咨询与建议

限定检索结果

文献类型

  • 1,492 篇 会议
  • 1,201 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,700 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,456 篇 计算机科学与技术...
    • 1,168 篇 软件工程
    • 313 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 130 篇 电气工程
    • 124 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 66 篇 动力工程及工程热...
    • 59 篇 化学工程与技术
    • 41 篇 建筑学
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
  • 878 篇 理学
    • 541 篇 数学
    • 183 篇 物理学
    • 172 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 70 篇 化学
  • 540 篇 管理学
    • 335 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 50 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 42 篇 software
  • 40 篇 optimization
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 protocols
  • 33 篇 web services
  • 32 篇 deep learning
  • 32 篇 cloud computing

机构

  • 493 篇 state key labora...
  • 189 篇 department of co...
  • 150 篇 department of co...
  • 117 篇 national key lab...
  • 109 篇 state key labora...
  • 85 篇 state key labora...
  • 66 篇 department of co...
  • 63 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 60 篇 state key labora...
  • 52 篇 state key labora...
  • 50 篇 university of ch...
  • 45 篇 national key lab...
  • 37 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 31 篇 state key labora...
  • 31 篇 department of co...
  • 30 篇 college of compu...
  • 30 篇 beijing key labo...
  • 29 篇 department of co...

作者

  • 34 篇 yu huiqun
  • 34 篇 junping du
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 33 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 30 篇 yingmin jia
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 chen liqiong
  • 21 篇 qi lianyong
  • 21 篇 lu sanglu

语言

  • 2,402 篇 英文
  • 231 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2700 条 记 录,以下是1981-1990 订阅
排序:
WSRank: A Method for Web Service Ranking in Cloud Environment
WSRank: A Method for Web Service Ranking in Cloud Environmen...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Rong Hu Wanchun Dou Xiaoqing Frank Liu Jianxun Liu Key Laboratory of Knowledge Processing & Networked Manufacturing Hunan University of Science and Technology Xiangtan Hunan China State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu China Department of Computer Science Missouri University of Science & Technology Rolla MO USA
For services that have similar functionalities, if they are published by different cloud platforms, it is a challenge to evaluate them, for satisfying different end users' personal preferences. In view of this cha... 详细信息
来源: 评论
Video Image Segmentation using Gaussian Mixture Models based on the Differential Evolution-based Parameter Estimation
Video Image Segmentation using Gaussian Mixture Models based...
收藏 引用
2011 International Conference on Advanced Materials and computer science(ICAMCS 2011)
作者: Zhi-Gao Zeng Li-Xin Ding Sheng-Qiu Yi San-You Zeng Zi-Hua QIU State Key Laboratory of Software Engineering Wuhan University School of Computer & Communication Hunan University of Technology Dept.of Computer Science China University of GeoSciences College of Computer Science Hunan Institute of Science and Technology
In order to improve the accuracy of the image segmentation in video surveillance sequences and to overcome the limits of the traditional clustering algorithms that can not accurately model the image data sets which Co... 详细信息
来源: 评论
Fault analysis study of the block cipher FOX64
收藏 引用
Multimedia Tools and Applications 2011年 第3期63卷 691-708页
作者: Li, Ruilin You, Jianxiong Sun, Bing Li, Chao Department of Mathematics and System Science Science College National University of Defense Technology Changsha China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China College of Computer National University of Defense Technology Changsha China
FOX is a family of symmetric block ciphers from MediaCrypt AG that helps to secure digital media, communications, and storage. The high-level structure of FOX is the so-called (extended) Lai–Massey scheme. This paper...
来源: 评论
Refactoring and Publishing WS-BPEL Processes to Obtain More Partners
Refactoring and Publishing WS-BPEL Processes to Obtain More ...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Wei Song Xiaoxing Ma S.C. Cheung Hao Hu Qiliang Yang Jian Jian Lü Institute of Computer Science Nanjing University of Science and Technology of PLA Nanjing China Institute of Computer Science Nanjing Universitv of Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Engineering HKUST Hong Kong China
WS-BPEL processes can facilitate service discovery when the services have multiple interfaces in certain order. Current approaches derive the abstract WS-BPEL processes directly from the corresponding executable ones ... 详细信息
来源: 评论
Spectrum-Based Fault Localization: Testing Oracles are No Longer Mandatory
Spectrum-Based Fault Localization: Testing Oracles are No Lo...
收藏 引用
International Conference on Quality software
作者: Xiaoyuan Xie W. Eric Wong Tsong Yueh Chen Baowen Xu Centre of Software Analysis and Testing Swinburne University of Technology Hawthorn VIC Australia School of Computer Science and Engineering South-East University Nanjing China State Key Laboratory for Novel Software Technology & Department of Computer Science and Technology Nanjing University Nanjing China Department of Computer Science University of Texas Dallas Richardson TX USA
Spectrum-based Fault Localization (SBFL) is one of the most popular approaches for locating software faults, and has received much attention because of its simplicity and effectiveness. It utilizes the execution resul... 详细信息
来源: 评论
Energy-efficient local wake-up scheduling in wireless sensor networks
Energy-efficient local wake-up scheduling in wireless sensor...
收藏 引用
Congress on Evolutionary Computation
作者: Jing-hui Zhong Jun Zhang Department of Computer Science Key Laboratory of Digital Life Ministry of Education Key Laboratory of Software Technology Education Department of Guangdong Sun Yat-sen University China
Scheduling sensor activities is an effective way to prolong the lifetime of wireless sensor networks (WSNs). In this paper, we explore the problem of wake-up scheduling in WSNs where sensors have different lifetime. A... 详细信息
来源: 评论
DHC: Distributed, hierarchical clustering in sensor networks
DHC: Distributed, hierarchical clustering in sensor networks
收藏 引用
作者: Ma, Xiu-Li Hu, Hai-Feng Li, Shuang-Feng Xiao, Hong-Mei Luo, Qiong Yang, Dong-Qing Tang, Shi-Wei School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of Machine Perception Peking University Ministry of Education Beijing 100871 China Key Laboratory of High Confidence Software Technologies Peking University Ministry of Education Beijing 100871 China Department of Computer Science and Engineering Hong Kong University Science and Technology Clear Water Bay Kowloon Hong Kong Google China Beijing 100871 China
In many sensor network applications, it is essential to get the data distribution of the attribute value over the network. Such data distribution can be got through clustering, which partitions the network into contig... 详细信息
来源: 评论
On multicast throughput scaling of hybrid wireless networks with general node density
收藏 引用
computer Networks 2011年 第15期55卷 3548-3561页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Yunhao Liu Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education China Department of Computer Science Illinois Institute of Technology Chicago IL 60616 United States TNLIST School of Software Tsinghua University China
In this paper, we consider hybrid wireless networks with a general node density λ   ∈   [1,   n ], where n ad hoc nodes are uniformly distributed and m base stations (BSs) are regularly placed in a sq...
来源: 评论
Leveraging Fragmental Semantic Data to Enhance Services Discovery
Leveraging Fragmental Semantic Data to Enhance Services Disc...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Jian Wang Jia Zhang Patrick C.K. Hung Zheng Li Jianxiao Liu Keqing He State Key Laboratory of Software Engineering Computer School Wuhan University China Department of Computer Science Northern Illinois University USA University of Ontario Institute of Technology Canada
As one foundational technology of cloud computing, services computing is playing a critical role to enable provisioning of software as a service (SaaS). However, how to effectively and efficiently discover proper avai... 详细信息
来源: 评论
Diagnosis of software Models with Multiple Levels of Abstraction Using Ontological Metamodeling
Diagnosis of Software Models with Multiple Levels of Abstrac...
收藏 引用
IEEE Annual International computer software and Applications Conference (COMPSAC)
作者: Nophadol Jekjantuk Jeff Z. Pan Yuzhong Qu Department of Computing Science University of Aberdeen UK State Key Laboratory for Novel Software Technology Nanjing University China
Ontology reasoning and reasoning-based search expansion are powerful tools for semantic applications. In this paper, we investigate how to apply ontology reasoning, with different ontology metamodeling approaches, to ... 详细信息
来源: 评论