咨询与建议

限定检索结果

文献类型

  • 1,492 篇 会议
  • 1,201 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,700 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,456 篇 计算机科学与技术...
    • 1,168 篇 软件工程
    • 313 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 130 篇 电气工程
    • 124 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 66 篇 动力工程及工程热...
    • 59 篇 化学工程与技术
    • 41 篇 建筑学
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
  • 878 篇 理学
    • 541 篇 数学
    • 183 篇 物理学
    • 172 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 70 篇 化学
  • 540 篇 管理学
    • 335 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 50 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 42 篇 software
  • 40 篇 optimization
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 protocols
  • 33 篇 web services
  • 32 篇 deep learning
  • 32 篇 cloud computing

机构

  • 493 篇 state key labora...
  • 189 篇 department of co...
  • 150 篇 department of co...
  • 117 篇 national key lab...
  • 109 篇 state key labora...
  • 85 篇 state key labora...
  • 66 篇 department of co...
  • 63 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 60 篇 state key labora...
  • 52 篇 state key labora...
  • 50 篇 university of ch...
  • 45 篇 national key lab...
  • 37 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 31 篇 state key labora...
  • 31 篇 department of co...
  • 30 篇 college of compu...
  • 30 篇 beijing key labo...
  • 29 篇 department of co...

作者

  • 34 篇 yu huiqun
  • 34 篇 junping du
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 33 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 30 篇 yingmin jia
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 chen liqiong
  • 21 篇 qi lianyong
  • 21 篇 lu sanglu

语言

  • 2,402 篇 英文
  • 231 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2700 条 记 录,以下是1961-1970 订阅
排序:
A Center-Based Community Detection Method in Weighted Networks
A Center-Based Community Detection Method in Weighted Networ...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Jie Jin Lei Pan Chongjun Wang Junyuan Xie National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
The study of community detection has received more and more attention in recent years, the problem is very difficult and of great importance in many fields such as sociology, biology and computer science. But most of ... 详细信息
来源: 评论
Strong barrier coverage using directional sensors with arbitrarily tunable orientations
Strong barrier coverage using directional sensors with arbit...
收藏 引用
2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011
作者: Tao, Dan Mao, Xu-Fei Tang, Shao-Jie Zhang, Hai-Tao Ma, Hua-Dong Xie, Hai-Jiang School of Electronic and Information Engineering Beijing Jiaotong University Beijing China Beijing Key Laboratory of Intelligent Telecomm. Software and Multimedia Beijing University of Posts and Telecomm. Beijing China Department of Computer Science Illinois Institute of Technology Chicago IL United States Department of Computer Science and Technology Xi'An JiaoTong University Xi'An China
Barrier coverage is an important problem for sensor networks to fulfill some given sensing tasks. Barrier coverage guarantees the detection of events happened crossing a barrier of sensors. In majority study of barrie... 详细信息
来源: 评论
Time Petri net model with mixed semantics
收藏 引用
Ruan Jian Xue Bao/Journal of software 2011年 第6期22卷 1199-1209页
作者: Pan, Li Ding, Zhi-Jun Guo, Guan-Qi School of Information and Communication Engineering Hu'nan Institute of Science and Technology Yueyang 414006 China Department of Computer Science and Technology Tongji University Shanghai 200092 China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China
This paper presents a time Petri net (TPN) model with mixed semantics that efficiently addresses the schedulability analysis problem of the existing semantics models. The proposed model associates each firable transit... 详细信息
来源: 评论
Detecting Link Communities Based on Local Approach
Detecting Link Communities Based on Local Approach
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Lei Pan Chongjun Wang Junyuan Xie Meilin Liu National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China Department of Computer Science & Engineering Wright State University Dayton OH USA
Detecting communities from networks has been given great attention these years. The traditional approaches were always focusing on the node community, while some recent studies have shown great advantage of link commu... 详细信息
来源: 评论
Multi-population principal component analysis based on spectral graph technique for data analysis
Multi-population principal component analysis based on spect...
收藏 引用
International Workshop on Computational Transportation science
作者: Wang, Haijuan Han, Lixin Zhen, Zhilong Zeng, Xiaoqin College of Computer and Information Engineering Hohai University Nanjing 210098 China Department of Mathematics Tonghua Normal University Tonghua 134002 China State Key Laboratory of Novel Software Technology Nanjing University Nanjing 210093 China
Principal component analysis is a multivariate statistical method that makes the complex cross-correlation between the variables simpler. The basic idea of principal component analysis is to project the original obser... 详细信息
来源: 评论
Low Overhead Dynamic Spectrum Reallocation in Opportunistic Spectrum Access Networks
Low Overhead Dynamic Spectrum Reallocation in Opportunistic ...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Yu Tian Wenzhong Li Zhuo Li Sanglu Lu Xiaoming Fu State Key Laboratory for Novel Software Technology Department of Computer Science Nanjing University China Institute of Computer Science Georg-August-University of Goettingen Germany
Opportunistic spectrum access, which allows secondary users opportunistically access unused licensed channels to exploit instantaneous spectrum availability, is a promising approach to achieve efficient spectrum utili... 详细信息
来源: 评论
An Approach to Handling Failure Recovery in Service Composition and Its Analysis
An Approach to Handling Failure Recovery in Service Composit...
收藏 引用
Theoretical Aspects of software Engineering (TASE)
作者: Guisheng Fan Huiqun Yu Liqiong Chen Chunhua Gu Department of Computer Science and Engineering East China University of Science and Technology Shanghai China State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai China
Service composition is an effective way to build complex Web service applications. However, it is a challenge to handle failure recovery due to the uncertainty of service in distributed and heterogeneous environment. ... 详细信息
来源: 评论
Aggregation-Friendly Data Collection Protocol of Wireless Sensor Networks for PoI Monitoring
Aggregation-Friendly Data Collection Protocol of Wireless Se...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Xiaobing Wu Shen Li Guihai Chen State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science University of Illinois Urbana-Champaign USA
Point of Interest (PoI) coverage problem has been discussed lately. Both practical strategies and theoretical analysis have been proposed. We however argue that coverage solution alone is not enough. In real applicati... 详细信息
来源: 评论
Multi-keyframe abstraction from videos
Multi-keyframe abstraction from videos
收藏 引用
IEEE International Conference on Image Processing
作者: Ping Li Yanwen Guo Hanqiu Sun Department of Computer Science and Engineering CUHK Hong Kong China State Key Laboratory for Novel Software Technology Nanjing University China
This paper presents a method for abstracting multi-keyframe from video datasets. Existing video abstraction methods focused on simple view videos, and the results will be unacceptable if applied to overlapping views d... 详细信息
来源: 评论
A real-time rescue system: Towards practical implementation of robotic sensor network
A real-time rescue system: Towards practical implementation ...
收藏 引用
IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON)
作者: Jing Yuan Shao-Jie Tang Cheng Wang Debraj De Xiang-Yang Li Wen-Zhan Song Guihai Chen State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science Illinois Institute of Technology Chicago IL USA Department of Computer Science University of Tongji Shanghai China Department of Computer Science Georgia State University USA
A real-time monitor and rescue system must be able to both quickly and reliably detect the event happening in its monitoring region. Furthermore, it is required to fulfill certain rescue mission, e.g., navigate victim... 详细信息
来源: 评论