咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是2211-2220 订阅
排序:
Lily: Ontology alignment results for OAEI 2009
Lily: Ontology alignment results for OAEI 2009
收藏 引用
4th International Workshop on Ontology Matching, OM-2009 - Collocated with the 8th International Semantic Web Conference, ISWC-2009
作者: Wang, Peng Xu, Baowen College of Software Engineering Southeast University China State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China
This paper presents the alignment results of Lily for the ontology alignment contest OAEI 2009. Lily is an ontology mapping system, and it has four functions: generic ontology matching, large scale ontology matching, ... 详细信息
来源: 评论
Mining emerging patterns for recognizing activities of multiple users in pervasive computing
Mining emerging patterns for recognizing activities of multi...
收藏 引用
2009 6th Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2009
作者: Gu, Tao Wu, Zhanqing Wang, Liang Tao, Xianping Lu, Jian Department of Mathematics and Computer Science University of Southern Denmark State Key Laboratory for Novel Software Technology Nanjing University China
Understanding and recognizing human activities from sensor readings is an important task in pervasive computing. Existing work on activity recognition mainly focuses on recognizing activities for a single user in a sm... 详细信息
来源: 评论
Modeling and integrating aspects with UML activity diagrams  09
Modeling and integrating aspects with UML activity diagrams
收藏 引用
24th Annual ACM Symposium on Applied Computing, SAC 2009
作者: Cui, Zhanqi Wang, Linzhang Li, Xuandong Xu, Dianxiang State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu 210093 China Department of Computer Science North Dakota State University Fargo ND 58105 United States
Dealing with crosscutting concerns has been a critical problem in software development processes. Aspect-Oriented Programming (AOP) provides a viable programming-level solution by separating crosscutting concerns from... 详细信息
来源: 评论
Slicing Java Generic Programs Using Generic System Dependence Graph
收藏 引用
Wuhan University Journal of Natural sciences 2009年 第4期14卷 304-308页
作者: CHEN Lin1,2,XU Baowen1,2 1.state key laboratory for Novel software technology,Nanjing University,Nanjing 210093,Jiangsu China 2.department of computer science and technology,Nanjing University,Nanjing 210093,Jiangsu China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 Jiangsu China Department of Computer Science and Technology Nanjing University Nanjing 210093 Jiangsu China
The existing slicing algorithms do not consider parameterized types in generic programs, so they are not suitable for generic programs. To solve this problem, this paper presents a generic system dependence graph for ... 详细信息
来源: 评论
A Sensor Network-Based Data Stream Clustering Algorithm for Pervasive Computing
收藏 引用
电子学报(英文版) 2009年 第2期18卷 255-258页
作者: YE Ning WANG Ruchuan Institute of Computer Science Nanjing University of Posts and Telecommunications Nanjing 210003 China Department of Information Science Nanjing College ]or Population Programme Management Nanjing 210042 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Pervasive computing is characterized by the integration with communication and digital media technology embedded to the people's living space. People can transparently access the digital service anywhere. Wireless... 详细信息
来源: 评论
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution  16
IntScope: Automatically Detecting Integer Overflow Vulnerabi...
收藏 引用
16th Symposium on Network and Distributed System Security, NDSS 2009
作者: Wang, Tielei Wei, Tao Lin, Zhiqiang Zou, Wei Key Laboratory of Network and Software Security Assurance Institute of Computer Science and Technology Peking University China Department of Computer Science Purdue University United States
The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, we present a system, IntScope, which can automatically detect integer overflow vulnerabilities in x...
来源: 评论
CORE: A trust model for agent coalition formation
CORE: A trust model for agent coalition formation
收藏 引用
5th International Conference on Natural Computation, ICNC 2009
作者: Zhou, Qing-Hua Wang, Chong-Jun Xie, Jun-Yuan National Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
CORE, a trust model is proposed trying to solve agent coalition formation problem. The model characterizes an agent's trust from two aspects of competence and reputation. In the paper, the Euclidean distance formu... 详细信息
来源: 评论
A frequency domain analysis based gait feature representation
A frequency domain analysis based gait feature representatio...
收藏 引用
2009 International Conference on Computational Intelligence and software Engineering, CiSE 2009
作者: Mu, Hong-Bo Yu, Xin-Cen Wang, Chong-Jun Department of Computer Science and Technology Nanjing University Nanjing China Software Institute Nanjing University Nanjing China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China
A method for representing gait feature based on frequency domain analysis is proposed. For a gait represented by a sequence of binarized silhouettes, its frequency domain feature is extracted following period detectio... 详细信息
来源: 评论
Pollution attack: A new attack against localization in wireless sensor networks
Pollution attack: A new attack against localization in wirel...
收藏 引用
2009 IEEE Wireless Communications and Networking Conference, WCNC 2009
作者: Zeng, Yingpei Cao, Jiannong Zhang, Shigeng Guo, Shanqing Xie, Li State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computing Hong Kong Polytechnic University Hong Kong School of Computer Science and Technology Shandong University Jinan China
Many secure localization algorithms have been proposed. In these algorithms, collusion attack is usually considered as the strongest attack when evaluating their performance. Also, for ensuring correct localization un... 详细信息
来源: 评论
Analyzing feasibility of requirement driven service composition
Analyzing feasibility of requirement driven service composit...
收藏 引用
2nd International Workshop on computer science and Engineering, WCSE 2009
作者: Chen, Liqiong Fan, Guisheng Liu, Yunxiang Liu, Dongmei Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai 200235 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China
In a service-oriented architecture, how to analyze the feasibility of service composition according to the requirements of service consumers has become a problem that must be solved in service composition. A method fo... 详细信息
来源: 评论