咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是2541-2550 订阅
排序:
Information extraction for eb resource
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第10期32卷 74-76页
作者: Zhu, Yongsheng Wu, Gangshan State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
With the widespread use of Internet and the development of information technology, there are a tremendous amount of news information resource. The ability to quickly obtain useful resource from the huge news informati... 详细信息
来源: 评论
Dynamic software architecture oriented approach to online evolution
收藏 引用
Ruan Jian Xue Bao/Journal of software 2006年 第6期17卷 1360-1371页
作者: Yu, Ping Ma, Xiao-Xing Lu, Jian Tao, Xian-Ping State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
An increasingly important requirement for software systems is the capability to evolve dynamically according to the changes of computing environment and users' need during runtime. In this paper, a dynamic softwar... 详细信息
来源: 评论
Evaluation method for trusted channel based on protocol analysis
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2006年 第8期29卷 1329-1336页
作者: Li, Qin Zeng, Qing-Kai State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Trusted channel provides various security services for information products in the environment of insecure networks. It has become a focused problem that whether the services of trusted channel provided by security pr... 详细信息
来源: 评论
Anomaly detection model based on dynamic behavior and character patterns
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2006年 第9期29卷 1553-1560页
作者: Lin, Guo-Yuan Guo, Shan-Qing Huang, Hao Cao, Tian-Jie State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China School of Computer China University of Mining and Technology Xuzhou 221008 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 China
Differing from existed anomaly detection methods which only dealt with the frequencies of system calls or local variation, the paper puts forward a model named DBCPIDS. It took in both dynamic behavior and character p... 详细信息
来源: 评论
Detection algorithm for multi-step attack based on CTPN
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2006年 第8期29卷 1383-1391页
作者: Yan, Fen Huang, Hao Yin, Xin-Chun State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Engineering Technology Institute Yangzhou University Yangzhou 225009 China
As a matter of fact, most attacks are not single attack action. They are multi-step attacks which are composed by a set of attack actions. How to detect multi-step attack is an important aspect of IDS research. The tr... 详细信息
来源: 评论
Energy efficient and location-independent QoS protocol for wireless sensor networks
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2006年 第6期43卷 1019-1026页
作者: Mao, Yingchi Gong, Haigang Liu, Ming Chen, Daoxu Xie, Li State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China Computer and Information Engineering College Hehai University Nanjing 210098 China
Wireless sensor networks often face the critical problem of maintaining the sufficient sensing coverage (QoS) at an application specific level while keeping a small number of nodes active at any time to save energy. T... 详细信息
来源: 评论
Distributed energy-efficient location-independent coverage protocol in wireless sensor networks
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2006年 第2期43卷 187-195页
作者: Mao, Yingchi Liu, Ming Chen, Lijun Chen, Daoxu Xie, Li State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China School of Computer and Information Engineering Hehai University Nanjing 210098 China
One of the major challenges in constructing WSNs is to maintain long network lifetime as well as sufficient sensing area. In this paper, the broad problems of coverage in WSNs are discussed, and coverage protocols dep... 详细信息
来源: 评论
Fast matching algorithm based on image gray value
收藏 引用
Ruan Jian Xue Bao/Journal of software 2006年 第2期17卷 216-222页
作者: Li, Qiang Zhang, Bo Department of Computer Science and Technology Tsinghua University Beijing 100084 China State Key Laboratory of Intelligent Technology and Systems Tsinghua University Beijing 100084 China
Correlation algorithms based on pixel gray value are very popular and widely used in image template matching. However, these algorithms have high time complexity and are sensitive to the variation of image luminance a... 详细信息
来源: 评论
Adaptive ant clustering algorithm
收藏 引用
Ruan Jian Xue Bao/Journal of software 2006年 第9期17卷 1884-1889页
作者: Xu, Xiao-Hua Chen, Ling College of Information Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China Department of Computer Science and Engineering Yangzhou University Yangzhou 225009 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Enlightened by the behaviors of gregarious ant colonies, an artificial ant movement (AM) model and an adaptive ant clustering (AAC) algorithm for this model are presented. In the algorithm, each ant is treated as an a... 详细信息
来源: 评论
Negotiation-based approach for software process collaboration
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2006年 第2期43卷 314-320页
作者: Zhao, Xinpei Li, Mingshu Chan, Keith Wang, Qing Laboratory for Internet Software Technology Institute of Software Chinese Academy of Sciences Beijing 100080 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
Large-scale software development typically requires participation of multiple people. One motivation of the participants to collaborate with others is to maximize the profit they may gain from the software development... 详细信息
来源: 评论