咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是2181-2190 订阅
排序:
3D Model Comparison through Kernel Density Matching
3D Model Comparison through Kernel Density Matching
收藏 引用
International Conference on Pattern Recognition
作者: Yiming Wang Tong Lu Rongjun Gao Wenyin Liu JiangYin High Technology and Information Institute Nanjing University Nanjing China Nanjing University Nanjing Jiangsu CN Department of Computer Science City University of Hong Kong Hong Kong China State Key Laboratory of Novel Software Technology Nanjing University Nanjing China
A novel 3D shape matching method is proposed in this paper. We first extract angular and distance feature pairs from pre-processed 3D models, then estimate their kernel densities after quantifying the feature pairs in... 详细信息
来源: 评论
A similarity analysis and clustering algorithm for video based on moving trajectory time series wavelet transform of moving object in Video
A similarity analysis and clustering algorithm for video bas...
收藏 引用
International Conference on Image Analysis and Signal Processing, IASP
作者: Yanmin Luo Minghong Liao Zhipeng Zhan College of Computer Science & Technology Huaqiao University Quanzhou China Congnitive Science Department Fujian Key Laboratory of the Brain-Like Intelligent Systems Xiamen University Xiamen China Software School of Xiamen University Xiamen China
Time-series data mining is a very important element of data mining. As a typical time-series data, video data has been widely used for many applications such as film, medical, sports and traffic areas. In this paper w... 详细信息
来源: 评论
Availability based trust model of clusters for MANET
Availability based trust model of clusters for MANET
收藏 引用
International Conference on Services Systems and Services Management, ICSSSM
作者: Xibin Zhao Zhiyang You Zhifeng Zhao Danning Chen Feng Peng Key Laboratory of Information System Security of Ministry of Education School of Software Tsinghua University China Department of Computer Science and Technology Tsinghua University China Zhenjiang Watercraft College Department of Computer Science Zhenjiang Watercraft College China School of Software Tsinghua University China China Minzu Securities Company Limited China
MANET (Mobile ad hoc network) is vulnerable to security attack due to its characteristics such as open network environment, lack of centralized control, dynamic topology, and so on, while traditional security mechanis... 详细信息
来源: 评论
The Transition Between Sharp and Rounded Features and the Manipulation of Incompatible Boundary in Filling n-sided Holes
The Transition Between Sharp and Rounded Features and the Ma...
收藏 引用
International Conference on Shape Modeling and Applications
作者: Kan-Le Shi Jun-Hai Yong Peng Liu Jia-Guang Sun Jean-Claude Paul Key Laboratory of Information System Security Ministry of Education of China Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China School of Software Tsinghua University Beijing China Tsinghua University Beijing Beijing CN INRIA France
N-sided hole filling plays an important role in vertex blending. Piegl and Tiller presented an algorithm to interpolate the given boundary and cross-boundary derivatives in B-spline form. To deal with the incompatible... 详细信息
来源: 评论
Robustify a job-shop schedule according to the payload of the machine
Robustify a job-shop schedule according to the payload of th...
收藏 引用
International Conference on Services Systems and Services Management, ICSSSM
作者: Zhiyang You Zhigang Sun Xibin Zhao Daxin Zang Department of Computer Science and Technology Tsinghua University Beijing China School of Software Tsinghua University Beijing China Key Laboratory of Information System Security Ministry of Education School of Software Tsinghua University Beijing China Software Engineering Institute Beijing Aeronautics and Astronautics University Beijing China
Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimiza... 详细信息
来源: 评论
SMART: A Strengthened Model of Access Router Tree for Multihoming in Nested Mobile Network
收藏 引用
电子学报(英文版) 2009年 第1期18卷 125-131页
作者: HUANG Songhua WU Xiaobing LU Yin HUANG Hao CHEN Guihai State Key Laboratory for Novel Software Technology Department of Computer Science Nanjing University Nanjing 210093 China
Load balance and failure tolerance are the crucial issues for multihomed mobile network. However, existing solutions are still far away from our expectation. In this paper, we first analyze the problems of multihoming... 详细信息
来源: 评论
GaN high electron mobility transistors with localized Mg doping and drain metal extension
GaN high electron mobility transistors with localized Mg dop...
收藏 引用
2010 10th IEEE International Conference on Solid-state and Integrated Circuit technology
作者: Xie, Gang Zhang, Bo Fu, Fred Y. Ng, W.T. Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto Toronto ON M5S 3G4 Canada State Key Laboratory of Electronic Thin Films and Integrated Devices University of Electronic Science and Technology of China Chengdu Sichuan China Microelectronics TCAD Crosslight Software Inc. 121-3989 Henning Dr. Burnaby BC V5C 6P8 Canada
A Magnesium Doped Layer (MDL) under the 2-DEG channel and a Drain Metal Extension (DME) are proposed to provide a new degree of freedom in the optimization between breakdown voltage (BV) and specific on-resistance (R ... 详细信息
来源: 评论
Fast and Accurate WSN Positioning in Emergency Logistics
Fast and Accurate WSN Positioning in Emergency Logistics
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Lai Xin Li Jun Zhong Wei Cao Yuan Software College Tsinghua University Beijing China General Logistics Department PLA Science and Research Institute Beijing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Software Center High-Tech Research Institute (CZ) Nanjing University Changzhou China
Accurate and fast nodes locating is required in large-scale emergency logistics with WSN (wireless sensor network) deployed. Under this background, the sensor nodes often move rapidly and frequently, and the mobility ... 详细信息
来源: 评论
Breakdown voltage enhancement for GaN high electron mobility transistors
Breakdown voltage enhancement for GaN high electron mobility...
收藏 引用
International Symposium on Power Semiconductor Devices and Ics (ISPSD)
作者: Gang Xie Bo Zhang Fred Y. Fu W. T. Ng State Key Laboratory of Electronic Thin Films and Integrated Devices University of Electronic Science and Technology Chengdu Sichuan China Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto Toronto ONT Canada Microelectronics TCAD Crosslight software Inc. Burnaby BC Canada
This paper presents a high voltage AlGaN/GaN HEMTs with remarkable breakdown voltage enhancement by introducing a magnesium doping layer under the 2-DEG channel. The surface electric field is distributed more evenly w... 详细信息
来源: 评论
QoS Requirement Generation and Algorithm Selection for Composite Service Based on Reference Vector
收藏 引用
Journal of computer science & technology 2009年 第2期24卷 357-372页
作者: 吴邦欲 支志雄 徐世杰 顾明 孙家广 School of Software Tsinghua University Key Laboratory for Information System Security Ministry of Education of China Department of Computer Science and Technology Tsinghua University
Under SOA (Service-Oriented Architecture), composite service is formed by aggregating multiple component services together in a given workflow. One key criterion of this research topic is QoS composition. Most work ... 详细信息
来源: 评论