咨询与建议

限定检索结果

文献类型

  • 1,492 篇 会议
  • 1,200 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,455 篇 计算机科学与技术...
    • 1,167 篇 软件工程
    • 313 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 131 篇 电气工程
    • 124 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 66 篇 动力工程及工程热...
    • 59 篇 化学工程与技术
    • 41 篇 建筑学
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
  • 878 篇 理学
    • 541 篇 数学
    • 183 篇 物理学
    • 172 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 70 篇 化学
  • 540 篇 管理学
    • 335 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 42 篇 software
  • 40 篇 optimization
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 protocols
  • 33 篇 web services
  • 32 篇 deep learning
  • 32 篇 cloud computing

机构

  • 491 篇 state key labora...
  • 188 篇 department of co...
  • 151 篇 department of co...
  • 117 篇 national key lab...
  • 109 篇 state key labora...
  • 85 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 60 篇 state key labora...
  • 52 篇 state key labora...
  • 50 篇 university of ch...
  • 46 篇 national key lab...
  • 37 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 state key labora...
  • 30 篇 college of compu...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 qi lianyong

语言

  • 2,401 篇 英文
  • 231 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2699 条 记 录,以下是1361-1370 订阅
排序:
MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing
MEDAPs: secure multi-entities delegated authentication proto...
收藏 引用
作者: Zhang, Lei Wei, Lifei Huang, Dongmei Zhang, Kai Dong, Mianxiong Ota, Kaoru College of Information Technology Shanghai Ocean University Shanghai China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Computer Science and Software Engineering East China Normal University Shanghai China Department of Information and Electronic Engineering Muroran Institute of Technology Muroran Japan
Because the technology of mobile cloud computing has brought several benefits to information world, many applications in mobile devices based on cloud have emerged and boomed in the last years. According to the storag... 详细信息
来源: 评论
Biterm Pseudo Document Topic Model for Short Text
Biterm Pseudo Document Topic Model for Short Text
收藏 引用
International Conference on Tools with Artificial Intelligence
作者: Lan Jiang Hengyang Lu Ming Xu Chongjun Wang National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University
In the past few years, we have witnessed a rapid development of online social media, from which we can access various short texts. Understanding the topic patterns of these short text is significant. Traditional topic... 详细信息
来源: 评论
Image Segmentation Based on Prototypes Extraction and Merging of Clusters in Multiple Spaces
Image Segmentation Based on Prototypes Extraction and Mergin...
收藏 引用
International Joint Conference on Neural Networks
作者: Xiaofeng Shi Furao Shen Jinxi Zhao The National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University
Pixel clustering is one of the basic methods for image segmentation. A critical problem of pixel clustering is how to measure the similarity between colors of the pixels on human visual perception. In this paper, we p... 详细信息
来源: 评论
A Fast Manifold Learning Algorithm for Dimensionality Reduction
A Fast Manifold Learning Algorithm for Dimensionality Reduct...
收藏 引用
International Conference on Tools with Artificial Intelligence
作者: Yu Liang Furao Shen Jinxi Zhao Yi Yang National Key Laboratory for Novel Software Technology and Department of Computer Science and Technology Nanjing University
This paper proposes a new manifold learning method called "Soinnmanifold". Traditional manifold learning method needs a lot of computation and appropriate priori parameters. This has somewhat restricted the ... 详细信息
来源: 评论
Melton: a practical and precise memory leak detection tool for C programs
收藏 引用
Frontiers of computer science 2015年 第1期9卷 34-54页
作者: Zhenbo XU Jian ZHANG Zhongxing XU Department of Computer Science and Technology University of Science and Technology of China Anhui 230027 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China
Memory leaks are a common type of defect that is hard to detect manually. Existing memory leak detection tools suffer from lack of precise interprocedural analysis and path-sensitivity. To address this problem, we pre... 详细信息
来源: 评论
A Multi-Source Approach for Bug Triage
A Multi-Source Approach for Bug Triage
收藏 引用
作者: Liu, Jin Tian, Yiqiuzi Yu, Xiao Yang, Zhijiang Jia, Xiangyang Ma, Chuanxiang Xu, Zheng State Key Laboratory of Software Engineering School of Computer Science Wuhan University Wuhan Hubei China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin Guangxi China Department of Computer Science Western Michigan University KalamazooMI49008-5466 United States School of Computer Science and Information Engineering Hubei University Wuhan Hubei China Third Research Institute of Ministry of Public Security Shanghai201204 China
Bug triaging refers to the process of assigning a bug to the most appropriate fixer. As the scale and complexity of software increases, bug triaging becomes a tedious and time-consuming work. Existing bug triaging app... 详细信息
来源: 评论
Temporal coherent video decolorization using proximity optimization  16
Temporal coherent video decolorization using proximity optim...
收藏 引用
33rd computer Graphics International Conference, CGI 2016
作者: Tao, Yizhang Shen, Yiyi Sheng, Bin Li, Ping Wu, Enhua Shanghai Jiao Tong University 800 Dongchuan Road Shanghai China Department of Mathematics and Information Technology Hong Kong Institute of Education Hong Kong State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China
Video decolorization has wide application, such as in film industry. However, previous works on video decolorization focus on simply reusing the image decolorization method, which is time-consuming and may lose tempor... 详细信息
来源: 评论
Quantum state and process tomography via adaptive measurements
收藏 引用
science China(Physics,Mechanics & Astronomy) 2016年 第10期59卷 25-32页
作者: HengYan Wang WenQiang Zheng NengKun Yu KeRen Li DaWei Lu Tao Xin Carson Li ZhengFeng Ji David Kribs Bei Zeng XinHua Peng JiangFeng Du Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics University of Science and Technology of ChinaHefei 230026China Department of Applied Physics Zhejiang University of TechnologyHangzhou 310023China Institute for Quantum Computing University of WaterlooWaterloo N2L 3G1Canada 4Department of Mathematics&Statistics University of GuelphGuelph N1G 2W1Canada Centre for Quantum Computation&Intelligent Systems Faculty of Engineering and Information TechnologyUniversity of Technology SydneySydney NSW 2007Australia State Key Laboratory of Low-Dimensional Quantum Physics and Department of Physics Tsinghua UniversityBeijing 100084China Department of Physics University of GuelphGuelph N1G 2W1Canada State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China Canadian Institute for Advanced Research Toronto M5G 1Z8Canada
We investigate quantum state tomography(QST) for pure states and quantum process tomography(QPT) for unitary channels via adaptive measurements. For a quantum system with a d-dimensional Hilbert space, we first propos... 详细信息
来源: 评论
Detecting overlapping communities in networks via dominant label propagation
收藏 引用
Chinese Physics B 2015年 第1期24卷 551-559页
作者: 孙鹤立 黄健斌 田勇强 宋擒豹 刘怀亮 Department of Computer Science and Technology Xi’an Jiaotong University State Key Laboratory for Novel Software Technology Nanjing University School of Software Xidian University School of Economics and Management Xidian University
Community detection is an important methodology for understanding the intrinsic structure and function of a realworld network. In this paper, we propose an effective and efficient algorithm, called Dominant Label Prop... 详细信息
来源: 评论
Online stochastic linear optimization under one-bit feedback  33
Online stochastic linear optimization under one-bit feedback
收藏 引用
33rd International Conference on Machine Learning, ICML 2016
作者: Zhang, Lijun Yang, Tianbao Jin, Rong Xiao, Yichi Zhou, Zhi-Hua National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Department of Computer Science University of Iowa Iowa CityIA52242 United States Alibaba Group Seattle United States
In this paper, we study a special bandit setting of online stochastic linear optimization, where only one-bit of information is revealed to the learner at each round. This problem has found many applications including... 详细信息
来源: 评论