咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是2311-2320 订阅
排序:
Adaptive multi-class support vector machine for microarray classification and gene selection
Adaptive multi-class support vector machine for microarray c...
收藏 引用
SICE Annual Conference
作者: Juntao Li Yingmin Jia Junping Du Fashan Yu Department of Systems and Control Beihang University Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo Henan China
This paper proposes an adaptive multi-class support vector machine for simultaneous microarray classification and gene selection. By evaluating the gene ranking significance, the adaptive multi-class support vector ma... 详细信息
来源: 评论
Clock model for soft real-time data
收藏 引用
Journal of Computational Information Systems 2008年 第4期4卷 1441-1445页
作者: Liu, Qizhi Gao, Xianfeng Hou, Xiaoliang Bai, Wenyang State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China
In some soft real-time systems, real-time data or data streams are held in relational databases as history data. In that case, many challenges will stem from relational model, such as layout of timestamp, efficiency, ... 详细信息
来源: 评论
Scoped Bellman-Ford Geographic Routing for Large Dynamic Wireless Sensor Networks
收藏 引用
Journal of computer science & technology 2008年 第6期23卷 944-956页
作者: 张学 洪爵 陆桑璐 谢立 曹建农 State Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing University Department of Electrical Engineering College of EngineeringNanjing Agricultural University Department of Computing Hong Kong Polytechnic University
Routing is a fundamental problem in wireless sensor networks. Most previous routing protocols are challenged when used in large dynamic networks as they suffer from either poor scalability or the void problem. In this... 详细信息
来源: 评论
Fast KD-tree construction method by probing the optimal splitting plane heuristically
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2009年 第2期32卷 185-192页
作者: Fan, Wen-Shan Wang, Bin Department of Computer Science and Technology Tsinghua University Beijing 100084 China School of Software Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
In the field of ray-tracing based photo-realistic rendering, kd-tree is used as an important acceleration structure. This paper focuses on the effective construction of kd-tree, and proposes a novel and fast construct... 详细信息
来源: 评论
Model Checking over Paraconsistent Temporal Logic
收藏 引用
Journal of Donghua University(English Edition) 2008年 第5期25卷 571-580页
作者: 陈冬火 王林章 崔家林 State Key Laboratory of Novel Software Technology Nanjing University School of Computer Science and Technology Soochow University Department of Information Science and Engineering Ningbo Institute of TechnologyZhejiang University
Classical logic cannot be used to effectively reason about concurrent systems with inconsistencies (inconsistencies often occur, especially in the early stage of the development, when large and complex concurrent syst... 详细信息
来源: 评论
A Power Control Scheme for Target Localization in WSN
收藏 引用
电子学报(英文版) 2008年 第3期17卷 443-448页
作者: GU Yu ZHAO Baohua Department of Computer Science University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
In this paper, we focus on the target tracking problem in sensor networks and propose an Powersaving target localization scheme (PSTL) based on a conjecture model that reflects the moving pattern of a target, and also... 详细信息
来源: 评论
Network security situational awareness model based on information fusion
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2009年 第3期46卷 353-362页
作者: Wei, Yong Lian, Yifeng Feng, Dengguo Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
Security situational awareness has become a hot topic in the area of network security research in recent years, which attracts the interest of more and more domestic and foreign researchers. The existing security situ... 详细信息
来源: 评论
Minimum-Energy Broadcast Trees in All-Wireless Networks
收藏 引用
电子学报(英文版) 2008年 第2期17卷 227-230页
作者: HU Tian ZHAO Baohua Department of Computer Science University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
This paper focuses on the problem of constructing the minimum-energy broadcast trees in all-wireless networks. We proposed a greedy algorithm called Greedy maximum-branch replacement algorithm (GMBR) to decrease the t... 详细信息
来源: 评论
Performance Flexibility Architecture of Core Service Platform for Next-Generation Network
收藏 引用
Tsinghua science and technology 2008年 第1期13卷 85-90页
作者: 杨孟辉 杨维康 王小鸽 廖建新 陈俊亮 Department of Computer Science and Technology Tsinghua University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
The hardware and software architectures of core service platforms for next-generation networks were analyzed to compute the minimum cost hardware configuration of a core service platform. This method gives a closed fo... 详细信息
来源: 评论
Constructing G1 quadratic Bezier curves with arbitrary endpoint tangent vectors
Constructing G1 quadratic Bezier curves with arbitrary endpo...
收藏 引用
11th IEEE International Conference on computer-Aided Design and computer Graphics(第11届IEEE国际计算机辅助设计与图形学学术会议 IEEE CAD/GRAPHICS 2009)
作者: He-Jin Gu Jun-Hai Yong Jean-Claude Paul Fuhua (Frank) Cheng Wuhan University of Technology Wuhan 430070 P. R. China Jiangxi Academy of Sciences Nanchang 3300 School of Software Tsinghua University Beijing 100084 P. R. China Key Laboratory for Information INRIA Le Chesnay Cedex 78153 France School of Software Tsinghua University Beijing 100084 P. R. Department of Computer Science University of Kentucky Lexington KY 40506-0046 USA
Quadratic Bézier curves are important geometric entities in many applications. However, it was often ignored by the literature the fact that a single segment of a quadratic Bézier curve may fail to fit arbit... 详细信息
来源: 评论