咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是2281-2290 订阅
排序:
Automated Design of Logic Circuits with a Increasable Evolution Approach
Automated Design of Logic Circuits with a Increasable Evolut...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Guoliang He Naixue Xiong Athanasios V. Vasilakos Yuanxiang Li Zhongzhi Shi State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Key Laboratory of Intelligent Information Process Institute of Computing Technology Chinese Academy and Sciences Beijing China Department of Computer Science Georgia State University USA Department of Computer Science Saint Francis Xavier University Canada
Since the scalability of logic circuits is becoming larger and more complex, the auto-design is becoming more and more difficult. In order to improve automatic design and performance evaluation of logic circuits in ef... 详细信息
来源: 评论
DFTT4CWS: A Testing Tool for Composite Web Services Based on Data-Flow
DFTT4CWS: A Testing Tool for Composite Web Services Based on...
收藏 引用
Web Information Systems and Applications Conference (WISA)
作者: Jun Hou Lei Xu School of Computer Science and Engineering South-East University Nanjing China China Telecom Jiangsu Hongxin System Integration Company Limited Nanjing China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
For large and complex composite Web services which are composed by BPEL and a set of WSDL and XSD documents, we urgently need the aid of the tools in designing and selecting test cases. However, most of mature testing... 详细信息
来源: 评论
Designing a Credit Approval System Using Web Services, BPEL, and AJAX
Designing a Credit Approval System Using Web Services, BPEL,...
收藏 引用
IEEE International Conference on e-Business Engineering (ICEBE)
作者: Vincent C.T. Chan Dickson K.W. Chiu Michelle Watson Patrick C.K. Hung Haiyang Hu Hua Hu Yi Zhuang Department of Computer Science & Engineering Hong Kong University of Science and Technology Hong Kong China Faculty of Business and IT University of Ontario Institute of Technology (UOIT) Canada College of Computer Science and Information Engineering Zhejiang Gongshang University China State Key Laboratory for Novel Software Technology Nanjing University China College of Computer Science Hangzhou Dianzi University China
In the business world, financial institutions, like banks and investment firms, heavily rely on technology to manipulate daily operations and support business. Many more business processes have now become automated an... 详细信息
来源: 评论
Enhanced Pictorial Structures for precise eye localization under incontrolled conditions
Enhanced Pictorial Structures for precise eye localization u...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Xiaoyang Tan Fengyi Song Zhi-Hua Zhou Songcan Chen Department of Computer Science and Engineering Nanjing University of Aeronautics and Astronautics Nanjing China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China
In this paper, we present an enhanced pictorial structure (PS) model for precise eye localization, a fundamental problem involved in many face processing tasks. PS is a computationally efficient framework for part-bas... 详细信息
来源: 评论
Differential Fault Analysis on SHACAL-1
Differential Fault Analysis on SHACAL-1
收藏 引用
Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
作者: Ruilin Li Chao Li Chunye Gong Department of Mathematics and System Science Science College National University of Defense Technology Changsha China State Key Laboratory of Information Security Institute of Software Chinese Academy and Sciences Beijing China School of Computer National University of Defense Technology Changsha China
SHACAL-1, known as one of the finalists of the NESSIE project, originates from the compression component of the widely used hash function SHA-1. The requirements of confusion and diffusion are implemented through mixi... 详细信息
来源: 评论
Model Checking Needham-Schroeder Security Protocol Based on Temporal Logic of Knowledge
Model Checking Needham-Schroeder Security Protocol Based on ...
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Xiangyu Luo Yan Chen Ming Gu Lijun Wu School of Software Key Laboratory of Security for Information System of Ministry of Education Tsinghua University Beijing China Department of Computer Science Guilin University of Electronic Technology Guilin China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the... 详细信息
来源: 评论
Solid texture synthesis using Position Histogram Matching
Solid texture synthesis using Position Histogram Matching
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Jiating Chen Bin Wang Department of Computer Science and Technology Tsinghua University Beijing China Ministry of Education Key Laboratory of Information System Security Beijing China School of Software Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China
In the past, several approaches have been proposed to produce high quality solid textures. Unfortunately, they often suffer from several synthesis artifacts, such as color blurry, bad texture structures, introducing a... 详细信息
来源: 评论
Frequent Items Mining on Data Stream Based on Time Fading Factor
Frequent Items Mining on Data Stream Based on Time Fading Fa...
收藏 引用
International Conference on Artificial Intelligence and Computational Intelligence (AICI)
作者: Shan Zhang Ling Chen Li Tu Department of Computer Science and Engineering Yangzhou University Yangzhou China State Key Laboratory of Novel Software Tech Nanjing University Nanjing China Department of Computer Science Yangzhou University Yangzhou China Institute of Information Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China
Most of the existing algorithms for mining frequent items on data stream do not emphasis the importance of the recent data items. We present an algorithm using a fading factor to detect the data items with frequency c... 详细信息
来源: 评论
Translation-Based Model Checking for PLC Programs
Translation-Based Model Checking for PLC Programs
收藏 引用
IEEE Annual International computer software and Applications Conference (COMPSAC)
作者: Min Zhou Fei He Ming Gu Xiaoyu Song Key Laboratory of ISS of MOE Tsinghua National Laboratory of Information Science and Technology School of Software Tsinghua University Beijing China ECE Department Portland State University Portland USA
In this paper, we focus on modeling and verification of PLC systems, which are widespread in industry and manufacture. Our approach is based on a translation procedure from PLC programs to timed automata. The resultin... 详细信息
来源: 评论
Trapping in scale-free networks with hierarchical organization of modularity
收藏 引用
Physical Review E 2009年 第5期80卷 051120-051120页
作者: Zhongzhi Zhang Yuan Lin Shuyang Gao Shuigeng Zhou Jihong Guan Mo Li School of Computer Science Fudan University Shanghai 200433 China Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai 200433 China Department of Computer Science and Technology Tongji University 4800 Cao’an Road Shanghai 201804 China Software School Fudan University Shanghai 200433 China
A wide variety of real-life networks share two remarkable generic topological properties: scale-free behavior and modular organization, and it is natural and important to study how these two features affect the dynami... 详细信息
来源: 评论