咨询与建议

限定检索结果

文献类型

  • 1,492 篇 会议
  • 1,201 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,700 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,456 篇 计算机科学与技术...
    • 1,168 篇 软件工程
    • 313 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 130 篇 电气工程
    • 124 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 66 篇 动力工程及工程热...
    • 59 篇 化学工程与技术
    • 41 篇 建筑学
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
  • 878 篇 理学
    • 541 篇 数学
    • 183 篇 物理学
    • 172 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 70 篇 化学
  • 540 篇 管理学
    • 335 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 50 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 42 篇 software
  • 40 篇 optimization
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 protocols
  • 33 篇 web services
  • 32 篇 deep learning
  • 32 篇 cloud computing

机构

  • 493 篇 state key labora...
  • 189 篇 department of co...
  • 150 篇 department of co...
  • 117 篇 national key lab...
  • 109 篇 state key labora...
  • 85 篇 state key labora...
  • 66 篇 department of co...
  • 63 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 60 篇 state key labora...
  • 52 篇 state key labora...
  • 50 篇 university of ch...
  • 45 篇 national key lab...
  • 37 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 31 篇 state key labora...
  • 31 篇 department of co...
  • 30 篇 college of compu...
  • 30 篇 beijing key labo...
  • 29 篇 department of co...

作者

  • 34 篇 yu huiqun
  • 34 篇 junping du
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 33 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 30 篇 yingmin jia
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 chen liqiong
  • 21 篇 qi lianyong
  • 21 篇 lu sanglu

语言

  • 2,402 篇 英文
  • 231 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2700 条 记 录,以下是1921-1930 订阅
排序:
基于图匹配和链表导向的内核数据结构取证技术
基于图匹配和链表导向的内核数据结构取证技术
收藏 引用
2012(第五届)全国网络与信息安全学术会议
作者: WANG Hao 王浩 CHEN Pin 陈平 MAO Bing 茅兵 State Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNaj 软件新技术国家重点实验 南京大学计算机科学与技术系 南京 210046
从内存镜像中识别内核数据结构的技术广泛应用于安全领域,具有非常重要的作用。当前的一种重要取证方法即指针指向图Signature存在void指针、NULL指针、同构等问题。针对这些问题,提出了一种新的内核数据结构取证方法。该取证方法区... 详细信息
来源: 评论
A lock-free solution for load balancing in multi-core environment
A lock-free solution for load balancing in multi-core enviro...
收藏 引用
International Workshop on Intelligent Systems and Applications
作者: Liu, Xi Pan, Lei Wang, Chong-Jun Xie, Jun-Yuan National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China Nanjing University Nanjing 210093 China
Load balancing device is an important part of cloud platform. One of the most common applications of load balancing is to provide a single powerful virtual machine from multiple servers. In multi-core environment, the... 详细信息
来源: 评论
Network survivability against region failure
Network survivability against region failure
收藏 引用
2011 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2011
作者: Li, Ran Wang, Xiaoliang Jiang, Xiaohong Department of Commanding Information System Xi'an Communication Institute Shaanxi China State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University China Future University Hakodate Hokkaido Japan
Communication networks are now facing more and more potential large scale region threats such as natural disaster and physical attack. Under such region failure scenarios, numerous network elements within a geographic... 详细信息
来源: 评论
Line drawing technique for building images
收藏 引用
Ruan Jian Xue Bao/Journal of software 2012年 第SUPPL.2期23卷 34-41页
作者: Liu, You-Quan Wu, Zong-Sheng Wang, Shan-Dong Xue, Ru Wu, En-Hua School of Information Engineering Chang'an University Xi'an 710064 China Faculty of Science and Technology University of Macau Macao China State Key Laboratory of Computer Science Institute of Software The Chinese Academy of Sciences Beijing 100190 China Tibet University for Nationalities Xianyang 712082 China
This paper presents an automatic line-drawing method designed for building images. The fast line segment detector with a false detection control and detects the outline and the door, or window edge features detected, ... 详细信息
来源: 评论
Assessing network vulnerability under probabilistic region failure model
Assessing network vulnerability under probabilistic region f...
收藏 引用
International Conference on High Performance Switching and Routing
作者: Wang, Xiaoliang Jiang, Xiaohong Pattavina, Achille State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University China Future University Hakodate Hokkaido Japan Department of Electronics and Information Politecnico di Milano 20133 Milano Italy
The mission critical network infrastructures are facing potential large region threats, both intentional (like EMP attack, bomb explosion) and natural (like earthquake, flooding). The available research on region fail... 详细信息
来源: 评论
Spectrum-based fault localization: Testing oracles are no longer mandatory
Spectrum-based fault localization: Testing oracles are no lo...
收藏 引用
International Conference on Quality software
作者: Xie, Xiaoyuan Wong, W. Eric Chen, Tsong Yueh Xu, Baowen Centre for Software Analysis and Testing Swinburne University of Technology Hawthorn VIC 3122 Australia Department of Computer Science University of Texas at Dallas Richardson TX 75083 United States State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China School of Computer Science and Engineering Southeast University Nanjing 210096 China
Spectrum-based Fault Localization (SBFL) is one of the most popular approaches for locating software faults, and has received much attention because of its simplicity and effectiveness. It utilizes the execution resul... 详细信息
来源: 评论
An improved design of optical LIFO buffer with switched delay lines
An improved design of optical LIFO buffer with switched dela...
收藏 引用
International Conference on High Performance Switching and Routing
作者: Wang, Xiaoliang Jiang, Xiaohong Pattavina, Achille State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University China Future University Hakodate Hokkaido Japan Department of Electronics and Information Politecnico di Milano 20133 Milano Italy
The lack of optical buffer is still one of the main problems that hinder the development of all optical networks. One approach to this problem is to emulate the behavior of optical buffers by using optical switches an... 详细信息
来源: 评论
NURBS model for chaotic time series
NURBS model for chaotic time series
收藏 引用
2011 3rd International Conference on computer Research and Development, ICCRD 2011
作者: Shao, Chenxi Xiao, Lipeng Department of Computer Science and Technology University of Science and Technology of China Hefei China Department of Modern Physics Nonlinear Science Center University of Science and Technology of China Hefei China Anhui Province Key Laboratory of Software in Computing and Communication Hefei China
NURBS method is extensively used in the field of Geometric Modeling. Since the original NURBS method does not have time factor, it can not display the huge advantage in the dynamics field. In this article, inspired by... 详细信息
来源: 评论
An approach to modeling and analyzing security requirements of service composition
An approach to modeling and analyzing security requirements ...
收藏 引用
2011 IEEE Asia-Pacific Services Computing Conference, APSCC 2011
作者: Fan, Guisheng Yu, Huiqun Chen, Liqiong Liu, Dongmei Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai 200235 China
Service composition is an important means for integrating the individual Web services to create new value added systems that can satisfy complex requirements. However, it is a challenge to analyze security requirement... 详细信息
来源: 评论
A regression test technique for analyzing the functionalities of service composition
A regression test technique for analyzing the functionalitie...
收藏 引用
SEKE 2011 - Proceedings of the 23rd International Conference on software Engineering and Knowledge Engineering
作者: Yu, Huiqun Liu, Dongmei Fan, Guisheng Chen, Liqiong Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai 200235 China
Regression testing is a hot research area for Web service composition, which has direct impact on QoS of applications. This paper proposes an aspect-oriented regression test technique for analyzing functionalities of ... 详细信息
来源: 评论