咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是2351-2360 订阅
排序:
一种三维模型的单笔画编辑方法
一种三维模型的单笔画编辑方法
收藏 引用
第六届智能CAD与数字娱乐学术会议
作者: Zhang Feiqian 章菲倩 Sun Zhengxing 孙正兴 Zhang Yaoye 张尧烨 Song Mofei 宋沫飞 State Key Laboratory for Novel Software Technology Nanjing University 210093 China 南京大学计算机软件新技术国家重点实验室 南京210093 Department of Computer Science and Technology Nanjing University 210093 China 南京大学计算机科学与技术系 南京210093
手绘草图界面是三维模型编辑最自然的方式。本文提出了一种基于单笔画的三维模型编辑方法,该方法的主要特点在于两个方面:一是依据三维模型轮廓的数学特征,采用对象空间三维模型轮廓提取方法,能更有效地提取适于手绘草图编辑的三维... 详细信息
来源: 评论
基于手绘草图的三维树木建模
基于手绘草图的三维树木建模
收藏 引用
第六届智能CAD与数字娱乐学术会议
作者: Wang Bin 王斌 Sun Zhengxing 孙正兴 Zhang Yaoye 张尧烨 Zhang Yan 张岩 State Key Laboratory for Novel Software Technology Nanjing University 210093 China 南京大学计算机软件新技术国家重点实验室 南京市210093 Department of Computer Science and Technology Nanjing University 210093 China 南京大学计算机科学与技术系 南京市210093
本文提出了一种基于手绘草图的三维树木建模方法,使得用户可手绘输入多种简易草图生成所需树木模型。首先,由用户输入树木草图来表示所需树木模型的结构及整体形状。然后,利用基于规则的方法在草图基础上生成新的二维树枝,形成完整... 详细信息
来源: 评论
基于手绘草图的交互式发型建模方法
基于手绘草图的交互式发型建模方法
收藏 引用
第六届智能CAD与数字娱乐学术会议
作者: Wang Bin 王斌 Sun Zhengxing 孙正兴 ZhangYaoye 张尧烨 Zhang Yan 张岩 State Key Laboratory for Novel Software Technology Nanjing University 210093 China 南京大学计算机软件新技术国家重点实验室 南京市210093 Department of Computer Science and Technology Nanjing University 210093 China 南京大学计算机科学与技术系 南京市210093
Hairstyle is an important feature of virtual human character in computer ***, which is an important part of hair modeling, is aimed to model the shape of static hair. It'sdifficulty to ensure both hair realism and... 详细信息
来源: 评论
A MDE Based Approach for Bridging Formal Models
A MDE Based Approach for Bridging Formal Models
收藏 引用
第二届IFIP/IEEE软件工程理论基础国际研讨会(TASE 2008)(Second IFIP/IEEE International Symposium on Theoretical Aspects of software Engineering)
作者: Tian Zhang Frederic Jouault Jean Bezivin Jianhua Zhao State Key Laboratory for Novel Software Technology Department of Computer Science & Technology Nanji ATLAS team INRIA & LINA Nantes University 44300 Nantes France State Key Laboratory for Novel Software Technology Department of Computer Science & Technology Nanji
Different formal methods have presented plenty of formal models for system specification and proof. Hence the problem of bridging these formal models rises. MDE is a new paradigm in software engineering, which impleme... 详细信息
来源: 评论
Mitigating energy holes based on transmission range adjustment in wireless sensor networks  5
Mitigating energy holes based on transmission range adjustme...
收藏 引用
5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008
作者: Song, Chao Cao, Jiannong Liu, Ming Zheng, Yuan Gong, Haigang Chen, Guihai School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610054 China Department of Computing Internet and Mobile Computing Laboratory Hong Kong Polytechnic University Hong Kong Hong Kong State Key Laboratory for Novel Software Technology Nanjing University Nanjing210093 China
In a wireless sensor network (WSN), the energy hole problem is a key factor which affects the lifetime of the networks. In a WSN with circular multi-hop deployment (modeled as concentric coronas), sensors in one coron... 详细信息
来源: 评论
A probabilistic approach to consistency checking for pervasive context
A probabilistic approach to consistency checking for pervasi...
收藏 引用
5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
作者: Huang, Yu Ma, Xiang Tao, Xianping Cao, Jiannong Lu, Jian State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflicting contexts and cannot decide how to ad... 详细信息
来源: 评论
Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions
Biomapping: Privacy trustworthy biometrics using noninvertib...
收藏 引用
作者: Shi, Jinyang You, Zhiyang Gu, Ming Lam, Kwok-Yan Key Laboratory for Information System Security Ministry of Education Tsinghua University China Department of Computer Science and Technology Tsinghua University China School of Software Tsinghua University China
Biometric authentication and privacy protection are conflicting issues in a practical system. Since biometrics cannot be revoked or canceled if compromised duo to the permanent association with the user, privacy-prese... 详细信息
来源: 评论
Cluster filtered KNN: A WLAN-based indoor positioning scheme
Cluster filtered KNN: A WLAN-based indoor positioning scheme
收藏 引用
IEEE International Symposium on World of Wireless Mobile and Multimedia Networks (WoWMoM)
作者: Jun Ma Xuansong Li Xianping Tao Jian Lu State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Location Based Service (LBS) is one kind of ubiquitous applications whose functions are based on the locations of clients. The core of LBS is an effective positioning system. As wireless LAN (WLAN) costs less and is e... 详细信息
来源: 评论
How and How Much Should We Disclose?
How and How Much Should We Disclose?
收藏 引用
International Conference on Pervasive Computing and Applications (ICPCA)
作者: Kai Dong Wentian Lu Zhen Qin Yu Huang Xianping Tao Jian Lu State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Privacy risks result in great barriers to the long-term success of pervasive computing. Unfortunately, related researches can still be considered in its infancy. Access control is widely used for privacy protection. H... 详细信息
来源: 评论
Proportion-Integral Power Control for Wireless Ad Hoc Networks
Proportion-Integral Power Control for Wireless Ad Hoc Networ...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Xue Zhang Zhuo Li Sanglu Lu Daoxu Chen Xining Li State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Power control plays an important role in wireless communications. However, most existing power control protocols are not efficient enough to be applied in real ad hoc network systems. In this paper, we propose PIPC (P... 详细信息
来源: 评论