咨询与建议

限定检索结果

文献类型

  • 1,498 篇 会议
  • 1,223 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,728 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,919 篇 工学
    • 1,473 篇 计算机科学与技术...
    • 1,178 篇 软件工程
    • 321 篇 信息与通信工程
    • 281 篇 控制科学与工程
    • 156 篇 生物工程
    • 144 篇 电气工程
    • 137 篇 机械工程
    • 129 篇 电子科学与技术(可...
    • 95 篇 光学工程
    • 92 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 67 篇 动力工程及工程热...
    • 61 篇 化学工程与技术
    • 43 篇 建筑学
    • 42 篇 网络空间安全
    • 41 篇 安全科学与工程
    • 39 篇 交通运输工程
  • 893 篇 理学
    • 545 篇 数学
    • 189 篇 物理学
    • 173 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 73 篇 化学
  • 546 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 78 篇 医学
    • 68 篇 临床医学
    • 58 篇 基础医学(可授医学...
    • 41 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 43 篇 software
  • 41 篇 optimization
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 deep learning
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 cloud computing
  • 33 篇 web services
  • 32 篇 protocols

机构

  • 493 篇 state key labora...
  • 190 篇 department of co...
  • 154 篇 department of co...
  • 116 篇 national key lab...
  • 107 篇 state key labora...
  • 86 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 60 篇 school of softwa...
  • 59 篇 state key labora...
  • 52 篇 university of ch...
  • 51 篇 state key labora...
  • 46 篇 national key lab...
  • 38 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 college of compu...
  • 31 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,361 篇 英文
  • 300 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2728 条 记 录,以下是1351-1360 订阅
排序:
FCA-based -iceberg core decomposition in graphs
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2017年 第2期15卷 1423-1428页
作者: Hao, Fei Xinchang, Khamphaphone Park, Doo-Soon Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an China School of Computer Science Shaanxi Normal University Xi’an China Department of Computer Science and Engineering Soonchunhyang University Asan South Korea Department of Computer Software Engineering Soonchunhyang University Asan South Korea
Complex networking analysis is a powerful technique for understanding both complex networks and big graphs in ubiquitous computing. Particularly, there are several novel metrics, such as k-clique and k-core are propos...
来源: 评论
Robust visual tracking using multi-frame multi-feature joint modeling
arXiv
收藏 引用
arXiv 2018年
作者: Zhang, Peng Yu, Shujian Xu, Jiamiao You, Xinge Jiang, Xiubao Jing, Xiao-Yuan Tao, Dacheng School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan Hubei China Department of Electrical and Computer Engineering University of Florida GainesvilleFL32611 United States State Key Laboratory of Software Engineering School of Computer Wuhan University Wuhan430072 China School of Automation Nanjing University of Posts and Telecommunications Nanjing210023 China UBTech Sydney Artificial Intelligence Institute and the School of Information Technologies Faculty of Engineering and Information Technologies at the University of Sydney DarlingtonNSW2008 Australia
It remains a huge challenge to design effective and efficient trackers under complex scenarios, including occlusions, illumination changes and pose variations. To cope with this problem, a promising solution is to int... 详细信息
来源: 评论
High-confidence software evolution
收藏 引用
science China(Information sciences) 2016年 第7期59卷 94-112页
作者: Qing GAO Jun LI Yingfei XIONG Dan HAO Xusheng XIAO Kunal TANEJA Lu ZHANG Tao XIE Key Laboratory of High Confidence Software Technologies Mo E Institute of Software School of Electronics Engineering and Computer Science Peking University NEC Laboratories America Inc.  3. Accenture Technology Labs  4. Department of Computer Science University of Illinois at Urbana-Champaign
software continues to evolve due to changing requirements, platforms and other environmental pressures. Modern software is dependent on frameworks, and if the frameworks evolve, the software has to evolve as well. On ... 详细信息
来源: 评论
Bayesian multi-hypothesis Wyner-Ziv video coding
收藏 引用
Journal of Information Hiding and Multimedia Signal Processing 2017年 第2期8卷 478-485页
作者: Meng, Li Li Zong, Jing Xiu Sun, Gui Na Cheng, Jie Zhang, Jia Zhao, Meng Chen Department of Information Science and Engineering Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University No.88 Wenhua East Road Jinan250014 China
The performance of distributed video coding (DVC) relies heavily on the quality of the side information (SI), and better performance can be expected if multiple SIs are employed. In this paper, we consider the scenari... 详细信息
来源: 评论
Users’ perceived control, trust and expectation on privacy settings of smartphone  9th
Users’ perceived control, trust and expectation on privacy ...
收藏 引用
9th International Symposium on Cyberspace Safety and Security, CSS 2017
作者: Zhou, Yun Raake, Alexander Xu, Tao Zhang, Xuyun School of Education Shaanxi Normal University Xi’anShaanxi710062 China Audiovisual Technology Group Institute for Media Technology University of Technology Ilmenau Ilmenau98693 Germany School of Software and Microelectronics Northwestern Polytechnical University Xi’anShaanxi710072 China State Key Laboratory for Manufacturing Systems Engineering Xi’an Jiaotong University Xi’anShaanxi710054 China Department of Electrical and Computer Engineering University of Auckland Auckland1010 New Zealand
A common issue is that a large number of authorized apps use important and sensitive personal information without arousing users’ full awareness. Existing schemes for privacy protection on smartphones try to provide ... 详细信息
来源: 评论
Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks
收藏 引用
Applied Intelligence 2018年 第7期48卷 1891-1891页
作者: Shujuan Ji Haiyan Ma Yongquan Liang Hofung Leung Chunjin Zhang Shandong Provincial Key Laboratory of Wisdom Mine Information Technology Shandong University of Science and Technology Qingdao China Shandong Provincial Key Laboratory of Novel Distributed Computer Software Technology Shandong Normal University Jinan China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China Center of Network Shandong University of Science and Technology Qingdao China
The article A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks, written by Shujuan Ji, Haiyan Ma, Yongquan Liang, Hofung Leung and Chunjin Zhang, was originally p...
来源: 评论
A new chaotic feature for EEG classification based seizure diagnosis
A new chaotic feature for EEG classification based seizure d...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Su Yang Anqin Zhang Jiulong Zhang Weishan Zhang Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University China School of Computer Science Xi'an University of Technology China Department of Software Engineering China University of Petroleum Qingdao China
Seeking effective measures to characterize the chaotic patterns of EEG signals for seizure diagnosis is a long-term endeavor in the literature. We propose to count the number of zero-crossing (ZC) points on Poincare s... 详细信息
来源: 评论
ROSF: Leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets
arXiv
收藏 引用
arXiv 2017年
作者: Jiang, He Nie, Liming Sun, Zeyi Ren, Zhilei Kong, Weiqiang Zhang, Tao Luo, Xiapu School of Software Dalian University of Technology Dalian China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian China State Key Laboratory of Software Engineering Wuhan University Wuhan China Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian China School of Computer Science & Technology Nanjing University of Posts and Telecommunications Nanjing China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
—when implementing unfamiliar programming tasks, developers commonly search code examples and learn usage patterns of APIs from the code examples or reuse them by copy-pasting and modifying. For providing high-qualit... 详细信息
来源: 评论
Automatic GUI Test by Using SIFT Matching
收藏 引用
China Communications 2016年 第9期13卷 227-236页
作者: Xiaoxin Fang Bin Sheng Ping Li Dan Wu Enhua Wu Department of Computer Science and Engineering Shanghai Jiao Tong UniversityShanghai 200240China The State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China Department of Mathematics and Information Technology The Education University of Hong KongHong KongChina China Southern Power Grid GuangzhouChina Faculty of Science and Technology University of MacaoMacaoChina
In software development process, the last step is usually the Graphic User In- terface(GUI) test, which is part of the final user experience (UE) test. Traditionally, there exist some GUI test tools in the market,... 详细信息
来源: 评论
A utility-driven scheduling algorithms in cloud computing
收藏 引用
Revista Tecnica de la Facultad de Ingenieria Universidad del Zulia 2016年 第2期39卷 282-287页
作者: Chen, Tao School of Management Science and Engineering Anhui University of Finance and Economics Bengbu Anhui233030 China Department of Computer Science and Technology Tongji University Shanghai201804 China State Key Laboratoryfor Novel Software Technology Nanjing University China
Cloud computing is a successful business model and utility paradigm which enables people to use computing power via Internet at anytime anywhere. How to schedule a task to cloud computing is an important issue. In clo... 详细信息
来源: 评论