咨询与建议

限定检索结果

文献类型

  • 1,492 篇 会议
  • 1,200 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,455 篇 计算机科学与技术...
    • 1,167 篇 软件工程
    • 313 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 131 篇 电气工程
    • 124 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 66 篇 动力工程及工程热...
    • 59 篇 化学工程与技术
    • 41 篇 建筑学
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
  • 878 篇 理学
    • 541 篇 数学
    • 183 篇 物理学
    • 172 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 70 篇 化学
  • 540 篇 管理学
    • 335 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 42 篇 software
  • 40 篇 optimization
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 protocols
  • 33 篇 web services
  • 32 篇 deep learning
  • 32 篇 cloud computing

机构

  • 491 篇 state key labora...
  • 188 篇 department of co...
  • 151 篇 department of co...
  • 117 篇 national key lab...
  • 109 篇 state key labora...
  • 85 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 60 篇 state key labora...
  • 52 篇 state key labora...
  • 50 篇 university of ch...
  • 46 篇 national key lab...
  • 37 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 state key labora...
  • 30 篇 college of compu...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 qi lianyong

语言

  • 2,401 篇 英文
  • 231 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2699 条 记 录,以下是1881-1890 订阅
排序:
Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
收藏 引用
电子学报(英文版) 2012年 第2期21卷 254-259页
作者: CHENG Hongbing RONG Chunming TAN Zhenghua ZENG Qingkai State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Information Engineering Jiangsu City Vocation College Nanjing 210036 China Department of Electronic Engineering and Computer Science University of Stavanger 4036 Stavanger Norway Department of Electronic Systems Aalborg University Niels Jernes Vej 12 9220 Aalborg Denmark
Cloud computing will be a main information infrastructure in the future;it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for clou... 详细信息
来源: 评论
WILL: Wireless indoor localization without site survey
WILL: Wireless indoor localization without site survey
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Chenshu Wu Zheng Yang Yunhao Liu Wei Xi MOE Key Laboratory for Information System Security School of Software Tsinghua National Laboratory for Information Science and Technology Tsinghua University China Department of Computer Science and Engineering HKUST Hong Kong China Xian Jiaotong University China
Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require a process of site survey, in which radio s... 详细信息
来源: 评论
Model-driven tenant development for PaaS-based SaaS
Model-driven tenant development for PaaS-based SaaS
收藏 引用
IEEE International Conference on Cloud Computing technology and science (CloudCom)
作者: Wei-Tek Tsai Wu Li Babak Esmaeili Wenjun Wu Department of Computer Science and Technology INLIST Tsinghua University Beijing China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ USA State Key Laboratory of Software Development Environment Beihang University Beijing China
This paper proposes key SaaS (software-as-a-Service) design strategies for those SaaS systems that run on top of a commercial PaaS (Platform-as-a-Service) system such as GAE (Google App Engine)[1]. Specifically, this ... 详细信息
来源: 评论
Bootstrapping Object Coreferencing on the Semantic Web
收藏 引用
Journal of computer science & technology 2011年 第4期26卷 663-675页
作者: 胡伟 瞿裕忠 孙行智 State Key Laboratory for Novel Software Technology Nanjing University Department of Computer Science and Technology Nanjing University IBM Research-China
An object on the Semantic Web is likely to be denoted with several URIs by different parties. Object core-ferencing is a process to identify "equivalent" URIs of objects for achieving a better Data Web. In this pape... 详细信息
来源: 评论
IMAGE SCALING METHOD BASED ON PROTECTED REGION
IMAGE SCALING METHOD BASED ON PROTECTED REGION
收藏 引用
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems
作者: Lisha Hou Junping Du Lingling Zi Min Zuo Katsunori Shimohara Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer ScienceBeijing University of Posts and Telecommunications School of Computer and Information Engineering Beijing Technology and Business University Department of Information Systems Design Doshisha University
To solve the problem of seriously distortion while enlarging images via seam carving,we proposed an improved method in this ***,we enlarged the image with hierarchical interpolation model to the size of power of two t... 详细信息
来源: 评论
MULTI-FOCUS IMAGE FUSION ALGORITHM BASED ON NSCT
MULTI-FOCUS IMAGE FUSION ALGORITHM BASED ON NSCT
收藏 引用
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems
作者: Yahao Yan Junping Du Qingping Li Min Zuo JangMyung Lee Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer ScienceBeijing University of Posts and Telecommunications School of Computer and Information Engineering Beijing Technology and Business University Department of Electronics Engineering Pusan National University
This paper is aimed at the problem of Multifocus image fusion for the same scene and has proposed a multi-focus image fusion algorithm based on NSCT [1](The Nonsubsampled Contourlet Transform).NSCT is the sparse rep... 详细信息
来源: 评论
Unsupervised metric fusion by cross diffusion
Unsupervised metric fusion by cross diffusion
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Bo Wang Jiayan Jiang Wei Wang Zhi-Hua Zhou Zhuowen Tu Department of Computer Science University of Toronto Canada Laboratory of Neuro Imaging University of California Los Angeles USA National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Microsoft Research Asia China
Metric learning is n fundamental problem in computer vision. Different features and algorithms may tackle a problem from different angles, and thus often provide complementary information. In this paper; we propose a ... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed Computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
Study on event correlation analysis in evidence chain structure
Study on event correlation analysis in evidence chain struct...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Dong Liu Yong-qing Wei School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan China Basic Education Department Shandong Police College Jinan China
computer forensics has limitations in representation formalism of the electronic evidence and data missing. A method in construction of electronic evidence chain was proposed on the basis of the study and analysis of ... 详细信息
来源: 评论
Application research of WebSocket technology on Web tree component
Application research of WebSocket technology on Web tree com...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Feng-yan Jiang Hui-chuan Duan School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan China Basic Education Department Shandong Normal University Jinan China
In the development of information systems, Web tree component is an important way to show information, provide a convenient and intuitive information queries, which has become one of the essential features in the info... 详细信息
来源: 评论