咨询与建议

限定检索结果

文献类型

  • 345 篇 期刊文献
  • 195 篇 会议

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 384 篇 工学
    • 266 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 83 篇 信息与通信工程
    • 55 篇 生物工程
    • 40 篇 电气工程
    • 36 篇 控制科学与工程
    • 34 篇 电子科学与技术(可...
    • 33 篇 光学工程
    • 28 篇 生物医学工程(可授...
    • 25 篇 机械工程
    • 17 篇 化学工程与技术
    • 14 篇 仪器科学与技术
    • 14 篇 核科学与技术
    • 13 篇 网络空间安全
    • 12 篇 材料科学与工程(可...
    • 9 篇 动力工程及工程热...
    • 9 篇 安全科学与工程
  • 204 篇 理学
    • 86 篇 数学
    • 71 篇 物理学
    • 58 篇 生物学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
    • 15 篇 系统科学
  • 107 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 25 篇 医学
    • 20 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 10 篇 药学(可授医学、理...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 法学
  • 5 篇 教育学
  • 3 篇 农学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 15 篇 semantics
  • 10 篇 hadron-hadron sc...
  • 9 篇 deep learning
  • 9 篇 feature extracti...
  • 9 篇 computer vision
  • 9 篇 robustness
  • 8 篇 machine learning
  • 7 篇 object detection
  • 7 篇 optimization
  • 7 篇 students
  • 6 篇 federated learni...
  • 5 篇 interpolation
  • 5 篇 accuracy
  • 5 篇 forecasting
  • 5 篇 data models
  • 4 篇 complex networks
  • 4 篇 semantic segment...
  • 4 篇 distillation
  • 4 篇 computers
  • 4 篇 change detection

机构

  • 49 篇 hubei key labora...
  • 38 篇 national enginee...
  • 25 篇 centro brasileir...
  • 25 篇 istanbul technic...
  • 25 篇 yerevan physics ...
  • 25 篇 department of ph...
  • 24 篇 national and kap...
  • 24 篇 charles universi...
  • 23 篇 universidad iber...
  • 23 篇 brunel universit...
  • 23 篇 university of sp...
  • 23 篇 academy of scien...
  • 23 篇 indian institute...
  • 23 篇 zhejiang univers...
  • 23 篇 school of comput...
  • 22 篇 italian national...
  • 22 篇 konya technical ...
  • 22 篇 università di to...
  • 22 篇 bingol universit...
  • 22 篇 erciyes universi...

作者

  • 70 篇 du bo
  • 35 篇 tao dacheng
  • 23 篇 liu juhua
  • 21 篇 konstantinou s.
  • 20 篇 lethuillier m.
  • 20 篇 pauls a.
  • 20 篇 lehti s.
  • 20 篇 waltenberger w.
  • 20 篇 lowette s.
  • 20 篇 luukka p.
  • 18 篇 ruimin hu
  • 17 篇 tavernier s.
  • 17 篇 hu ruimin
  • 16 篇 ding liang
  • 15 篇 zhong qihuang
  • 15 篇 wang zheng
  • 14 篇 mastrolorenzo l.
  • 14 篇 bo du
  • 13 篇 chen g.m.
  • 13 篇 laktineh i.b.

语言

  • 504 篇 英文
  • 25 篇 其他
  • 11 篇 中文
检索条件"机构=State Key Laboratory Software Engineering and School Computer and Complex Network Research Center"
540 条 记 录,以下是511-520 订阅
排序:
An ontology-based approach for semantic web service searching  1
收藏 引用
4th International Conference on Human-Centric Computing, HumanCom'11 and the 6th International Conference on Embedded and Multimedia Computing, EMC'11
作者: Shen, Shuijing Li, Bing Shao, Bo Li, Dingwei State Key Laboratory of Software Engineering Wuhan University 430072 Wuhan China School of Computer Science and Complex Network Research Center Wuhan University 430205 Wuhan China
Web service is released, combined and invoked through the web. With the continuous growth of web services, finding the web service to meet user requirement has become a challenging problem. The current web service dis... 详细信息
来源: 评论
An architecture description language based on dynamic description logics for self-healing systems
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第18期4卷 89-96页
作者: Wang, Zhuxiao Peng, Hui Guo, Jing Wu, Kehe Cui, Wenchao Wang, Xiaofeng School of Control and Computer Engineering State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources North China Electric Power University Beijing 102206 China Education Technology Center Beijing International Studies University Beijing 100024 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China School of Control and Computer Engineering Institute of Electric Information Security Engineering Research Center of Power Information North China Electric Power University Beijing 102206 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
As biological systems exhibit adaptation, healing and robustness in the face of changing environmental behavior, this paradigm has actuated research dealing with the concept of self-healing systems, which attempt to h... 详细信息
来源: 评论
A practical covert channel identification approach in source code based on directed information flow graph
A practical covert channel identification approach in source...
收藏 引用
International Conference on Secure software Integration and Reliability Improvement
作者: Wu, JingZheng Ding, Liping Wang, Yongji Han, Wei National Engineering Research Center for Fundamental Software Institute of Software China State Key Laboratory of Computer Science Institute of Software China Graduate School Chinese Academy of Science Beijing China
Covert channel analysis is an important requirement when building secure information systems and identification is the most difficult task. Although some approaches were presented they are either experimental or const... 详细信息
来源: 评论
Identification and evaluation of sharing memory covert timing channel in Xen virtual machines
Identification and evaluation of sharing memory covert timin...
收藏 引用
International Conference on Cloud Computing
作者: Wu, Jing Zheng Ding, Liping Wang, Yongji Han, Wei National Engineering Research Center for Fundamental Software Institute of Software Beijing China State Key Laboratory of Computer Science Institute of Software Beijing China Graduate School Chinese Academy of Science Beijing China
Virtualization technology is the basis of cloud computing, and the most important property of virtualization is isolation. Isolation guarantees security between virtual machines. However, covert channel breaks the iso... 详细信息
来源: 评论
Secure machine learning, a brief overview
Secure machine learning, a brief overview
收藏 引用
International Conference on Secure software Integration and Reliability Improvement Companion
作者: Liao, Xiaofeng Ding, Liping Wang, Yongji National Engineering Research Center for Fundamental Software Institute of Software China State Key Laboratory of Computer Science Institute of Software China Graduate University Chinese Academy of Sciences Beijing 100049 China Information Engineering School Nanchang University Nanchang Jiangxi 330031 China
The purpose of this article is to give a brief overview on the current work towards the emerging research problem of secure machine learning. Machine learning technique has been applied widely in various applications ... 详细信息
来源: 评论
Ranking the Importance of Classes via software Structural Analysis
Ranking the Importance of Classes via Software Structural An...
收藏 引用
2011 International Conference on Future Communication, Computing, Control and Management(ICF4C 2011)
作者: Li Ding-wei Li Bing He Peng Pan Wei-feng State Key Laboratory of Software Engineering Wuhan University Complex Networks Research Center Wuhan University School of Computer Science and Information Engineering Zhejiang Gongshan University
How to identify important classes in an object-oriented system is a significant task for resources allocation and decision makingHowever, the work on ranking the importance of classes is scarceThis paper introduces a ... 详细信息
来源: 评论
Multi-granularity dynamic analysis of complex software networks
Multi-granularity dynamic analysis of complex software netwo...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Bing Li Weifeng Pan Jinhu Lü State Key Laboratory Software Engineering and School Computer and Complex Network Research Center Wuhan University of China Wuhan China State Key Laboratory Software Engineering Wuhan University of China Wuhan China School Electrical Computer Engineering RMIT University Melbourne Australia Acad. Mathematics System Science Chinese Academy and Sciences Beijing China
software systems represent one of the most complex man-made systems. In this paper, we analyze the evolution of Object-Oriented (OO) software using complex network theory from a multi-granularity perspective. First, t... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
Measuring Structural Quality of Object-Oriented softwares via Bug Propagation Analysis on Weighted software networks
收藏 引用
Journal of computer Science & Technology 2010年 第6期25卷 1202-1213页
作者: 潘伟丰 李兵 马于涛 覃叶宜 周晓燕 State Key Laboratory of Software Engineering Wuhan University School of Computer Wuhan University Complex Networks Research Center Wuhan University
The quality of a software system is partially determined by its structure(topological structure),so the need to quantitatively analyze the quality of the structure has become *** this paper a novel metric called sof... 详细信息
来源: 评论
Multi-User Private keyword Search for Cloud Computing
Multi-User Private Keyword Search for Cloud Computing
收藏 引用
IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
作者: Yanjiang Yang Haibing Lu Jian Weng Institute for Infocomm Research Singapore Department of Operations Management and Information Systems The Leavey School of Business Santa Clara University USA State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Department of Computer Science and Emergency Technology Research Center of Risk Department of Computer Science and Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论