咨询与建议

限定检索结果

文献类型

  • 1,492 篇 会议
  • 1,200 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,455 篇 计算机科学与技术...
    • 1,167 篇 软件工程
    • 313 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 131 篇 电气工程
    • 124 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 66 篇 动力工程及工程热...
    • 59 篇 化学工程与技术
    • 41 篇 建筑学
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
  • 878 篇 理学
    • 541 篇 数学
    • 183 篇 物理学
    • 172 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 70 篇 化学
  • 540 篇 管理学
    • 335 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 42 篇 software
  • 40 篇 optimization
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 protocols
  • 33 篇 web services
  • 32 篇 deep learning
  • 32 篇 cloud computing

机构

  • 491 篇 state key labora...
  • 188 篇 department of co...
  • 151 篇 department of co...
  • 117 篇 national key lab...
  • 109 篇 state key labora...
  • 85 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 60 篇 state key labora...
  • 52 篇 state key labora...
  • 50 篇 university of ch...
  • 46 篇 national key lab...
  • 37 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 state key labora...
  • 30 篇 college of compu...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 qi lianyong

语言

  • 2,401 篇 英文
  • 231 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2699 条 记 录,以下是1211-1220 订阅
排序:
Improving Energy Demand Estimation Using an Adaptive Firefly Algorithm  9th
Improving Energy Demand Estimation Using an Adaptive Firefly...
收藏 引用
9th International Symposium on Intelligence Computation and Applications, ISICA 2017
作者: Wang, Hui Chen, Zhangxin Wang, Wenjun Wu, Zhijian Wu, Keliu Li, Wei School of Information Engineering Nanchang Institute of Technology Nanchang330099 China Department of Chemical and Petroleum Engineering University of Calgary CalgaryABT2N 1N4 Canada School of Business Administration Nanchang Institute of Technology Nanchang330099 China State Key Laboratory of Software Engineering School of Computer Wuhan University Wuhan430072 China School of Information Engineering Jiangxi University of Science and Technology Ganzhou341000 China
In recent years, energy demand has increased rapidly in developing countries. Energy demand estimation (EDE) plays an important role for policy makers and related organizations. Generally, energy demand can be mathema... 详细信息
来源: 评论
A duplicate data detection approach based on MapReduce and HDFS
收藏 引用
Recent Patents on computer science 2017年 第2期10卷 140-148页
作者: Wei, Fang Xue-Zhi, Wen Yu, Zheng Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210066 China Department of Electrical & Computer Engineering University of Florida GainesvilleFL32611 United States
Background: With the surge in the volume of collected data, deduplication will undoubtedly become one of the problems faced by researchers. There is significant advantage for deduplication to reduce storage, network b... 详细信息
来源: 评论
Notice of Removal: Short-term Wind Power Forecast for Wind Farm Base on Artificial Neural Network
Notice of Removal: Short-term Wind Power Forecast for Wind F...
收藏 引用
International computers, Signals and Systems Conference (ICOMSSC)
作者: Wu Feiyan Liao Xianwen Guangxi Colleges and Universities Key Laboratory of Professional Software Technology Wuzhou University Wuzhou Technology Department of Computer Science The Beihai Campus of the Guilin University of Electronic Beihai China
Removed.
来源: 评论
Incident detection based on mobile crowd sensing for smart city
收藏 引用
Journal of computers (Taiwan) 2019年 第1期30卷 96-104页
作者: Zhang, Peng Zhang, Zhenjiang Chao, Han-Chieh Department of Electronic and Information Engineering Key Laboratory of Communication and Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing100044 China Department of Software Engineering Key Laboratory of Communication and Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing100044 China Department of Electrical Engineering National Dong Hwa University Hualien97401 Taiwan School of Information Science and Engineering Fujian University of Technology Fuzhou350118 China School of Mathematics and Computer Science Wuhan Polytechnic University Wuhan430023 China Department of Computer Science and Information Engineering National Ilan University Yilan County260 Taiwan
In recent years, mobile devices have taken a significant role in improving the quality of people’s life. In order to enhance the usability of those devices, more and more sensors have been built in. Furthermore, the ... 详细信息
来源: 评论
Insulation Simulation Analysis of Press-Pack IGBT
Insulation Simulation Analysis of Press-Pack IGBT
收藏 引用
China International Electrical and Energy Conference (CIEEC)
作者: Yuzhe Liu Chaoqun Jiao Zhibin Zhao Chengzong Pang Yuanliang Fan School of Electrical Engineering Beijing Jiaotong University Beijing China State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources North China Electric Power University Beijing China Department of Electrical Engineering and Computer Science Wichita State University Wichita USA Fujian Provincial Enterprise Key Laboratory of High Reliable Electric Power Distribution Technology State Grid Fujian Electric Power Research Institute Fuzhou China
In high voltage applications such as power grid and rail transportation, IGBT devices generally operate under very harsh conditions, which places high demands on device reliability. In this paper, the electric field d...
来源: 评论
Top-rank enhanced listwise optimization for statistical machine translation  21
Top-rank enhanced listwise optimization for statistical mach...
收藏 引用
21st Conference on Computational Natural Language Learning, CoNLL 2017
作者: Chen, Huadong Huang, Shujian Chiang, David Dai, Xinyu Chen, Jiajun State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Engineering University of Notre Dame India
Pairwise ranking methods are the basis of many widely used discriminative training approaches for structure prediction problems in natural language processing (NLP). Decomposing the problem of ranking hypotheses into ... 详细信息
来源: 评论
Hierarchical taxonomy-aware and attentional graph capsule RCNNs for large-scale multi-label text classification
arXiv
收藏 引用
arXiv 2019年
作者: Peng, Hao Li, Jianxin Gong, Qiran Wang, Senzhang He, Lifang Li, Bo Wang, Lihong Yu, Philip S. Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 State Key Laboratory of Software Development Environment Beihang University Beijing100083 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China Department of Biostatistics and Epidemiology University of Pennsylvania PhiladelphiaPA19104 United States National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China Department of Computer Science University of Illinois at Chicago ChicagoIL60607 United States
CNNs, RNNs, GCNs, and CapsNets have shown significant insights in representation learning and are widely used in various text mining tasks such as large-scale multi-label text classification. However, most existing de... 详细信息
来源: 评论
Web Services: Problems and Future Directions
SSRN
收藏 引用
SSRN 2018年
作者: Wang, Hongbing Huang, Joshua Zhexue Qu, Yuzhong Xie, Junyuan Department of Computer Science and Technology Nanjing University Nanjing210093 China National Key Laboratory for Novel Software Technology E-Business Technology Institute The University of Hong Kong Hong Kong Hong Kong
Recently, Web services have generated great interests in both vendors and researchers. Web services, based on existing Internet protocols and open standards, can provide a flexible solution to the problem of applicati... 详细信息
来源: 评论
An Auto-Contouring Method for Kidney based on SVM
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1944卷
作者: Bo Li Jing Xue Ping Wang Saikun Gu Wei Chen Pengjiang Qian Yizhang Jiang School of Artificial Intelligence and Computer Science Jiangnan University 1800 Lihu Avenue Wuxi Jiangsu 214122 People's Republic of China Jiangsu Key Laboratory of Media Design and Software Technology 1800 Lihu Avenue Wuxi 214122 Jiangsu People's Republic of China Department of Nephrology the Affiliated Wuxi People's Hospital of Nanjing Medical University 299 Qingyang Rd Wuxi Jiangsu 214023 People's Republic of China
In adaptive radiotherapy planning, the contour map of the treatment target area is still the most difficult problem. Usually this work is done by a professional radiologist oncologist, which is very time-consuming and...
来源: 评论
A secure and effcient mutual authentication and key agreement protocol with smart cards for wireless communications
收藏 引用
International Journal of Network Security 2018年 第2期20卷 323-331页
作者: Guo, Cheng Chang, Chin-Chen Chang, Shih-Chang School of Software Technology Dalian University of Technology China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province China Department of Information Engineering and Computer Science Feng Chia University Taiwan Department of Computer Science and Information Engineering Asia University Taiwan Department of Computer Science and Information Engineering National Chung Cheng University Taiwan
Mobile user authentication and key agreement for wireless networks is an important security priority. In recent years, several user authentication and key agreement protocols with smart cards for wireless communicatio... 详细信息
来源: 评论