咨询与建议

限定检索结果

文献类型

  • 1,492 篇 会议
  • 1,201 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,700 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,456 篇 计算机科学与技术...
    • 1,168 篇 软件工程
    • 313 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 130 篇 电气工程
    • 124 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 66 篇 动力工程及工程热...
    • 59 篇 化学工程与技术
    • 41 篇 建筑学
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
  • 878 篇 理学
    • 541 篇 数学
    • 183 篇 物理学
    • 172 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 70 篇 化学
  • 540 篇 管理学
    • 335 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 50 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 42 篇 software
  • 40 篇 optimization
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 protocols
  • 33 篇 web services
  • 32 篇 deep learning
  • 32 篇 cloud computing

机构

  • 493 篇 state key labora...
  • 189 篇 department of co...
  • 150 篇 department of co...
  • 117 篇 national key lab...
  • 109 篇 state key labora...
  • 85 篇 state key labora...
  • 66 篇 department of co...
  • 63 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 60 篇 state key labora...
  • 52 篇 state key labora...
  • 50 篇 university of ch...
  • 45 篇 national key lab...
  • 37 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 31 篇 state key labora...
  • 31 篇 department of co...
  • 30 篇 college of compu...
  • 30 篇 beijing key labo...
  • 29 篇 department of co...

作者

  • 34 篇 yu huiqun
  • 34 篇 junping du
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 33 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 30 篇 yingmin jia
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 chen liqiong
  • 21 篇 qi lianyong
  • 21 篇 lu sanglu

语言

  • 2,402 篇 英文
  • 231 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2700 条 记 录,以下是2001-2010 订阅
排序:
Visual Recognition Using Density Adaptive Clustering
Visual Recognition Using Density Adaptive Clustering
收藏 引用
International Conference on Multimedia and Ubiquitous Engineering (MUE)
作者: Lei Ji Zheng Qin Kai Chen Huan Li Key Laboratory for Information System Security Ministry of Education School of Software Dongguan University of Technology Guangdong China Tsinghua National Laboratory for Information Science and Technology China Department of Computer Science and Technology Tsinghua University Beijing China
Visual codebook based texture analysis and image recognition is popular for its robustness to affine transformation and illumination variation. It is based on the affine invariable descriptors of local patches extract... 详细信息
来源: 评论
No-go theorem for one-way quantum computing on naturally occurring two-level systems
收藏 引用
Physical Review A 2011年 第5期83卷 050301(R)-050301(R)页
作者: Jianxin Chen Xie Chen Runyao Duan Zhengfeng Ji Bei Zeng Department of Computer Science and Technology Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Department of Physics Massachusetts Institute of Technology Cambridge Massachusetts USA Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney New South Wales Australia Perimeter Institute for Theoretical Physics Waterloo Ontario Canada State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Institute for Quantum Computing and Department of Combinatorics and Optimization University of Waterloo Waterloo Ontario Canada
The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, i... 详细信息
来源: 评论
LIR-OSGi: Extends OSGi to support distributed and heterogeneous ubiquitous computing system
LIR-OSGi: Extends OSGi to support distributed and heterogene...
收藏 引用
International Conference on Pervasive Computing and Applications (ICPCA)
作者: Jinzhao Liu Xiaojuan Lu Dan Wang Xin Liu Yongqiang Lu Yu Chen Department of Computer Science and Technology Beijing University of Technology Beijing China General Hospital of PLA Second Artillery USA Research Institute of Information Technology Key Laboratory of Pervasive Computing Ministry of Education Tsinghua University Beijing China System Software and Software Engineering Group Laboratory of Pervasive Computing Department of Computer Science and Technology Tsinghua University Beijing China
As an emerging portable service platform, OSGi is now taking a more and more important role in Ubiquitous Computing environment. As a module management framework, OSGi provides the functions of dynamic loading and unl... 详细信息
来源: 评论
Smoothness in noise reduction of chaotic time series
Smoothness in noise reduction of chaotic time series
收藏 引用
2011 International Conference on computers, Communications, Control and Automation
作者: Chenxi Shao Jiangong Ji Jingyuan Shao Lipeng Xiao Department of Computer Science and Technology University of Science and Technology of China Department of Modern Physics and Nonlinear Science Center University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Information center Jianghuai Automobile Co.Ltd.
Noise is an omnipresent phenomenon. It obscures the real behavior of dynamical system. Lots of methods are proposed to remove the noise contaminating time series. However, almost all the methods consider the noise red... 详细信息
来源: 评论
iLight: Indoor device-free passive tracking using wireless sensor networks
iLight: Indoor device-free passive tracking using wireless s...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Xufei Mao ShaoJie Tang Xiaohua Xu Xiang-Yang Li Huadong Ma Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia BUPT Beijing China Department of Computer Science Illinois Institute of Technology Chicago IL USA
Target tracking is a main application of wireless sensor networks (WSNs), and has been studied widely [4], [10]. In this work, we study indoor passive tracking problem using WSNs, in which we assume no equipment is ca... 详细信息
来源: 评论
Expression and evaluation of reputation based on fuzzy set theory
收藏 引用
Journal of Information and Computational science 2011年 第1期8卷 129-138页
作者: Sun, Hua Yu, Huiqun Yang, Nianhua Li, Li Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China School of Information Science and Engineering Xinjiang University Urumqi 830046 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China
In the heterogeneous and open networks, reputation can help users to make a decision about whether or not to have a transaction with other entities. The feedback data used to evaluate the reputation always comes from ... 详细信息
来源: 评论
Face recognition based on local uncorrelated and weighted global uncorrelated discriminant transforms
Face recognition based on local uncorrelated and weighted gl...
收藏 引用
IEEE International Conference on Image Processing
作者: Xiaoyuan Jing Sheng Li David Zhang Jingyu Yang State Key Laboratory for Software Engineering Wuhan University of China Wuhan China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China College of Automation Nanjing University of Posts and Telecommunications China Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong China College of Computer Science Nanjing University of Science and Technology of PLA China
Feature extraction is one of the most important problems in image recognition tasks. In many applications such as face recognition, it is desirable to eliminate the redundancy among the extracted discriminant features... 详细信息
来源: 评论
Verifiable reputation management scheme based on RSA threshold secret sharing in P2P networks
收藏 引用
Journal of Computational Information Systems 2011年 第8期7卷 2770-2778页
作者: Sun, Hua Yu, Huiqun Yang, Nianhua Li, Li Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China School of Information Science and Engineering Xinjiang University Urumqi 830046 Xinjiang China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China
In this paper we propose an innovative verifiable reputation management scheme based on RSA threshold secret sharing in P2P networks. This scheme employs RSA threshold secret sharing theory to realize management of th... 详细信息
来源: 评论
Improve the Effectiveness of Test Case Generation on EFSM via Automatic Path Feasibility Analysis
Improve the Effectiveness of Test Case Generation on EFSM vi...
收藏 引用
IEEE International Symposim on High Assurance Systems Engineering
作者: Rui Yang Zhenyu Chen Baowen Xu W. Eric Wong Jie Zhang School of Electronic Engineering Huaihai Institute of Technology Lianyungang China Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Nanjing University Nanjing Jiangsu CN Department of Computer Science University of Texas Dallas Richardson TX USA
A typical approach utilized for automated test case generation is to create a model of the implementation under test. Extended Finite state Machine (EFSM) is among the most popular models for model-based testing. Howe... 详细信息
来源: 评论
Evaluating coverage quality through best covered pathes in wireless sensor networks  11
Evaluating coverage quality through best covered pathes in w...
收藏 引用
International Workshop on Quality of Service
作者: ShaoJie Tang XuFei Mao Xiang-Yang Li Guojun Dai Department of Computer Science Illinois Institute of Technology Chicago IL USA Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia BUPT Beijing China Institute of Computer Application Technology Hangzhou Dianzi University Hangzhou China
Coverage quality is one critical metric to evaluate the Quality of Service (QoS) provided by wireless sensor net works. In this paper, we address maximum support coverage problem (a.k.a. best case coverage) in wireles... 详细信息
来源: 评论