咨询与建议

限定检索结果

文献类型

  • 4,690 篇 期刊文献
  • 1,458 篇 会议
  • 1 册 图书

馆藏范围

  • 6,149 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,147 篇 工学
    • 2,372 篇 计算机科学与技术...
    • 1,460 篇 软件工程
    • 825 篇 机械工程
    • 687 篇 控制科学与工程
    • 670 篇 仪器科学与技术
    • 617 篇 信息与通信工程
    • 454 篇 电子科学与技术(可...
    • 349 篇 网络空间安全
    • 183 篇 材料科学与工程(可...
    • 120 篇 交通运输工程
    • 92 篇 光学工程
    • 83 篇 电气工程
    • 73 篇 建筑学
    • 71 篇 航空宇航科学与技...
    • 62 篇 动力工程及工程热...
    • 61 篇 土木工程
    • 55 篇 化学工程与技术
    • 41 篇 地质资源与地质工...
  • 1,414 篇 管理学
    • 1,331 篇 管理科学与工程(可...
    • 90 篇 工商管理
  • 857 篇 理学
    • 404 篇 数学
    • 200 篇 系统科学
    • 124 篇 物理学
    • 49 篇 生物学
    • 42 篇 化学
  • 175 篇 艺术学
    • 175 篇 设计学(可授艺术学...
  • 154 篇 经济学
    • 150 篇 应用经济学
  • 150 篇 教育学
    • 131 篇 教育学
  • 99 篇 医学
    • 57 篇 临床医学
  • 97 篇 军事学
    • 86 篇 军队指挥学
  • 58 篇 农学
  • 37 篇 文学
  • 15 篇 法学
  • 9 篇 哲学
  • 5 篇 历史学

主题

  • 70 篇 internet
  • 69 篇 设计
  • 64 篇 计算机网络
  • 57 篇 数据挖掘
  • 55 篇 遗传算法
  • 55 篇 计算机
  • 43 篇 xml
  • 43 篇 网络安全
  • 41 篇 simulation
  • 38 篇 面向对象
  • 35 篇 genetic algorith...
  • 31 篇 agent
  • 30 篇 java
  • 28 篇 人工智能
  • 27 篇 computer simulat...
  • 27 篇 数据库
  • 26 篇 cad
  • 26 篇 无线传感器网络
  • 24 篇 虚拟现实
  • 23 篇 关联规则

机构

  • 215 篇 华中科技大学
  • 120 篇 武汉理工大学
  • 110 篇 中国科学技术大学
  • 109 篇 国防科技大学
  • 109 篇 电子科技大学
  • 103 篇 山东大学
  • 95 篇 天津大学
  • 92 篇 北京科技大学
  • 83 篇 清华大学
  • 74 篇 南京理工大学
  • 74 篇 哈尔滨工业大学
  • 67 篇 苏州大学
  • 66 篇 上海交通大学
  • 58 篇 北京理工大学
  • 57 篇 山东科技大学
  • 57 篇 西安电子科技大学
  • 55 篇 武汉大学
  • 52 篇 华南理工大学
  • 51 篇 南京信息工程大学
  • 49 篇 四川大学

作者

  • 385 篇 china
  • 51 篇 p.r.china
  • 26 篇 钟珞
  • 22 篇 wuhan
  • 21 篇 王汝传
  • 21 篇 china)
  • 20 篇 涂序彦
  • 19 篇 beijing
  • 16 篇 杨炳儒
  • 14 篇 p. r. china
  • 13 篇 jiangsu
  • 12 篇 李涛
  • 11 篇 shanghai
  • 10 篇 战守义
  • 10 篇 hubei
  • 10 篇 harbin
  • 10 篇 夏红霞
  • 10 篇 王宝树
  • 9 篇 changsha
  • 9 篇 刘刚

语言

  • 3,826 篇 中文
  • 2,323 篇 英文
检索条件"作者=2.school of computer and Communications Engineering,university of science and technology Beijing,Beijing 100083,china"
6149 条 记 录,以下是41-50 订阅
排序:
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of computer science and technology,beijing university of technology,beijing 100124,china 2 State Key Laboratory of Integrated Services Network,Xidian university,Xi’an 710071,china 3 State Key Laboratory of Information Security (Graduate university of Chinese Academy of sciences),beijing 100049,china 4 State Key Laboratory of Networking and Switching technology,beijing university of Posts and Tele-communications,beijing 100876,china College of computer science and technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China State Key Laboratory of Information Security (Graduate university of Chinese Academy of sciences) Beijing 100049 China State Key Laboratory of Networking and Switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A variational method for contour tracking via covariance matching
收藏 引用
science china(Information sciences) 2012年 第11期55卷 2635-2645页
作者: WU YuWei,MA Bo & LI Pei beijing Laboratory of Intelligent Information technology,school of computer science,beijing Institute of technology,beijing 100081,china 1. beijing Laboratory of Intelligent Information technology School of Computer Science Beijing Institute of Technology Beijing 100081 China
This paper presents a novel formulation for contour *** model the second-order statistics of image regions and perform covariance matching under the variational level set ***,covariance matrix is adopted as a visual o... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Human knowledge acquisition from 3D interaction in virtual environments
收藏 引用
science china(Information sciences) 2012年 第7期55卷 1528-1540页
作者: CHENG Cheng,JIANG Ru & DONG XueMei beijing Laboratory of Intelligent Information technology,school of computer science,beijing Institute of technology,beijing 100081,china 1. beijing Laboratory of Intelligent Information technology School of Computer Science Beijing Institute of Technology Beijing 100081 China
Recently,virtual environment (VE) based design and planning,which is a kind of interaction intensive computing,has shown great *** users of such systems are specialists or technicians and their 3D interactions with th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Technical framework for Internetware: An architecture centric approach
收藏 引用
science in china(Series F) 2008年 第6期51卷 610-622页
作者: YANG FuQing1,2, Lü Jian3,4 & MEI Hong1,2 1 Key Laboratory of High Confidence Software Technologies (Peking university), Ministry of Education, beijing 100871, china 2.school of Electronics engineering and computer science, Peking university, beijing 100871, china 3 State Key Laboratory for Novel Software technology, Nanjing 210093, china 4 Department of computer science and technology, Nanjing university, Nanjing 210093, china 1. Key Laboratory of High Confidence Software Technologies (Peking university) Ministry of Education Beijing 100871 China 2. school of Electronics engineering and computer science Peking University Beijing 100871 China 3. State Key Laboratory for Novel Software technology Nanjing 210093 China 4. Department of computer science and technology Nanjing University Nanjing 210093 China
Being a new software paradigm evolved by the Internet, Internetware brings many challenges to the traditional software methods and techniques. Sponsored by the national basic research program (973), researchers in C... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A user-space file system for on-demand legacy desktop software
收藏 引用
science china(Information sciences) 2011年 第6期54卷 1142-1150页
作者: ZHANG YouHui 1,2 , SU GeLin 1,2 & ZHENG WeiMin 1,2 1 Department of computer science and technology, Tsinghua university, beijing 100084, china 2 Tsinghua National Laboratory for Information science and technology, Tsinghua university, beijing 100084, china 1. Department of computer science and technology Tsinghua University Beijing 100084 China2. Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing 100084 China
Some user-level virtualization technologies have been used to convert legacy software (like the existing Windows desktop applications) into the on-demand software without any modification. To give the client a friendl... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An algorithm to compute maximal contractions for Horn clauses
收藏 引用
science china(Information sciences) 2011年 第2期54卷 244-257页
作者: LUO Jie & LI Wei State Key Laboratory of Software Development Environment, school of computer science and technology, Beihang university, beijing 100191, china 1. State Key Laboratory of Software Development Environment School of Computer Science and Technology Beihang University Beijing 100191 China
In the theory of belief revision, the computation of all maximal subsets (maximal contractions) of a formula set with respect to a set of facts is one of the key problems. In this paper, we try to solve this problem b... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Displacement residual based DDM matching algorithm
收藏 引用
science china(Information sciences) 2012年 第9期55卷 2090-2101页
作者: ZHANG Lin 1,2,ZHOU Zhong 1,2,LIU Lin 1,2 & WU Wei 1,2 1 State Key Laboratory of Virtual Reality technology and Systems,Beihang university,beijing 100191,china 2.school of computer science and engineering,Beihang university,beijing 100191,china 1. State Key Laboratory of Virtual Reality technology and Systems Beihang University Beijing 100191 China2. School of Computer Science and Engineering Beihang University Beijing 100191 China
High level architecture(HLA) is the prevailing standard for modeling and *** data distribution management(DDM) service of HLA is defined for reducing the delivery of irrelevant *** key in DDM implementation is the reg... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Fuzzy dynamic characteristic model based attitude control of hypersonic vehicle in gliding phase
收藏 引用
science china(Information sciences) 2011年 第3期54卷 448-459页
作者: LUO Xiong 1,2 & LI Jiang 1 1 Department of computer science and technology, Key Laboratory of Advanced Control of Iron and Steel Process (Ministry of Education), university of science and technology beijing, beijing 100083, china 2 National Laboratory of Space Intelligent Control, beijing 100190, china 1. Department of computer science and technology Key Laboratory of Advanced Control of Iron and Steel Process (Ministry of Education) University of Science and Technology Beijing Beijing 100083 China2. National Laboratory of Space Intelligent Control Beijing 100190 China
The intelligent autonomous control of hypersonic vehicles has aroused great interest from the field of spacecraft. To solve the problem of longitudinal attitude control of hypersonic vehicle in gliding phase, a new in... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Augmented reality registration algorithm based on nature feature recognition
收藏 引用
science china(Information sciences) 2010年 第8期53卷 1555-1565页
作者: CHEN Jing 1 , WANG YongTian 1,2 , GUO JunWei 1 , LIU Wei 1 , LIN JingDun 1 , XUE Kang 1 , LIU Yue 1 & DING GangYi 31 school of Optoelectronics, beijing Institute of technology, beijing 100081, china 2.school of computer science and technology, beijing Institute of technology, beijing 100081, china 3 school of Software, beijing Institute of technology, beijing 100081, china 1. school of Optoelectronics Beijing Institute of Technology Beijing 100081 China2. School of Computer Science and Technology Beijing Institute of Technology Beijing 100081 China3. School of Software Beijing Institute of Technology Beijing 100081 China
This paper presents an improved key frame based augmented reality registration algorithm for real-time motion tracking in outdoor environment. In such applications, wide-baseline feature matching is a critical problem... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
(2,n)secret sharing scheme for gray and color images based on Boolean operation
收藏 引用
science china(Information sciences) 2012年 第5期55卷 1151-1161页
作者: DONG Lin 1,WANG DaoShun 1,LI ShunDong 2 & DAI YiQi 1 1 Department of computer science and technology,Tsinghua university,beijing 100084,china 2.school of computer science,Shaanxi Normal university,Xi'an 710062,china 1. Department of computer science and technology Tsinghua University Beijing 100084 China2. School of Computer Science Shaanxi Normal University Xi’an 710062 China
Traditional secret sharing (SS) schemes can reconstruct the secret precisely,but have high com-putation *** secret sharing (VSS) schemes use human visual system to reconstruct the secret without cryptographic computat... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论