咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是2061-2070 订阅
排序:
Modeling coalition formation for repeated games using learning approaches
Modeling coalition formation for repeated games using learni...
收藏 引用
2010 International Conference on computer Application and System Modeling, ICCASM 2010
作者: Wang, Zhong-Cun Wang, Chong-Lun Department of Computer Science and Technology National Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
In this paper, we introduce the notion of "weight" to task's capability, and describe the use of case-based learning and reinforcement learning in a coalition formation model when games are repeated. Bas... 详细信息
来源: 评论
Formation control of mobile robots with input constraints: An elliptic approximation approach
Formation control of mobile robots with input constraints: A...
收藏 引用
International Conference on Control, Automation and Systems ( ICCAS)
作者: Xiaohan Chen Yingmin Jia Junping Du Fashan Yu The Seventh Research Division and Department of Systems and Control Beihang University BUAA Beijing China Beihang University Beijing CN Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo Henan China
This paper considers the problem of formation control for mobile robots which are subject to input constraints. The control strategy based on virtual robot tracking is proposed, which leads to a compact controller for... 详细信息
来源: 评论
Probe: A system for context collection, dissemination and processing  10
Probe: A system for context collection, dissemination and pr...
收藏 引用
Proceedings of the Second Asia-Pacific Symposium on Internetware
作者: Ma, Jun Tao, Xianping State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University No. 22 Hankou Road Nanjing 210093 China
The open, dynamic and uncertain internet platform requires software systems running on it should be able to probe the changes of their running environments and adapt themselves accordingly. The Internetware paradigm a... 详细信息
来源: 评论
Ad Hoc grid task scheduling algorithm considering trust-demand
Ad Hoc grid task scheduling algorithm considering trust-dema...
收藏 引用
International Conference on Future computer and Communication
作者: Wang, Haobo Li, Chunlin Yan, Chunxiang Li, Qingqing Li, Jun Department of Computer Science Wuhan University of Technology State Key Laboratory of Software Development Environment Beijing University of Aeronautics and Astronautics
At present, most Ad Hoc grid task scheduling algorithms ignore the impact of trust mechanism, resulting in the potential dangerous in the real scheduling. In this paper, the trust model is defined, which satisfies the... 详细信息
来源: 评论
Sequential event pattern based context-aware adaptation  10
Sequential event pattern based context-aware adaptation
收藏 引用
Proceedings of the Second Asia-Pacific Symposium on Internetware
作者: Gao, Chushu Wei, Jun Xu, Chang Cheung, S.C. Technology Centre of Software Engineering Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China Department of Computer Science and Engineering Hong Kong University of Science and Technology Kowloon Hong Kong Hong Kong
Recent pervasive systems are designed to be context-aware so that they are able to adapt to continual changes of their environments. Rule-based adaptation, which is commonly adopted by these applications, introduces n... 详细信息
来源: 评论
Adaptive interaction fault location based on combinatorial testing
Adaptive interaction fault location based on combinatorial t...
收藏 引用
10th International Conference on Quality software, QSIC 2010
作者: Wang, Ziyuan Xu, Baowen Chen, Lin Xu, Lei Department of Computer Science and Technology Nanjing University Nanjing 210093 China State Key Laboratory of Novel Software Technology Nanjing University Nanjing 210093 China
Combinatorial testing aims to detect interaction faults, which are triggered by interaction among parameters in system, by covering some specific combinations of parametric values. Most works about combinatorial testi... 详细信息
来源: 评论
Efficient tag identification in mobile RFID systems
Efficient tag identification in mobile RFID systems
收藏 引用
IEEE INFOCOM 2010
作者: Xie, Lei Sheng, Bo Tan, Chiu C. Han, Hao Li, Qun Chen, Daoxu State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University China College of William and Mary Williamsburg VA United States
In this paper we consider how to efficiently identify tags on the moving conveyor. Considering conditions like the path loss and multi-path effect in realistic settings, we first propose a probabilistic model for RFID... 详细信息
来源: 评论
A QoS-optimal automatic service composition method based on backtracting theory
A QoS-optimal automatic service composition method based on ...
收藏 引用
International Conference on Computational science and Engineering
作者: Lin, Wenmin Yang, Rutao Si, Xiaojie Qi, Lianyong Dou, Wanchun Department of Computer Science and Technology Nanjing University Nanjing 210093 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Generally, it is often a challenging issue to develop a QoS-optimal service composition schema from vast amount of services. In view of this challenge, an automatic service composition method is proposed, in this pape... 详细信息
来源: 评论
Privacy protection for RFID-based tracking systems
Privacy protection for RFID-based tracking systems
收藏 引用
4th Annual IEEE International Conference on RFID, RFID 2010
作者: Tan, Chiu C. Li, Qun Xie, Lei Department of Computer Science College of William and Mary United States State Key Laboratory of Novel Software Technology Nanjing University China
RFID technology is increasingly being deployed in ubiquitous computing environments for object tracking and localization. Existing tracking architecture usually assumes the use of a trusted server which is invulnerabl... 详细信息
来源: 评论
Energy-efficient task Clustering Scheduling on homogeneous clusters
Energy-efficient task Clustering Scheduling on homogeneous c...
收藏 引用
11th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2010
作者: Liu, Wei Li, Hongfeng Shi, Feiyan Department of Computer Science Wuhan University of Technology Wuhan 430063 China State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Wuhan University of Technology Department of Computer Science Wuhan China
Clusters provide powerful computing performance is at cost of huge energy consumption. Scheduling a parallel application with a set of precedence-constrained tasks on cluster is challenging because of high communicati... 详细信息
来源: 评论