咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是1991-2000 订阅
排序:
Refactoring and Publishing WS-BPEL Processes to Obtain More Partners
Refactoring and Publishing WS-BPEL Processes to Obtain More ...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Wei Song Xiaoxing Ma S.C. Cheung Hao Hu Qiliang Yang Jian Jian Lü Institute of Computer Science Nanjing University of Science and Technology of PLA Nanjing China Institute of Computer Science Nanjing Universitv of Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Engineering HKUST Hong Kong China
WS-BPEL processes can facilitate service discovery when the services have multiple interfaces in certain order. Current approaches derive the abstract WS-BPEL processes directly from the corresponding executable ones ... 详细信息
来源: 评论
Spectrum-Based Fault Localization: Testing Oracles are No Longer Mandatory
Spectrum-Based Fault Localization: Testing Oracles are No Lo...
收藏 引用
International Conference on Quality software
作者: Xiaoyuan Xie W. Eric Wong Tsong Yueh Chen Baowen Xu Centre of Software Analysis and Testing Swinburne University of Technology Hawthorn VIC Australia School of Computer Science and Engineering South-East University Nanjing China State Key Laboratory for Novel Software Technology & Department of Computer Science and Technology Nanjing University Nanjing China Department of Computer Science University of Texas Dallas Richardson TX USA
Spectrum-based Fault Localization (SBFL) is one of the most popular approaches for locating software faults, and has received much attention because of its simplicity and effectiveness. It utilizes the execution resul... 详细信息
来源: 评论
Energy-efficient local wake-up scheduling in wireless sensor networks
Energy-efficient local wake-up scheduling in wireless sensor...
收藏 引用
Congress on Evolutionary Computation
作者: Jing-hui Zhong Jun Zhang Department of Computer Science Key Laboratory of Digital Life Ministry of Education Key Laboratory of Software Technology Education Department of Guangdong Sun Yat-sen University China
Scheduling sensor activities is an effective way to prolong the lifetime of wireless sensor networks (WSNs). In this paper, we explore the problem of wake-up scheduling in WSNs where sensors have different lifetime. A... 详细信息
来源: 评论
DHC: Distributed, hierarchical clustering in sensor networks
DHC: Distributed, hierarchical clustering in sensor networks
收藏 引用
作者: Ma, Xiu-Li Hu, Hai-Feng Li, Shuang-Feng Xiao, Hong-Mei Luo, Qiong Yang, Dong-Qing Tang, Shi-Wei School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of Machine Perception Peking University Ministry of Education Beijing 100871 China Key Laboratory of High Confidence Software Technologies Peking University Ministry of Education Beijing 100871 China Department of Computer Science and Engineering Hong Kong University Science and Technology Clear Water Bay Kowloon Hong Kong Google China Beijing 100871 China
In many sensor network applications, it is essential to get the data distribution of the attribute value over the network. Such data distribution can be got through clustering, which partitions the network into contig... 详细信息
来源: 评论
Leveraging Fragmental Semantic Data to Enhance Services Discovery
Leveraging Fragmental Semantic Data to Enhance Services Disc...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Jian Wang Jia Zhang Patrick C.K. Hung Zheng Li Jianxiao Liu Keqing He State Key Laboratory of Software Engineering Computer School Wuhan University China Department of Computer Science Northern Illinois University USA University of Ontario Institute of Technology Canada
As one foundational technology of cloud computing, services computing is playing a critical role to enable provisioning of software as a service (SaaS). However, how to effectively and efficiently discover proper avai... 详细信息
来源: 评论
On multicast throughput scaling of hybrid wireless networks with general node density
收藏 引用
computer Networks 2011年 第15期55卷 3548-3561页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Yunhao Liu Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education China Department of Computer Science Illinois Institute of Technology Chicago IL 60616 United States TNLIST School of Software Tsinghua University China
In this paper, we consider hybrid wireless networks with a general node density λ   ∈   [1,   n ], where n ad hoc nodes are uniformly distributed and m base stations (BSs) are regularly placed in a sq...
来源: 评论
Diagnosis of software Models with Multiple Levels of Abstraction Using Ontological Metamodeling
Diagnosis of Software Models with Multiple Levels of Abstrac...
收藏 引用
IEEE Annual International computer software and Applications Conference (COMPSAC)
作者: Nophadol Jekjantuk Jeff Z. Pan Yuzhong Qu Department of Computing Science University of Aberdeen UK State Key Laboratory for Novel Software Technology Nanjing University China
Ontology reasoning and reasoning-based search expansion are powerful tools for semantic applications. In this paper, we investigate how to apply ontology reasoning, with different ontology metamodeling approaches, to ... 详细信息
来源: 评论
An algorithm application in intrusion forensics based on improved information gain
An algorithm application in intrusion forensics based on imp...
收藏 引用
2011 3rd Symposium on Web Society, SWS2011
作者: Jia, Xian Liu, Peiyu Gong, Wei Chi, Xuezhi School of Information Science and Engineering Shandong Normal University Ji'nan 250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan 250014 China Basic Education Department Shandong Police College Ji'nan 250014 China
As a kind of feature selection algorithm applied widely in intrusion forensics, information gain could solve the problem of high-dimension and magnanimous, but it neglects correlation between features, which could lea... 详细信息
来源: 评论
Extending lifetime of sensor surveillance systems in data fusion model
Extending lifetime of sensor surveillance systems in data fu...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Xiang Cao Xiaohua Jia Guihai Chen State Key Laboratory of Novel Software Technology Nanjing University Nanjing China Department of Computer Science City University of Hong Kong Hong Kong China
A critical aspect of the sensor surveillance systems is the network lifetime. Sensors are often battery-powered and they have limited energy constraint. Therefore, it is crucial to extend the network lifetime. However... 详细信息
来源: 评论
Web Service Discovery Based on User Requirements
Web Service Discovery Based on User Requirements
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Lei Xu Baowen Xu Lianjie Chen Hongji Yang Department of Computer Science and Technology State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China School of Computing De Montfort University Leicester UK
With the rapid development of Web services, Web service discovery becomes a significant challenge in the matching precision and efficiency. In this paper, we present a novel method in the view of users' requiremen... 详细信息
来源: 评论