咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是2221-2230 订阅
排序:
An approach to analyzing dynamic trustworthy service composition
An approach to analyzing dynamic trustworthy service composi...
收藏 引用
4th Asian Conference on the Semantic Web, ASWC 2009
作者: Fan, Guisheng Yu, Huiqun Chen, Liqiong Liu, Dongmei Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai 200235 China
Service composition and related technologies have provided favorable means for building complex Web software systems. It may span multiple organizational units requires particular considerations on trustworthy issues.... 详细信息
来源: 评论
PSF-constraints based iterative blind deconvolution method for image deblurring
PSF-constraints based iterative blind deconvolution method f...
收藏 引用
16th International Multimedia Modeling Conference on Advances in Multimedia Modeling, MMM 2010
作者: Mo, Xuan Jiao, Jun Shen, Chen Department of Automation State Key Laboratory of Intelligent Technology and Systems Tsinghua University Beijing China Dept. of Computer Science and Technology Nanjing University Nanjing China School of Software and Electronics Peking University Beijing China
In recent years, Image Deblurring techniques have played an essential role in the field of Image Processing. In image deblurring, there are several kinds of blurred image such as motion blur, defocused blur and gaussi... 详细信息
来源: 评论
Removing local irregularities of triangular meshes with highlight line models
收藏 引用
science in China(Series F) 2009年 第3期52卷 418-430页
作者: YONG JunHai DENG BaiLin CHENG FuHua WANG Bin WU Kun GU HeJin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Department of Computer Science University of Kentucky Lexington KY 40506-0046 USA Key Laboratory for Information System Security Ministry of Education of China Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China jianaxi Academy of Sciences. Nanchang 330029. China
The highlight line model is a powerful tool in assessing the quality of a surface. It increases the flexibility of an interactive design environment. In this paper, a method to generate a highlight line model on an ar... 详细信息
来源: 评论
SWCA: A secure weighted clustering algorithm in wireless ad hoc networks
SWCA: A secure weighted clustering algorithm in wireless ad ...
收藏 引用
2009 IEEE Wireless Communications and Networking Conference, WCNC 2009
作者: Zeng, Yingpei Cao, Jiannong Guo, Shanqing Yang, Kai Xie, Li State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong School of Computer Science and Technology Shandong University Jinan China
Clustering has been widely used in wireless ad hoc networks for various purposes such as routing, broadcasting and Qos. Many clustering algorithms have been proposed. However, most of them implicitly assume that nodes... 详细信息
来源: 评论
On maximum stability with enhanced scalability in high-churn DHT deployment
On maximum stability with enhanced scalability in high-churn...
收藏 引用
38th International Conference on Parallel Processing, ICPP-2009
作者: Xie, Junfeng Li, Zhenhua Chen, Guihai Wu, Jie State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Engineering Florida Atlantic University Boca Raton FL 33431 United States
When applied in a commercial deployment, DHTbased P2P protocols face a dilemma: Although most real-world participants are so unstable that the maintenance overhead is prohibitively high, they must be effectively utili... 详细信息
来源: 评论
A Workflow Framework for Intelligent Service Composition
A Workflow Framework for Intelligent Service Composition
收藏 引用
International Conference on Grid and Pervasive Computing Workshops, GPC
作者: Xudong Song Wanchun Dou Wei Song Department of Computer Science and Technology State Key Laboratory for Novel Software Technology Nanjing China
Generally, service composition and its evaluation are initiated by web services' functional and non-functional attributes. To select qualified services and compose them into a service composition framework manuall... 详细信息
来源: 评论
Tighter and convex maximum margin clustering
Tighter and convex maximum margin clustering
收藏 引用
12th International Conference on Artificial Intelligence and Statistics, AISTATS 2009
作者: Li, Yu-Feng Tsang, Ivor W. Kwok, James T. Zhou, Zhi-Hua National Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China School of Computer Engineering Nanyang Technological University Singapore 639798 Singapore Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Maximum margin principle has been successfully applied to many supervised and semi-supervised problems in machine learning. Recently, this principle was extended for clustering, referred to as Maximum Margin Clusterin... 详细信息
来源: 评论
Design pattern directed clustering for understanding open source code
IEEE International Conference on Program Comprehension
收藏 引用
IEEE International Conference on Program Comprehension 2009年 295-296页
作者: Han, Zhixiong Wang, Linzhang Yu, Liqian Chen, Xin Zhao, Jianhua Li, Xuandong State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu 210093 China
Program understanding plays an important role in the maintenance and reuse of open source code. Rapid evolving and bad documentation makes the understanding and reusing difficult. Design patterns are widely employed i... 详细信息
来源: 评论
SkipStream: A Clustered Skip Graph Based On-demand Streaming Scheme over Ubiquitous Environments
SkipStream: A Clustered Skip Graph Based On-demand Streaming...
收藏 引用
International Conference on Parallel Processing (ICPP)
作者: Qifeng Yu Tianyin Xu Baoliu Ye Sanglu Lu Daoxu Chen State Key Laboratory of Novel Software and Technology Department of Computer Science and Technology Nanjing University China
Providing continuous on-demand streaming services with VCR functionality over ubiquitous environments is challenging due to the stringent QoS requirements of streaming service as well as the dynamic characteristics of... 详细信息
来源: 评论
Dependence Analysis for C Programs with Combinability of Dataflow Facts under Consideration
收藏 引用
Wuhan University Journal of Natural sciences 2009年 第4期14卷 321-326页
作者: QIAN Ju XU Baowen ZHOU Xiaoyu CHEN Lin SHI Liang College of Information Science and Technology NanjingUniversity of Aeronautics and Astronautics Nanjing 210016Jiangsu China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 Jiangsu China Department of Computer Science and Technology NanjingUniversity Nanjing 210093 Jiangsu China School of Computer Science and Engineering SoutheastUniversity Nanjing 211189 Jiangsu China Microsoft China Research and Development Group Beijing100080 China
To avoid the precision loss caused by combining data- flow facts impossible to occur in the same execution path in dependence analysis for C programs, this paper first proposes a flow-sensitive and context-insensitive... 详细信息
来源: 评论