咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是2631-2640 订阅
排序:
A METHOD TO APPROACH OPTIMAL RESTORATION IN IMAGE RESTORATION PROBLEMS WITHOUT NOISE ENERGY INFORMATION
收藏 引用
Acta Mathematica Scientia 2003年 第4期23卷 512-520页
作者: 曾三友 丁立新 康立山 State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China Deptartment of Computer Science Zhuzhou Institute of Technology Zhuzhou 402008 China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China
This paper proposes a new image restoration technique, in which the resulting regularized image approximates the optimal solution steadily. The affect of the regular-ization operator and parameter on the lower band an... 详细信息
来源: 评论
Solving A Kind of High Complexity Multi-Objective Problems by A Fast Algorithm
收藏 引用
Wuhan University Journal of Natural sciences 2003年 第S1期8卷 183-188页
作者: Zeng San-you, Ding Li-xin, Kang Li-shandepartment of computer science,China University of Geosciences, Wuhan 430074, Hubei, China department of computer science, Zhuzhou Institute of technology , Zhuzhou 412008, Hunan, China state key laboratory of software Engineering, Wuhan University, Wuhan 430072, Hubei, China Department of Computer Science China University of GeoSciences Wuhan Hubei China Department of Computer Science Zhuzhou Institute of Technology Zhuzhou Hunan China State Key Laboratory of Software Engineering Wuhan University Wuhan Hubei China
A fast algorithm is proposed to solve a kind of high complexity multi-objective problems in this paper. It takes advantages of both the orthogonal design method to search evenly, and the statistical optimal method to ... 详细信息
来源: 评论
Attribute reduction of rough sets in mining market value functions
Attribute reduction of rough sets in mining market value fun...
收藏 引用
IEEE/WIC International Conference on Web Intelligence, WI 2003
作者: Huang, Jiajin Liu, Chunnian Ou, Chuangxin Yao, Y.Y. Zhong, N. Mutimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing University of Technology Beijing China Department of Computer Science University of Regina ReginaSKS4S 0A2 Canada Department of Information Engineering Macbashi Institute of Technology Maebashi-City371-0816 Japan
The linear model of market value functions is a new method for direct marketing. Just like other methods in direct marketing, attribute reduction is very important to deal with large databases. We apply the algorithm ... 详细信息
来源: 评论
Collaborative Intrusion Detection Based on Coordination Agent
Collaborative Intrusion Detection Based on Coordination Agen...
收藏 引用
The Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies
作者: Ran Zhang Depei Qian Heng Chen Weiguo Wu Department of Computer Science and Technology Xi'an Jiaotong University State Key Laboratory on Software Development Environment Beihang University
Based on the analysis of characteristics of current attacks,a collaborative intrusion detection model using coordination agent is *** this paper defines the inner structure of intrusion detection agents, introduces it... 详细信息
来源: 评论
Solving Integer Programming by Evolutionary Soft Agent
收藏 引用
Wuhan University Journal of Natural sciences 2003年 第S1期8卷 283-286页
作者: Yin Jiandepartment of computer science, Zhongshan University, Guangzhou 510275,Guangdong, Chinastate key laboratory for Novel software technology, Nanjing University, Nanjing 210093, Jiangsu, China Department of Computer Science Zhongshan University Guangzhou Guangdong China State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu China
Many practical problems in commerce and industry involve finding the best way to allocate scarce resources a-mong competing activities. This paper focuses on the problem of integer programming, and describes an evolut... 详细信息
来源: 评论
Intrusion discovery with data mining on Honeynet
Intrusion discovery with data mining on Honeynet
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jian Yin Gang Zhang Yi-Qun Chen Department of Computer Science Zhongshan University Guangzhou China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
In order to construct a secure network, attack and intrusion mode of intruders are analyzed for improving the capability of IDS and firewall systems. This paper presents a method for constructing a network intrusion a... 详细信息
来源: 评论
Collaborative intrusion detection based on coordination agent
Collaborative intrusion detection based on coordination agen...
收藏 引用
IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
作者: Ran Zhang Depei Qian Heng Chen Weiguo Wu Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China State Key Laboratory on Software Development Environment Beihang University Beijing China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an
Based on the analysis of characteristics of current attacks, a collaborative intrusion detection model using coordination agent is proposed. Then we define the inner structure of intrusion detection agents, introduces... 详细信息
来源: 评论
Seamless provisioning of service in the ubiquitous computing environment
Seamless provisioning of service in the ubiquitous computing...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: En-Yi Chen De-Gan Zhang Yuan-Chun Shi Guang-You Xu The State Key Laboratory of Intelligence System and Technology Department of Computer Science and Technology Tsinghua University Beijing China
In the ubiquitous computing environment (UCE), how to seamlessly provision the service or application to its occupant or its mobile user is an interesting research topic. This paper introduces our two UCEs called smar... 详细信息
来源: 评论
Design of a parser for real-time process algebra
Design of a parser for real-time process algebra
收藏 引用
Canadian Conference on Electrical and computer Engineering (CCECE)
作者: Jianhua Zhao Yingxu Wang State Key Laboratory of Novel Software Technology Department of Computer Science and Technology University of Calgary Nanjing University Jiangsu China Theoretical and Empirical Software Engineering Research Centre Department of Electrical and Computer Engineering University of Calgary Calgary AB Canada
The real-time process algebra (RTFA) is a set of new mathematical notations for formally describing software system architectures, and static and dynamic behaviors. To bring RTPA into industrial software development p... 详细信息
来源: 评论
Online recommendation based on customer shopping model in e-commerce  03
Online recommendation based on customer shopping model in e-...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Junzhong Ji Zhiqiang Sha Chunnian Liu Ning Zhong College of Computer Science and Technology Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology Beijing University of Technology Beijing China Department of Information Engineering Maebashi Institute of Technology Maebashi Japan
As e-commerce developing rapidly, it is becoming a research focus about how to capture or find customer's behavior patterns and realize commerce intelligence by use of Web mining technology. Recommendation system ... 详细信息
来源: 评论