咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是2011-2020 订阅
排序:
iLight: Indoor device-free passive tracking using wireless sensor networks
iLight: Indoor device-free passive tracking using wireless s...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Xufei Mao ShaoJie Tang Xiaohua Xu Xiang-Yang Li Huadong Ma Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia BUPT Beijing China Department of Computer Science Illinois Institute of Technology Chicago IL USA
Target tracking is a main application of wireless sensor networks (WSNs), and has been studied widely [4], [10]. In this work, we study indoor passive tracking problem using WSNs, in which we assume no equipment is ca... 详细信息
来源: 评论
Expression and evaluation of reputation based on fuzzy set theory
收藏 引用
Journal of Information and Computational science 2011年 第1期8卷 129-138页
作者: Sun, Hua Yu, Huiqun Yang, Nianhua Li, Li Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China School of Information Science and Engineering Xinjiang University Urumqi 830046 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China
In the heterogeneous and open networks, reputation can help users to make a decision about whether or not to have a transaction with other entities. The feedback data used to evaluate the reputation always comes from ... 详细信息
来源: 评论
Face recognition based on local uncorrelated and weighted global uncorrelated discriminant transforms
Face recognition based on local uncorrelated and weighted gl...
收藏 引用
IEEE International Conference on Image Processing
作者: Xiaoyuan Jing Sheng Li David Zhang Jingyu Yang State Key Laboratory for Software Engineering Wuhan University of China Wuhan China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China College of Automation Nanjing University of Posts and Telecommunications China Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong China College of Computer Science Nanjing University of Science and Technology of PLA China
Feature extraction is one of the most important problems in image recognition tasks. In many applications such as face recognition, it is desirable to eliminate the redundancy among the extracted discriminant features... 详细信息
来源: 评论
Verifiable reputation management scheme based on RSA threshold secret sharing in P2P networks
收藏 引用
Journal of Computational Information Systems 2011年 第8期7卷 2770-2778页
作者: Sun, Hua Yu, Huiqun Yang, Nianhua Li, Li Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China School of Information Science and Engineering Xinjiang University Urumqi 830046 Xinjiang China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China
In this paper we propose an innovative verifiable reputation management scheme based on RSA threshold secret sharing in P2P networks. This scheme employs RSA threshold secret sharing theory to realize management of th... 详细信息
来源: 评论
Improve the Effectiveness of Test Case Generation on EFSM via Automatic Path Feasibility Analysis
Improve the Effectiveness of Test Case Generation on EFSM vi...
收藏 引用
IEEE International Symposim on High Assurance Systems Engineering
作者: Rui Yang Zhenyu Chen Baowen Xu W. Eric Wong Jie Zhang School of Electronic Engineering Huaihai Institute of Technology Lianyungang China Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Nanjing University Nanjing Jiangsu CN Department of Computer Science University of Texas Dallas Richardson TX USA
A typical approach utilized for automated test case generation is to create a model of the implementation under test. Extended Finite state Machine (EFSM) is among the most popular models for model-based testing. Howe... 详细信息
来源: 评论
Evaluating coverage quality through best covered pathes in wireless sensor networks  11
Evaluating coverage quality through best covered pathes in w...
收藏 引用
International Workshop on Quality of Service
作者: ShaoJie Tang XuFei Mao Xiang-Yang Li Guojun Dai Department of Computer Science Illinois Institute of Technology Chicago IL USA Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia BUPT Beijing China Institute of Computer Application Technology Hangzhou Dianzi University Hangzhou China
Coverage quality is one critical metric to evaluate the Quality of Service (QoS) provided by wireless sensor net works. In this paper, we address maximum support coverage problem (a.k.a. best case coverage) in wireles... 详细信息
来源: 评论
Extracting Academic Information from Conference Web Pages
Extracting Academic Information from Conference Web Pages
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Peng Wang Yue You Baowen Xu Jianyu Zhao School of Computer Science and Engineering South East University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China College of Software Engineering South East University Nanjing China Department of Computer Science and Engineering Shanghai Jiaotong University China
Conference Web pages are the main platforms to share the conference information and organize conference events. To discover the academic knowledge from such Web pages for building academic ontologies or social network... 详细信息
来源: 评论
Estimate Aggregation with Delay Constraints in Multihop Wireless Sensor Networks
Estimate Aggregation with Delay Constraints in Multihop Wire...
收藏 引用
IEEE/ACM International Conference on Cyber-Physical Systems (ICCPS)
作者: Haitao Zhang Huadong Ma Xiang-Yang Li Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Beijing China Department of Computer Science Illinois Institute of Technology Chicago USA
Using wireless sensor networks (WSNs) to observe physical processes for control systems has attracted much attention recently. For some real-time control applications, controllers need to accurately estimate the proce... 详细信息
来源: 评论
Class-imbalance learning based discriminant analysis
Class-imbalance learning based discriminant analysis
收藏 引用
Asian Conference on Pattern Recognition (ACPR)
作者: Xiaoyuan Jing Chao Lan Min Li Yongfang Yao David Zhang Jingyu Yang State Key Laboratory of Software Engineering Wuhan University of China Wuhan China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China College of Automation Nanjing University of Posts and Telecommunications Nanjing China Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong China College of Computer Science Nanjing University of Science and Technology of PLA Nanjing China
Feature extraction is an important research topic in the field of pattern recognition. The class-specific idea tends to recast a traditional multi-class feature extraction and recognition task into several binary clas... 详细信息
来源: 评论
Automatic Generation of Canonical Views for CAD Models
Automatic Generation of Canonical Views for CAD Models
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Kaimo Hu Bin Wang Bin Yuan Junhai Yong Key Laboratory for Information System Security Ministry of Education Beijing China Department of Computer Science and Technology Tsinghua University Beijing China School of Software Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China
Selecting the best views for 3D objects is useful for many applications. However, with the existing methods applied in CAD models, the results neither exhibit the 3D structures of the models fairly nor conform to huma... 详细信息
来源: 评论