咨询与建议

限定检索结果

文献类型

  • 1,498 篇 会议
  • 1,223 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,728 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,919 篇 工学
    • 1,473 篇 计算机科学与技术...
    • 1,178 篇 软件工程
    • 321 篇 信息与通信工程
    • 281 篇 控制科学与工程
    • 156 篇 生物工程
    • 144 篇 电气工程
    • 137 篇 机械工程
    • 129 篇 电子科学与技术(可...
    • 95 篇 光学工程
    • 92 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 67 篇 动力工程及工程热...
    • 61 篇 化学工程与技术
    • 43 篇 建筑学
    • 42 篇 网络空间安全
    • 41 篇 安全科学与工程
    • 39 篇 交通运输工程
  • 893 篇 理学
    • 545 篇 数学
    • 189 篇 物理学
    • 173 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 73 篇 化学
  • 546 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 78 篇 医学
    • 68 篇 临床医学
    • 58 篇 基础医学(可授医学...
    • 41 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 43 篇 software
  • 41 篇 optimization
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 deep learning
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 cloud computing
  • 33 篇 web services
  • 32 篇 protocols

机构

  • 493 篇 state key labora...
  • 190 篇 department of co...
  • 154 篇 department of co...
  • 116 篇 national key lab...
  • 107 篇 state key labora...
  • 86 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 60 篇 school of softwa...
  • 59 篇 state key labora...
  • 52 篇 university of ch...
  • 51 篇 state key labora...
  • 46 篇 national key lab...
  • 38 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 college of compu...
  • 31 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,361 篇 英文
  • 300 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2728 条 记 录,以下是1431-1440 订阅
排序:
Ontology-based metadata matching for emergency decision-making using MapReduce
收藏 引用
International Journal of Metadata, Semantics and Ontologies 2015年 第2期10卷 75-83页
作者: Zhu, Li Hu, Wei School of Economics and Management Nanjing University of Information Science and Technology Nanjing Jiangsu210044 China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu210023 China
Ontology matching techniques can help improve the accuracy of emergency decisionmaking on heterogeneous data. In this paper, we propose a practical approach to leverage ontology and MapReduce for matching metadata of ... 详细信息
来源: 评论
Detection, classification and characterization of android malware using API data dependency  11th
Detection, classification and characterization of android ma...
收藏 引用
11th International Conference Security and Privacy in Communication Networks, SecureComm 2015
作者: Li, Yongfeng Shen, Tong Sun, Xin Pan, Xuerui Mao, Bing State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
With the popularity of Android devices, more and more Android malware are manufactured every year. How to filter out malicious app is a serious problem for app markets. In this paper, we propose DroidADDMiner, an effi... 详细信息
来源: 评论
Parallel surface reconstruction on GPU  15
Parallel surface reconstruction on GPU
收藏 引用
7th International Conference on Internet Multimedia Computing and Service, ICIMCS 2015
作者: Gao, Heng Tang, Jie Wu, Gangshan State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Marching Cubes is the most frequently used method to reconstruct isosurface from a point cloud. However, the point clouds are getting denser and denser, thus the efficiency of Marching cubes method has become an obsta... 详细信息
来源: 评论
Top-k queries for multi-category RFID systems
Top-k queries for multi-category RFID systems
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Xiulong Liu Keqiu Li Jie Wu Alex X. Liu Xin Xie Chunsheng Zhu Weilian Xue School of Computer Science and Technology Dalian University of Technology China Department of Computer and Information Sciences Temple University USA State Key Laboratory for Novel Software Technology Nanjing University China Department of Electrical and Computer Engineering The University of British Columbia Canada School of Management Liaoning Normal University China
This paper studies the practically important problem of top-k queries, which is to find the top k largest categories and their corresponding sizes. In this paper, we propose a Top-k Query (TKQ) protocol and a techniqu... 详细信息
来源: 评论
A study on key technologies of unmanned driving
收藏 引用
CAAI Transactions on Intelligence technology 2016年 第1期1卷 4-13页
作者: Xinyu Zhang Hongbo Gao Mu Guo Guopeng Li Yuchao Liu Deyi Li Department of Computer Science and Technology Tsinghua University Beijing 100084 China Information Technology Center Tsinghua University Beijing 100084 China State Key Laboratory of Software Development Environment Beihang University Beijing 100191 China The Institute of Electronic System Engineering Beijing 100039 China
Although the development of machine intelligence is far from simulating all the cognitive competence of our brains, still it is absolutely possible to peel the driving activity from people's cognitive activities and ... 详细信息
来源: 评论
Constructing Edge-Colored Graph for Heterogeneous Networks
收藏 引用
Journal of computer science & technology 2015年 第5期30卷 1154-1160页
作者: 侯睿 武继刚 陈亚文 张海波 隋秀峰 School of Computer Science and Software Engineering Tianjin Polytechnic University Tianjin 300387 China State Key Laboratory of Computer Architecture~ Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Department of Computer Science University of Otago Dunedin 9054 New Zealand
In order to build a fault-tolerant network, heterogeneous facilities are arranged in the network to prevent homogeneous faults from causing serious damage. This paper uses edge-colored graph to investigate the feature... 详细信息
来源: 评论
A P system for degree-constrained spanning tree
收藏 引用
Journal of Computational and Theoretical Nanoscience 2016年 第6期13卷 3918-3925页
作者: Guo, Ping Zhong, Yuwen Chen, Haizhu Zhou, Mingqiang College of Computer Science Chongqing University Chongqing400030 China Department of Software Engineering Chongqing College of Electronic Engineering Chongqing401331 China Chongqing Key Laboratory of Software Theory and Technology Chongqing400044 China
Degree-constrained spanning tree problem (DCSTP for short) is a kind of classical NP complete problems, and it is widely used in the fields of distribution network planning, mobile services etc. Finding all spanning t... 详细信息
来源: 评论
A system-of-systems architecture-driven modeling method for combat system effectiveness simulation  2
A system-of-systems architecture-driven modeling method for ...
收藏 引用
2nd Annual IEEE International Symposium on Systems Engineering, ISSE 2016
作者: Li, Xiaobo Wang, Weiping Shu, Zhe Zhu, Ning He, Hua Liao, Tianjun College of Information Systems and Management National University of Defense Technology Changsha Hunan410073 China Department of Mathematics and Computer Science University of Antwerp Antwerp2020 Belgium State Key Laboratory of Complex System Simulation Beijing Institute of Systems Engineering Beijing China
Under the background of system-of-systems (SoS) counterwork, it is more apparent that the simulation modeling of the equipment should be domain-specific, formal, automatic and composable. Current equipment effectivene... 详细信息
来源: 评论
Tracking slowly moving clairvoyant: Optimal dynamic regret of online learning with true and noisy gradient  33
Tracking slowly moving clairvoyant: Optimal dynamic regret o...
收藏 引用
33rd International Conference on Machine Learning, ICML 2016
作者: Yang, Tianbao Zhang, Lijun Jin, Rong Yi, Jinfeng Department of Computer Science University of Iowa Iowa CityIA52242 United States National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Institute of Data Science and Technologies Alibaba Group Seattle United States IBM Thomas J. Watson Research Center Yorktown HeightsNY10598 United States
This work focuses on dynamic regret of online convex optimization that compares the performance of online learning to a clairvoyant who knows the sequence of loss functions in advance and hence selects the minimizer o... 详细信息
来源: 评论
A sample weighted sparse representation approach to image classification
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第11期7卷 2283-2290页
作者: Wang, Yongxin Zhang, Huaxiang Department of Computer Science Shandong Normal University China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology No. 88 Wenhua East Road Lixia District Jinan250014 China
Sparse representation for classification (SRC) has achieved a big success for face recognition. It utilizes a sparsely linear combination of the training samples to construct a test sample, and classifies the test sam... 详细信息
来源: 评论