息
来源: 评论
A chromosome-based evaluation model for computer defense immune systems
A chromosome-based evaluation model for computer defense imm...
收藏 引用
2003 Congress on Evolutionary Computation, CEC 2003
作者: Wu, Zejun Dong, Hongbin Liang, Yiwen McKay, R.I. School of Computer State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China School of Information Technology and Electrical Engineering University of New South Wales at ADFA Canberra Australia
The computer defense immune system (GDIS) is an artificial immune system for detecting computer viruses and network intrusions. We present a simple chromosome-based evaluation model for GDIS. In this model, the genoty... 详细信息
来源: 评论
Applying Evolutionary Algorithm to Public key Cryptosystems
收藏 引用
Wuhan University Journal of Natural Sciences 2003年 第S1期8卷 287-293页
作者: Tu Hang, Li Li, Wu Tao-jun, Li Yuan-xiangstate key laboratory of software engineering, Wuhan University, Wuhan 430072, Hubei,China)school of computer, Wuhan University, Wuhan 430072, Hubei,China State Key Laboratory of Software Engineering Wuhan University Wuhan Hubei China School of Computer Wuhan University Wuhan Hubei China
A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under diffe... 详细信息
来源: 评论
Do Search and Selection Operators Play Important Roles in Multi-Objective Evolutionary Algorithms:A Case Study
收藏 引用
Wuhan University Journal of Natural Sciences 2003年 第S1期8卷 195-201页
作者: Yan Zhen-yu, Kang Li-shan, Lin Guang-ming ,He Meistate key laboratory of software engineering, Wuhan University, Wuhan 430072, Hubei, Chinaschool of computer Science, UC, UNSW Australian Defence Force Academy, Northcott Drive, Canberra, ACT 2600 AustraliaCapital Bridge Securities Co. ,Ltd, Floor 42, Jinmao Tower, Shanghai 200030, China Wuhan University State Key Laboratory of Software Engineering Wuhan Hubei China (GRID:grid.49470.3e) (ISNI:***) UC UNSW Australian Defence Force Academy School of Computer Science Canberra Australia (GRID:grid.97008.36) (ISNI:***) Capital Bridge Securities Co. Ltd Shanghai China (GRID:grid.97008.36)
Multi-objective Evolutionary Algorithm (MOEA) is becoming a hot research area and quite a few aspects of MOEAs have been studied and discussed. However there are still few literatures discussing the roles of search an... 详细信息
来源: 评论
A chromosome-based evaluation model for computer defense immune systems
A chromosome-based evaluation model for computer defense imm...
收藏 引用
Congress on Evolutionary Computation
作者: Zejun Wu Hongbin Dong Yiwen Liang R.I. McKay School of Computer / State Key Laboratory of Software Engineering Wuhan University of China Wuhan China School of Information Technology and Electrical Engineering University of New South Wales Canberra Australia
The computer defense immune system (GDIS) is an artificial immune system for detecting computer viruses and network intrusions. We present a simple chromosome-based evaluation model for GDIS. In this model, the genoty... 详细信息
来源: 评论
Multi-objective and MGG evolutionary algorithm for constrained optimization
Multi-objective and MGG evolutionary algorithm for constrain...
收藏 引用
Congress on Evolutionary Computation
作者: Yuren Zhou Yuanxing Li Jun He Lishan Kang College of Computer Science and Engineering South China University of Technology Guangzhou China State key Laboratory of Software Engineering Wuhan University Wuhan China School of Computer Science University of Binningham Edgbaston UK
This paper presents a new approach to handle constrained optimization using evolutionary algorithms. The new technique converts constrained optimization to a two-objective optimization: one is the original objective f... 详细信息
来源: 评论
C-pruner: an improved instance pruning algorithm
C-pruner: an improved instance pruning algorithm
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Ke-Ping Zhao Shui-Geng Zhou Ji-Hong Guan Ao-Ying Zhou Department of Computer Science & Engineering Fudan University Shanghai China State Key Laboratory of Software Engineering Wuhan University of China Wuhan China School of Computer Science Wuhan University of China Wuhan China
Instance-based learning faces the problem of deciding which instances could be discarded in order to save computation and storage costs. For large instance bases classifier suffers from large memory requirements and s... 详细信息
来源: 评论
AN ALGORITHM FOR FAULT DIAGNOSIS BASED ON COMBINATORIAL DESIGN APPROACH FOR TESTING
收藏 引用
Journal of Electronics(China) 2003年 第3期20卷 224-226页
作者: Nie Changhai Xu Baowen Shi Liang (Dept. of computer Science & Eng., Southeast Univ., Nanjing 210096) (state key laboratory of software engineering, Wuhan University, Wuhan 430072) (Jiangsu key lab. of computer Info. Proc. Tech., Soochow Univ., Suzhou 215006) Dept. of Computer Science & Eng. Southeast Univ. Nanjing State Key Laboratory of Software Engineering Wuhan University Wuhan Jiangsu Key Lab. of Computer Info. Proc. Tech. Soochow Univ. Suzhou
Much research has been done mainly in testcase generation and its effect for com-binatorial design approach for testing. This letter presents an algorithm for fault diagnosis basedon the approach. It can conclude that... 详细信息
来源: 评论