咨询与建议

限定检索结果

文献类型

  • 1,473 篇 会议
  • 1,215 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,464 篇 计算机科学与技术...
    • 1,179 篇 软件工程
    • 317 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 131 篇 电气工程
    • 121 篇 电子科学与技术(可...
    • 91 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
    • 37 篇 建筑学
  • 890 篇 理学
    • 551 篇 数学
    • 182 篇 物理学
    • 172 篇 生物学
    • 150 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 544 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 55 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 38 篇 feature extracti...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 cloud computing
  • 29 篇 deep learning

机构

  • 507 篇 state key labora...
  • 201 篇 department of co...
  • 151 篇 department of co...
  • 118 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 63 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 49 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...
  • 27 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 30 篇 zhang lijun
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 21 篇 gao yang
  • 21 篇 lu sanglu
  • 21 篇 xu xiaolong

语言

  • 2,520 篇 英文
  • 89 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2696 条 记 录,以下是2571-2580 订阅
排序:
Duration-constrained regular expressions
Duration-constrained regular expressions
收藏 引用
作者: Xuandong, Li Jianhua, Zhao Tao, Zheng Yong, Li Guoliang, Zheng State Key Laboratory of Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing Jiangsu 210093 China
This paper investigates the logic-automata-connection for Duration Calculus. It has been frequently observed that Duration Calculus with linear duration terms comes close to being a logic of linear hybrid automata. We... 详细信息
来源: 评论
An adaptive routing strategy based on dynamic cache in mobile ad hoc networks
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2004年 3358卷 357-366页
作者: Chen, YueQuan Guo, XiaoFeng Zeng, QingKai Chen, Guihai State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University 210093 Nanjing China
The dynamic changes of the topology caused by the movement of nodes makes routing become one of the key problems in the mobile Ad Hoc Networks (MANET). So how to optimize routing becomes a hot and difficult topic, amo... 详细信息
来源: 评论
An adaptive routing strategy based on dynamic cache in mobile ad hoc networks  04
收藏 引用
Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
作者: YueQuan Chen XiaoFeng Guo QingKai Zeng Guihai Chen State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
The dynamic changes of the topology caused by the movement of nodes makes routing become one of the key problems in the mobile Ad Hoc Networks (MANET). So how to optimize routing becomes a hot and difficult topic, amo...
来源: 评论
Verifying compositional designs for scenario-based timing specifications
Verifying compositional designs for scenario-based timing sp...
收藏 引用
International Symposium on Object-Oriented Real-Time Distributed Computing
作者: Li Xuandong Zhao Jianhua Gong Jiayu Shi Yaoxin Zheng Guoliang State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu China
In this paper, we use networks of UML statechart diagrams to model compositional designs for real-time systems, and present an algorithm for checking networks of statechart diagrams for the scenario-based specificatio... 详细信息
来源: 评论
TSS: A hybrid web searches
收藏 引用
Advanced Workshop on Content Computing, AWCC 2004
作者: Han, Li-Xin Chen, Gui-Hai Xie, Li Department of Mathematics Nanjing University Nanjing210093 China Department of Computer Science and Engineering Hohai University Nanjing210024 China State Key Laboratory of Novel Software Technology Nanjing University Nanjing210093 China
Because of emergence of Semantic Web, It make possible for machines to understand the meaning of resources on the Web. The widespread availability of machine understandable information will impact on Information retri... 详细信息
来源: 评论
Relational peculiarity oriented data mining
Relational peculiarity oriented data mining
收藏 引用
Proceedings - Fourth IEEE International Conference on Data Mining, ICDM 2004
作者: Zhong, Ning Liu, Chunnian Yao, Y.Y. Ohshima, Muneaki Huang, Mingxin Huang, Jiajin Department of Information Engineering Maebashi Institute of Technology 460-1 Kamisadori-Cho Maebashi 371-0816 Japan Computer Science College Beijing University of Technology Multimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing 100022 China Department of Computer Science University of Regina Regina Sask. S4S 0A2 Canada
Peculiarity rules are a new type of interesting rules which can be discovered by searching the relevance among peculiar data. A main task of mining peculiarity rules is the identification of peculiarity. Traditional m... 详细信息
来源: 评论
A multiobjective genetic algorithm for distributed database management
A multiobjective genetic algorithm for distributed database ...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Xunxue Cui Chuang Lin State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Tsinghua University Beijing China
It is important to reduce access latency and network traffic in distributed database management problem (DDMP). This problem has been formulated as a multiobjective combinatorial optimization problem in the paper. A n... 详细信息
来源: 评论
A Method of Acquiring Ontology Information from Web Documents
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2004年 3314卷 1041-1046页
作者: Han, Lixin Chen, Guihai Xie, Li Department of Mathematics Nanjing University China State Key Laboratory of Novel Software Technology Nanjing University China Department of Computer Science and Engineering Hohai University China
Ontology plays an important role on the Semantic Web. In this paper, we propose a method, AOIWD, of acquiring ontology information from Web documents. The AOIWD method employs data mining techniques combined with infe... 详细信息
来源: 评论
Multi-events analysis for anomaly intrusion detection
Multi-events analysis for anomaly intrusion detection
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jian Yin Gang Zhang Yi-Qun Chen Xian-Li Fan Department of Computer Science Zhongshan University Guangzhou China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Probabilistic methods are widely used in intrusion detection especially in computer audit data analysis. There are many famous probabilistic algorithm such as decision tree, Hotelling's T2, chi-square, first-order... 详细信息
来源: 评论
Real time facial expression recognition with AdaBoost
Real time facial expression recognition with AdaBoost
收藏 引用
International Conference on Pattern Recognition
作者: Yubo Wang Haizhou Ai Bo Wu Chang Huang Department of Computer Science and Technology State Key Laboratory of Intelligent Technology and Systems Tsinghua University Beijing China
In this paper, we propose a novel method for facial expression recognition. The facial expression is extracted from human faces by an expression classifier that is learned from boosting Haar feature based look-up-tabl... 详细信息
来源: 评论