咨询与建议

限定检索结果

文献类型

  • 1,498 篇 会议
  • 1,223 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,728 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,919 篇 工学
    • 1,473 篇 计算机科学与技术...
    • 1,178 篇 软件工程
    • 321 篇 信息与通信工程
    • 281 篇 控制科学与工程
    • 156 篇 生物工程
    • 144 篇 电气工程
    • 137 篇 机械工程
    • 129 篇 电子科学与技术(可...
    • 95 篇 光学工程
    • 92 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 67 篇 动力工程及工程热...
    • 61 篇 化学工程与技术
    • 43 篇 建筑学
    • 42 篇 网络空间安全
    • 41 篇 安全科学与工程
    • 39 篇 交通运输工程
  • 893 篇 理学
    • 545 篇 数学
    • 189 篇 物理学
    • 173 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 73 篇 化学
  • 546 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 78 篇 医学
    • 68 篇 临床医学
    • 58 篇 基础医学(可授医学...
    • 41 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 43 篇 software
  • 41 篇 optimization
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 deep learning
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 cloud computing
  • 33 篇 web services
  • 32 篇 protocols

机构

  • 493 篇 state key labora...
  • 190 篇 department of co...
  • 154 篇 department of co...
  • 116 篇 national key lab...
  • 107 篇 state key labora...
  • 86 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 60 篇 school of softwa...
  • 59 篇 state key labora...
  • 52 篇 university of ch...
  • 51 篇 state key labora...
  • 46 篇 national key lab...
  • 38 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 college of compu...
  • 31 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,361 篇 英文
  • 300 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2728 条 记 录,以下是1841-1850 订阅
排序:
Test effectiveness index: Integrating product metrics with process metrics
Test effectiveness index: Integrating product metrics with p...
收藏 引用
IEEE International Conference on Cyber technology in Automation, Control, and Intelligent Systems
作者: Yan Zhang Xuying Zhao Xiaokun Zhang Tian Zhang Department of Computer Science and Technology Beijing Electronic Science and Technology Institute Beijing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Defect measurement is an important method in the improvement of software quality. Recent approaches of defect measurement are inappropriate to small software organizations by reason of their intricacy. This paper give... 详细信息
来源: 评论
Packet Matching Algorithm Based on Improving Differential Evolution
收藏 引用
Wuhan University Journal of Natural sciences 2012年 第5期17卷 447-453页
作者: WANG Zelin WU Zhijian ZHANG Buzhong State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 Hubei China School of Computer Science and Technology Nantong University Nantong 226000 Jiangsu China School of Computer and Information Anqing Teachers College Anqing 246011 Anhui China
The performance of network equipments, such as firewall, router, etc., is decided by the efficiency of patch matching. It is difficult to adapt the speed of packet matching with packets linear forwarding by traditiona... 详细信息
来源: 评论
The dimension of the space of smooth splines of degree 8 on tetrahedral partitions
The dimension of the space of smooth splines of degree 8 on ...
收藏 引用
13th International Conference on Approximation Theory, ICAT 2010
作者: Shi, Xiquan Kamau, Ben Liu, Fengshan Yin, Baocai Department of Mathematical Sciences Delaware State University Dover DE 19901 United States Mathematics Department Columbus State University Columbus GA 31907 United States Beijing Key Laboratory of Multimedia and Intelligent Software College of Computer Science and Technology Beijing University of Technology Beijing 100022 China
Let Ω R3be a connected polyhedral domain that is allowed to con-tain polyhedral holes and Δ be a tetrahedral partition of Ω. Given 0 ≤ r ≤ d, we define. the spline space of degree d and smoothness r, where Pd is ...
来源: 评论
Building decision trees for the multi-class imbalance problem
Building decision trees for the multi-class imbalance proble...
收藏 引用
16th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2012
作者: Hoens, T. Ryan Qian, Qi Chawla, Nitesh V. Zhou, Zhi-Hua Department of Computer Science and Engineering University of Notre Dame Notre Dame IN 46556 United States National Key Laboratory for Novel Software Technology Nanjing University Nanjing 210046 China
Learning in imbalanced datasets is a pervasive problem prevalent in a wide variety of real-world applications. In imbalanced datasets, the class of interest is generally a small fraction of the total instances, but mi... 详细信息
来源: 评论
A novel identity-based key management and encryption scheme for distributed system
A novel identity-based key management and encryption scheme ...
收藏 引用
4th International Symposium on Cyberspace Safety and Security, CSS 2012
作者: Yang, Geng Zhou, Qiang Xu, Xiaolong Xu, Jian Rong, Chunming College of Computer Nanjing University of Posts and Telecommunications Nanjing China College of Computer and Information Engineering Chuzhou University Chuzhou China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science University of Stavanger Stavanger Norway
The paper proposes a Distributed Identity-Based Encryption (DIBE) scheme. The DIBE scheme extends the traditional IBE to a distributed system which consists of some homogenous or heterogeneous subsystems. Each subsyst... 详细信息
来源: 评论
Formation learning algorithms for mobile agents subject to 2-D dynamically changing topologies
Formation learning algorithms for mobile agents subject to 2...
收藏 引用
American Control Conference
作者: Deyuan Meng Yingmin Jia Junping Du Jun Zhang Wenling Li Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 P. R. China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 P. R. China School of Electronic and Information Engineering Beihang University (BUAA) Beijing 100191 P. R. China
In this paper, we consider a two-dimensional (2-D) formation problem for multi-agent systems subject to switching topologies that dynamically change along both a finite time axis and an infinite iteration axis. We pre... 详细信息
来源: 评论
Convex and scalable weakly labeled SVMs
收藏 引用
The Journal of Machine Learning Research 2013年 第1期14卷
作者: Kevin Murphy Bernhard Schölkopf Yu-Feng Li Ivor W. Tsang James T. Kwok Zhi-Hua Zhou Google MPI for Intelligent Systems National Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer Engineering Nanyang Technological University Singapore Department of Computer Science and Engineering Hong Kong University of Science & Technology Hong Kong
In this paper, we study the problem of learning from weakly labeled data, where labels of the training examples are incomplete. This includes, for example, (i) semi-supervised learning where labels are partially known... 详细信息
来源: 评论
A Sufficient and Necessary Condition for the Convergence of B(o)hm-Like Trees
A Sufficient and Necessary Condition for the Convergence of ...
收藏 引用
2012年全国理论计算机科学学术年会(NCTCS2012)
作者: Haixing Hu Nan Wu Fangmin Song State Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing University Nanjing 210093 China
this paper,we introduce the definitions of B(o)hm-like trees and B(o)hm-trees,and give a sufficient and necessary condition for the convergence of B(o)hm-like *** is shown that a B(o)hm-like tree is a B(o)hm-tree of a...
来源: 评论
Active Learning with Transfer Learning  12
Active Learning with Transfer Learning
收藏 引用
Student Research Workshop
作者: Chunyong Luo Yangsheng Ji Xinyu Dai Jiajun Chen State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210046 China
In sentiment classification, unlabeled user reviews are often free to collect for new products, while sentiment labels are rare. In this case, active learning is often applied to build a high-quality classifier with a... 详细信息
来源: 评论
Low power aging-aware register file design by duty cycle balancing  12
Low power aging-aware register file design by duty cycle bal...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Shuai Wang Tao Jin Chuanlei Zheng Guangshan Duan State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu China
The degradation of CMOS devices over the lifetime can cause the severe threat to the system performance and reliability at deep submicron semiconductor technologies. The negative bias temperature instability (NBTI) is... 详细信息
来源: 评论