咨询与建议

限定检索结果

文献类型

  • 284 篇 会议
  • 114 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 300 篇 工学
    • 260 篇 计算机科学与技术...
    • 223 篇 软件工程
    • 53 篇 信息与通信工程
    • 49 篇 控制科学与工程
    • 20 篇 电子科学与技术(可...
    • 16 篇 机械工程
    • 14 篇 生物工程
    • 13 篇 材料科学与工程(可...
    • 12 篇 电气工程
    • 10 篇 仪器科学与技术
    • 9 篇 安全科学与工程
    • 8 篇 动力工程及工程热...
    • 8 篇 化学工程与技术
    • 8 篇 生物医学工程(可授...
    • 7 篇 光学工程
    • 7 篇 建筑学
    • 5 篇 交通运输工程
    • 5 篇 农业工程
  • 177 篇 理学
    • 145 篇 数学
    • 36 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 21 篇 物理学
    • 14 篇 生物学
    • 7 篇 化学
  • 86 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 13 篇 法学
    • 11 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 6 篇 医学
    • 6 篇 临床医学
  • 5 篇 艺术学
  • 4 篇 农学
  • 2 篇 教育学

主题

  • 15 篇 semantics
  • 8 篇 computer science
  • 7 篇 conferences
  • 7 篇 ordinary differe...
  • 7 篇 computational mo...
  • 7 篇 software quality
  • 6 篇 forecasting
  • 5 篇 image classifica...
  • 5 篇 cloud computing
  • 5 篇 random processes
  • 5 篇 web services
  • 4 篇 collaborative fi...
  • 4 篇 hybrid systems
  • 4 篇 programming
  • 4 篇 ant colony optim...
  • 4 篇 image segmentati...
  • 4 篇 graphics process...
  • 4 篇 educational inst...
  • 4 篇 optimization
  • 4 篇 data mining

机构

  • 69 篇 state key lab. f...
  • 39 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 24 篇 state key lab. o...
  • 24 篇 university of ch...
  • 22 篇 state key lab. o...
  • 14 篇 graduate univers...
  • 13 篇 department of co...
  • 12 篇 state key lab. f...
  • 9 篇 nanjing universi...
  • 8 篇 state key lab of...
  • 8 篇 state key labora...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 state key lab. o...
  • 7 篇 graduate univers...
  • 6 篇 international sc...
  • 5 篇 department of co...
  • 5 篇 key lab. of inte...
  • 5 篇 intelligence eng...

作者

  • 21 篇 zhan naijun
  • 18 篇 xue bai
  • 13 篇 huang qingming
  • 12 篇 liu jin
  • 11 篇 zhan bohua
  • 10 篇 jiang shuqiang
  • 10 篇 wang hongan
  • 8 篇 tian qi
  • 8 篇 bai xue
  • 8 篇 liu wei
  • 8 篇 dai guozhong
  • 8 篇 barmpalias georg...
  • 7 篇 ye mao
  • 7 篇 wang shuling
  • 7 篇 zhang tian
  • 7 篇 tian feng
  • 7 篇 yu xiao
  • 7 篇 mingjun xiao
  • 7 篇 sheng zhang
  • 6 篇 zhuzhong qian

语言

  • 385 篇 英文
  • 9 篇 其他
  • 7 篇 中文
检索条件"机构=State Key Lab. of Computer Science Inst. of Software"
401 条 记 录,以下是341-350 订阅
排序:
A steep thermodynamical selection rule for evolutionary algorithms
A steep thermodynamical selection rule for evolutionary algo...
收藏 引用
7th International Conference on Computational science, ICCS 2007
作者: Ying, Weiqin Li, Yuanxiang Peng, Shujuan Wang, Weiwu State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China School of Computer Science Wuhan University Wuhan 430079 China
The genetic algorithm (GA) often suffers from the premature convergence because of the loss of population diversity at an early stage of searching. This paper proposes a steep thermodynamical evolutionary algorithm (S... 详细信息
来源: 评论
Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols
Pseudo trust: Zero-knowledge based authentication in anonymo...
收藏 引用
21st International Parallel and Distributed Processing Symposium, IPDPS 2007
作者: Lu, Li Han, Jinsong Hu, Lei Huai, Jinpeng Liu, Yunhao Ni, Lionel M. State Key Lab. of Information Security Graduate School Chinese Academy of Sciences Beijing China Dept. of Computer Science and Engineering Hong Kong University of Science and Technology Kowloon Hong Kong School of Computer Science Beihang University Beijing China State Key Lab. of Software Developing Environment Beihang University Beijing China
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence, there exists an inhere... 详细信息
来源: 评论
Mesh deformation under skeleton-based detail-preservation
Mesh deformation under skeleton-based detail-preservation
收藏 引用
2007 10th IEEE International Conference on computer Aided Design and computer Graphics, CAD/Graphics 2007
作者: Wu, Jinzhong Liu, Xuehui Wu, Enhua State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Department of Computer and Information Science University of Macau Macao China Graduate University Chinese Academy of Sciences Beijing China
With in skeleton based deformation, two issues are waiting for investigation, large angle rotation and artifacts near joint regions. In this paper we propose rotation angle decomposition and detail preserving method t... 详细信息
来源: 评论
Approximation to the minimum rooted star cover problem
Approximation to the minimum rooted star cover problem
收藏 引用
4th International Conference on Theory and Applications of Models of Computation, TAMC 2007
作者: Wenbo, Zhao Peng, Zhang State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences P.O.Box 8718 Beijing 100080 China Graduate University Chinese Academy of Sciences Beijing China
In this paper, we study the following minimum rooted star cover problem: given a complete graph G = (V, E) with a length function l : E &rarr + that satisfies the triangle inequality, a designated root vertex r ∈... 详细信息
来源: 评论
An access control model in lager-scale P2P file sharing systems
An access control model in lager-scale P2P file sharing syst...
收藏 引用
7th International Conference on Computational science (ICCS 2007)
作者: Yue Guang-xue Yu Fei Chen Li-ping Chen Yi-jun College of Information Engineering Jiaxing University 314000 China Department of Computer Science and Technology Huaihua University 418000 China State Key Lab. for Novel Software Technology Nanjing University 210093 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University 2150063 China
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonym... 详细信息
来源: 评论
The tilt cursor: Enhancing stimulus-response compatibility by providing 3D orientation cue of pen
Conference on Human Factors in Computing Systems - Proceedin...
收藏 引用
Conference on Human Factors in Computing Systems - Proceedings 2007年 303-306页
作者: Tian, Feng Ao, Xiang Wang, Hongan Setlur, Vidya Dai, Guozhong Intelligence Engineering Lab. Institute of Software Chinese Academy of Sciences P.O.Box 8718 Beijing China State Key Lab. of Computer Science P.O.Box 8718 Beijing China Nokia Research Palo Alto 975 Page Mill Road Palo Alto CA United States
In order to improve stimulus-response compatibility of touchpad in pen-based user interface, we present the tilt cursor, i.e. a cursor dynamically reshapes itself to providing the 3D orientation cue of pen. We also pr... 详细信息
来源: 评论
An energy-aware protocol for data gathering applications in wireless sensor networks
An energy-aware protocol for data gathering applications in ...
收藏 引用
IEEE International Conference on Communications (ICC 2007)
作者: Liu, Ming Zheng, Yuan Cao, Jiannong Chen, Guihai Chen, Lijun Gong, Haigang School of Computer Science and Engineering University of Electronic and Technology of China China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong State Key Laboratory for Novel Software Technology Nanjing University China
Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energy of sensor nodes while meeting the requ... 详细信息
来源: 评论
Modified quantization index modulation watermarking adaptive to contrast masking thresholds
Modified quantization index modulation watermarking adaptive...
收藏 引用
1st International Conference on Communications and Networking in China, ChinaCom '06
作者: Guoxi, Wang Lihong, Ma. Kang, Cai Hanqing, Lu GD Key Lab. of Computer Network Dept.of Electronic Engineering South China Univ. of Tech. Guangzhou 510641 China National Lab. of Pattern Recognition Inst. Automation China Academy of Science Beijing 100080 China Guangdong Telecom.
In this paper, we suggest an adaptive watermarking method to improve both transparence and robustness of quantization index modulation (QIM) scheme. inst.ad of a fixed quantization step size, we apply a step size adap... 详细信息
来源: 评论
A kind of fuzzy constructive neural network and its application
A kind of fuzzy constructive neural network and its applicat...
收藏 引用
26th Chinese Control Conference, CCC 2007
作者: Tao, Wu Liwei, Chen Junjun, Mao Ling, Zhang State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China Key Lab. IC and SP Anhui University Hefei 230039 China School of Mathematics and Computational Science Anhui University Hefei 230039 China
Support vector machine (SVM) has been studied and applied extensively for its high accuracy, but it must construct SVM decision tree to classify sample sets with multiclass for it just be applicable for binary classif... 详细信息
来源: 评论
Assigning block size based on speculation for parallel downloading
Assigning block size based on speculation for parallel downl...
收藏 引用
6th IEEE International Conference on computer and Information Technology, CIT 2006
作者: Fu, Jianming Fan, Hui School of Computer Science Wuhan University 430072 Wuhan China State Key Lab. of Software Engineering Wuhan University 430072 Wuhan China
With the development of mirror sites, parallel downloading, which can decrease download latency, is becoming more and more popular. Dynamic parallel downloading can be adapted according to the fluctuation of network b... 详细信息
来源: 评论