咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是2501-2510 订阅
排序:
Topological hole detection in sensor networks with cooperative neighbors
Topological hole detection in sensor networks with cooperati...
收藏 引用
2nd International Conference on Systems and Networks Communications, ICSNC 2006
作者: Kun, Bi Kun, Tu Naijie, Gu Wanli, Dong Xiaohu, Liu Department of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui 230027 China
In a wireless sensor network, the regions in which a large percentage of sensor nodes are not available may form holes in the network. In holes, sensor nodes may be depleted or not dense enough to communicate with oth... 详细信息
来源: 评论
Subsumption Checking between Concept Queries in Different Ontologies Based on Mutual Instances
收藏 引用
Wuhan University Journal of Natural sciences 2006年 第1期11卷 68-72页
作者: KANG Da-zhou LU Jian-jiang XU Bao-wen WANG Peng ZHOU Jin Department of Computer Science and Engineering NmtheastUniversity Nanjing 210096 Jiangsu China Jiangsu Institute of Software Quality Nanjing 210096 JiangsuChina Institute of Science The People's Liberation Army University of Science and Technology Nanjing 210007 Jiangsu China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 Hubei China
This paper proposes a checking method based on mutual instances and discusses three key problems in the method: how to deal with mistakes in the mutual instances and how to deal with too many or too few mutual instan... 详细信息
来源: 评论
Concept Approximation between Fuzzy Ontologies
收藏 引用
Wuhan University Journal of Natural sciences 2006年 第1期11卷 73-77页
作者: LI Yan-hui XU Bao-wen LU Jian-jiang KANG Da-zhou ZHOU Jing-jing Department of Computer Science and Engineering Southeast University Nanjing 210096 Jiangsu China Jiangsu Institute of Software Quality Nanjing 210096 JiangsuChina State Key Laboratory of Software Engineering Wuhan UniversityWuhan 430072 Hubei China Institute of Science The People's Liberation Army University of Science and Technology Nanjing 210007 Jiangsu China
Fuzzy ontologics are efficient tools to handle fuzzy and uncertain knowledge on the semantic web; but there are heterogeneity problems when gaining interoperability among different fuzzy ontologies. This paper uses co... 详细信息
来源: 评论
Study on Parallel Computing
收藏 引用
Journal of computer science & technology 2006年 第5期21卷 665-673页
作者: 陈国良 孙广中 张云泉 莫则尧 Anhui Province-MOST Key Co-Lab of High Performance Computing and Its Applications Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 P.R. China Laboratory of Parallel Computing Institute of Software Chinese Academy of Sciences Beijing 100080 P.R. China Laboratory of Computational Physics Institute of Applied Physics and Computational Mathematics Beijing 100088 P.R. China
In this paper, we present a general survey on parallel computing. The main contents include parallel computer system which is the hardware platform of parallel computing, parallel algorithm which is the theoretical ba... 详细信息
来源: 评论
Scenario-based component behavior derivation
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2006年 4260 LNCS卷 206-225页
作者: Zhang, Yan Hu, Jun Yu, Xiaofeng Zhang, Tian Li, Xuandong Zheng, Guoliang State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China
The reusability of components affects how much benefit we can get from the component based software development (CBSD). For enhancing the reuse of components, we propose an approach to derive the desired behavior from... 详细信息
来源: 评论
An entity-relationship model based conceptual framework for model driven development
An entity-relationship model based conceptual framework for ...
收藏 引用
IASTED International Conference on software Engineering, as part of the 24th IASTED International Multi-Conference on APPLIED INFORMATICS
作者: Duan, Yucong Cheung, Shing-Chi Fu, Xiaolan Gu, Yuqing Institute of Software Chinese Academy of Sciences China Department of Computer Science Hong Kong University of Science and Technology Hong Kong State Key Laboratory of Brain and Cognitive Science Institute of Psychology Chinese Academy of Sciences China
The Unified Modeling Language (UML) is a defacto notation for model driven software development (MDSD), emphasizing on model to model refinements and transformations. However UML may not be expressive enough to descri... 详细信息
来源: 评论
Comparison of static analysis technology for intrusion prevention
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第3期32卷 174-176+253页
作者: Wu, Chunmei Xia, Nai Mao, Bing State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
A testbed which includes the common vulnerabilities is built. The paper compares three typical and publicly available tools by applying them to the testbed individually for sake of preventing intrusion. The result rev... 详细信息
来源: 评论
PeerIDS - A Distributed Network Intrusion Detection System Based on the Peer-to-Peer Model
收藏 引用
通讯和计算机(中英文版) 2006年 第5期3卷 66-74页
作者: Shu Jin Fengyu Liu Manwu Xu Department of Computer Science Nanjing University of Science and Technology Nanjing 210094 China State Key Software Laboratory Nanjing University Nanjing 210093 China
来源: 评论
Zone routing protocol based on energy consumption
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第12期32卷 117-118+135页
作者: Zhai, Weifeng Gu, Naijie Zhang, Jianming Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei 230027 China
A zone routing protocol based on the energy consumption speed of nodes in mobile Adhoc networks is presented. A route select parameter computed by residual lifetime of nodes and hop count of route is used to be select... 详细信息
来源: 评论
Novel Ad hoc network troubleshooting system
收藏 引用
Journal of Computational Information Systems 2006年 第3期2卷 981-986页
作者: Li, Qianmu Wang, Yuan Xu, Manwu Zhang, Hong Liu, Fengyu State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science Nanjing University of Science and Technology Nanjing 210094 China
Due to the rapid development of Ad hoc network system, the traditional methods like vulnerability scanning to analyze network troubleshooting are confronted with the large challenge, because it is difficult to find fo... 详细信息
来源: 评论