咨询与建议

限定检索结果

文献类型

  • 1,492 篇 会议
  • 1,201 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,700 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,456 篇 计算机科学与技术...
    • 1,168 篇 软件工程
    • 313 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 130 篇 电气工程
    • 124 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 66 篇 动力工程及工程热...
    • 59 篇 化学工程与技术
    • 41 篇 建筑学
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
  • 878 篇 理学
    • 541 篇 数学
    • 183 篇 物理学
    • 172 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 70 篇 化学
  • 540 篇 管理学
    • 335 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 50 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 42 篇 software
  • 40 篇 optimization
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 protocols
  • 33 篇 web services
  • 32 篇 deep learning
  • 32 篇 cloud computing

机构

  • 493 篇 state key labora...
  • 189 篇 department of co...
  • 150 篇 department of co...
  • 117 篇 national key lab...
  • 109 篇 state key labora...
  • 85 篇 state key labora...
  • 66 篇 department of co...
  • 63 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 60 篇 state key labora...
  • 52 篇 state key labora...
  • 50 篇 university of ch...
  • 45 篇 national key lab...
  • 37 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 31 篇 state key labora...
  • 31 篇 department of co...
  • 30 篇 college of compu...
  • 30 篇 beijing key labo...
  • 29 篇 department of co...

作者

  • 34 篇 yu huiqun
  • 34 篇 junping du
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 33 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 30 篇 yingmin jia
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 chen liqiong
  • 21 篇 qi lianyong
  • 21 篇 lu sanglu

语言

  • 2,402 篇 英文
  • 231 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2700 条 记 录,以下是2231-2240 订阅
排序:
Research of constructing algorithm to create D2FA
收藏 引用
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications 2009年 第SUPPL.期32卷 40-43+48页
作者: Zhou, Hao Liu, Zhen-Hua Zhao, Bao-Hua Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
Delayed input deterministic finite automata (D2FA) reduces the transition edges of deterministic finite automata (DFA) by introducing default edges. The relevance between DFA (∧X) and DFA (X) is analyzed to improve t... 详细信息
来源: 评论
Coalitional Planning in Game-like Domains via ATL Model Checking
Coalitional Planning in Game-like Domains via ATL Model Chec...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Jun Wu Chongjun Wang Lei Zhang Junyuan Xie National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Based on the planning via model checking paradigm, we address the problem of coalitional planning in this paper. Informally, coalitional planning is the problem of planning for a subset of agents in a multi-agent syst... 详细信息
来源: 评论
Enriched gabor feature based PCA for face recognition with one training image per person
Enriched gabor feature based PCA for face recognition with o...
收藏 引用
5th International Conference on Natural Computation, ICNC 2009
作者: Lu, Wei Sun, Wei Lu, Hongtao School of Information Science and Technology Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou 510275 China School of Software Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou 510275 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China
Gabor feature based classification approaches are widely used in face recognition, because they are insensitive to changes in illumination and facial expression. However, most of strategies only use the magnitude of t... 详细信息
来源: 评论
Internetware computing: Issues and perspective  09
Internetware computing: Issues and perspective
收藏 引用
1st Asia-Pacific Symposium on Internetware, Internetware 2009
作者: Tsai, Wei-Tek Jin, Zhi Bai, Xiaoying Department of Computer Science and Engineering Arizona State University Tempe AZ 85287 United States Tsinghua University Beijing China Key Laboratory of High Confidence Software Technologies Peking University Beijing 100871 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
The Internetware is a new initiative to develop software on the web for web applications. The open and dynamic nature of Internet applications suggest new ways of thinking will be needed for this initiative. This pape... 详细信息
来源: 评论
Model checking CTL based on complete abstraction interpretation
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2009年 第5期32卷 992-1001页
作者: Qian, Jun-Yan Xu, Bao-Wen School of Computer and Control Guilin University of Electronic Technology Guilin 541004 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Abstraction plays a fundamental role in combating state-space explosion in model checking. In a complete abstract interpretation-based view, the authors reduce the state space of a Kripke structure in order to obtain ... 详细信息
来源: 评论
A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network Protocols
A Security Calculus of Concurrent Objects for Verifying Ad H...
收藏 引用
International Conference on Network and System Security, NSS
作者: Qin Li Qingkai Zeng School of Computer Science Anhui University of Science and Technology China State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University China
We present a calculus of concurrent objects for specification and security analysis of ad hoc security protocols. The communicating nodes and the network are modeled by objects, while the interactions between them are... 详细信息
来源: 评论
Improvements on Teaching Methods and Contents for the "computer Organization and Architecture" Curriculum
Improvements on Teaching Methods and Contents for the "Compu...
收藏 引用
International Conference on Scalable Computing and Communications;International Conference on Embedded Computing, SCALCOM-EMBEDDEDCOM
作者: Chunfeng Yuan Yihua Huang Zhesheng Zhang Guihai Chen Wanchun Dou Department of Computer Science and Technology State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu China
"computer Organization and Architecture" is one of the most important fundamental courses for those majoring in computer science and engineering. The contents of the curriculum are crucial for entire compute... 详细信息
来源: 评论
Design pattern directed clustering for understanding open source code
Design pattern directed clustering for understanding open so...
收藏 引用
IEEE Workshop on Program Comprehension
作者: Zhixiong Han Linzhang Wang Liqian Yu Xin Chen Jianhua Zhao Xuandong Li State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu China
Program understanding plays an important role in the maintenance and reuse of open source code. Rapid evolving and bad documentation makes the understanding and reusing difficult. Design patterns are widely employed i... 详细信息
来源: 评论
Building Prioritized Pairwise Interaction Test Suites with Ant Colony Optimization
Building Prioritized Pairwise Interaction Test Suites with A...
收藏 引用
International Conference on Quality software
作者: Xiang Chen Qing Gu Xin Zhang Daoxu Chen State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu China
Interaction testing offers a stable cost-benefit ratio in identifying faults. But in many testing scenarios, the entire test suite cannot be fully executed due to limited time or cost. In these situations, it is essen... 详细信息
来源: 评论
A Decentralized Storage Scheme for Multi-Dimensional Range Queries over Sensor Networks
A Decentralized Storage Scheme for Multi-Dimensional Range Q...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Lei Xie Lijun Chen Daoxu Chen Li Xie State Key Laboratory of Novel Software Technology Department of Computer Science Nanjing University Nanjing China
This paper presents the design of a decentralized storage scheme to support multi-dimensional range queries over sensor networks. We build a distributed k-d tree based index structure over sensor network, so as to eff... 详细信息
来源: 评论