咨询与建议

限定检索结果

文献类型

  • 1,492 篇 会议
  • 1,200 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,455 篇 计算机科学与技术...
    • 1,167 篇 软件工程
    • 313 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 131 篇 电气工程
    • 124 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 66 篇 动力工程及工程热...
    • 59 篇 化学工程与技术
    • 41 篇 建筑学
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
  • 878 篇 理学
    • 541 篇 数学
    • 183 篇 物理学
    • 172 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 70 篇 化学
  • 540 篇 管理学
    • 335 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 42 篇 software
  • 40 篇 optimization
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 protocols
  • 33 篇 web services
  • 32 篇 deep learning
  • 32 篇 cloud computing

机构

  • 491 篇 state key labora...
  • 188 篇 department of co...
  • 151 篇 department of co...
  • 117 篇 national key lab...
  • 109 篇 state key labora...
  • 85 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 60 篇 state key labora...
  • 52 篇 state key labora...
  • 50 篇 university of ch...
  • 46 篇 national key lab...
  • 37 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 state key labora...
  • 30 篇 college of compu...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 qi lianyong

语言

  • 2,401 篇 英文
  • 231 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2699 条 记 录,以下是1851-1860 订阅
排序:
Static Rate-Optimal Scheduling of Multirate DSP Algorithms via Retiming and Unfolding
Static Rate-Optimal Scheduling of Multirate DSP Algorithms v...
收藏 引用
IEEE Symposium on Real-Time and Embedded technology and Applications
作者: Xue-Yang Zhu Marc Geilen Twan Basten Sander Stuijk State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Department of Electrical Engineering Eindhovan University of Technology Eindhoven Netherlands
This paper presents an exact method and a heuristic method for static rate-optimal multiprocessor scheduling of real-time multi rate DSP algorithms represented by synchronous data flow graphs (SDFGs). Through explorin... 详细信息
来源: 评论
Bacterial foraging with PSO algorithm and its application on attribute reduction
收藏 引用
International Journal of Innovative Computing and Applications 2012年 第2期4卷 100-108页
作者: Zhao, Qingshan Meng, Guoyan Wu, Zhijian Department of Computer Science and Technology Xinzhou Teachers University XinZhou Shanxi Province 034000 China State Key Laboratory of Software Engineering Wuhan University Wuhan Hubei Province 430072 China
Attribute reduction is the important part in rough set theory. Enlightened by bacterial foraging processing, this paper combines the idea of bacterial foraging algorithm with particle swarm optimisation and proposes a... 详细信息
来源: 评论
Multiple clustered instance learning for histopathology cancer image classification, segmentation and clustering
Multiple clustered instance learning for histopathology canc...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Yan Xu Jun-Yan Zhu Eric Chang Zhuowen Tu State Key Laboratory of Software Development Environment Key Laboratory of Biomechanics and Mechanobiology of Ministry of Education Beihang University China Microsoft Research Asia China Department of Computer Science and Technology Tsinghua University China Laboratory of Neuro Imaging and Department of Computer Science UCLA USA
Cancer tissues in histopathology images exhibit abnormal patterns; it is of great clinical importance to label a histopathology image as having cancerous regions or not and perform the corresponding image segmentation... 详细信息
来源: 评论
Wielding Statistical Fault Localization Statistically
Wielding Statistical Fault Localization Statistically
收藏 引用
IEEE International Conference on software Reliability Engineering Workshops (ISSRE Wksp)
作者: Yunqian Zhang Lin Chen Bo Jiang Zhenyu Zhang Chinese Academy of Sciences Institute of Software Beijing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science Beihang University Beijing China
Program debugging is a laborious but necessary phase of software development. It generally consists of fault localization, bug fix, and regression testing. Statistical software fault localization automates the manual ... 详细信息
来源: 评论
Research of a resource to influence on the software aging and rejuvenation cycle
Research of a resource to influence on the software aging an...
收藏 引用
2012 7th IEEE Conference on Industrial Electronics and Applications, ICIEA 2012
作者: Yang, Tianshe Wu, Qinge Bao, Junpeng State Key Laboratory of Astronautic Dynamics Xi'an Satellite Control Center Xi'an China College of Electric and Information Engineering Zhengzhou University of Light Industry Zhengzhou China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China
This paper studies the aging amount of damnification and the cost of rejuvenation, in order to effectively reduce the average downtime costs of systems at the time of software aging existence, to increase the availabi... 详细信息
来源: 评论
Assessing physical network vulnerability under random line-segment failure model
Assessing physical network vulnerability under random line-s...
收藏 引用
IEEE Workshop on High Performance Switching and Routing
作者: Xiaoliang Wang Xiaohong Jiang Achille Pattavina Sanglu Lu State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China Future University Hokkaido Japan Department of Electronics and Information Politecnico di Milano Milano Italy
The communication network is now one of the critical infrastructures in our society. However, the current communication networks are facing more and more large-scale region failure threats, such as natural disasters (... 详细信息
来源: 评论
Asymptotic throughput for large-scale wireless networks with general node density
收藏 引用
Wireless Networks 2012年 第5期19卷 559-575页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Yunhao Liu Department of Computer Science Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China The Tsinghua National Laboratory for Information Science and Technology (TNLIST) Department of Computer Science and Engineering Tongji University Shanghai China The Department of Computer Science Illinois Institute of Technology Chicago USA The TNLIST and School of Software Tsinghua University Beijing China CSE The Hong Kong University of Science and Technology Kowloon Hong Kong
We study the asymptotic throughput for a large-scale wireless ad hoc network consisting of n nodes under the generalized physical model. We directly compute the throughput of multicast sessions to unify the unicast an...
来源: 评论
Ant colony optimization for enhancing scheduling reliability in wireless sensor networks
Ant colony optimization for enhancing scheduling reliability...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Xiao-Min Hu Jun Zhang Department of Computer Science Key Laboratory of Intelligent Sensor Networks Ministry of Education Key Laboratory of Software Technology Education Department of Guangdong Province Sun Yat-sen University China
In the application of wireless sensor networks (WSNs), energy efficiency is always an important topic for extending the network lifetime. Scheduling the operation modes of sensors can reduce the energy wasted by redun... 详细信息
来源: 评论
Guided mutation operation based on search degree and fitness estimation
Guided mutation operation based on search degree and fitness...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Liang Yin Jun Zhang Department of Computer Science Key Laboratory of Machine Intelligence and Sensor Network Ministry of Education Key Laboratory of Software Technology Education Department of Guangdong Sun Yat-sen University China
Mutation is a fundamental operation in genetic algorithm (GA) for it has a significant impact on global search ability and convergence rate. Traditional mutation operation of GA changes chromosomes randomly (or blindl... 详细信息
来源: 评论
Efficient Median Estimation for RFID Systems
Efficient Median Estimation for RFID Systems
收藏 引用
International Conference on Computing, Measurement, Control and Sensor Network (CMCSN)
作者: Huda El Hag Mustafa Xiaojun Zhu Qun Li Department of Computer Science College of William and Mary Williamsburg VA USA Department of Computer Science University Of Khartoum Sudan State Key Laboratory for Novel Software Technology Nanjing University P. R. China
Radio frequency identification (RFID) tags are used in a lot of applications such as production line and inventory management. Sensors are also a widely adopted wireless technology. This large scale deployment of both... 详细信息
来源: 评论