咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是2071-2080 订阅
排序:
Optimize context-sensitive Andersen-style points-to analysis by method summarization and cycle-elimination
Optimize context-sensitive Andersen-style points-to analysis...
收藏 引用
4th International Symposium on Leveraging Applications, ISoLA 2010
作者: Qian, Li Jianhua, Zhao Xuandong, Li State Key Laboratory of Novel Software Technology of China Nanjing University 210093 Nanjing China Department of Computer Science and Technology Nanjing University 210093 Nanjing China
This paper presents an efficient context-sensitive, field-based Andersen-style points-to analysis algorithm for Java programs. This algorithm first summarizes methods of the program under analysis using directed graph... 详细信息
来源: 评论
Preserving data flow correctness in process adaptation
Preserving data flow correctness in process adaptation
收藏 引用
2010 IEEE 7th International Conference on Services Computing, SCC 2010
作者: Song, Wei Ma, Xiaoxing Cheung, S.C. Hu, Hao Lü, Jian State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Engineering HKUST Hongkong Hong Kong
In services and cloud computing, processes need to be continually adapted to changing environments and requirements. Undisciplined process adaptation could easily lead to data flow anomalies, e.g., input missing for s... 详细信息
来源: 评论
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability  10
Perturbing numerical calculations for statistical analysis o...
收藏 引用
19th International Symposium on software Testing and Analysis, ISSTA 2010
作者: Tang, Enyi Barr, Earl Li, Xuandong Su, Zhendong State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science University of California Davis United States
Writing reliable software is difficult. It becomes even more difficult when writing scientific software involving floating-point numbers. computers provide numbers with limited precision;when confronted with a real wh... 详细信息
来源: 评论
Analyzing the robustness of FTSP with timed automata  10
Analyzing the robustness of FTSP with timed automata
收藏 引用
Proceedings of the Second Asia-Pacific Symposium on Internetware
作者: Tan, Lin Bu, Lei Zhao, Jianhua Wang, Linzhang State Key Laboratory of Novel Software Technology Nanjing University Nanjing Jiangsu 210093 China Department of Computer Science and Technology Nanjing University Nanjing Jiangsu 210093 China
Since Wireless Sensor Networks (WSNs) are increasingly used in many industrial and civilian application areas, the correctness of their low level protocol such as the Flooding Time Synchronization Protocol (FTSP) is c... 详细信息
来源: 评论
Research on the adaptable reputation-based scheduling for storage resources in data grids
Research on the adaptable reputation-based scheduling for st...
收藏 引用
International Conference on Internet technology and Applications, ITAP 2010
作者: Liu, Wei Huang, Xun Du, Wei Department of Computer Science Wuhan University of Technology Wuhan 430063 China State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Institute of Computer Science Huazhong University of Science and Technology Wuhan 430074 China
Data grids provide the data-intensive applications with a large virtual stroage framework. We use a reputation-based trust aggregation approach for data providers to quantitatively predict and calculate whether or not... 详细信息
来源: 评论
Composite surface generation from sketchy drawing
收藏 引用
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of computer-Aided Design and computer Graphics 2010年 第6期22卷 907-913页
作者: Liu, Kai Sun, Zhengxing Zhang, Yaoye State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China
To facilitate designers to create and or modify 3D shapes rapidly during prototype modeling, this paper presents an online interactive approach which can easily generate 3D composite surface of various shapes. The app... 详细信息
来源: 评论
Study language models with specific user goals  10
Study language models with specific user goals
收藏 引用
19th International World Wide Web Conference, WWW2010
作者: Cen, Rongwei Liu, Yiqun Zhang, Min Ru, Liyun Ma, Shaoping State Key Laboratory of Intelligent Technology and Systems Department of Computer Science and Technology Tsinghua University Beijing 100084 China
Under different language contexts, people choose different terms or phrases to express their feelings and opinions. When a user is writing a paper or chatting with a friend, he/she applies a specific language model co... 详细信息
来源: 评论
Isolating suspiciousness from spectrum-based fault localization techniques
Isolating suspiciousness from spectrum-based fault localizat...
收藏 引用
10th International Conference on Quality software, QSIC 2010
作者: Xie, Xiaoyuan Chen, Tsong Yueh Xu, Baowen Centre for Software Analysis and Testing Swinburne University of Technology Hawthorn VIC 3122 Australia School of Computer Science and Engineering Southeast University Nanjing 210096 China Department of Computer Science and Technology State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Spectrum-based fault localization (SBFL) is one of the most promising fault localization approaches, which normally uses the failed and passed program spectrum to evaluate the risks for all program entities. However, ... 详细信息
来源: 评论
Modeling users' visiting behaviors for Web load testing by Continuous Time Markov Chain
Modeling users' visiting behaviors for Web load testing by C...
收藏 引用
7th Web Information Systems and Applications Conference, WISA 2010, 5th Workshop on Semantic Web and Ontology, SWON 2010, 4th Workshop on Electronic Government technology and Application, EGTA 2010
作者: Xu, Lei Zhang, Weifeng Chen, Lianjie Department of Computer Science and Technology Nanjing University State Key Laboratory for Novel Software Technology Nanjing China School of Computer Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Engineering Southeast University Nanjing China
Virtual users with high quality are the preconditions to ensure the effect of load testing for Web applications. The existed tools for load testing usually generate virtual users with randomly choosing user sessions, ... 详细信息
来源: 评论
DREAM: On the reaction delay in large scale wireless networks with mobile sensors
DREAM: On the reaction delay in large scale wireless network...
收藏 引用
2010 IEEE 18th International Workshop on Quality of Service, IWQoS 2010
作者: Tang, Shao Jie Li, Xiang-Yang Yuan, Jing Wang, Cheng Chen, Gui Hai Jiang, Changjun Department of Computer Science Illinois Institute of Technology Chicago IL 60616 United States State Key Laboratory of Novel Software Technology NanJing University NanJing China Department of Computer Science Tongji University China Institute of Computer Application Technology Hangzhou Dianzi University China
In this work, we present a monitor and rescue system utilizing hybrid networks which is a integration of stationary sensor networks and mobile sensor networks: stationary sensor networks comprised of large numbers of ... 详细信息
来源: 评论