咨询与建议

限定检索结果

文献类型

  • 2,892 篇 会议
  • 2,526 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 5,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,801 篇 工学
    • 2,856 篇 计算机科学与技术...
    • 2,337 篇 软件工程
    • 711 篇 信息与通信工程
    • 517 篇 控制科学与工程
    • 331 篇 生物工程
    • 325 篇 电气工程
    • 287 篇 电子科学与技术(可...
    • 269 篇 机械工程
    • 215 篇 光学工程
    • 191 篇 生物医学工程(可授...
    • 152 篇 仪器科学与技术
    • 141 篇 化学工程与技术
    • 137 篇 动力工程及工程热...
    • 106 篇 网络空间安全
    • 85 篇 土木工程
    • 83 篇 建筑学
    • 79 篇 安全科学与工程
  • 1,842 篇 理学
    • 1,135 篇 数学
    • 394 篇 物理学
    • 377 篇 生物学
    • 312 篇 统计学(可授理学、...
    • 241 篇 系统科学
    • 143 篇 化学
  • 1,089 篇 管理学
    • 667 篇 管理科学与工程(可...
    • 458 篇 图书情报与档案管...
    • 216 篇 工商管理
  • 145 篇 医学
    • 120 篇 临床医学
    • 99 篇 基础医学(可授医学...
  • 133 篇 法学
    • 98 篇 社会学
  • 77 篇 经济学
    • 77 篇 应用经济学
  • 54 篇 教育学
  • 48 篇 农学
  • 17 篇 文学
  • 15 篇 艺术学
  • 14 篇 军事学

主题

  • 180 篇 computer science
  • 135 篇 laboratories
  • 131 篇 semantics
  • 96 篇 feature extracti...
  • 94 篇 wireless sensor ...
  • 90 篇 optimization
  • 87 篇 training
  • 81 篇 data mining
  • 81 篇 computational mo...
  • 76 篇 software
  • 74 篇 deep learning
  • 70 篇 algorithm design...
  • 62 篇 software enginee...
  • 61 篇 clustering algor...
  • 61 篇 testing
  • 60 篇 cloud computing
  • 59 篇 software testing
  • 59 篇 accuracy
  • 57 篇 web services
  • 56 篇 application soft...

机构

  • 1,056 篇 state key labora...
  • 224 篇 department of co...
  • 217 篇 national key lab...
  • 173 篇 department of co...
  • 139 篇 school of inform...
  • 116 篇 state key labora...
  • 114 篇 state key labora...
  • 107 篇 state key labora...
  • 100 篇 college of compu...
  • 86 篇 university of ch...
  • 81 篇 shandong provinc...
  • 78 篇 school of comput...
  • 73 篇 shandong provinc...
  • 67 篇 department of co...
  • 59 篇 school of softwa...
  • 57 篇 shanghai key lab...
  • 56 篇 school of artifi...
  • 51 篇 state key labora...
  • 51 篇 state key labora...
  • 48 篇 state key labora...

作者

  • 66 篇 gao yang
  • 46 篇 shi yinghuan
  • 44 篇 dou wanchun
  • 42 篇 guihai chen
  • 37 篇 zhou zhi-hua
  • 37 篇 sanglu lu
  • 37 篇 li wu-jun
  • 32 篇 baowen xu
  • 32 篇 yu huiqun
  • 32 篇 junping du
  • 31 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 xu baowen
  • 28 篇 fan guisheng
  • 27 篇 lu sanglu
  • 26 篇 yang tianbao
  • 26 篇 xu xiaolong
  • 26 篇 xu chang
  • 26 篇 zhang lijun
  • 26 篇 liu hong

语言

  • 5,063 篇 英文
  • 214 篇 其他
  • 155 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Department of Computer Science and Technology"
5431 条 记 录,以下是361-370 订阅
排序:
Evolution of Cooperation in Public Goods Games
收藏 引用
Communications in Theoretical Physics 2011年 第10期56卷 638-644页
作者: 夏承遗 张娟娟 王祎玲 王劲松 Key Laboratory of Computer Vision and System(Tianjin University of Technology) Ministry of Education Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology College of Life Science Shanxi Normal University
We investigate the evolution of cooperation with evolutionary public goods games based on finite populations, where four pure strategies: cooperators, defectors, punishers and loners who are unwilling to participate ... 详细信息
来源: 评论
MiTAR:a study on human activity recognition based on NLP with microscopic perspective
收藏 引用
Frontiers of computer science 2021年 第5期15卷 93-110页
作者: Huichao MEN Botao WANG Gang WU School of Computer Science and Engineering Northeastern UniversityShenyang 110000China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210000China
Nowadays,human activity recognition is becoming a more and more significant topic,and there is also a wide range of applications for it in real world *** data is an important data source in engineering and *** present... 详细信息
来源: 评论
GridDroid--An Effective and Efficient Approach for Android Repackaging Detection Based on Runtime Graphical User Interface
收藏 引用
Journal of computer science & technology 2022年 第1期37卷 147-181页
作者: Jun Ma Qing-Wei Sun Chang Xu Xian-Ping Tao State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China Huatai Securities Co. Ltd.Nanjing 210019China
Repackaging brings serious threats to Android *** birthmark techniques are typically applied to detect repackaged *** based on apps'runtime graphical user interfaces(GUI)are effective,especially for obfuscated or ... 详细信息
来源: 评论
A Lightweight Dynamic Enforcement of Privacy Protection for Android
收藏 引用
Journal of computer science & technology 2019年 第4期34卷 901-923页
作者: Zi-Peng Zhang Ming Fu Xin-Yu Feng School of Computer Science and Technology University of Science and Technology of ChinaHefei 230026China OS Kernel Laboratory Huawei Technologies Co.Ltd.Shanghai 200135China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China
Inter-process communication(IPC)provides a message passing mechanism for information exchange between *** has been long believed that IPCs can be abused by malware writers to launch collusive information leak using tw... 详细信息
来源: 评论
Iterative Android automated testing
收藏 引用
Frontiers of computer science 2023年 第5期17卷 15-26页
作者: Yi ZHONG Mengyu SHI Youran XU Chunrong FANG Zhenyu CHEN State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210093China School of Big Data and Computer Science Chongqing College of Mobile CommunicationChongqing 400065China
With the benefits of reducing time and workforce,automated testing has been widely used for the quality assurance of mobile applications(APPs).Compared with automated testing,manual testing can achieve higher coverage... 详细信息
来源: 评论
Checking Temporal Duration Properties of Timed Automata
收藏 引用
Journal of computer science & technology 2002年 第6期17卷 689-698页
作者: 李勇 Dang Van Hung State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 P.R. China International Institute for Software Technology The United Nations University P.O. Box 3058 Macao SAR P.R. China
In this paper, the problem of checking a timed automaton for a Duration Cal-culus formula of the form Temporal Duration Property is addressed. It is shown that TemporalDuration Properties are in the class of discretis... 详细信息
来源: 评论
Wireless Hallucination in Generative AI-enabled Communications: Concepts, Issues, and Solutions
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Xudong Wang, Jiacheng Feng, Lei Niyato, Dusit Zhang, Ruichen Kang, Jiawen Xiong, Zehui Du, Hongyang Mao, Shiwen State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China College of Computing and Data Science Nanyang Technological University Singapore School of Automation Guangdong University of Technology Guangzhou510006 China Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore Department of Electrical and Electronic Engineering University of Hong Kong Pok Fu Lam Hong Kong Department of Electrical and Computer Engineering Auburn University Auburn United States
Generative AI (GenAI) is driving the intelligence of wireless communications. Due to data limitations, random generation, and dynamic environments, GenAI may generate channel information or optimization strategies tha... 详细信息
来源: 评论
Detection, classification and characterization of android malware using API data dependency  11th
Detection, classification and characterization of android ma...
收藏 引用
11th International Conference Security and Privacy in Communication Networks, SecureComm 2015
作者: Li, Yongfeng Shen, Tong Sun, Xin Pan, Xuerui Mao, Bing State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
With the popularity of Android devices, more and more Android malware are manufactured every year. How to filter out malicious app is a serious problem for app markets. In this paper, we propose DroidADDMiner, an effi... 详细信息
来源: 评论
Combating NBTI-induced aging in data caches  13
Combating NBTI-induced aging in data caches
收藏 引用
23rd ACM International Conference of the Great Lakes Symposium on VLSI, GLSVLSI 2013
作者: Wang, Shuai Duan, Guangshan Zheng, Chuanlei Jin, Tao State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
The negative bias temperature instability (NBTI) in CMOS devices is one of most prominent sources of aging mechanisms, which can induce severe threats to the reliability of modern processors at deep submicron semicond... 详细信息
来源: 评论
A Spin-Glass Model based Local Community Detection Method in Social Networks
A Spin-Glass Model based Local Community Detection Method in...
收藏 引用
25th International Conference on Tools with Artificial Intelligence (ICTAI)
作者: Pan, Lei Wang, Chongjun Xie, Junyuan National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Mining community structures has become a general problem which exists in many fields including: computer-science, Mathematics, Physics, Biology, Sociology and so on. It has developed rapidly and been used widely in ma... 详细信息
来源: 评论