咨询与建议

限定检索结果

文献类型

  • 1,473 篇 会议
  • 1,215 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,464 篇 计算机科学与技术...
    • 1,179 篇 软件工程
    • 317 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 131 篇 电气工程
    • 121 篇 电子科学与技术(可...
    • 91 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
    • 37 篇 建筑学
  • 890 篇 理学
    • 551 篇 数学
    • 182 篇 物理学
    • 172 篇 生物学
    • 150 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 544 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 55 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 38 篇 feature extracti...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 cloud computing
  • 29 篇 deep learning

机构

  • 507 篇 state key labora...
  • 201 篇 department of co...
  • 151 篇 department of co...
  • 118 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 63 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 49 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...
  • 27 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 30 篇 zhang lijun
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 21 篇 gao yang
  • 21 篇 lu sanglu
  • 21 篇 xu xiaolong

语言

  • 2,520 篇 英文
  • 89 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2696 条 记 录,以下是2591-2600 订阅
排序:
A framework for Web applications testing
A framework for Web applications testing
收藏 引用
International Conference on Cyberworlds
作者: Lei Xu Baowen Xu Department of Computer Science & Engineering Jiangsu Institute of Software Quality South-East University Nanjing China State Key Laboratory of Software Engineering Wuhan University of China Wuhan China School of Computers National University of Defense Technology Changsha China
Web application testing is concerned with numerous and complicated testing objects, methods and processes. So a testing framework fitting for the properties of Web application is needed to guide and organize all the t... 详细信息
来源: 评论
A 3D Virtual Shopping Mall That Has the Intelligent Virtual Purchasing Guider and Cooperative Purchasing Functionalities
A 3D Virtual Shopping Mall That Has the Intelligent Virtual ...
收藏 引用
The 8th International Conference on computer Supported Cooperative Work in Design(第八届计算机支持的协同工作设计国际会议)(CSCWD2004)
作者: Yiming Zhao Lijun Guo Xiaoli Wang Zhigeng Pan Department of Computer Science & Technology NingBo UniversityNingbo315211China State Key Laboratory of CAD&CG.Zheiiang University Hangzhou 310027 China
This paper represents a multi-user interactive virtualpurchasing environment realized by technologies suchas multi-agent, VRML, JAVA3D, XML and thecomputer network. In this environment, there is asymbol with mood for ... 详细信息
来源: 评论
Benchmarking algorithms for dynamic travelling salesman problems
Benchmarking algorithms for dynamic travelling salesman prob...
收藏 引用
Congress on Evolutionary Computation
作者: Lishan Kang Aimin Zhou B. McKay Yan Li Zhuo Kang State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Department of Computer Science & Technology China University of Geoscience Wuhan China School of IT & EE University of New South Wales Canberra Australia Computer Center Wuhan University Wuhan China
Dynamic optimisation problems are becoming increasingly important; meanwhile, progress in optimisation techniques and in computational resources are permitting the development of effective systems for dynamic optimisa... 详细信息
来源: 评论
Application of fuzzy neural network in the system of concrete undamaged inspection
Application of fuzzy neural network in the system of concret...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Jing Xu Qingchun Meng Songsen Yang Wen Zhang Changhong Song Department of Civil Engineering Qingdao Institute of Architecture and Engineering Qingdao China Department of Computer Science Ocean University of China Qingdao China State Key Laboratory of Intelligent Technology and Systems Tsinghua University Beijing China
The accuracy of concrete strength inspection has a great influence on the safety evaluation of the building. In order to increase the accuracy, Fuzzy Neural Network (FNN) was built up to evaluate concrete stmngth: It ... 详细信息
来源: 评论
A METHOD TO APPROACH OPTIMAL RESTORATION IN IMAGE RESTORATION PROBLEMS WITHOUT NOISE ENERGY INFORMATION
收藏 引用
Acta Mathematica Scientia 2003年 第4期23卷 512-520页
作者: 曾三友 丁立新 康立山 State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China Deptartment of Computer Science Zhuzhou Institute of Technology Zhuzhou 402008 China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China
This paper proposes a new image restoration technique, in which the resulting regularized image approximates the optimal solution steadily. The affect of the regular-ization operator and parameter on the lower band an... 详细信息
来源: 评论
Solving A Kind of High Complexity Multi-Objective Problems by A Fast Algorithm
收藏 引用
Wuhan University Journal of Natural sciences 2003年 第S1期8卷 183-188页
作者: Zeng San-you, Ding Li-xin, Kang Li-shandepartment of computer science,China University of Geosciences, Wuhan 430074, Hubei, China department of computer science, Zhuzhou Institute of technology , Zhuzhou 412008, Hunan, China state key laboratory of software Engineering, Wuhan University, Wuhan 430072, Hubei, China Department of Computer Science China University of GeoSciences Wuhan Hubei China Department of Computer Science Zhuzhou Institute of Technology Zhuzhou Hunan China State Key Laboratory of Software Engineering Wuhan University Wuhan Hubei China
A fast algorithm is proposed to solve a kind of high complexity multi-objective problems in this paper. It takes advantages of both the orthogonal design method to search evenly, and the statistical optimal method to ... 详细信息
来源: 评论
Attribute reduction of rough sets in mining market value functions
Attribute reduction of rough sets in mining market value fun...
收藏 引用
IEEE/WIC International Conference on Web Intelligence, WI 2003
作者: Huang, Jiajin Liu, Chunnian Ou, Chuangxin Yao, Y.Y. Zhong, N. Mutimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing University of Technology Beijing China Department of Computer Science University of Regina ReginaSKS4S 0A2 Canada Department of Information Engineering Macbashi Institute of Technology Maebashi-City371-0816 Japan
The linear model of market value functions is a new method for direct marketing. Just like other methods in direct marketing, attribute reduction is very important to deal with large databases. We apply the algorithm ... 详细信息
来源: 评论
Collaborative Intrusion Detection Based on Coordination Agent
Collaborative Intrusion Detection Based on Coordination Agen...
收藏 引用
The Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies
作者: Ran Zhang Depei Qian Heng Chen Weiguo Wu Department of Computer Science and Technology Xi'an Jiaotong University State Key Laboratory on Software Development Environment Beihang University
Based on the analysis of characteristics of current attacks,a collaborative intrusion detection model using coordination agent is *** this paper defines the inner structure of intrusion detection agents, introduces it... 详细信息
来源: 评论
Solving Integer Programming by Evolutionary Soft Agent
收藏 引用
Wuhan University Journal of Natural sciences 2003年 第S1期8卷 283-286页
作者: Yin Jiandepartment of computer science, Zhongshan University, Guangzhou 510275,Guangdong, Chinastate key laboratory for Novel software technology, Nanjing University, Nanjing 210093, Jiangsu, China Department of Computer Science Zhongshan University Guangzhou Guangdong China State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu China
Many practical problems in commerce and industry involve finding the best way to allocate scarce resources a-mong competing activities. This paper focuses on the problem of integer programming, and describes an evolut... 详细信息
来源: 评论
Intrusion discovery with data mining on Honeynet
Intrusion discovery with data mining on Honeynet
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jian Yin Gang Zhang Yi-Qun Chen Department of Computer Science Zhongshan University Guangzhou China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
In order to construct a secure network, attack and intrusion mode of intruders are analyzed for improving the capability of IDS and firewall systems. This paper presents a method for constructing a network intrusion a... 详细信息
来源: 评论