咨询与建议

限定检索结果

文献类型

  • 284 篇 会议
  • 114 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 300 篇 工学
    • 260 篇 计算机科学与技术...
    • 223 篇 软件工程
    • 53 篇 信息与通信工程
    • 49 篇 控制科学与工程
    • 20 篇 电子科学与技术(可...
    • 16 篇 机械工程
    • 14 篇 生物工程
    • 13 篇 材料科学与工程(可...
    • 12 篇 电气工程
    • 10 篇 仪器科学与技术
    • 9 篇 安全科学与工程
    • 8 篇 动力工程及工程热...
    • 8 篇 化学工程与技术
    • 8 篇 生物医学工程(可授...
    • 7 篇 光学工程
    • 7 篇 建筑学
    • 5 篇 交通运输工程
    • 5 篇 农业工程
  • 177 篇 理学
    • 145 篇 数学
    • 36 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 21 篇 物理学
    • 14 篇 生物学
    • 7 篇 化学
  • 86 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 13 篇 法学
    • 11 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 6 篇 医学
    • 6 篇 临床医学
  • 5 篇 艺术学
  • 4 篇 农学
  • 2 篇 教育学

主题

  • 15 篇 semantics
  • 8 篇 computer science
  • 7 篇 conferences
  • 7 篇 ordinary differe...
  • 7 篇 computational mo...
  • 7 篇 software quality
  • 6 篇 forecasting
  • 5 篇 image classifica...
  • 5 篇 cloud computing
  • 5 篇 random processes
  • 5 篇 web services
  • 4 篇 collaborative fi...
  • 4 篇 hybrid systems
  • 4 篇 programming
  • 4 篇 ant colony optim...
  • 4 篇 image segmentati...
  • 4 篇 graphics process...
  • 4 篇 educational inst...
  • 4 篇 optimization
  • 4 篇 data mining

机构

  • 69 篇 state key lab. f...
  • 39 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 24 篇 state key lab. o...
  • 24 篇 university of ch...
  • 22 篇 state key lab. o...
  • 14 篇 graduate univers...
  • 13 篇 department of co...
  • 12 篇 state key lab. f...
  • 9 篇 nanjing universi...
  • 8 篇 state key lab of...
  • 8 篇 state key labora...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 state key lab. o...
  • 7 篇 graduate univers...
  • 6 篇 international sc...
  • 5 篇 department of co...
  • 5 篇 key lab. of inte...
  • 5 篇 intelligence eng...

作者

  • 21 篇 zhan naijun
  • 18 篇 xue bai
  • 13 篇 huang qingming
  • 12 篇 liu jin
  • 11 篇 zhan bohua
  • 10 篇 jiang shuqiang
  • 10 篇 wang hongan
  • 8 篇 tian qi
  • 8 篇 bai xue
  • 8 篇 liu wei
  • 8 篇 dai guozhong
  • 8 篇 barmpalias georg...
  • 7 篇 ye mao
  • 7 篇 wang shuling
  • 7 篇 zhang tian
  • 7 篇 tian feng
  • 7 篇 yu xiao
  • 7 篇 mingjun xiao
  • 7 篇 sheng zhang
  • 6 篇 zhuzhong qian

语言

  • 385 篇 英文
  • 9 篇 其他
  • 7 篇 中文
检索条件"机构=State Key Lab. of Computer Science Inst. of Software"
401 条 记 录,以下是221-230 订阅
排序:
Early effort estimation by AHP: A case study of project metrics in small organizations
Early effort estimation by AHP: A case study of project metr...
收藏 引用
2012 IEEE International Conference on computer science and Automation Engineering, CSAE 2012
作者: Zhang, Yan Zhang, Xiaokun Zhao, Xuying Zhang, Tian Department of Computer Science and Technology Beijing Electronic Science and Technology Institute Beijing 100070 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
Project effort estimation in the early phase of software development is a significant activity for every software organization to improve the development process. Small organizations need some simple and easily used m... 详细信息
来源: 评论
Unblockable compositions of software components  12
Unblockable compositions of software components
收藏 引用
15th ACM SIGSOFT Symposium on Component Based software Engineering, CBSE'12
作者: Dong, Ruzhen Faber, Johannes Liu, Zhiming Srba, Jiří Zhan, Naijun Zhu, Jiaqi UNU-IIST China Dept. of Computer Science Aalborg University Denmark State Key Lab. of Comp. Sci. Institute of Software CAS China
We present a new automata-based interface model describing the interaction behavior of software components. Contrary to earlier component- or interface-based approaches, the interface model we propose specifies all th... 详细信息
来源: 评论
A practical local hacking scheme on device-independent bell test based quantum randomness expansion
A practical local hacking scheme on device-independent bell ...
收藏 引用
Frontiers in Optics, FIO 2012
作者: Li, Junhui Yu, Quanfu Liu, Yu Guo, Hong CREAM Group State Key Lab. of Advanced Optical Communication Systems and Networks Inst. of Quantum Electronics School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
Violation of Bell inequality cannot guarantee non-locality, thus an applicable hacking scheme on device-independent Bell test based quantum randomness expansion is given, together with a more secure upper bound on gen... 详细信息
来源: 评论
Tag ranking by propagating relevance over tag and image graphs  12
Tag ranking by propagating relevance over tag and image grap...
收藏 引用
4th International Conference on Internet Multimedia Computing and Service, ICIMCS 2012
作者: Li, Minxian Tang, Jinhui Li, Haojie Zhao, Chunxia School of Computer Science and Technology Nanjing University of Science and Technology Nan Jing China State Key Lab. for Novel Software Technology Nanjing University Nan Jing China School of Software Dalian University of Technology Dalian China
In this paper, we explore the problem of tag ranking by propagating relevance over community-contributed images and their associated tags. To rank the tags more accurately, we propose a novel tag ranking scheme throug... 详细信息
来源: 评论
Hierarchical clustering on HDP topics to build a semantic tree from text
Hierarchical clustering on HDP topics to build a semantic tr...
收藏 引用
2nd International Workshop on Searching and Integrating New Web Data Sources: Very Large Data Search, VLDS 2012
作者: Si, Jianfeng Li, Qing Qian, Tieyun Deng, Xiaotie Dept. of Computer Science City University of Hong Kong Hong Kong Hong Kong State Key Lab. of Software Eng. Wuhan University Wuhan China
An ideal semantic representation of text corpus should exhibit a hierarchical topic tree structure, and topics residing at different node levels of the tree should exhibit different levels of semantic abstraction (i.e... 详细信息
来源: 评论
Context-aware role mining for mobile service recommendation  12
Context-aware role mining for mobile service recommendation
收藏 引用
27th Annual ACM Symposium on Applied Computing, SAC 2012
作者: Wang, Jian Zeng, Cheng He, Chuan Hong, Liang Zhou, Liang Wong, Raymond K. Tian, Jilei State Key Lab. of Software Engineering Wuhan University China School of Computer Science and Engineering University of New South Wales Australia Nokia Research Center Beijing China
Finding and recommending suitable services for mobile users are increasingly important due to the popularity of mobile Internet. While recent research has attempted to use role-based approaches to recommend services, ... 详细信息
来源: 评论
Probabilistic reasoning in DL-lite
Probabilistic reasoning in DL-lite
收藏 引用
12th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2012
作者: Ramachandran, Raghav Qi, Guilin Wang, Kewen Wang, Junhu Thornton, John School of Information and Communication Technology Griffith University Australia School of Computer Science and Engineering Southeast University China State Key Lab. for Novel Software Technology Nanjing University China
The problem of extending description logics with uncertainty has received significant attention in recent years. In this paper, we investigate a probabilistic extension of DL-Lite, a family of tractable description lo... 详细信息
来源: 评论
A fast algorithm for frequent itemset mining using Patricia* structures
A fast algorithm for frequent itemset mining using Patricia*...
收藏 引用
14th International Conference on Data Warehousing and Knowledge Discovery, DaWaK 2012
作者: Qu, Jun-Feng Liu, Mengchi State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan 430072 China School of Computer Science Carleton University Ottawa ON K1S 5B6 Canada
Efficient mining of frequent itemsets from a database plays an essential role in many data mining tasks such as association rule mining. Many algorithms use a prefix-tree to represent a database and mine frequent item... 详细信息
来源: 评论
Test effectiveness index: Integrating product metrics with process metrics
Test effectiveness index: Integrating product metrics with p...
收藏 引用
2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems, CYBER 2012
作者: Zhang, Yan Zhao, Xuying Zhang, Xiaokun Zhang, Tian Department of Computer Science and Technology Beijing Electronic Science and Technology Institute Beijing 100070 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Defect measurement is an important method in the improvement of software quality. Recent approaches of defect measurement are inappropriate to small software organizations by reason of their intricacy. This paper give... 详细信息
来源: 评论
Mining high utility itemsets without candidate generation  12
Mining high utility itemsets without candidate generation
收藏 引用
21st ACM International Conference on Information and Knowledge Management, CIKM 2012
作者: Liu, Mengchi Qu, Junfeng State Key Lab. of Software Engineering School of Computer Wuhan University Wuhan 430072 China School of Computer Science Carleton University Ottawa ON K1S 5B6 Canada
High utility itemsets refer to the sets of items with high utility like profit in a database, and efficient mining of high utility itemsets plays a crucial role in many real-life applications and is an important resea... 详细信息
来源: 评论