咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是2331-2340 订阅
排序:
Modeling non-repudiation in distributed systems
收藏 引用
Information technology Journal 2008年 第1期7卷 228-230页
作者: Zheng, Hong Du, YuYue Yu, ShuXia Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
As an important security service in distributed systems, non-repudiation is required to implement evidence generating or validating in the application layer. Formal methods are powerful tools to provide security servi... 详细信息
来源: 评论
Technical framework for Internetware: An architecture centric approach
收藏 引用
science in China(Series F) 2008年 第6期51卷 610-622页
作者: YANG FuQing1,2, Lü Jian3,4 & MEI Hong1,2 1 key laboratory of High Confidence software Technologies (Peking University), Ministry of Education, Beijing 100871, China 2 School of Electronics Engineering and computer science, Peking University, Beijing 100871, China 3 state key laboratory for Novel software technology, Nanjing 210093, China 4 department of computer science and technology, Nanjing University, Nanjing 210093, China 1. Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education Beijing 100871 China 2. School of Electronics Engineering and Computer Science Peking University Beijing 100871 China 3. State Key Laboratory for Novel Software Technology Nanjing 210093 China 4. Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Being a new software paradigm evolved by the Internet, Internetware brings many challenges to the traditional software methods and techniques. Sponsored by the national basic research program (973), researchers in C... 详细信息
来源: 评论
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme
收藏 引用
Journal of computer science & technology 2008年 第2期23卷 265-269页
作者: 刘胜利 陈晓峰 张方国 Department of Computer Science and Engineering Shanghai Jiao Tong UniversityShanghai 200240China State Key Laboratory of Information SecurityInstitute of SoftwareChinese Academy of Sciences Beijing 100080China Department of Computer Science School of Information Science and TechnologySun Yat-Sen University Guangzhou 510275China Department of Electronics and Communication Engineering School of Information Science and Technology Sun Yat-Sen UniversityGuangzhou 510275China
Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system Very recently, Wang, Tang and Li proposed a neW ID-based restrictive partially blind signature (ID-RPB... 详细信息
来源: 评论
Improved variance shadow maps based on non-linear wrapping
收藏 引用
Journal of Information and Computational science 2008年 第6期5卷 2415-2421页
作者: Lv, Weiwei Liu, Xuehui Wu, Enhua State Key Laboratory of Computer Science Institute of Software Chinese Acad. of Sci. Beijing 100190 China Department of Computer and Information Science Faculty of Science and Technology University of Macau Macau China Graduate University of Chinese Academy of Sciences Beijing 100190 China
Variance shadow maps algorithm reduces aliasing by pre-filtering the depth texture from which an occlusion probability up-bound is computed. But for scenes with high depth complexity this method is unable to correctly... 详细信息
来源: 评论
Research Progress of Trust Evaluation Model
收藏 引用
Wuhan University Journal of Natural sciences 2008年 第4期13卷 391-395页
作者: ZHOU Guoqiang PAN Fangrui ZHANG Weifeng GUO Jian Department of Computer Science and Technology Nanjing University/State Key Laboratory of Novel Software TechnologyNanjing 210093 Jiangsu China College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China
software systems in distributed environment are changing from a close and relatively static form, whose users are familiar with each other, to an open and highly dynamic mode, which can be visited by public. In such c... 详细信息
来源: 评论
Analysis and Design of Mobile Model for DTN
收藏 引用
电子学报(英文版) 2009年 第4期
作者: LIN Zhiting LIN Zhiting QU Yugui QU Yugui JI Yusheng JI Yusheng ZHAO Baohua ZHAO Baohua Department of Computer Science University of Science and Technology of China Hefei 230027 China Department of Computer Science University of Science and Technology of China Hefei 230027 China Province Key Laboratory of Software in Computing and Communication Hcfei 230027 China Province Key Laboratory of Software in Computing and Communication Hcfei 230027 China Information Systems Architecture Science Research Division National Institute of Info~natics Tokyo Japan) Information Systems Architecture Science Research Division National Institute of Info~natics Tokyo Japan)
来源: 评论
DDoS attack detection based on compensation non-parameter CUSUM algorithm
DDoS attack detection based on compensation non-parameter CU...
收藏 引用
2008 International Conference on Security and Management, SAM 2008
作者: Fen, Yan Yiqun, Chen Xinchun, Yin Hao, Huang State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu China Department of Computer Science and Engineering Technology Institute Yangzhou University Yangzhou Jiangsu China
The researches focus in DDoS attack detection on target-end network. A new method to detect DDoS attacks based on TCP is given. For DDoS attacks based on TCP, many unacknowledged segments of both communication sides w... 详细信息
来源: 评论
The distributed diagnosis system of vehicles based on TH-OSEK embedded platform
The distributed diagnosis system of vehicles based on TH-OSE...
收藏 引用
2008 IEEE Vehicle Power and Propulsion Conference, VPPC 2008
作者: Yang, Qing Sun, Xiaomin Department of Computer Science and Technology State Key Laboratory of Intelligent Technology and Systems Tsinghua University Beijing 100084 China
We proposed a fully-software distributed failure diagnosis system for vehicles based on the TH-OSEK realtime embedded OS platform we previously developed. The diagnosis system puts all the ECUs into a virtual logical ... 详细信息
来源: 评论
A vision-based algorithm for landing Unmanned Aerial Vehicles
A vision-based algorithm for landing Unmanned Aerial Vehicle...
收藏 引用
International Conference on computer science and software Engineering, CSSE 2008
作者: Fan, Yang Haiqing, Shi Hong, Wang Department of Computer Science and Technology State Key Laboratory of Intelligent Technology and Systems Tsinghua University Beijing 100084 China
Autonomous landing is an important part of the autonomous control of Unmanned Aerial Vehicles (UAVs). In this article we present the design and implementation of a vision algorithm for autonomous landing. We use an on... 详细信息
来源: 评论
Location dependent cooperative caching in MANET
Location dependent cooperative caching in MANET
收藏 引用
37th International Conference on Parallel Processing, ICPP 2008
作者: Wang, Yilin Chan, Edward Li, Wenzhong Lu, Sanglu Department of Computer Science City University of Hong Kong Hong Kong Hong Kong State Key Laboratory for Novel Software Technology Nanjing University China
Location Dependent information Services (LDISs) are gaining increasing popularity in recent years. Due to limited client power and untermittent connectivity, caching is an Important approach to improve the performance... 详细信息
来源: 评论