咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是2161-2170 订阅
排序:
Active Learning by Querying Informative and Representative Examples  10
Active Learning by Querying Informative and Representative E...
收藏 引用
Annual Conference on Neural Information Processing Systems
作者: Sheng-Jun Huang Rong Jin Zhi-Hua Zhou National Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Engineering Michigan State University East Lansing MI 48824
Most active learning approaches select either informative or representative unla-beled instances to query their labels. Although several active learning algorithms have been proposed to combine the two criteria for qu... 详细信息
来源: 评论
Sparse Representation for Face Verification in Social Insurance System
Sparse Representation for Face Verification in Social Insura...
收藏 引用
Chinese Conference on Pattern Recognition (CCPR)
作者: Rui Xue Ming-Yu You Guo-Zheng Li Department of Control Science & Engineering University of Tongji Shanghai China State Key Laboratory of Novel Software Technology Nanjing University China
Face verification system has been applied in the process of social insurance payment to prevent the pension impostors. However, the previous methods of face verification compare the test face with the corresponding tr... 详细信息
来源: 评论
A Probabilistic Routing Protocol for Heterogeneous Sensor Networks
A Probabilistic Routing Protocol for Heterogeneous Sensor Ne...
收藏 引用
International Conference on Networking, Architecture, and Storage (NAS)
作者: Yuefei Hu Wenzhong Li Xiao Chen Xin Chen Sanglu Lu Jie Wu State Key Laboratory of Novel Software Technology Nanjing University China Department of Computer Science Texas State University San Marcos San Marcos USA Department of Computer and Information Sciences Temple University Philadelphia PA USA
The past five years witnessed a rapid development in wireless sensor networks, which have been widely used in military and civilian applications. Due to different requirements in their application environment, sensors... 详细信息
来源: 评论
Adaptive resource allocation for preemptable jobs in cloud systems
Adaptive resource allocation for preemptable jobs in cloud s...
收藏 引用
International Conference on Intelligent Systems Design and Applications (ISDA)
作者: Jiayin Li Meikang Qiu Jian-Wei Niu Yu Chen Zhong Ming Department of Electrical and Computer Engineering University of Kentucky Lexington KY USA State Key Laboratory of Software Develop. Environment Beihang University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China College of Computer Science and Software Shenzhen University Shenzhen China
In cloud computing, computational resources are provided to remote users in the form of leases. For a cloud user, he/she can request multiple cloud services simultaneously. In this case, parallel processing in the clo... 详细信息
来源: 评论
Quantum state Reduction for Universal Measurement Based Computation
收藏 引用
Physical Review Letters 2010年 第2期105卷 020502-020502页
作者: Xie Chen Runyao Duan Zhengfeng Ji Bei Zeng Department of Physics Massachusetts Institute of Technology Cambridge Massachusetts USA Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney NSW Australia Department of Computer Science and Technology Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Perimeter Institute for Theoretical Physics Waterloo Ontario Canada State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Institute for Quantum Computing University of Waterloo Waterloo Ontario Canada Department of Combinatorics and Optimization University of Waterloo Waterloo Ontario Canada
Measurement based quantum computation, which requires only single particle measurements on a universal resource state to achieve the full power of quantum computing, has been recognized as one of the most promising mo... 详细信息
来源: 评论
A Trust-Based Approach to Estimating the Confidence of the software System in Open Environments
收藏 引用
Journal of computer science & technology 2009年 第2期24卷 373-385页
作者: 徐锋 潘静 陆文 State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University
Emerging with open environments, the software paradigms, such as open resource coalition and Internetware, present several novel characteristics including user-centric, non-central control, and continual evolution. Th... 详细信息
来源: 评论
Trust based routing for misbehavior detection in Ad hoc networks
收藏 引用
Journal of Networks 2010年 第5期5卷 551-558页
作者: Gong, Wei You, Zhiyang Chen, Danning Zhao, Xibin Gu, Ming Lam, Kwok-Yan Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory of Information System Security of Ministry of Education School of Software Tsinghua University Beijing 100084 China
Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. To deal with mis... 详细信息
来源: 评论
A Fine-Grained Data Reconstruction Algorithm for Solid-state Disks
A Fine-Grained Data Reconstruction Algorithm for Solid-State...
收藏 引用
International Conference on Networking, Architecture, and Storage (NAS)
作者: Peng Wang Diqing Hu Changsheng Xie Jianzong Wang Xiao Qin Wuhan National Laboratory of Optoelectronics Key Laboratory of Data Storage System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology Wuhan Hubei China Department of Computer Science and Software Engineering Samuel Ginn College of Engineering Aubum University USA
Solid-state disks (SSDs) with high I/O performance are increasingly becoming popular. To extend the life time of flash memory, one can apply wear-leveling strategies to manage data blocks. However, wear-leveling strat... 详细信息
来源: 评论
A Community-Centric Model for Service Publication, Discovery, Selection, Binding, and Maintenance
A Community-Centric Model for Service Publication, Discovery...
收藏 引用
2010 Fifth IEEE International Symposium on Service Oriented System Engineering
作者: Lijun Mei W. K. Chan Zhenyu Zhang Xiaopeng Gao Department of Computer Science City University of Hong Kong Hong Kong China Department of Computer Science University of Hong Kong Hong Kong China State Key Laboratory of Computer Science Institute of Software of Chinese Academy of Sciences Beijing China School of Computer Science and Technology Beihang University Beijing China
Services discovery, selection, composition, verification, and adaptation are important in service-oriented computing. Existing researches often study techniques to maximize the benefits of individual services. However... 详细信息
来源: 评论
Middleware Support for Context-awareness in Asynchronous Pervasive Computing Environments
Middleware Support for Context-awareness in Asynchronous Per...
收藏 引用
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC
作者: Jianping Yu Yu Huang Jiannong Cao Xianping Tao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Internet and Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Hong Kong China
Context-awareness is an essential feature of pervasive applications, and runtime detection of contextual properties is one of the primary approaches to enabling context awareness. However, existing context-aware middl... 详细信息
来源: 评论