咨询与建议

限定检索结果

文献类型

  • 278 篇 会议
  • 201 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 254 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 70 篇 信息与通信工程
    • 37 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 光学工程
    • 18 篇 电子科学与技术(可...
    • 17 篇 仪器科学与技术
    • 16 篇 交通运输工程
    • 14 篇 电气工程
    • 12 篇 动力工程及工程热...
    • 12 篇 建筑学
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 安全科学与工程
    • 9 篇 土木工程
    • 8 篇 化学工程与技术
    • 6 篇 网络空间安全
  • 123 篇 理学
    • 71 篇 数学
    • 27 篇 生物学
    • 20 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 15 篇 系统科学
    • 14 篇 化学
  • 81 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 8 篇 法学
    • 5 篇 社会学
  • 8 篇 医学
    • 7 篇 临床医学
  • 4 篇 哲学
  • 4 篇 经济学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 14 篇 semantics
  • 10 篇 object detection
  • 10 篇 servers
  • 9 篇 feature extracti...
  • 9 篇 software
  • 9 篇 heuristic algori...
  • 7 篇 computational mo...
  • 7 篇 machine learning
  • 7 篇 computer vision
  • 7 篇 training
  • 6 篇 semantic segment...
  • 6 篇 deep learning
  • 6 篇 programming
  • 6 篇 safety
  • 6 篇 educational inst...
  • 6 篇 optimization
  • 6 篇 graph neural net...
  • 6 篇 resource allocat...
  • 6 篇 blockchain
  • 6 篇 satellites

机构

  • 178 篇 school of comput...
  • 156 篇 state key labora...
  • 109 篇 state key labora...
  • 47 篇 state key labora...
  • 23 篇 state key lab of...
  • 20 篇 institute of art...
  • 13 篇 zhongguancun lab...
  • 12 篇 beijing advanced...
  • 12 篇 hangzhou innovat...
  • 11 篇 school of comput...
  • 7 篇 state key labora...
  • 7 篇 sino-french engi...
  • 6 篇 school of mechan...
  • 5 篇 shen yuan honors...
  • 5 篇 school of artifi...
  • 5 篇 beihang universi...
  • 5 篇 beihang universi...
  • 5 篇 school of comput...
  • 5 篇 ping an technolo...
  • 5 篇 state key labora...

作者

  • 41 篇 xiao limin
  • 31 篇 huang di
  • 30 篇 ruan li
  • 29 篇 limin xiao
  • 20 篇 li ruan
  • 18 篇 zhang xiong
  • 17 篇 hao sheng
  • 14 篇 bai xiao
  • 14 篇 di huang
  • 11 篇 wang yunhong
  • 10 篇 li zhoujun
  • 10 篇 chen jiaxin
  • 10 篇 zhu mingfa
  • 9 篇 liu xianglong
  • 8 篇 wenge rong
  • 8 篇 yang hongyu
  • 8 篇 li yongnan
  • 8 篇 xu ke
  • 8 篇 luo jie
  • 7 篇 peng hao

语言

  • 400 篇 英文
  • 73 篇 其他
  • 9 篇 中文
检索条件"机构=State Key Lab.Of Software Development Environment School of Computer Science & Engineering"
480 条 记 录,以下是361-370 订阅
排序:
Bandwidth-adaptive Application Partitioning for Execution Time and Energy Optimization
Bandwidth-adaptive Application Partitioning for Execution Ti...
收藏 引用
IEEE International Conference on Communications
作者: Jianwei Niu Wenfang Song Lei Shu Mohammed Atiquzzaman State Key Laboratory of Software Development Environment Beihang University Beijing China Guangdong Petrochemical Equipment Fault Diagnosis Key Lab Guangdong University of Petrochemical Technology China School of Computer Science University of Oklahoma Norman OK China
Partitioning and offloading some parts of mobile applications onto remote servers is a promising approach to extend the battery life of mobile devices. However, since available network bandwidths vary in a wireless en... 详细信息
来源: 评论
Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards
Security Analysis and Enhancement of a Dynamic Identity Base...
收藏 引用
International Symposium on Biometrics and Security Technologies, ISBAST
作者: Xiong Li Jianwei Niu Muhammad Khurram Khan Junguo Liao School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China State Key Laboratory of Software Development Environment Beihang University Beijing China Center of Excellence in Information Assurance King Saud University Riyadh Saudi Arabia
Remote user authentication is an important and efficient method to ensure security for many network-based application systems. So far, several dynamic identity based authentication schemes have been proposed to protec... 详细信息
来源: 评论
Robust Biometrics Based Three-Factor Remote User Authentication Scheme with key Agreement
Robust Biometrics Based Three-Factor Remote User Authenticat...
收藏 引用
International Symposium on Biometrics and Security Technologies, ISBAST
作者: Xiong Li Jianwei Niu Muhammad Khurram Khan Junguo Liao School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China State Key Laboratory of Software Development Environment Beihang University Beijing China Center of Excellence in Information Assurance King Saud University Riyadh Saudi Arabia
Recently, An pointed out the weaknesses of Das's three-factor remote user authentication scheme, and proposed an improved biometric based three-factor remote user authentication scheme. An's scheme improves th... 详细信息
来源: 评论
Test algebra for combinatorial testing
Test algebra for combinatorial testing
收藏 引用
International Workshop on Automation of software Test (AST)
作者: Wei-Tek Tsai Charles J. Colbourn Jie Luo Guanqiu Qi Qingyang Li Xiaoying Bai School of Computing Informatics and Decision Systems Arizona State University Tempe AZ USA Arizona State University Tempe AZ US State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Department of Computer Science and Technology INLIST Tsinghua University Beijing China
This paper proposes a new algebraic system, Test Algebra (TA), for identifying faults in combinatorial testing for SaaS (software-as-a-Service) applications. SaaS as a part of cloud computing is a new software deliver... 详细信息
来源: 评论
Adaptive Fault Detection for Testing Tenant Applications in Multi-tenancy SaaS Systems
Adaptive Fault Detection for Testing Tenant Applications in ...
收藏 引用
IEEE International Conference on Cloud engineering (IC2E)
作者: W.T. Tsai Qingyang Li Charles J. Colbourn Xiaoying Bai School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ USA State Key Laboratory of Software Development Environment Beihang University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
SaaS (software-as-a-Service) often uses multi-tenancy architecture (MTA) where tenant developers compose their applications online using the components stored in the SaaS database. Tenant applications need to be teste... 详细信息
来源: 评论
Social-aware Relay Node Selection in Delay Tolerant Networks
Social-aware Relay Node Selection in Delay Tolerant Networks
收藏 引用
International Conference on computer Communications and Networks
作者: Kaimin Wei Deze Zeng Song Guo Ke Xu State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Engineering University of Aizu Japan
In Delay Tolerant Networks (DTNs), the connections between mobile nodes are intermittent and constant end-to-end paths rarely exist. In order to achieve high delivery ratio, most existing DTN routing algorithms favor ... 详细信息
来源: 评论
A precise approach to tracking dim-small targets using spectral fingerprint features
收藏 引用
Frontiers of computer science 2012年 第5期6卷 527-536页
作者: Hao SHENG Chao LI Yuanxin OUYANG Zhang XIONG School of Computer Science and Engineering Beihang UniversityBeijing 100191China Research Institute of Beihang University in Shenzhen Shenzhen 518057China State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China
A precise method for accurately tracking dim- small targets, based on spectral fingerprint is proposed where traditional full color tracking seems impossible. A fingerprint model is presented to adequately extract spe... 详细信息
来源: 评论
A efficient and robust method for complexly faulted horizon reconstruction based on meshes cutting and interpolating
A efficient and robust method for complexly faulted horizon ...
收藏 引用
2012 IEEE International Conference on computer science and Automation engineering, CSAE 2012
作者: Li, Jigang Meng, Xianhai Li, Yufeng Yang, Qin State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
3d-geological modeling is a means of improving data interpretation through visualization, as well as a way to generate support for numerical simulations of complex phenomena. Reconstructing horizons from scattered poi... 详细信息
来源: 评论
3D structural geological modeling based on morphing field  1
收藏 引用
International Conference on Information engineering and Applications, IEA 2011
作者: Xianhai, Meng Jigang, Li Qin, Yang State Key Laboratory of Software Development Environment School of Computer Science and Engineering BeiHang University Beijing 100191 China
Strata are continuous surface by sediment, which form fractured and discontinuous geological layers during strata moving. In 3D structural geological modeling, how to describe fractured geological layers well and trul... 详细信息
来源: 评论
A formal semantics for program debugging
收藏 引用
science China(Information sciences) 2012年 第1期55卷 133-148页
作者: LI Wei1&LI Ning1,2 1state key laboratory of software development environment,school of computer science and engineering,Beihang University,Beijing 100191,China 2China Ship Research and development Academy,Beijing 100192,China 1. State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing 100191 China2. China Ship Research and Development Academy Beijing 100192 China
This work aims to build a semantic framework for automated debugging.A debugging process consists of tracing,locating,and fixing processes *** first two processes are accomplished by a tracing procedure and a locating... 详细信息
来源: 评论