咨询与建议

限定检索结果

文献类型

  • 1,498 篇 会议
  • 1,223 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,728 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,919 篇 工学
    • 1,473 篇 计算机科学与技术...
    • 1,178 篇 软件工程
    • 321 篇 信息与通信工程
    • 281 篇 控制科学与工程
    • 156 篇 生物工程
    • 144 篇 电气工程
    • 137 篇 机械工程
    • 129 篇 电子科学与技术(可...
    • 95 篇 光学工程
    • 92 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 67 篇 动力工程及工程热...
    • 61 篇 化学工程与技术
    • 43 篇 建筑学
    • 42 篇 网络空间安全
    • 41 篇 安全科学与工程
    • 39 篇 交通运输工程
  • 893 篇 理学
    • 545 篇 数学
    • 189 篇 物理学
    • 173 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 73 篇 化学
  • 546 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 78 篇 医学
    • 68 篇 临床医学
    • 58 篇 基础医学(可授医学...
    • 41 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 43 篇 software
  • 41 篇 optimization
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 deep learning
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 cloud computing
  • 33 篇 web services
  • 32 篇 protocols

机构

  • 493 篇 state key labora...
  • 190 篇 department of co...
  • 154 篇 department of co...
  • 116 篇 national key lab...
  • 107 篇 state key labora...
  • 86 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 60 篇 school of softwa...
  • 59 篇 state key labora...
  • 52 篇 university of ch...
  • 51 篇 state key labora...
  • 46 篇 national key lab...
  • 38 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 college of compu...
  • 31 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,361 篇 英文
  • 300 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2728 条 记 录,以下是1401-1410 订阅
排序:
Variable version lovász local lemma: Beyond shearer's bound
arXiv
收藏 引用
arXiv 2017年
作者: He, Kun Li, Liang Liu, Xingwu Wang, Yuyi Xia, Mingji Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing China Department of Artificial Intelligence Ant Financial Services Group China Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing China Disco Group ETH Zürich Switzerland State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing China
A tight criterion under which the abstract version Lovász Local Lemma (abstract-LLL) holds was given by Shearer [43] decades ago. However, little is known about that of the variable version LLL (variable-LLL) whe... 详细信息
来源: 评论
OpenFunction: An extensible data plane abstraction protocol for platform-independent software-defined middleboxes
OpenFunction: An extensible data plane abstraction protocol ...
收藏 引用
International Conference on Network Protocols
作者: Chen Tian Alex X. Liu Ali Munir Jie Yang State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Engineering Michigan State University USA
We propose OpenFunction, an extensible data plane abstraction protocol for platform-independent software-defined middleboxes. The main challenge is how to abstract packet operations, flow states and event generations ... 详细信息
来源: 评论
Macroflow: A fine-grained networking abstraction for job completion time oriented scheduling in datacenters
Macroflow: A fine-grained networking abstraction for job com...
收藏 引用
International Conference on Network Protocols
作者: Chen Tian Junhua Yan Alex X. Liu Yizhou Tang Yuankun Zhong Zi Li State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Engineering Michigan State University USA
For a datacenter running a data-parallel analytic framework, minimizing job completion time (JCT) is crucial for application performance. The key observation is that JCT could be improved, if network scheduling can ex... 详细信息
来源: 评论
Test Case Prioritization Using Adaptive Random Sequence with Category-Partition-Based Distance
Test Case Prioritization Using Adaptive Random Sequence with...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security (QRS)
作者: Xiaofang Zhang Xiaoyuan Xie Tsong Yueh Chen School of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory of Software Engineering Wuhan University Wuhan China Department of Computer Science and Software Engineering Swinburne University of Technology Hawthorn Australia
Test case prioritization schedules test cases in a certain order aiming to improve the effectiveness of regression testing. Random sequence is a basic and simple prioritization technique, while Adaptive Random Sequenc... 详细信息
来源: 评论
Solving All-SAT Problems by P Systems
收藏 引用
Chinese Journal of Electronics 2015年 第4期24卷 744-749页
作者: GUO Ping JI Jinfang CHEN Haizhu LIU Ran College of Computer Science Chongqing University Chongqing Key Laboratory of Software Theory & Technology Department of Software Engineering Chongqing College of Electronic Engineering
The satisfiability problem(SAT) is a well known NP-complete problem. Obtaining All of the truth assignments of SAT is called All-SAT and it has numerous applications in artificial intelligence and computer theories. M... 详细信息
来源: 评论
Ranking in evolving complex networks
arXiv
收藏 引用
arXiv 2017年
作者: Liao, Hao Mariani, Manuel Sebastian Medo, Matúš Zhang, Yi-Cheng Zhou, Ming-Yang Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Physics University of Fribourg Fribourg1700 Switzerland Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Chengdu610054 China Department of Radiation Oncology Inselspital Bern University Hospital University of Bern Bern3010 Switzerland
Complex networks have emerged as a simple yet powerful framework to represent and analyze a wide range of complex systems. The problem of ranking the nodes and the edges in complex networks is critical for a broad ran... 详细信息
来源: 评论
Petri nets-based method to model and analyse the self-healing web service composition
收藏 引用
International Journal of High Performance Computing and Networking 2016年 第1-2期9卷 8-18页
作者: Chen, Liqiong Xiao, Lizhong Fan, Guisheng Zhang, Huanhuan Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Department of Computer Science and Engineering East China University of Science and Technology Shanghai China
Service composition is an important means for integrating the individual web services to create new value added systems that can satisfy complex requirements. Such applications are subject to unexpected failure owing ... 详细信息
来源: 评论
Analysis on the Content Features and Their Correlation of Web Pages for Spam Detection
收藏 引用
China Communications 2015年 第3期12卷 84-94页
作者: JI Hua ZHANG Huaxiang Department of computer science Shandong Normal University Shandong Provincial key laboratory for novel distributed computer software technology
In the global information era,people acquire more and more information from the Internet,but the quality of the search results is degraded strongly because of the presence of web *** spam is one of the serious problem... 详细信息
来源: 评论
Securing big data in the Cloud by protected mapping over multiple providers
Securing big data in the Cloud by protected mapping over mul...
收藏 引用
Digital Media Industry & Academic Forum (DMIAF)
作者: Chunming Rong Hongbing Cheng Martin Gilje Jaatun Department of Electronic Engineering & Computer Science University of Stavanger Norway State Key Laboratory for Novel Software Technology Nanjing University China
The Cloud is increasingly being used to store and process big data, and conventional security mechanisms using encryption are either not sufficiently efficient or not suited to the task of protecting big data in the C... 详细信息
来源: 评论
Secure Big Data Storage and Sharing Scheme for Cloud Tenants
收藏 引用
China Communications 2015年 第6期12卷 106-115页
作者: CHENG Hongbing RONG Chunming HWANG Kai WANG Weihong LI Yanyan College of Computer Science Zhejiang University of Technology State Key Laboratory for Novel Software Technology Nanjing University Department of Electronic Engineering & Computer Science University of Stavanger Electrical Engineering and Computer Science University of Southern California
The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in... 详细信息
来源: 评论