咨询与建议

限定检索结果

文献类型

  • 1,492 篇 会议
  • 1,200 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,455 篇 计算机科学与技术...
    • 1,167 篇 软件工程
    • 313 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 131 篇 电气工程
    • 124 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 66 篇 动力工程及工程热...
    • 59 篇 化学工程与技术
    • 41 篇 建筑学
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
  • 878 篇 理学
    • 541 篇 数学
    • 183 篇 物理学
    • 172 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 70 篇 化学
  • 540 篇 管理学
    • 335 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 42 篇 software
  • 40 篇 optimization
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 protocols
  • 33 篇 web services
  • 32 篇 deep learning
  • 32 篇 cloud computing

机构

  • 491 篇 state key labora...
  • 188 篇 department of co...
  • 151 篇 department of co...
  • 117 篇 national key lab...
  • 109 篇 state key labora...
  • 85 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 60 篇 state key labora...
  • 52 篇 state key labora...
  • 50 篇 university of ch...
  • 46 篇 national key lab...
  • 37 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 state key labora...
  • 30 篇 college of compu...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 qi lianyong

语言

  • 2,401 篇 英文
  • 231 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2699 条 记 录,以下是1251-1260 订阅
排序:
Fast rates of ERM and stochastic approximation: Adaptive to error bound conditions
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Mingrui Zhang, Xiaoxuan Zhang, Lijun Jin, Rong Yang, Tianbao Department of Computer Science University of Iowa Iowa CityIA52242 United States National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Alibaba Group Seattle United States
Error bound conditions (EBC) are properties that characterize the growth of an objective function when a point is moved away from the optimal set. They have recently received increasing attention in the field of optim... 详细信息
来源: 评论
Triangle extension: Efficient localizability detection in wireless sensor networks
arXiv
收藏 引用
arXiv 2018年
作者: Wu, Hejun Ding, Ao Liu, Weiwei Li, Lvzhou Yang, Zheng Guangdong Key Laboratory of Big Data Analysis and Processing Department of Computer Science Sun Yat-sen University Guangzhou China Horizon Robotics Beijing China School of Software Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China
Determining whether nodes can be localized, called localizability detection, is essential for wireless sensor networks (WSNs). This step is required for localizing nodes, achieving low-cost deployments, and identifyin... 详细信息
来源: 评论
Preventing "bad" content dispersal in Named Data Networking  17
Preventing "bad" content dispersal in Named Data Networking
收藏 引用
50th ACM Turing Conference - China, ACM TUR-C 2017
作者: Wang, Yi Qi, Zhuyun Lei, Kai Liu, Bin Tian, Chen Huawei Future Network Theory Lab Hong Kong School of Electronics and Computer Engineering Peking University Shenzhen518055 China Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing100084 China State Key Laboratory for Novel Software Technology Nanjing University Najing210023 China
Named Data Networking (NDN) improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network, NDN routers should verify the digital signature of ea... 详细信息
来源: 评论
Recognizing keystrokes Using WiFi Devices
Recognizing Keystrokes Using WiFi Devices
收藏 引用
作者: Ali, Kamran Liu, Alex X. Wang, Wei Shahzad, Muhammad Department of Computer Science and Engineering Michigan State University East LansingMI48823 United States State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Department of Computer Science North Carolina State University RaleighNC27695 United States
keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the fir... 详细信息
来源: 评论
Device-Free Human Activity Recognition Using Commercial WiFi Devices
Device-Free Human Activity Recognition Using Commercial WiFi...
收藏 引用
作者: Wang, Wei Liu, Alex X. Shahzad, Muhammad Ling, Kang Lu, Sanglu State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Department of Computer Science and Engineering Michigan State University East LansingMI48824 United States Department of Computer Science North Carolina State University RaleighNC27695 United States
Since human bodies are good reflectors of wireless signals, human activities can be recognized by monitoring changes in WiFi signals. However, existing WiFi-based human activity recognition systems do not build models... 详细信息
来源: 评论
Short-term wind power forecast for wind farm base on artificial neural network
Short-term wind power forecast for wind farm base on artific...
收藏 引用
2017 International Conference on computer technology, Electronics and Communication, ICCTEC 2017
作者: Wu, Feiyan Liao, Xianwen Guangxi Colleges and Universities Key Laboratory of Professional Software Technology Wuzhou University Wuzhou543002 China Beihai Campus of the Guilin University of Electronic Technology Department of Computer Science Beihai536000 China
Wind power forecasting is a critical method in minimizing the impact caused by integrated power grids. Firstly, the general steps of the establishment of neural network based load forecasting model for wind farm are p... 详细信息
来源: 评论
Amplified locality-sensitive hashing for privacy-preserving distributed service recommendation  10th
Amplified locality-sensitive hashing for privacy-preserving ...
收藏 引用
10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Qi, Lianyong Dou, Wanchun Zhang, Xuyun Yu, Shui School of Information Science and Engineering Qufu Normal University Rizhao276826 China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing210023 China Department of Electrical and Computer Engineering University of Auckland Auckland1023 New Zealand School of Information Technology Deakin University Melbourne3125 Australia
With the ever-increasing volume of services registered in various web communities, service recommendation techniques, e.g., Collaborative Filtering (i.e., CF) have provided a promising way to alleviate the heavy burde... 详细信息
来源: 评论
Data Collection Strategy in Low Duty Cycle Wireless Sensor Networks with Mobile Sink
收藏 引用
International Journal of Communications, Network and System sciences 2017年 第5期10卷 227-239页
作者: Xiaofeng Tang Li Xie State Key Laboratory of Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
The lifetime of wireless sensor networks can be improved by imposing low duty cycle, but doing so could not solve unbalanced energy consumption and will increase transmission latency. To avoid this, this paper gives a... 详细信息
来源: 评论
Predicting commercial activeness over urban big data
收藏 引用
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2017年 第3期1卷 1-20页
作者: Yang, Su Wang, Minjie Wang, Wenshan Sun, Yi Gao, Jun Zhang, Weishan Zhang, Jiulong Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University 825 Zhangheng Rd Shanghai201203 China Department of Software Engineering China University of Petroleum Qingdao266580 China School of Computer Science Xian University of Technology Xian710048 China
This study aims at revealing how commercial hotness of urban commercial districts (UCDs) is shaped by social contexts of surrounding areas so as to render predictive business planning. We define social contexts for a ... 详细信息
来源: 评论
Robust dense reconstruction by range merging based on confidence estimation
收藏 引用
science China(Information sciences) 2016年 第9期59卷 22-32页
作者: Yadang CHEN Chuanyan HAO Wen WU Enhua WU School of Computer and Software Nanjing University of Information Science and Technology Department of Computer and Information Science Faculty of Science and Technology University of Macau School of Education Science and Technology Nanjing University of Posts and Telecommunications State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences
Although the stereo matching problem has been extensively studied during the past decades, automatically computing a dense 3D reconstruction from several multiple views is still a difficult task owing to the problems ... 详细信息
来源: 评论