咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是2451-2460 订阅
排序:
A New Channel Parameter For Cognitive Radio
A New Channel Parameter For Cognitive Radio
收藏 引用
International Conference on Cognitive Radio Oriented Wireless Networks and Communications
作者: Ping Zhu Jinglong Li Kun Han Xufa Wang Anhui Province Key Laboratory of Software in Computing and Communication Department of Computer Science and Technology University of Science and Technology Hefei Anhui China
Spectrum leasing has made more efficient utilization for the limited spectrum resource. While increasing the spectrum utilization, spectrum leasing also brings in some problem. Spectrum switch in the leasing process n... 详细信息
来源: 评论
An Agent-based Policy Aware Framework for Web Services Security
An Agent-based Policy Aware Framework for Web Services Secur...
收藏 引用
IFIP International Conference on Network and Parallel Computing Workshops (NPC Workshops)
作者: JIAN-XIN LI BIN LI LIANG LI TONG-SHENG CHE Department of Computer Science and Engineering Yangzhou University China State Key Laboratory for Novel Software Technology Nanjing University China
The security of Web services has become one of the important research topics about the application of Web services. In this paper, we propose an agent-based policy aware framework for Web services security. In this fr... 详细信息
来源: 评论
A Policy Language for Adaptive Web Services Security Framework
A Policy Language for Adaptive Web Services Security Framewo...
收藏 引用
ACIS International Conference on software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Jian-Xin Li Bin Li Liang Li Tong-Sheng Che Department of Computer Science and Engineering Yangzhou University China State Key Laboratory for Novel Software Technology Nanjing University China
How to resolve access control on Web services has become one of the important research tasks about the application of Web services. In this paper, we propose a policy based adaptive Web services security framework. In... 详细信息
来源: 评论
Self-interested Nodes Modeling in Mobile Wireless Ad Hoc Networks
Self-interested Nodes Modeling in Mobile Wireless Ad Hoc Net...
收藏 引用
第三届IEEE无线通讯、网络技术暨移动计算国际会议
作者: Jun Wu Chongjun Wang Shifu Chen National Key Laboratory for Novel Software Technology (Nanjing University) Department of Computer Science and Technology Nanjing University Nanjing 210093
The Increasing adoption of the techniques of mobile wireless ad hoc network in the field of civilian applications arouses many urgent problems. As we known nodes to consist a MANET may belong to different users, thus ... 详细信息
来源: 评论
The Learning-Bargaining Algorithm Used in Unlicensed Spectrum Pre-Allocation
The Learning-Bargaining Algorithm Used in Unlicensed Spectru...
收藏 引用
第三届IEEE无线通讯、网络技术暨移动计算国际会议
作者: Kun Han Jinlong Li Ping Zhu Xufa Wang Anhui Province Key Laboratory of Software in Computing and Communication Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China
In the wireless network of finite spectrum resource, some communication users probably do not allocate the spectrum so that their communication should be delayed. Thus it is necessary to arrange the communication time... 详细信息
来源: 评论
Immune genetic programming based on register-stack structure
Immune genetic programming based on register-stack structure
收藏 引用
Congress on Evolutionary Computation
作者: Zeming Zhang Wenjian Luo Xufa Wang Nature Inspired Computation and Applications Laboratory Department of Computer Science and Technology University of Science and Technology Hefei China Nature Inspired Computation and Applications Laboratory Department of Computer Science and Technology and Anhui Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei China
Inspired by biological immune principles, a novel Immune Genetic Programming based on Register-Stack structure (rs-IGP) is proposed in this paper. In rs-IGP, an antigen represents a problem to be solved, and an antibo... 详细信息
来源: 评论
Self-adaptive method dealing with the end issue of EMD
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2007年 第10期35卷 1944-1948页
作者: Shao, Chen-Xi Wang, Jian Fan, Jin-Feng Yang, Ming Wang, Zi-Cai MOE-Microsoft Key Laboratory of Multimedia Computing and Communication University of Science and Technology of China Hefei 230026 China Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 China Control and Simulation Center Harbin Institute of Technology Harbin 150001 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
The empirical mode decomposition (EMD) developed by Huang etc. of NASA is an advanced method for signal analysis. But there is an involved end issue in the course of getting two envelops of the data using spline inter... 详细信息
来源: 评论
A Global-Energy-Balancing Real-Time Routing in Wireless Sensor Networks
A Global-Energy-Balancing Real-Time Routing in Wireless Sens...
收藏 引用
IEEE Asia-Pacific Conference on Services Computing (APSCC)
作者: Peilong Li Yu Gu Baohua Zhao Department of Computer Science Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
Many applications in wireless sensor networks like video surveillance have the requirement of timely data delivery. Real-time routing is needed in these applications. Because of the limitation of node energy, energy e... 详细信息
来源: 评论
Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks
Secure Location Verification Using Hop-Distance Relationship...
收藏 引用
IEEE Asia-Pacific Conference on Services Computing (APSCC)
作者: Yongsheng Liu Hao Zhou Baohua Zhao Department of Computer Science Anhui Province Key Laboratory of Software in Computing and Communication University of Science and Technology Hefei Anhui China
With the growing prevalence of wireless sensor networks comes a new need for location-based access control mechanisms. Thus we need a method to perform location verification to enforce location-based access to informa... 详细信息
来源: 评论
A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks
A Secure Routing Protocol with Malicious Nodes Detecting and...
收藏 引用
IEEE Asia-Pacific Conference on Services Computing (APSCC)
作者: Yuan-xi Jiang Bao-hua Zhao Department of Computer Science Anhui Province Key Laboratory of software in Computing and Communication University of Science and Technology Hefei Anhui China
Routing protocol security is the key element in the research of secure wireless sensor networks. Due to its special characteristic, designing security routing protocol is a challenge in these networks. A secure routin... 详细信息
来源: 评论