咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是2121-2130 订阅
排序:
AZCVN: A novel energy equilibrium routing algorithm for WSNs
AZCVN: A novel energy equilibrium routing algorithm for WSNs
收藏 引用
International Conference on Communication technology (ICCT)
作者: Yueyue Gu Guangwei Bai Lei Cao Department of Computer Science and Technology Nanjing University of Technology Nanjing China State Key Laboratory of Novel Software Technology Nanjing University Nanjing China
This paper, based on the existing LEACH routing algorithm, proposes a novel adaptive zone-crossed and virtual node for multi-hop routing algorithm for large-scale wireless sensor networks. At first, we introduce the c... 详细信息
来源: 评论
A logic-based frame for knowledge reasoning in real-time security analysis
A logic-based frame for knowledge reasoning in real-time sec...
收藏 引用
2010 IEEE International Conference on software Engineering and Service sciences, ICSESS 2010
作者: Li, Chaoming Wang, Kenwen Department of Computer Science Sun Yat-Sen University Guang Zhou China Key Laboratory of High Confidence Software Technologies Peking University Ministry of Education Beijing China Department of Information Technology Griffith University Brisbane Australia
Continuous time Markov chains (CTMCs) have been used in real-time dependability and security analysis. However, existing approaches assume that the system is fully observable to a system attacker, which is not feasibl... 详细信息
来源: 评论
Interactive PBIL with Multiple Probability Vectors for Multimodal Optimization with Implicit Performance Indices
Interactive PBIL with Multiple Probability Vectors for Multi...
收藏 引用
2010 2nd International Conference on computer Engineering and technology(2010年第二届计算机工程与技术国际会议 ICCET 2010)
作者: Haifeng You Xufa Wang Department of Computer Science and Technology Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei China
Interactive population-based incremental learning (IPBIL) is an effective method to solve optimization problems with implicit performance indices. It can significantly reduce user fatigue compared with interactive evo... 详细信息
来源: 评论
Security alert management system for Internet Data Center based on ISO/IEC 27001 ontology
Security alert management system for Internet Data Center ba...
收藏 引用
International Workshop on Cloud Services-Platform Accelerating E-Business
作者: Tsang, Terry M.F. Yeung, Thomas M.W. Chiu, Dickson K.W. Hu, Haiyang Zhuang, Yi Hu, Hua Department of Computer Science Hong Kong Baptist University Kowloon Tong Hong Kong Dickson Computer Systems 7 Victory Avenue Homantin Hong Kong Hangzhou Dianzi University Hangzhou China College of Computer Science and Information Engineering Zhejiang Gongshang University China State Key Laboratory for Novel Software Technology Nanjing University China
Internet Data Centers (IDC) emerge as a major network service platform to converge Internet related services and applications to one location, managing servers, networks, together with valuable and sensitive data of m... 详细信息
来源: 评论
McC++/Java: Enabling Multi-core Based Monitoring and Fault Tolerance in C++/Java
McC++/Java: Enabling Multi-core Based Monitoring and Fault T...
收藏 引用
IEEE International Conference on Engineering of Complex computer Systems
作者: Lu Yang Liqian Yu Jianwen Tang Linzhang Wang Jianhua Zhao Xuandong Li Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory of Novel Software Technology Nanjing University Nanjing China
Monitoring and fault tolerance are important approaches to give high confidence that long-running online software systems run correctly. But these approaches will certainly cause high overhead cost, i.e. the loss of e... 详细信息
来源: 评论
Research on the Adaptable Reputation-Based Scheduling for Storage Resources in Data Grids
Research on the Adaptable Reputation-Based Scheduling for St...
收藏 引用
International Conference on Internet technology and Applications (iTAP)
作者: Wei Liu Xun Huang Wei Du State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Department of Computer Science Wuhan University of Technology Wuhan China China State Key Laboratory of Novel Software Technology Nanjing University Nanjing China Institute of Computer Science Huazhong University of Science and Technology Wuhan China
Data grids provide the data-intensive applications with a large virtual storage framework. We use a reputation-based trust aggregation approach for data providers to quantitatively predict and calculate whether or not... 详细信息
来源: 评论
Modeling Coalition Formation for Repeated Games using Learning Approaches
Modeling Coalition Formation for Repeated Games using Learni...
收藏 引用
The 2010 International Conference on computer Application and System Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)
作者: Zhong-Cun Wang Chong-Jun Wang National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China
In this paper, we introduce the notion of "weight" to task's capability, and describe the use of case-based learning and reinforcement learning in a coalition formation model when games are repeated. Bas... 详细信息
来源: 评论
An emotional harmony generation system
An emotional harmony generation system
收藏 引用
Congress on Evolutionary Computation
作者: Bin Xu Shangfei Wang Xian Li Key Laboratory of Computing Software of Anhui Province School of Computer Science and Technology University of Science and Technology China Department of Automation University of Science and Technology China
This paper proposes an emotional harmony composition system using a series of predefined rules and interactive genetic algorithm. Two kinds of rules are defined: One is harmony composition rules used for composing har... 详细信息
来源: 评论
Privacy protection for RFID-based tracking systems
Privacy protection for RFID-based tracking systems
收藏 引用
IEEE International Conference on RFID
作者: Chiu C. Tan Qun Li Lei Xie Department of Computer Science College of William and Mary USA State Key Laboratory of Novel Software Technology Nanjing University China
RFID technology is increasingly being deployed in ubiquitous computing environments for object tracking and localization. Existing tracking architecture usually assumes the use of a trusted server which is invulnerabl... 详细信息
来源: 评论
Availability based trust model of clusters for MANET
Availability based trust model of clusters for MANET
收藏 引用
7th International Conference on Service Systems and Service Management, ICSSSM'10
作者: Zhao, Xibin You, Zhiyang Zhao, Zhifeng Chen, Danning Peng, Feng Key Laboratory for Information System Security of Ministry of Education School of Software Tsinghua University 100084 China Department of Computer Science and Technology Tsinghua University 100084 China Department of Computer Science Zhenjiang Watercraft College 212003 China School of Software Tsinghua University 100084 China China Minzu Securities Co. Ltd. 100096 China
MANET (Mobile ad hoc network) is vulnerable to security attack due to its characteristics such as open network environment, lack of centralized control, dynamic topology, and so on, while traditional security mechanis... 详细信息
来源: 评论