咨询与建议

限定检索结果

文献类型

  • 1,498 篇 会议
  • 1,223 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,728 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,919 篇 工学
    • 1,473 篇 计算机科学与技术...
    • 1,178 篇 软件工程
    • 321 篇 信息与通信工程
    • 281 篇 控制科学与工程
    • 156 篇 生物工程
    • 144 篇 电气工程
    • 137 篇 机械工程
    • 129 篇 电子科学与技术(可...
    • 95 篇 光学工程
    • 92 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 67 篇 动力工程及工程热...
    • 61 篇 化学工程与技术
    • 43 篇 建筑学
    • 42 篇 网络空间安全
    • 41 篇 安全科学与工程
    • 39 篇 交通运输工程
  • 893 篇 理学
    • 545 篇 数学
    • 189 篇 物理学
    • 173 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 73 篇 化学
  • 546 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 78 篇 医学
    • 68 篇 临床医学
    • 58 篇 基础医学(可授医学...
    • 41 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 43 篇 software
  • 41 篇 optimization
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 deep learning
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 cloud computing
  • 33 篇 web services
  • 32 篇 protocols

机构

  • 493 篇 state key labora...
  • 190 篇 department of co...
  • 154 篇 department of co...
  • 116 篇 national key lab...
  • 107 篇 state key labora...
  • 86 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 60 篇 school of softwa...
  • 59 篇 state key labora...
  • 52 篇 university of ch...
  • 51 篇 state key labora...
  • 46 篇 national key lab...
  • 38 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 college of compu...
  • 31 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,361 篇 英文
  • 300 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2728 条 记 录,以下是1871-1880 订阅
排序:
Self-Adaptive Cloud Pricing Strategies with Markov Prediction and Data Mining Method
Self-Adaptive Cloud Pricing Strategies with Markov Predictio...
收藏 引用
International Conference on Cloud and Service Computing (CSC)
作者: Huazheng Qin Xing Wu Ji Hou Hanyu Wang Wu Zhang Wanchun Dou School of Computer Engineering and Science Shanghai University Shanghai China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
Cloud computing as a new IT technology is burgeoning and an increasing number of providers are offering various web services related to cloud computing. Meanwhile, the demands of different kinds of users are also risi... 详细信息
来源: 评论
A novel segmentation method for convex lesions based on dynamic programming with local intra-class variance  12
A novel segmentation method for convex lesions based on dyna...
收藏 引用
27th Annual ACM Symposium on Applied Computing, SAC 2012
作者: Yu, Mali Huang, Qiliang Jin, Renchao Song, Enmin Liu, Hong Hung, Chih-Cheng School of Computer Science Huazhong University of Science and Technology Wuhan China Key Laboratory of Education Ministry for Image Processing and Intelligent Control Wuhan Hubei China Radiology Department Second People's Hospital of Nanning Nanning China School of Computing and Software Engineering Southern Polytechnic State University GA United States
Lesion segmentation plays an important role in medical image processing and analysis. There exist several successful dynamic programming (DP) based segmentation methods for general images. In those methods, the gradie... 详细信息
来源: 评论
Dual transfer learning
Dual transfer learning
收藏 引用
12th SIAM International Conference on Data Mining, SDM 2012
作者: Long, Mingsheng Wang, Jianmin Ding, Guiguang Cheng, Wei Zhang, Xiang Wang, Wei Department of Computer Science and Technology Tsinghua University Beijing 100084 China School of Software Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education United States Department of Computer Science University of North Carolina Chapel Hill NC United States Dept of Electrical Engineering and Computer Science Case Western Reserve University OH United States
Transfer learning aims to leverage the knowledge in the source domain to facilitate the learning tasks in the tar- get domain. It has attracted extensive research interests recently due to its effectiveness in a wide ... 详细信息
来源: 评论
Corrigendum: “Provably-secure electronic cash based on certicateless partially-blind signatures”
收藏 引用
Electronic Commerce Research and Applications 2013年 第1期12卷 60-60页
作者: Lei Zhang Futai Zhang Bo Qin Shubo Liu East China Normal University Software Engineering Institute Shanghai Key Laboratory of Trustworthy Computing Shanghai China Universitat Rovira i Virgili Department of Computer Engineering and Mathematics UNESCO Chair in Data Privacy Tarragona Catalonia Spain Nanjing Normal University School of Computer Science and Technology China Xi’an University of Technology School of Science Department of Maths China Wuhan University School of Computer Science Wuhan China
来源: 评论
A framework for service-based business process collaboration
收藏 引用
Journal of Computational Information Systems 2012年 第4期8卷 1791-1803页
作者: Hu, Haiyang Hu, Hua Chiu, Dickson K.W. College of Computer Science Hangzhou Dianzi University China State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong
Nowadays, Web services-based systems have gained the attention of researchers, and it enables business process system to automatically discover and invocate suitable Web services at run time. Further with portable ter... 详细信息
来源: 评论
Scaling Laws of Multicast Capacity for Power-Constrained Wireless Networks under Gaussian Channel Model
收藏 引用
IEEE Transactions on computers 2012年 第5期61卷 713-725页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Shaojie Tang Yuan He Xufei Mao Yunhao Liu Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science and Engineering Building of Electronics and Information Engineering University of Tongji Shanghai China Department of Computer Science Illinois Institute of Technology Chicago IL USA Tsinghua National Laboratory for Information Science and Technology (TNLIST) Tsinghua University Beijing China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Hong Kong University of Science and Technology Kowloon Hong Kong China Tsinghua National Laboratory for Information Science and Technology (TNLIST) School of Software Tsinghua University Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing China
We study the asymptotic networking-theoretic multicast capacity bounds for random extended networks (REN) under Gaussian channel model, in which all wireless nodes are individually power-constrained. During the transm... 详细信息
来源: 评论
A layer-based routing protocol for heterogeneous wireless sensor networks
A layer-based routing protocol for heterogeneous wireless se...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Xiao Chen Zanxun Dai Wenzhong Li Hongchi Shi Department of Computer Science Texas State University San Marcos San Marcos TX USA State Key Laboratory for Novel Software Technology Nanjing University China
Due to requirements in different applications, sensors with various capacities are deployed. Data routing in such heterogeneous wireless sensor networks (HWSNs) poses challenges. First, the heterogeneous features crea... 详细信息
来源: 评论
Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks
Priv-Code: Preserving privacy against traffic analysis throu...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Zhiguo Wan Kai Xing Yunhao Liu MOE Key Laboratory for Information System Security School of Software Tsinghua National Laboratory for Information Science and Technology Tsinghua University China School of Computer Science and Technology University of Science and Technology China Department of Computer Science and Engineering HKUST Hong Kong China
Traffic analysis presents a serious threat to wireless network privacy due to the open nature of wireless medium. Traditional solutions are mainly based on the mix mechanism proposed by David Chaum, but the main drawb... 详细信息
来源: 评论
FTrack: Infrastructure-free floor localization via mobile phone sensing
FTrack: Infrastructure-free floor localization via mobile ph...
收藏 引用
IEEE International Conference on Pervasive Computing and Communications (PerCom)
作者: Haibo Ye Tao Gu Xiaorui Zhu Jinwei Xu Xianping Tao Jian Lu Ning Jin State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Mathematics and Computer Science University of Southern Denmark Odense M Denmark
Mobile phone localization plays a key role in the fast-growing Location Based Applications domain. Most of the existing localization schemes rely on infrastructure support such as GSM, WiFi or GPS. In this paper, we p... 详细信息
来源: 评论
Energy-Efficient Stochastic Target Coverage in Sensor Surveillance Systems
Energy-Efficient Stochastic Target Coverage in Sensor Survei...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Pan Wu Xiang Cao Xiaobing Wu Guihai Chen State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Engineering University of Minnesota Twin city USA Department of Computer Science and Engineering Shanghai Jiaotong University China
In many sensor surveillance systems such as environment and habitat monitoring, sensors are deployed in an area to monitor several important locations where targets appear. As the sensor nodes are often powered by non... 详细信息
来源: 评论