咨询与建议

限定检索结果

文献类型

  • 1,498 篇 会议
  • 1,223 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,728 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,919 篇 工学
    • 1,473 篇 计算机科学与技术...
    • 1,178 篇 软件工程
    • 321 篇 信息与通信工程
    • 281 篇 控制科学与工程
    • 156 篇 生物工程
    • 144 篇 电气工程
    • 137 篇 机械工程
    • 129 篇 电子科学与技术(可...
    • 95 篇 光学工程
    • 92 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 67 篇 动力工程及工程热...
    • 61 篇 化学工程与技术
    • 43 篇 建筑学
    • 42 篇 网络空间安全
    • 41 篇 安全科学与工程
    • 39 篇 交通运输工程
  • 893 篇 理学
    • 545 篇 数学
    • 189 篇 物理学
    • 173 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 73 篇 化学
  • 546 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 78 篇 医学
    • 68 篇 临床医学
    • 58 篇 基础医学(可授医学...
    • 41 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 43 篇 software
  • 41 篇 optimization
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 deep learning
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 cloud computing
  • 33 篇 web services
  • 32 篇 protocols

机构

  • 493 篇 state key labora...
  • 190 篇 department of co...
  • 154 篇 department of co...
  • 116 篇 national key lab...
  • 107 篇 state key labora...
  • 86 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 60 篇 school of softwa...
  • 59 篇 state key labora...
  • 52 篇 university of ch...
  • 51 篇 state key labora...
  • 46 篇 national key lab...
  • 38 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 college of compu...
  • 31 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,361 篇 英文
  • 300 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2728 条 记 录,以下是1381-1390 订阅
排序:
A survey on dependability improvement techniques for pervasive computing systems
收藏 引用
science China(Information sciences) 2015年 第5期58卷 19-32页
作者: YANG WenHua LIU YePang XU Chang CHEUNG S.C. State Key Laboratory for Novel Software Technology Nanjing University Department of Computer Science and Technology Nanjing University Department of Computer Science and Engineering The Hong Kong University of Science and Technology
The goal of this survey is to summarize the state-of-the-art research results and identify research challenges of developing and deploying dependable pervasive computing systems. We discuss the factors that affect the... 详细信息
来源: 评论
Combined Cloud: A Mixture of Voluntary Cloud and Reserved Instance Marketplace
收藏 引用
Journal of computer science & technology 2016年 第6期31卷 1110-1123页
作者: Wei Shen Wan-Chun Dou Fan Wu Shaojie Tang Qiang Ni State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210046 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Information Systems University of Texas at Dallas Texas TX 75080 U.S.A. School of Computing and Communications Lancaster University Lancaster LA1 4WA U.K.
Voluntary cloud is a new paradigm of cloud computing. It provides an alternative selection along with some well-provisioned clouds. However, for the uncertain time span that participants share their computing resource... 详细信息
来源: 评论
Generalized Regular Quadrilateral Mesh Generation based on Surface Foliation
收藏 引用
Procedia Engineering 2017年 203卷 336-348页
作者: Na Lei Xiaopeng Zheng Hang Si Zhongxuan Luo Xianfeng Gu DUT-RU International School of Information Science and Engineering Dalian University of Technology Dalian 116620 China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian 116620 China Beijing Advanced Innovation Center for Imaging Technology Capital Normal University Beijing 100048 China Weierstrass Institute for Applied Analysis and Stochastics Berlin 10117 Germany Computer Science Department Stony Brook University Stony Brook 11794 NY USA
This work introduces a novel algorithm for quad-mesh generation based on surface foliation theory. The algorithm is based on the equivalence among colorable quad-meshes, measure foliations and holomorphic differential... 详细信息
来源: 评论
Improved dynamic regret for non-degenerate functions  17
Improved dynamic regret for non-degenerate functions
收藏 引用
Proceedings of the 31st International Conference on Neural Information Processing Systems
作者: Lijun Zhang Tianbao Yangt Jinfeng Yi Rong Jin Zhi-Hua Zhou National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science The University of Iowa Iowa City AI Foundations Lab IBM Thomas J. Watson Research Center Yorktown Heights NY Alibaba Group Seattle
Recently, there has been a growing research interest in the analysis of dynamic regret, which measures the performance of an online learner against a sequence of local minimizers. By exploiting the strong convexity, p...
来源: 评论
Hidden space reconstruction inspires link prediction in complex networks
arXiv
收藏 引用
arXiv 2017年
作者: Liao, Hao Zhou, Mingyang Wei, Zong-Wen Mao, Rui Vidmer, Alexandre Zhang, Yi-Cheng Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 Department of Physics University of Fribourg Chemin du Musée 3 FribourgCH-1700 Department of Modern Physics University of Science and Technology of China Hefei230027 China
As a fundamental challenge in vast disciplines, link prediction aims to identify potential links in a network based on the incomplete observed information, which has broad applications ranging from uncovering missing ... 详细信息
来源: 评论
GB-RC4: Effective brute force attacks on RC4 algorithm using GPU  7
GB-RC4: Effective brute force attacks on RC4 algorithm using...
收藏 引用
7th International Green and Sustainable Computing Conference, IGSC 2016
作者: Xue, Pei Li, Tao Dong, Han Liu, Chunbo Ma, Wenjing Pei, Songwen College of Computer and Control Engineering Nankai University Tianjin300071 China Information Security Evaluation Center Civil Aviation University of China Tianjin300300 China Laboratory of Parallel Software and Computational Science State Key Laboratory of Computing Science Institute of Software CAS Beijing China Shanghai Key Lab of Modern Optical Systems Department of Computer Science and Engineering University of Shanghai for Science and Technology Shanghai200093 China
Encryption algorithms are applied to a variety of fields and the security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space search. RC4 algorithm has an extensive appl... 详细信息
来源: 评论
Density Based Self Organizing Incremental Neural Network For Data Stream Clustering
Density Based Self Organizing Incremental Neural Network For...
收藏 引用
International Joint Conference on Neural Networks
作者: Baile Xu Furao Shen Jinxi Zhao National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University
Clustering is an important technique widely used in many areas such as machine learning, pattern recognition, data analysis etc. Data stream clustering is a branch of clustering that draws much attention in recent yea... 详细信息
来源: 评论
Exploiting Correlation Subspace to Predict Heterogeneous Cross-Project Defects
Exploiting Correlation Subspace to Predict Heterogeneous Cro...
收藏 引用
作者: Cheng, Ming Wu, Guoqing Wan, Hongyan You, Guoan Yuan, Mengting Jiang, Min State Key Laboratory of Software Engineering School of Computer Wuhan University Wuhan Hubei China Department of Cognitive Science and Technology School of Information Science and Engineering Xiamen University Xiamen Fujian China Fujian Key Laboratory of Brain-Like Intelligent Systems School of Information Science and Engineering Xiamen University Xiamen Fujian China
Cross-project defect prediction trains a prediction model using historical data from source projects and applies the model to target projects. Most previous efforts assumed the cross-project data have the same metrics... 详细信息
来源: 评论
MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing
MEDAPs: secure multi-entities delegated authentication proto...
收藏 引用
作者: Zhang, Lei Wei, Lifei Huang, Dongmei Zhang, Kai Dong, Mianxiong Ota, Kaoru College of Information Technology Shanghai Ocean University Shanghai China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Computer Science and Software Engineering East China Normal University Shanghai China Department of Information and Electronic Engineering Muroran Institute of Technology Muroran Japan
Because the technology of mobile cloud computing has brought several benefits to information world, many applications in mobile devices based on cloud have emerged and boomed in the last years. According to the storag... 详细信息
来源: 评论
Biterm Pseudo Document Topic Model for Short Text
Biterm Pseudo Document Topic Model for Short Text
收藏 引用
International Conference on Tools with Artificial Intelligence
作者: Lan Jiang Hengyang Lu Ming Xu Chongjun Wang National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University
In the past few years, we have witnessed a rapid development of online social media, from which we can access various short texts. Understanding the topic patterns of these short text is significant. Traditional topic... 详细信息
来源: 评论