咨询与建议

限定检索结果

文献类型

  • 220 篇 会议
  • 160 篇 期刊文献

馆藏范围

  • 380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 307 篇 工学
    • 247 篇 计算机科学与技术...
    • 213 篇 软件工程
    • 66 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 32 篇 生物工程
    • 20 篇 化学工程与技术
    • 13 篇 机械工程
    • 11 篇 光学工程
    • 9 篇 仪器科学与技术
    • 9 篇 动力工程及工程热...
    • 9 篇 交通运输工程
    • 8 篇 农业工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 建筑学
    • 7 篇 环境科学与工程(可...
    • 6 篇 电气工程
    • 6 篇 土木工程
    • 5 篇 水利工程
    • 5 篇 生物医学工程(可授...
  • 129 篇 理学
    • 69 篇 数学
    • 32 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 18 篇 化学
    • 14 篇 物理学
    • 12 篇 系统科学
  • 96 篇 管理学
    • 56 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 18 篇 工商管理
  • 17 篇 法学
    • 14 篇 社会学
  • 11 篇 农学
    • 9 篇 作物学
  • 4 篇 医学
  • 3 篇 经济学
  • 2 篇 军事学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 22 篇 semantics
  • 10 篇 training
  • 10 篇 neural machine t...
  • 9 篇 feature extracti...
  • 7 篇 deep neural netw...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 forecasting
  • 6 篇 benchmarking
  • 6 篇 natural language...
  • 6 篇 software
  • 6 篇 web services
  • 5 篇 computational mo...
  • 5 篇 machine learning
  • 5 篇 ontology
  • 4 篇 task analysis
  • 4 篇 large dataset
  • 4 篇 convolution
  • 4 篇 data mining
  • 4 篇 benchmark testin...

机构

  • 208 篇 state key lab of...
  • 47 篇 state key lab. o...
  • 16 篇 zhongguancun lab...
  • 14 篇 microsoft resear...
  • 14 篇 tencent cloud xi...
  • 13 篇 school of econom...
  • 12 篇 microsoft resear...
  • 12 篇 state key labora...
  • 10 篇 state key lab. o...
  • 9 篇 sensetime resear...
  • 9 篇 beijing advanced...
  • 8 篇 meituan
  • 7 篇 shen yuan honors...
  • 7 篇 school of cyber ...
  • 6 篇 school of comput...
  • 5 篇 meta ai united s...
  • 5 篇 beihang universi...
  • 5 篇 department of in...
  • 5 篇 microsoft corpor...
  • 5 篇 the university o...

作者

  • 72 篇 li zhoujun
  • 45 篇 liu xianglong
  • 42 篇 xu ke
  • 30 篇 yang jian
  • 17 篇 liu aishan
  • 16 篇 bai jiaqi
  • 15 篇 liang xinnian
  • 14 篇 yan zhao
  • 14 篇 ma shilong
  • 13 篇 wei furu
  • 13 篇 wu wei
  • 13 篇 guo hongcheng
  • 12 篇 wu junran
  • 12 篇 zhang dongdong
  • 12 篇 yang liqun
  • 12 篇 ma shuming
  • 11 篇 wang jiakai
  • 11 篇 xianglong liu
  • 11 篇 wu shuangzhi
  • 11 篇 wu wenjun

语言

  • 371 篇 英文
  • 7 篇 中文
  • 3 篇 其他
检索条件"机构=State Key Lab. of Software Development Environment"
380 条 记 录,以下是1-10 订阅
排序:
Towards structural web services discovery
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2008年 第3期15卷 297-301页
作者: 陈江锋 State Key Lab. of Software Development Environment Beihang University
A syntactic and structural matching mechanism for service discovery was put forward, which tries to exploit the underlying semantics of web services to enhance tbe traditional syntactic service discovery. We commit WS... 详细信息
来源: 评论
An automatic testing framework applied on LIW and implementation
收藏 引用
Journal of Theoretical and Applied Information Technology 2012年 第2期46卷 648-653页
作者: Yin, Jie Yu, Dan Ma, Shilong State Key Lab. of Software Development Environment Beihang University Beijing 100191 Beijing China
software is an important component of Large Information Weapon (LIW). We propose a data-driven distributed automatic testing framework, which is based on the analysis of LIW testing requirements, and it supports the w... 详细信息
来源: 评论
An improved algorithm for finding community structure in networks with an application to IPv6 backbone network
收藏 引用
中国高等学校学术文摘·计算机科学 2007年 第4期1卷 459-467页
作者: GUO Yingxin XU Ke State Key Lab of Software Development Environment Beihang UniversityBeijing 100083China
The discovery of community structure in a large number of complex networks has attracted lots of interest in recent *** category of algorithms for detecting community structure,the divisive algorithms,has been propose... 详细信息
来源: 评论
A high order collab.ration and real time formal model for automatic testing of safety critical systems
收藏 引用
Frontiers of Computer Science 2015年 第4期9卷 495-510页
作者: Jianghua LV ShUong MA Xianjun LI Jiangong SONG State Key Lab of Software Development Environment School of Computer Science Beihang University Beijing 100191 China
The need for safety critical systems (SCS) is both important and urgent, and their evaluation and verification are test-dependent. SCS are usually complex and very large, so manual testing of SCS are infeasible in p... 详细信息
来源: 评论
Dynamic Web services discovery based on similarity computation
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2010年 第1期17卷 119-122页
作者: 陈江锋 State Key Lab.of Software Development Environment Beihang University
A new approach for dynamic Web services discovery based on similarity computation in the treatment of massive Web information resource is put forward. Firstly, three kinds of service description information, textual, ... 详细信息
来源: 评论
A word co-occurrence matrix based method for relevance feedback
收藏 引用
Journal of Computational Information Systems 2011年 第1期7卷 17-24页
作者: Chen, Zilong Lu, Yang State Key Lab. of Software Development Environment Beihang University Beijing 100191 China School of Software and Microelectronics Peking University Beijing 100191 China
In most information retrieval models, keyword frequency plays a major role. However, these models are less context dependent, the main disadvantage is that they don't have a deeper understanding of the documents. ... 详细信息
来源: 评论
A predictive handoff approach for mobile IP
A predictive handoff approach for mobile IP
收藏 引用
2nd International Conference on Wireless and Mobile Communications, ICWMC 2006
作者: Zhang, Da-Wei Yao, Yi State Key Lab. of Software Development Environment BeiHang University China
We propose a predictive handoff mechanism which can predict the occurrence of link layer handoff precisely. It can be used as a trigger for Mobile IP to start network layer handoff ahead or pre-allocate resources. Usi... 详细信息
来源: 评论
Ontology-based Unified Model for Heterogeneous Threat Intelligence Integration and Sharing  11
Ontology-based Unified Model for Heterogeneous Threat Intell...
收藏 引用
2017 11th IEEE International Conference on Anti-counterfeiting,Security,and Identification(ASID)
作者: Yishuai Zhao Bo Lang Ming Liu State Key Lab of Software Development Environment Beihang University
Threat intelligence contains valuable information for cyber security;however, usually the intelligence is from multiple sources and is described with different data formats and schemas, which not only leads to the ine... 详细信息
来源: 评论
A novel 3-D motion estimation algorithm for multi-reference frame in H.264/AVC
A novel 3-D motion estimation algorithm for multi-reference ...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Mi, Zhou Yanchun, Zhong Yuan, Liang State Key Lab. of Software Development Environment Beihang University Beijing China
H.264/AVC achieves higher compression efficiency but needs more computational load comparing with previous video codecs. Motion estimation (ME) is the most time-consuming modules in encoder. Although lots of fast ME a... 详细信息
来源: 评论
A kernel based structure matching for web services search  07
A kernel based structure matching for web services search
收藏 引用
16th International World Wide Web Conference, WWW2007
作者: Jianjun, Yu Shengmin, Guo Hao, Su Hui, Zhang Ke, Xu State Key Lab. of Software Development Environment Beihang University Beijing China
This paper describes a kernel based Web Services (abbrevi-ated as service) matching mechanism for service discoveryand integration. The matching mechanism tries to exploitthe latent semantics by the structure of servi... 详细信息
来源: 评论