咨询与建议

限定检索结果

文献类型

  • 28,713 篇 期刊文献
  • 6,679 篇 会议
  • 1 册 图书

馆藏范围

  • 35,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25,301 篇 工学
    • 10,049 篇 计算机科学与技术...
    • 6,616 篇 软件工程
    • 3,824 篇 控制科学与工程
    • 3,749 篇 机械工程
    • 2,857 篇 仪器科学与技术
    • 2,604 篇 信息与通信工程
    • 2,035 篇 电子科学与技术(可...
    • 1,358 篇 网络空间安全
    • 935 篇 材料科学与工程(可...
    • 696 篇 电气工程
    • 650 篇 地质资源与地质工...
    • 582 篇 交通运输工程
    • 547 篇 光学工程
    • 494 篇 测绘科学与技术
    • 429 篇 航空宇航科学与技...
    • 384 篇 化学工程与技术
    • 370 篇 建筑学
    • 363 篇 动力工程及工程热...
  • 7,881 篇 管理学
    • 6,061 篇 管理科学与工程(可...
    • 1,042 篇 图书情报与档案管...
    • 756 篇 工商管理
  • 7,268 篇 理学
    • 3,003 篇 数学
    • 1,715 篇 系统科学
    • 822 篇 物理学
    • 467 篇 生物学
  • 1,532 篇 教育学
    • 1,044 篇 教育学
  • 1,332 篇 经济学
    • 1,274 篇 应用经济学
  • 1,039 篇 农学
  • 818 篇 医学
    • 403 篇 临床医学
  • 759 篇 艺术学
    • 724 篇 设计学(可授艺术学...
  • 399 篇 军事学
    • 362 篇 军队指挥学
  • 393 篇 文学
  • 307 篇 法学
  • 81 篇 哲学
  • 57 篇 历史学

主题

  • 505 篇 计算机网络
  • 448 篇 计算机
  • 395 篇 数据库
  • 371 篇 设计
  • 322 篇 internet
  • 209 篇 网络安全
  • 203 篇 遗传算法
  • 197 篇 地理信息系统
  • 193 篇 数据挖掘
  • 187 篇 xml
  • 152 篇 面向对象
  • 132 篇 web
  • 125 篇 神经网络
  • 111 篇 simulation
  • 108 篇 人工智能
  • 106 篇 管理信息系统
  • 98 篇 中国
  • 97 篇 软件开发
  • 94 篇 gis
  • 91 篇 软件

机构

  • 689 篇 华中科技大学
  • 535 篇 上海交通大学
  • 529 篇 武汉大学
  • 410 篇 同济大学
  • 404 篇 山东大学
  • 374 篇 四川大学
  • 361 篇 中国科学技术大学
  • 354 篇 清华大学
  • 306 篇 南京大学
  • 305 篇 浙江大学
  • 299 篇 天津大学
  • 255 篇 北京航空航天大学
  • 254 篇 北京大学
  • 229 篇 上海大学
  • 225 篇 苏州大学
  • 223 篇 国防科技大学
  • 221 篇 东南大学
  • 215 篇 复旦大学
  • 201 篇 南京理工大学
  • 199 篇 吉林大学

作者

  • 1,389 篇 china
  • 100 篇 p.r.china
  • 44 篇 王汝传
  • 41 篇 p. r. china
  • 38 篇 tsinghua univers...
  • 36 篇 shanghai
  • 36 篇 zhejiang univers...
  • 36 篇 beijing
  • 33 篇 赵海
  • 33 篇 李涛
  • 28 篇 hangzhou
  • 27 篇 李明
  • 25 篇 nanjing
  • 24 篇 huazhong univers...
  • 24 篇 刘刚
  • 23 篇 hubei
  • 23 篇 china)
  • 22 篇 周明天
  • 22 篇 李莉
  • 20 篇 changsha

语言

  • 23,298 篇 中文
  • 12,095 篇 英文
检索条件"作者=2Department of Computer and Information Science, university of Macau, Macao, China"
35393 条 记 录,以下是31-40 订阅
排序:
Compactness in fuzzy logic
收藏 引用
Chinese science Bulletin 1998年 第14期43卷 1166-1171页
作者: YING Mingsheng department of computer science and Technology, Tsinghua university, Beijing 100084, china department of computer science and Technology Tsinghua University Beijing China
Compactness in Pavelka’s fuzzy logic for some compact lattices of truth values is shown, and the concept of gradual compactness is introduced to establish some corresponding results in a more general setting.
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Data classification from the inverse nth power gravitation
收藏 引用
science china(information sciences) 2012年 第1期55卷 184-190页
作者: XU HuaRong1,WANG XiaoDong1,ZENG ZhiQiang1&FANG Qiu2 1department of computer science and Technology,Xiamen university of Technology,Xiamen 361024,china 2department of Mechanical Engineering,Xiamen university of Technology,Xiamen 361024,china 1. department of computer science and Technology Xiamen University of Technology Xiamen 361024 China2. Department of Mechanical Engineering Xiamen University of Technology Xiamen 361024 China
By the inverse nth power gravitation in physics,a novel classifier for data classification,called the I-n-PG classifier,is *** the I-n-PG model,training samples from each class are regarded as a system of particles an... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
SUPERCONVERGENCES OF THE ADINI'S ELEMENT FORSECOND ORDER EQUATION
收藏 引用
Journal of Computational Mathematics 1999年 第6期17卷 569-574页
作者: Ping Luo(department of computer science and Technology, Qinghua university, Beijing 100084,china)Qun Lin(Institute of Systems science, Academia Sinica, Beijing, 100080, china) Tsing Hua Univ Dept Comp Sci & Technol Beijing 100084 Peoples R China Acad Sinica Inst Syst Sci Beijing 100080 Peoples R China
n this papers the asymptotic error expansions of Adini's element for the secondorder imhomogeneous Neumann problem are given and the superconvergence estimations are obtained. Moreover, a numerical example to support ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Selection of unitary operations in quantum secret sharing without entanglement
收藏 引用
science china(information sciences) 2011年 第9期54卷 1837-1842页
作者: XU Juan 1,CHEN HanWu 1,LIU WenJie 1,2 & LIU ZhiHao 1 1 School of computer science and Engineering,Southeast university,Nanjing 210096,china 2 School of computer and Software,Nanjing university of information science and Technology,Nanjing 210044,china 1. School of computer science and Engineering Southeast University Nanjing 210096 China2. School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
We propose a substitute-Bell-state attack strategy for quantum secret sharing schemes without entanglement,as well as a definition of the minimum failure probability of such attack strategy.A quantitative analysis of ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Approximation algorithms for indefinite complex quadratic maximization problems
收藏 引用
science china Mathematics 2010年 第10期53卷 2697-2708页
作者: HUANG Yongwei1,& ZHANG Shuzhong2 1department of Electronic and computer Engineering,The Hong Kong university of science and Technology,Kowloon,Hong Kong,china 2department of Systems Engineering and Engineering Management,The Chinese university of Hong Kong,Shatin,Hong Kong,china 1. department of Electronic and computer Engineering The Hong Kong University of Science and Technology Kowloon Hong Kong China2. Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong Shatin Hong Kong China
In this paper,we consider the following indefinite complex quadratic maximization problem: maximize zHQz,subject to zk ∈ C and zkm = 1,k = 1,...,n,where Q is a Hermitian matrix with trQ = 0,z ∈ Cn is the decision ve... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
(2,n)secret sharing scheme for gray and color images based on Boolean operation
收藏 引用
science china(information sciences) 2012年 第5期55卷 1151-1161页
作者: DONG Lin 1,WANG DaoShun 1,LI ShunDong 2 & DAI YiQi 1 1 department of computer science and Technology,Tsinghua university,Beijing 100084,china 2 School of computer science,Shaanxi Normal university,Xi'an 710062,china 1. department of computer science and Technology Tsinghua University Beijing 100084 China2. School of Computer Science Shaanxi Normal University Xi’an 710062 China
Traditional secret sharing (SS) schemes can reconstruct the secret precisely,but have high com-putation *** secret sharing (VSS) schemes use human visual system to reconstruct the secret without cryptographic computat... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An improved approach to the efficient construction of and search operations in motion graphs
收藏 引用
science china(information sciences) 2012年 第5期55卷 1042-1051页
作者: GAO Yan 1,CHEN ZhiHua 2,CHEN MinGang 3 & SHEN Yang 3 1 Software Engineering Institute,East china Normal university,Shanghai 200062,china 2 department of computer science and Engineering,East china university of science and Technology,Shanghai 200237,china 3 department of computer science and Engineering,Shanghai Jiao Tong university,Shanghai 200240,china 1. Software Engineering Institute East China Normal University Shanghai 200062 China2. Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China3. Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China
Motion graphs have been widely used as an effective technique in the synthesis of human *** synthesize well-formed motions,motion graphs require smooth transitions and good ***,the time and costs grow quadratically as... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
DMM:A dynamic memory mapping model for virtual machines
收藏 引用
science china(information sciences) 2010年 第6期53卷 1097-1108页
作者: CHEN HaoGang1,WANG XiaoLin1,WANG ZhenLin2,ZHANG BinBin1,LUO YingWei1* & LI XiaoMing11department of computer science,Peking university,Beijing 100871,china 2department of computer science,Michigan Technological university,Houghton,MI 49931,USA 1. department of computer science Peking University Beijing 100871 China2. Department of Computer Science Michigan Technological University Houghton MI 49931 USA
Memory virtualization is an important part in the design of virtual machine monitors(VMM).In this paper,we proposed dynamic memory mapping(DMM) model,a mechanism that allows the VMM to change the mapping between a vir... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
FINITE ELEMENT APPROXIMATION OF EIGENVALUE PROBLEM FOR A COUPLED VIBRATION BETWEEN ACOUSTIC FIELD AND PLATE
收藏 引用
Journal of Computational Mathematics 1997年 第3期15卷 265-278页
作者: L. Deng T. Kako(department of computer science and information Mathematics, The university of Electro-Communications, Japan) UNIV ELECTROCOMMUN DEPT COMP SCI & INFORMAT MATHCHOFUTOKYO 182JAPAN
We formulate a coupled vibration between plate and acoustic field in mathematically rigorous fashion. It leads to a non-standard eigenvalue problem. A finite element approximation is considered in an abstract way, and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Basin filling algorithm for the circular packing problem with equilibrium behavioral constraints
收藏 引用
science china(information sciences) 2010年 第5期53卷 885-895页
作者: LIU JingFa1& LI Gang2 1School of computer and Software, Nanjing university of information science & Technology, Nanjing 210044, china 2School of Mathematics and Physics, Nanjing university of information science & Technology, Nanjing 210044, china 1. School of computer and Software Nanjing University of Information Science & Technology Nanjing 210044 China2. School of Mathematics and Physics Nanjing University of Information Science & Technology Nanjing 210044 China
With the background of the satellite module layout design, the circular packing problem with equilibrium behavioral constraints is a layout optimization problem and NP-hard problem in math. For lack of a powerful opti... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论