咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是2411-2420 订阅
排序:
Study on Communication Model Between Heterogeneous Operating Systems for a Wireless Sensor Network Middleware
收藏 引用
电子学报(英文版) 2007年 第3期16卷 543-546页
作者: LI Wenfeng WANG Ruchuan SUN Lijuan Department of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Focusing on the problem that two HOS (Heterogeneous operating systems) of wireless sensor network can't communicate with each other, and based on the comparative analysis on common-use communication models for the... 详细信息
来源: 评论
An empirical study on software development with open source components in the chinese software industry
收藏 引用
software Process: Improvement and Practice 2008年 第1期13卷
作者: Weibing Chen Jingyue Li Jianqiang Ma Reidar Conradi Junzhong Ji Chunnian Liu Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology Beijing University of Technology Beijing 100022 China Department of Computer and Information Science Norwegian University of Science and Technology (NTNU) NO-7491 Trondheim Norway
Chinese software companies are increasingly using open source software (OSS) components in software development. Development with OSS components faces challenges with respect to component selection, component integrat... 详细信息
来源: 评论
Models of parallel computation :a survey and classification
收藏 引用
中国高等学校学术文摘·计算机科学 2007年 第2期1卷 156-165页
作者: ZHANG Yunquan CHEN Guoliang SUN Guangzhong MIAO Qiankun Laboratory of Parallel Computing Institute of SoftwareChinese Academy of SciencesBeijing 100080China State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100080China Anhui Province-MOST Key Co-Lab of High Performance Computing and Its Applications Department of Computer Science and TechnologyUniversity of Science and Technology of ChinaHefei 230027China
In this paper,the state-of-the-art parallel computational model research is *** will introduce various models that were developed during the past *** to their targeting architecture features,especially memory organiza... 详细信息
来源: 评论
RoughTree: A classifier with Naive-Bayes and rough sets hybrid in decision tree representation
RoughTree: A classifier with Naive-Bayes and rough sets hybr...
收藏 引用
2007 IEEE International Conference on Granular Computing, GrC 2007
作者: Yangsheng, Ji Lin, Shang State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
This paper presents a semi-naive classifier named RoughTree, which is designed to alleviate the attribute interdependence problem of Naive Bayesian Classifier. RoughTree uses the attribute dependence detecting measure... 详细信息
来源: 评论
A Fuzzy Directed Graph-Based QoS Model for Service Composition
收藏 引用
Wuhan University Journal of Natural sciences 2007年 第5期12卷 861-865页
作者: GUO Sanjun DOU Wanchun FAN Shaokun State Key Laboratory for Novel Software Technology/ Department of Computer Science and Technology Nanjing University Nanjing 210093 Jiangsu China
Web service composition lets developers create applications on top of service-oriented computing and its native description, discovery, and communication capabilities. This paper mainly focuses on the QoS when the con... 详细信息
来源: 评论
Secure Two-Party Point-Circle Inclusion Problem
收藏 引用
Journal of computer science & technology 2007年 第1期22卷 88-91页
作者: 罗永龙 黄刘生 仲红 Department of Computer Science University of Science and Technology of China Hefei 230027 China Department of Computer Science Anhui Normal University Wuhu 241000 China Anhui Province Key laboratory of Software in Computing and Communication Hefei 230027 China
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present ... 详细信息
来源: 评论
An agent-based policy aware framework for Web Services security
An agent-based policy aware framework for Web Services secur...
收藏 引用
IFIP International Conference on Network and Parallel Computing
作者: Li, Jian-Xin Li, Bin Li, Liang Che, Tong-Sheng Department of Computer Science and Engineering Yangzhou University China State Key Laboratory for Novel Software Technology Nanjing University China
The security of Web Services has become one of the important research topics about the application of Web Services. In this paper, we propose an agent-based policy aware framework for Web Services security. In this fr... 详细信息
来源: 评论
Local reputation for P2P MMOG design
Local reputation for P2P MMOG design
收藏 引用
18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2007
作者: Shanshan, Liu Jinlong, Li Xufa, Wang Anhui Key Laboratory of Software in Computation and Communication Computer Science Department University of Science and Technology of China
The assignment of the computation and communication is one of the important problems in the design of peer-to-peer (P2P) Massively Multi-player Online Game (MMOG). A reputation mechanism for P2P MMOG is proposed in th... 详细信息
来源: 评论
A compositional multiple policies operating system security model
A compositional multiple policies operating system security ...
收藏 引用
8th International Workshop on Information Security Applications, WISA 2007
作者: Lei, Xia Wei, Huang Hao, Huang State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University 22 Hankou Road Nanjing 210093 China
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the trusted subjects it introduces to ha... 详细信息
来源: 评论
A policy language for adaptive Web services security framework
A policy language for adaptive Web services security framewo...
收藏 引用
SNPD 2007: 8th ACIS International Conference on software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Li, Jian-Xin Li, Bin Li, Liang Che, Tong-Sheng Department of Computer Science and Engineering Yangzhou University China State Key Laboratory for Novel Software Technology Nanjing University China
How to resolve access control on Web Services has become one of the important research tasks about the application of Web Services. In this paper, we propose a policy based adaptive Web Services security framework. In... 详细信息
来源: 评论