咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是2101-2110 订阅
排序:
A propagation model of reputation query request
A propagation model of reputation query request
收藏 引用
2010 2nd IEEE International Conference on Information Management and Engineering, ICIME 2010
作者: Sun, Hua Yu, Huiqun Department of Computer Science and Engineering East China University of Science and Technology Shanghai China School of Information Science and Engineering Xinjiang University Urumqi China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Reputation is a key factor to enhance reliability and performance of transactions in the network. Many works have focused on rating the reputation of the entities through kinds of technologies. The entities send the r... 详细信息
来源: 评论
Optimal Data Scheduling for P2P VoD Streaming Systems
Optimal Data Scheduling for P2P VoD Streaming Systems
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Qifeng Yu Daoxu Chen State Key Laboratory of Novel Software and Technology Department of Computer Science and Technology Nanjing University China
Media streaming services have been much more popular nowadays, and these services consume lots of network bandwidth. Peer-to-Peer(P2P) technology has been employed in the streaming systems to save the server bandwidth... 详细信息
来源: 评论
D-WAV: A Web Application Vulnerabilities Detection Tool Using Characteristics of Web Forms
D-WAV: A Web Application Vulnerabilities Detection Tool Usin...
收藏 引用
International Conference on software Engineering Advances (ICSEA)
作者: Lijiu Zhang Qing Gu Shushen Peng Xiang Chen Haigang Zhao Daoxu Chen State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Jiangsu China
Finding effective approaches to detect vulnerabilities is important to guarantee the security of Web applications. Web application security issues are mostly related to malicious input data and Web forms are the main ... 详细信息
来源: 评论
Middleware support for context-awareness in asynchronous pervasive computing environments
Middleware support for context-awareness in asynchronous per...
收藏 引用
International Workshop on Wireless Network Algorithm and Theory
作者: Yu, Jianping Huang, Yu Cao, Jiannong Tao, Xianping State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
Context-awareness is an essential feature of pervasive applications, and runtime detection of contextual properties is one of the primary approaches to enabling context-awareness. However, existing context-aware middl... 详细信息
来源: 评论
Detection of behavioral contextual properties in asynchronous pervasive computing environments
Detection of behavioral contextual properties in asynchronou...
收藏 引用
16th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2010
作者: Huang, Yu Yu, Jianping Cao, Jiannong Tao, Xianping State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
Detection of contextual properties is one of the primary approaches to enabling context-awareness. In order to adapt to temporal evolution of the pervasive computing environment, context-aware applications often need ... 详细信息
来源: 评论
BACH 2 : Bounded reachability checker for compositional linear hybrid systems  10
BACH 2 : Bounded reachability checker for compositional line...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Lei Bu You Li Linzhang Wang Xin Chen Xuandong Li State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu China
Existing reachability analysis techniques are easy to fail when applied to large compositional linear hybrid systems, since their memory usages rise up quickly with the increase of systems' size. To address this p... 详细信息
来源: 评论
Applying Particle Swarm Optimization to Pairwise Testing
Applying Particle Swarm Optimization to Pairwise Testing
收藏 引用
IEEE Annual International computer software and Applications Conference (COMPSAC)
作者: Xiang Chen Qing Gu Jingxian Qi Daoxu Chen State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu China
Combinatorial testing (also called interaction testing) is an effective specification-based test input generation technique. By now most of research work in combinatorial testing aims to propose novel approaches tryin... 详细信息
来源: 评论
A face-based shape matching method for IGES surface model
A face-based shape matching method for IGES surface model
收藏 引用
International Conference on Shape Modeling and Applications - Shape Modeling International Conference, SMI 2010
作者: Hu, Kai-Mo Wang, Bin Gao, Yi Yuan, Qi-Ming Yong, Jun-Hai School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
IGES is a widely used standard for mechanical data exchange. In this paper, we present a new method for the retrieval task of IGES surface model. Based on this method, a novel distinctive face selection strategy is pr... 详细信息
来源: 评论
Energy-Efficient and Topology-Aware Routing for Underwater Sensor Networks
Energy-Efficient and Topology-Aware Routing for Underwater S...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Xiaobing Wu Guihai Chen Jinming Chen State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu China
Underwater sensor networks were recently proposed to support quite a few aquatic applications such as ocean exploration and harbor monitoring. Different from terrestrial WSNs, the underwater sensor networks have many ... 详细信息
来源: 评论
A community-centric model for service publication, discovery, selection, binding, and maintenance
A community-centric model for service publication, discovery...
收藏 引用
5th IEEE International Symposium on Service-Oriented System Engineering, SOSE 2010
作者: Chan, W.K. Mei, Lijun Zhang, Zhenyu Gao, Xiaopeng Department of Computer Science City University of Hong Kong Tat Chee Avenue Hong Kong Hong Kong Department of Computer Science University of Hong Kong Pokfulam Road Hong Kong Hong Kong State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Technology Beihang University Beijing China
Services discovery, selection, composition, verification, and adaptation are important in service-oriented computing. Existing researches often study techniques to maximize the benefits of individual services. However... 详细信息
来源: 评论