咨询与建议

限定检索结果

文献类型

  • 2,892 篇 会议
  • 2,526 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 5,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,801 篇 工学
    • 2,856 篇 计算机科学与技术...
    • 2,337 篇 软件工程
    • 711 篇 信息与通信工程
    • 517 篇 控制科学与工程
    • 331 篇 生物工程
    • 325 篇 电气工程
    • 287 篇 电子科学与技术(可...
    • 269 篇 机械工程
    • 215 篇 光学工程
    • 191 篇 生物医学工程(可授...
    • 152 篇 仪器科学与技术
    • 141 篇 化学工程与技术
    • 137 篇 动力工程及工程热...
    • 106 篇 网络空间安全
    • 85 篇 土木工程
    • 83 篇 建筑学
    • 79 篇 安全科学与工程
  • 1,842 篇 理学
    • 1,135 篇 数学
    • 394 篇 物理学
    • 377 篇 生物学
    • 312 篇 统计学(可授理学、...
    • 241 篇 系统科学
    • 143 篇 化学
  • 1,089 篇 管理学
    • 667 篇 管理科学与工程(可...
    • 458 篇 图书情报与档案管...
    • 216 篇 工商管理
  • 145 篇 医学
    • 120 篇 临床医学
    • 99 篇 基础医学(可授医学...
  • 133 篇 法学
    • 98 篇 社会学
  • 77 篇 经济学
    • 77 篇 应用经济学
  • 54 篇 教育学
  • 48 篇 农学
  • 17 篇 文学
  • 15 篇 艺术学
  • 14 篇 军事学

主题

  • 180 篇 computer science
  • 135 篇 laboratories
  • 131 篇 semantics
  • 96 篇 feature extracti...
  • 94 篇 wireless sensor ...
  • 90 篇 optimization
  • 87 篇 training
  • 81 篇 data mining
  • 81 篇 computational mo...
  • 76 篇 software
  • 74 篇 deep learning
  • 70 篇 algorithm design...
  • 62 篇 software enginee...
  • 61 篇 clustering algor...
  • 61 篇 testing
  • 60 篇 cloud computing
  • 59 篇 software testing
  • 59 篇 accuracy
  • 57 篇 web services
  • 56 篇 application soft...

机构

  • 1,056 篇 state key labora...
  • 224 篇 department of co...
  • 217 篇 national key lab...
  • 173 篇 department of co...
  • 139 篇 school of inform...
  • 116 篇 state key labora...
  • 114 篇 state key labora...
  • 107 篇 state key labora...
  • 100 篇 college of compu...
  • 86 篇 university of ch...
  • 81 篇 shandong provinc...
  • 78 篇 school of comput...
  • 73 篇 shandong provinc...
  • 67 篇 department of co...
  • 59 篇 school of softwa...
  • 57 篇 shanghai key lab...
  • 56 篇 school of artifi...
  • 51 篇 state key labora...
  • 51 篇 state key labora...
  • 48 篇 state key labora...

作者

  • 66 篇 gao yang
  • 46 篇 shi yinghuan
  • 44 篇 dou wanchun
  • 42 篇 guihai chen
  • 37 篇 zhou zhi-hua
  • 37 篇 sanglu lu
  • 37 篇 li wu-jun
  • 32 篇 baowen xu
  • 32 篇 yu huiqun
  • 32 篇 junping du
  • 31 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 xu baowen
  • 28 篇 fan guisheng
  • 27 篇 lu sanglu
  • 26 篇 yang tianbao
  • 26 篇 xu xiaolong
  • 26 篇 xu chang
  • 26 篇 zhang lijun
  • 26 篇 liu hong

语言

  • 5,063 篇 英文
  • 214 篇 其他
  • 155 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Department of Computer Science and Technology"
5431 条 记 录,以下是341-350 订阅
排序:
Identifying key features from app user reviews  21
Identifying key features from app user reviews
收藏 引用
43rd IEEE/ACM International Conference on software Engineering, ICSE 2021
作者: Wu, Huayao Deng, Wenjun Niu, Xintao Nie, Changhai State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
Due to the rapid growth and strong competition of mobile application (app) market, app developers should not only offer users with attractive new features, but also carefully maintain and improve existing features bas... 详细信息
来源: 评论
A Generalized Binary Tree Mechanism for Differentially Private Approximation of All-Pair Distances
arXiv
收藏 引用
arXiv 2025年
作者: Dinitz, Michael Fan, Chenglin Liu, Jingcheng Upadhyay, Jalaj Zou, Zongrui Department of Computer Science Johns Hopkins University United States Department of Computer Science and Engineering Seoul National University Korea Republic of State Key Laboratory for Novel Software Technology New Cornerstone Science Laboratory Nanjing University China Management Science & Information Systems Department Rutgers University United States
We study the problem of approximating all-pair distances in a weighted undirected graph with differential privacy, introduced by Sealfon [Sea16]. Given a publicly known undirected graph, we treat the weights of edges ... 详细信息
来源: 评论
Data consistency enforcement on business process transactions
Data consistency enforcement on business process transaction...
收藏 引用
2012 International Conference on Service-Oriented Computing, ICSOC 2012
作者: Liu, Xi State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
Transactions are common in business processes (BPs). Consistency on data, which is defined as satisfaction of a set of data integrity constraints, is one of the basic properties for business process transactions (BPTs... 详细信息
来源: 评论
Hyperspectral Target Detection Using Diffusion Model and Convolutional Gated Linear Unit
收藏 引用
IEEE Transactions on Geoscience and Remote Sensing 2025年 63卷
作者: Li, Zhaokui Mo, Fan Zhao, Xiaobin Liu, Cuiwei Gong, Xuewei Li, Wei Du, Qian Yuan, Bo Shenyang Aerospace University School of Computer Science Shenyang110136 China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China Institute of Applied Ecology Chinese Academy of Sciences CAS Key Laboratory of Forest Ecology and Silviculture Shenyang110016 China Beijing Institute of Technology School of Information and Electronics Beijing Key Laboratory of Fractional Signals and Systems Beijing100081 China Mississippi State University Department of Electrical and Computer Engineering StarkvilleMS39762 United States
Deep learning can effectively extract latent information from data to enhance target-background separation in hyperspectral target detection (HTD). However, these models typically require extensive labeled samples, wh... 详细信息
来源: 评论
Hierarchical Clustering of Complex Symbolic Data and Application for Emitter Identification
收藏 引用
Journal of computer science & technology 2018年 第4期33卷 807-822页
作者: Xin Xu Jiaheng Lu Wei Wang Laboratory of Science and Technology on Information System Engineering Nanjing Research Institute of Electronics Engineering Nanjing 21000~ China Department of Computer Science University of Helsinki Helsinki 00014 Finland State Key Laboratory for Novel Software and Technology Nanjing University Nanjing 210046 China
It is well-known that the values of symbolic variables may take various forms such as an interval, a set of stochastic measurements of some underlying patterns or qualitative multi-values and so on. However, the major... 详细信息
来源: 评论
Traffic adaptive MAC protocol for wireless sensor network
Traffic adaptive MAC protocol for wireless sensor network
收藏 引用
Third International Conference on computer Network and Mobile Computing, ICCNMC 2005
作者: Gong, Haigang Liu, Ming Mao, Yinchi Chen, Li-Jun Xie, Li State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
In this paper, we propose TA-MAC, a traffic load adaptive Medium Access Control protocol for wireless sensor network. TA-MAC modified the contention window mechanism of S-MAC. It adjusts the initial contention window ... 详细信息
来源: 评论
Optimal data scheduling for P2P VoD streaming systems
Optimal data scheduling for P2P VoD streaming systems
收藏 引用
16th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2010
作者: Yu, Qifeng Chen, Daoxu Department of Computer Science and Technology State Key Laboratory for Novel Software and Technology Nanjing University China
Media streaming services have been much more popular nowadays, and these services consume lots of network bandwidth. Peer-to-Peer(P2P) technology has been employed in the streaming systems to save the server bandwidth... 详细信息
来源: 评论
"re-ID BUFF": An enhanced similarity measurement based on genetic programming for person re-identification  21
"re-ID BUFF": An enhanced similarity measurement based on ge...
收藏 引用
2021 Genetic and Evolutionary Computation Conference, GECCO 2021
作者: Li, Yiming Shang, Lin State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
Person re-identification (re-ID) is a fundamental link to ensure successful cross-camera tracking. Its overall process is divided into two stages, feature extraction and matching. In the matching stage, the simple Euc... 详细信息
来源: 评论
Path-oriented bounded reachability analysis of composed linear hybrid systems
收藏 引用
International Journal on software Tools for technology Transfer 2011年 第4期13卷 307-317页
作者: Bu, Lei Li, Xuandong State Key Laboratory of Novel Software Technology Nanjing University Nanjing Jiangsu 210093 China Department of Computer Science and Technology Nanjing University Nanjing Jiangsu 210093 China
The existing techniques for reachability analysis of linear hybrid systems do not scale well to the problem size of practical interest. The performance of existing techniques is even worse for reachability analysis of... 详细信息
来源: 评论
Balancing resource utilization for continuous virtual machine requests in clouds
Balancing resource utilization for continuous virtual machin...
收藏 引用
6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
作者: Li, Xin Qian, Zhuzhong Chi, Ruiqing Zhang, Bolei Lu, Sanglu State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China
The placement of virtual machines (VMs) on a cluster of physical machines (PMs) is a primary task in clouds. We can benefit a lot from appropriate placement policy, e.g. cost saving. In this paper, we raise a continuo... 详细信息
来源: 评论