咨询与建议

限定检索结果

文献类型

  • 298 篇 会议
  • 206 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 505 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 352 篇 工学
    • 272 篇 计算机科学与技术...
    • 224 篇 软件工程
    • 72 篇 信息与通信工程
    • 38 篇 控制科学与工程
    • 28 篇 生物工程
    • 25 篇 机械工程
    • 24 篇 光学工程
    • 19 篇 电子科学与技术(可...
    • 17 篇 仪器科学与技术
    • 16 篇 交通运输工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 电气工程
    • 13 篇 建筑学
    • 12 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
    • 11 篇 安全科学与工程
    • 10 篇 土木工程
    • 8 篇 化学工程与技术
    • 6 篇 网络空间安全
  • 135 篇 理学
    • 81 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 16 篇 系统科学
    • 14 篇 化学
  • 93 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 9 篇 法学
  • 8 篇 医学
    • 7 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 哲学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 14 篇 semantics
  • 11 篇 object detection
  • 10 篇 servers
  • 9 篇 feature extracti...
  • 9 篇 software
  • 9 篇 heuristic algori...
  • 7 篇 educational inst...
  • 7 篇 computational mo...
  • 7 篇 machine learning
  • 7 篇 computer vision
  • 7 篇 training
  • 6 篇 semantic segment...
  • 6 篇 deep learning
  • 6 篇 programming
  • 6 篇 safety
  • 6 篇 resource allocat...
  • 6 篇 blockchain
  • 6 篇 satellites
  • 6 篇 privacy
  • 6 篇 cryptography

机构

  • 177 篇 school of comput...
  • 158 篇 state key labora...
  • 109 篇 state key labora...
  • 46 篇 state key labora...
  • 23 篇 state key lab of...
  • 19 篇 institute of art...
  • 12 篇 zhongguancun lab...
  • 12 篇 beijing advanced...
  • 12 篇 hangzhou innovat...
  • 11 篇 school of comput...
  • 7 篇 state key lab. o...
  • 7 篇 sino-french engi...
  • 6 篇 national lab. of...
  • 6 篇 state key labora...
  • 6 篇 school of mechan...
  • 5 篇 shen yuan honors...
  • 5 篇 school of artifi...
  • 5 篇 beihang universi...
  • 5 篇 school of comput...
  • 5 篇 ping an technolo...

作者

  • 41 篇 xiao limin
  • 31 篇 huang di
  • 30 篇 ruan li
  • 29 篇 limin xiao
  • 20 篇 li ruan
  • 18 篇 zhang xiong
  • 17 篇 hao sheng
  • 14 篇 bai xiao
  • 14 篇 di huang
  • 11 篇 wang yunhong
  • 10 篇 li zhoujun
  • 10 篇 chen jiaxin
  • 10 篇 zhu mingfa
  • 10 篇 xu ke
  • 9 篇 liu xianglong
  • 8 篇 wenge rong
  • 8 篇 yang hongyu
  • 8 篇 li yongnan
  • 8 篇 luo jie
  • 7 篇 peng hao

语言

  • 479 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=State Key Lab. Of Software Development Environment School of Computer Science & Engineering"
505 条 记 录,以下是451-460 订阅
排序:
Online MOACO biclustering of microarray data
Online MOACO biclustering of microarray data
收藏 引用
IEEE International Conference on Granular Computing (GRC)
作者: Junwan Liu Zhoujun Li Xiaohua Hu Yiming Chen School of Computer Information Engineering Central South University of Forestry and Technology China State Key Laboratory of Software Development Environment Beijing China College of Information Science and Technology Drexel University USA School of Information Science and Technology Hunan Agricultural University China
Multi-objective optimization (MOP) a fast growing area of research. Bioinformatics data sets come mostly from DNA microarray experiments. The analysis of microarray data sets can provide valuable information on the bi... 详细信息
来源: 评论
A 3D shape retrieval framework for 3D smart cities
收藏 引用
中国高等学校学术文摘·计算机科学 2010年 第3期4卷 394-404页
作者: Biao LENG Zhang XIONG Xiangwei FU State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191China College of Software Engineering Southeast UniversityNanjing 210089China
This paper introduces the importance of 3D shape retrieval frameworks in 3D smart cities, and proposes a unified framework for 3D shape retrieval. The proposed method is based on the concept of visual representation, ... 详细信息
来源: 评论
DeepComp: towards a balanced system design for high performance computer systems
收藏 引用
中国计算机科学前沿 2010年 第4期4卷 475-479页
作者: Mingfa ZHU Limin XIAO Li RUAN Qinfen HAO State Key Laboratory of Software Development Environment Beijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China
Today, cluster-based computing is the mainstream architecture for high end computer *** system design is critical for large scale cluster systems to achieve high efficiency. This paper addresses the practice on DeepCo... 详细信息
来源: 评论
Logical verification of scientific discovery
收藏 引用
science China(Information sciences) 2010年 第4期53卷 677-684页
作者: LI Wei state key lab.ratory of software development environment, school of computer science and engineering, Beihang University, Beijing 100191, China 1. State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing 100191 China
This paper shows that the discovery processes of Einstein’s special theory of relativity and Darwin’s theory of evolution of species can be formally verified by R-calculus which is a logical inference system. The ai... 详细信息
来源: 评论
Resilient virtual network service provision in Network Virtualization environments
Resilient virtual network service provision in Network Virtu...
收藏 引用
16th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2010
作者: Chen, Yang Li, Jianxin Wo, Tianyu Hu, Chunming Liu, Wantao State Key Laboratory of Software Development Environment China School of Computer Science and Engineering Beihang University China
Network Virtualization has recently emerged to provide scalab.e, customized and on-demand virtual network services over a shared substrate network. How to provide VN services with resiliency guarantees against network... 详细信息
来源: 评论
RETRACTED ARTICLE: Computing R-contraction for propositional logic is hard
RETRACTED ARTICLE: Computing R-contraction for propositional...
收藏 引用
2nd International Workshop on Education Technology and computer science, ETCS 2010
作者: Li, He Li, Lusong State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
R-calculus is a formal revision calculus system which can formally deduce R-contraction. R-contraction is the axiom system's maximal subset that is consistent with the refutations by facts. In this paper, we prove... 详细信息
来源: 评论
Formal analysis of behavioural equivalence for trustworthy and composite web services
Formal analysis of behavioural equivalence for trustworthy a...
收藏 引用
International Conference on Autonomic and Trusted Computing
作者: Zhao, Yongwang Hu, Chunyang Liu, Min Ma, Dianfu State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
Trustworthy and composite web services play important roles in service-oriented systems. Web services choreography as one important approach of composing web services describes the global model of service interactions... 详细信息
来源: 评论
Marching prisms: Rapid section generation in 3D geological model
Marching prisms: Rapid section generation in 3D geological m...
收藏 引用
2010 International Conference on computer Modeling and Simulation, ICCMS 2010
作者: Xu, Ping Yang, Qin Meng, Xianhai State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University BUAA Beijing China
To efficiently construct the profile in 3D geological model expressed by triangular mesh and rapidly cut the model into separated parts, a new idea is presented in large scale compatible triangular mesh. It promotes t... 详细信息
来源: 评论
A revision approach based on assignment equivalence classes
A revision approach based on assignment equivalence classes
收藏 引用
2nd International Workshop on Intelligent Systems and Applications, ISA2010
作者: Jiang, Dongchen Lou, Yihua Jin, Yi State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China China Development Laboratory IBM Beijing China
The problem of belief revision and specification evolution has been studied for years. Different methods have been proposed to solve this problem. However, the problem of efficiency has not been solved well. Therefore... 详细信息
来源: 评论
Parallel point-multiplication for conic curves cryptosystem
Parallel point-multiplication for conic curves cryptosystem
收藏 引用
International Symposium on Parallel Architectures, Algorithms, and Programming
作者: Li, Yongnan Xiao, Limin State Key Laboratory of Software Development Environment Beijing 100191 China School of Computer Science and Engineering Beihang University Beijing 100191 China
Cryptosystem on conic curves, which is a new developing cryptography, becomes more widespread in these days. It is important to explore fast parallel algorithms to both encrypt and decrypt information in conic curves ... 详细信息
来源: 评论