咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是2201-2210 订阅
排序:
Kalman filtering with multiple nonlinear-linear mixing state constraints
Kalman filtering with multiple nonlinear-linear mixing state...
收藏 引用
IEEE Conference on Decision and Control
作者: X. Fu Y. Jia J. Du F. Yu Seventh Research Division and the Department of Systems and Control Beihang University Beijing China Beihang University Beijing CN Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo Henan China
This paper is devoted to the problem of state estimation for a class of dynamic system with multiple nonlinear-linear (NL) mixing state constraints. A computational algorithm was developed by C. Yang and E. Blasch to ... 详细信息
来源: 评论
Aspect-Oriented Modeling and Verification with Finite state Machines
收藏 引用
Journal of computer science & technology 2009年 第5期24卷 949-961页
作者: 徐殿祥 Omar El-Ariss 许巍峰 王林章 National Center for the Protection of the Financial Infrastructure Dakota State UniversityMadisonSD 57042 U.S.A. State Key Laboratory of Novel Software Technology Department of Computer Science and TechnologyNanjing University Department of Computer Science North Dakota State UniversityFargoND 58105 U.S.A Computer and Information Science Department Gannon University109 University SquareEriePA 16541 U.S.A
Aspect-oriented programming modularizes crosscutting concerns into aspects with the advice invoked at the specified points of program execution. Aspects can be used in a harmful way that invalidates desired properties... 详细信息
来源: 评论
Dynamical Trust Construction Schema with Fuzzy Decision in P2P Systems
收藏 引用
电子学报(英文版) 2009年 第3期18卷 417-421页
作者: WANG Yang WANG Ruchuan HAN Zhijie College of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China Department of Computer Anhui Normal University Wuhu 241000 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
The security problem for Peer-to-peer (P2P) systems has been gradually recognized as an important topic of P2P applications. Among existing solution for P2P security, how to establish trust relationship among peers is... 详细信息
来源: 评论
A decentralized storage scheme for multi-dimensional range queries over sensor networks
A decentralized storage scheme for multi-dimensional range q...
收藏 引用
15th International Conference on Parallel and Distributed Systems, ICPADS '09
作者: Xie, Lei Chen, Lijun Chen, Daoxu Xie, Li State Key Laboratory of Novel Software Technology Department of Computer Science Nanjing University Nanjing China
This paper presents the design of a decentralized storage scheme to support multi-dimensional range queries over sensor networks. We build a distributed k-d tree based index structure over sensor network, so as to eff... 详细信息
来源: 评论
TMAC: Taint-based memory protection via access control
TMAC: Taint-based memory protection via access control
收藏 引用
2009 2nd International Conference on Dependability, DEPEND 2009
作者: Lei, Wang Chen, Fang Bing, Mao Li, Xie State Key Laboratory for Novel Software Technology Department of Computer Science Nanjing University Nanjing China
Memory corruption attacks account for most parts of malicious attacks toward software security. Recently dynamic taint analysis is proposed and is gaining momentum. This proposed technique attempts to defeat attacks b... 详细信息
来源: 评论
A hybrid approach to build prioritized pairwise interaction test suites
A hybrid approach to build prioritized pairwise interaction ...
收藏 引用
2009 International Conference on Computational Intelligence and software Engineering, CiSE 2009
作者: Chen, Xiang Gu, Qing Wang, Xinping Li, Ang Chen, Daoxu State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu 210093 China
Traditional interaction testing aims to build test suites that cover all t-way interactions of inputs. But in many test scenarios, the entire test suites cannot be fully run due to the limited budget. Therefore it is ... 详细信息
来源: 评论
Equality detection for linear arithmetic constraints
收藏 引用
Journal of Zhejiang University-science A(Applied Physics & Engineering) 2009年 第12期10卷 1784-1789页
作者: Li LI Kai-duo HE Ming GU Xiao-yu SONG Department of Computer Science and Technology Tsinghua University Beijing 100084 China School of Software Tsinghua University Beijing 100084 China MOE Key Laboratory for Information System Security Beijing 100084 China Department of Electrical and Computer Engineering Portland State University Oregon 97207 USA
Satisfiability modulo theories (SMT) play a key role in verification applications. A crucial SMT problem is to combine separate theory solvers for the union of theories. In previous work, the simplex method is used to... 详细信息
来源: 评论
SNN - A neural network based combination of software reliability growth models
SNN - A neural network based combination of software reliabi...
收藏 引用
1st International Conference on Information science and Engineering, ICISE2009
作者: Li, Ang Gu, Qing Feng, Guang-Cheng Chen, Dao-Xu State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China School of Computer Science and Engineering University of Aizu Japan
Applying SRGMs (software Reliability Growth Models) to real projects is a major concern in software reliability. Sometimes, it is hard to decide the best model for a specific project. Researchers have made a first ste... 详细信息
来源: 评论
Evolutionary Games on Weighted Newman-Watts Small-World Networks
收藏 引用
Chinese Physics Letters 2009年 第5期26卷 255-258页
作者: 杜文博 曹先彬 赵琳 周宏 Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology of China Hefei 230026 School of Life Sciences University of Science and Technology of China Hefei 230026
We investigate the evolutionary prisoner's dilemma game (PDG) on weighted Newman-Watts (NW) networks. In weighted NW networks, the link weight ωij is assigned to the link between the nodes i and j as: ωij = (... 详细信息
来源: 评论
Comparing and evaluating collection strategies in trust-based reputation systems in distributed environments
Comparing and evaluating collection strategies in trust-base...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, UIC-ATC 2009
作者: Zong, Bo Xu, Feng Pan, Jing Lv, Jian State Key Laboratory for Novel Software Technology Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Trust-based reputation system(TBRS) provides us an excellent decision-support tool for distributed environments. TBRS quantifies the trust relationships between entities based on the information that describes the ent... 详细信息
来源: 评论