咨询与建议

限定检索结果

文献类型

  • 1,492 篇 会议
  • 1,200 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,455 篇 计算机科学与技术...
    • 1,167 篇 软件工程
    • 313 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 131 篇 电气工程
    • 124 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 66 篇 动力工程及工程热...
    • 59 篇 化学工程与技术
    • 41 篇 建筑学
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
  • 878 篇 理学
    • 541 篇 数学
    • 183 篇 物理学
    • 172 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 70 篇 化学
  • 540 篇 管理学
    • 335 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 42 篇 software
  • 40 篇 optimization
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 protocols
  • 33 篇 web services
  • 32 篇 deep learning
  • 32 篇 cloud computing

机构

  • 491 篇 state key labora...
  • 188 篇 department of co...
  • 151 篇 department of co...
  • 117 篇 national key lab...
  • 109 篇 state key labora...
  • 85 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 60 篇 state key labora...
  • 52 篇 state key labora...
  • 50 篇 university of ch...
  • 46 篇 national key lab...
  • 37 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 state key labora...
  • 30 篇 college of compu...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 qi lianyong

语言

  • 2,401 篇 英文
  • 231 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2699 条 记 录,以下是1191-1200 订阅
排序:
Efficient identity-based threshold decryption scheme from bilinear pairings
收藏 引用
Frontiers of computer science 2018年 第1期12卷 177-189页
作者: Wei GAO Guilin WANG Kefei CHEN Xueli WANG School of Mathematics and Statistics Ludong University Yantai 264025 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing 210044 China Key Laboratory of Information Security Guangzhou University Guangzhou 510006 China Shield Lab Singapore Research Center of Huawei Singapore 117674 Singapore Department of Mathematics Hangzhou Normal University Hangzhou 311121China School of Mathematics South China Normal University Guangzhou 510631 China
Using Shamir's secret sharing scheme to indi- rectly share the identity-based private key in the form of a pairing group element, we propose an efficient identity-based threshold decryption scheme from pairings and p... 详细信息
来源: 评论
NjuLink: Results for instance matching at OAEI 2017  12
NjuLink: Results for instance matching at OAEI 2017
收藏 引用
12th International Workshop on Ontology Matching, OM 2017
作者: Lyu, Xinze Zhang, Qingheng Hu, Wei Sun, Zequn Qu, Yuzhong State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China
njuLink is a tool designed for instance matching. It mainly matches instances by finding discriminative property pairs. Also, to meet 1:1 equivalence relationship for the OAEI 2017 DORUMES task, we make several improv...
来源: 评论
Identification of Cognitive Dysfunction in Patients with T2DM Using Whole Brain Functional Connectivity
收藏 引用
Genomics, Proteomics & Bioinformatics 2019年 第4期17卷 441-452页
作者: Zhenyu Liu Jiangang Liu Huijuan Yuan Taiyuan Liu Xingwei Cui Zhenchao Tang Yang Du Meiyun Wang Yusong Lin Jie Tian CAS Key Laboratory of Molecular Imaging Institute of AutomationChinese Academy of SciencesBeijing 100190China School of Computer and Information Technology Beijing Jiaotong UniversityBeijing 100044China Department of Endocrinology and Metabolism Henan Provincial People’s Hospital&the People’s Hospital of Zhengzhou UniversityZhengzhou 450003China Department of Radiology Henan Provincial People’s Hospital&the People’s Hospital of Zhengzhou UniversityZhengzhou 450003China Cooperative Innovation Center for Internet Healthcare&School of Software Zhengzhou UniversityZhengzhou 450003China School of Mechanical Electrical&Information EngineeringShandong University(Weihai)Weihai 264209China University of Chinese Academy of Sciences Beijing 100080China Beijing Advanced Innovation Center for Big Data-Based Precision Medicine School of MedicineBeihang UniversityBeijing 100191China Engineering Research Center of Molecular and Neuro Imaging of Ministry of Education School of Life Science and TechnologyXidian UniversityXi’an 710126China
Majority of type 2 diabetes mellitus(T2DM)patients are highly susceptible to several forms of cognitive impairments,particularly ***,the underlying neural mechanism of these cognitive impairments remains *** aimed to ... 详细信息
来源: 评论
Data flow analysis on android platform with fragment lifecycle modeling  1
收藏 引用
12th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2016
作者: Li, Yongfeng Ouyang, Jinbin Guo, Shanqing Mao, Bing State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China School of Computer Science and Technology Shandong University Jinan China
Smartphones carry a large quantity of sensitive information to satisfy people’s various requirements, but the way of using information is important to keep the security of users’ privacy. There are two kinds of misu... 详细信息
来源: 评论
How to Explain a Patch: An Empirical Study of Patch Explanations in Open Source Projects
How to Explain a Patch: An Empirical Study of Patch Explanat...
收藏 引用
International Symposium on software Reliability Engineering (ISSRE)
作者: Jingjing Liang Yaozong Hou Shurui Zhou Junjie Chen Yingfei Xiong Gang Huang Key Laboratory of High Confidence Software Technologies (Peking University) MoE Beijing PR China Department of Computer Science and Technology EECS Peking University Beijing PR China Beijing Kuaishou Technology Co. Ltd Beijing PR China Carnegie Mellon University Pittsburgh USA College of Intelligence and Computing Tianjin University Tianjin PR China
Bugs are inevitable in software development and maintenance processes. Recently a lot of research efforts have been devoted to automatic program repair, aiming to reduce the efforts of debugging. However, since it is ... 详细信息
来源: 评论
Petri Net Control Method for Pipe-line Systems and Its Implementation via CIF3 ⁎
收藏 引用
IFAC-PapersOnLine 2019年 第24期52卷 261-266页
作者: YuHao Fu JiLiang Luo Huifeng Wu Jianhong Ye Yi-sheng Huang College Information Science and Engineering Huaqiao University Xiamen 361021 China College Information Science and Engineering Huaqiao University Xiamen 361021 China and also with Fujian Engineering Research Center of Motor Control and System Optimal Schedule Xiamen 361021 China Institute of Intelligent and Software Technology Hangzhou Dianzi University Hangzhou 310018 China Computer Science and Technology Huaqiao University Xiamen 361021 China and also with Fujian Provincial Key Laboratory of Data Intensive Computing Quanzhou 362000 China Department of Electrical Engineering National Ilan University Taiwan
As for a pipe-line system subjected to complex operations, an approach is proposed to synthesize the controller via Petri nets (PNs) such that the plant is run as concurrently as possible and the loads of equipments a... 详细信息
来源: 评论
Simultaneous spectral-spatial feature selection and extraction for hyperspectral images
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Lefei Zhang, Qian Du, Bo Huang, Xin Tang, Yuan Yan Tao, Dacheng State Key Laboratory of Software Engineering School of Computer Wuhan University Wuhan430072 China Beijing Samsung Telecom R&D Center Beijing100028 China School of Remote Sensing and Information Engineering Wuhan University Wuhan430072 China Department of Computer and Information Science University of Macau Macau999078 China Centre for Quantum Computation and Intelligent Systems Faculty of Engineering and Information Technology University of Technology SydneyNSW2007 Australia
In hyperspectral remote sensing data mining, it is important to take into account of both spectral and spatial information, such as the spectral signature, texture feature and morphological property, to improve the pe... 详细信息
来源: 评论
A Logic for Recursive Quantum Programs
arXiv
收藏 引用
arXiv 2018年
作者: Xu, Zhaowei Ying, Mingsheng Ying, Shenggang State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing100190 China Center for Quantum Software and Information University of Technology Sydney NSW2007 Australia Department of Computer Science and Technology Tsinghua University Beijing100084 China
Most modern (classical) programming languages support recursion. Recursion has also been successfully applied to the design of several quantum algorithms and introduced in a couple of quantum programming languages. So... 详细信息
来源: 评论
Value based Curriculum Design for Engineering Studies  5
Value based Curriculum Design for Engineering Studies
收藏 引用
5th IEEE International Conference on MOOCs, Innovation and technology in Education (MITE)
作者: Subramanian, Shriram Dorairaju, Bharathi Pallavarapu, Mayur Department of Computer Science Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin China
Education apart from the basic needs of food, clothing and shelter, is another key factor to empower an individual. It acts as an enabler to elevate a person socially and from within. Education system has been evolvin... 详细信息
来源: 评论
Continuous Incident Triage for Large-Scale Online Service Systems
Continuous Incident Triage for Large-Scale Online Service Sy...
收藏 引用
IEEE International Conference on Automated software Engineering (ASE)
作者: Junjie Chen Xiaoting He Qingwei Lin Hongyu Zhang Dan Hao Feng Gao Zhangwei Xu Yingnong Dang Dongmei Zhang College of Intelligence and Computing Tianjin University Tianjin China Microsoft Research Beijing China The University of Newcastle NSW Australia Key Laboratory of High Confidence Software Technologies (Peking University) MoE Department of Computer Science and Technology Peking University Beijing China Microsoft Azure Redmond Washington USA
In recent years, online service systems have become increasingly popular. Incidents of these systems could cause significant economic loss and customer dissatisfaction. Incident triage, which is the process of assigni... 详细信息
来源: 评论