咨询与建议

限定检索结果

文献类型

  • 504 篇 期刊文献
  • 12 篇 会议

馆藏范围

  • 516 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 475 篇 工学
    • 355 篇 计算机科学与技术...
    • 249 篇 软件工程
    • 155 篇 控制科学与工程
    • 94 篇 电气工程
    • 93 篇 信息与通信工程
    • 67 篇 网络空间安全
    • 66 篇 机械工程
    • 53 篇 电子科学与技术(可...
    • 43 篇 仪器科学与技术
    • 22 篇 材料科学与工程(可...
    • 14 篇 力学(可授工学、理...
    • 14 篇 生物医学工程(可授...
    • 10 篇 地质资源与地质工...
    • 10 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
    • 9 篇 生物工程
    • 8 篇 建筑学
    • 8 篇 测绘科学与技术
    • 7 篇 土木工程
  • 109 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
  • 100 篇 理学
    • 53 篇 数学
    • 15 篇 物理学
    • 12 篇 生物学
    • 11 篇 化学
  • 23 篇 教育学
    • 19 篇 教育学
  • 17 篇 医学
    • 9 篇 临床医学
  • 14 篇 艺术学
    • 14 篇 设计学(可授艺术学...
  • 10 篇 法学
    • 7 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 7 篇 农学
  • 5 篇 军事学
  • 1 篇 文学

主题

  • 25 篇 深度学习
  • 12 篇 注意力机制
  • 12 篇 机器学习
  • 9 篇 卷积神经网络
  • 7 篇 软件定义网络
  • 6 篇 信息检索
  • 6 篇 物联网
  • 6 篇 软件工程
  • 6 篇 知识图谱
  • 6 篇 强化学习
  • 6 篇 数据挖掘
  • 5 篇 自然语言处理
  • 4 篇 图像分割
  • 4 篇 暴雨灾害
  • 4 篇 符号执行
  • 4 篇 程序理解
  • 4 篇 svm
  • 4 篇 长短期记忆网络
  • 4 篇 隐私保护
  • 4 篇 大数据

机构

  • 22 篇 电子科技大学
  • 17 篇 南京信息工程大学
  • 13 篇 上海理工大学
  • 13 篇 清华大学
  • 12 篇 北京信息科技大学
  • 10 篇 昆明理工大学
  • 9 篇 南京理工大学
  • 9 篇 中国科学院大学
  • 8 篇 北京大学
  • 8 篇 吉林大学
  • 8 篇 苏州大学
  • 8 篇 南京航空航天大学
  • 7 篇 华中科技大学
  • 7 篇 软件新技术与产业...
  • 7 篇 广东外语外贸大学
  • 7 篇 北京航空航天大学
  • 7 篇 中国科学技术大学
  • 7 篇 北京化工大学
  • 6 篇 山东大学
  • 6 篇 深圳大学

作者

  • 9 篇 李斌
  • 8 篇 刘景发
  • 7 篇 刘全
  • 6 篇 陈翔
  • 6 篇 李征
  • 6 篇 刘勇
  • 5 篇 刘勇国
  • 4 篇 刘强
  • 4 篇 马慧芳
  • 4 篇 刘健
  • 4 篇 李巧勤
  • 4 篇 吴永豪
  • 4 篇 刘明
  • 4 篇 刘畅
  • 4 篇 gang li
  • 4 篇 崔展齐
  • 4 篇 李静
  • 4 篇 刘利军
  • 4 篇 jin li
  • 4 篇 刘辉

语言

  • 413 篇 中文
  • 103 篇 英文
检索条件"作者=LIU JingFa1& LI Gang2.1School of computer and Software, nanjing {2. of Information science & technology, nanjing 2.0044, china"
516 条 记 录,以下是1-10 订阅
排序:
Basin filling algorithm for the circular packing problem with equilibrium behavioral constraints
收藏 引用
science china({2. sciences) 2010年 第5期53卷 885-895页
作者: liu jingfa1& li gang2.1school of computer and software, nanjing University of {2. science & technology, nanjing 2.0044, china 2.7} of Mathematics and Physics, nanjing University of {2. science & technology, nanjing 2.0044, china school of computer and {2. Nanjing University of Information Science & Technology school of Mathematics and Physics Nanjing University of Information Science & Technology
With the background of the satellite module layout design, the circular packing problem with equilibrium behavioral constraints is a layout optimization problem and NP-hard problem in math. For lack of a powerful opti... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new heuristic algorithm for the circular packing problem with equilibrium constraints
收藏 引用
science china({2. sciences) 2011年 第8期54卷 1572-1584页
作者: liu jingfa 1,2.{2. gang 3 & GENG HuanTong 1 1 school of computer and software,nanjing University of information science & technology,nanjing {12.,china 2.Network information Center,nanjing University of information science & technology, nanjing 2.0044,china 3 school of Mathematics and Physics,nanjing University of information science & technology,nanjing {12.,china school of computer and {2. Nanjing University of Information Science & Technology Network information Center Nanjing University of Information Science & Technology school of Mathematics and Physics Nanjing University of Information Science & Tec
The circular packing problem with equilibrium constraints is an optimization problem about simplified satellite module layout design.A heuristic algorithm based on tabu search is put forward for solving this *** algor... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Deterministic secure quantum communication without unitary operation based on high-dimensional entanglement swapping
收藏 引用
science china({2. sciences) 2012年 第2期55卷 360-367页
作者: liu ZhiHao1,CHEN HanWu1,liu WenJie2.XU Juan1 & {2. ZhiQiang3 1school of computer science and Engineering,Southeast University,nanjing 2.1189,china 2.3} of computer and software,nanjing University of information science & technology,nanjing 2.0044,china 3College of information Engineering,Yangzhou University,Yangzhou 2.5009,china school of computer {2. and Engineering Southeast University school of computer and {2. Nanjing University of Information Science & Technology
By analysis of the basic properties of entanglement swapping of high-dimensional Bell states,a universal and general deterministic secure quantum communication(DSQC)protocol is proposed,in which unitary operation is n... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A heuristic algorithm for cube packing with time schedule
收藏 引用
science china({2. sciences) 2010年 第1期53卷 18-29页
作者: li Wei1, HUANG WenQi2. JIANG DongChen1 & liu XiangLong1 1State Key Laboratory of {2. Development Environment, Beihang University, Beijing 100191, china 2.4} of computer science and technology, Huazhong University of science and technology, Wuhan 430074, china State Key Laboratory of software Development Environment Beihang University school of computer {2. and technology Huazhong University of Science and Technology
Packing problem has been proved to be an NP-hard problem. Many algorithms such as simulation annealing algorithm, genetic algorithm and other heuristic algorithms have been proposed to solve twodimensional and three-d... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Fuzzing:Progress,Challenges,and Perspectives
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1-29页
作者: Zhenhua Yu Zhengqi liu Xuya Cong Xiaobo li li Yin Institute of Systems Security and Control College of Computer Science and TechnologyXi'an University of Science and TechnologyXi'an710054China school of Mathematics and information {2. Baoji University of Arts and SciencesBaoji721013China Institute of Systems Engineering Macao University of Science and TechnologyTaipaMacaoChina
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Secure Device Management Scheme with Audio-Based Location Distinction in IoT
收藏 引用
工程与科学中的计算机建模(英文) 2024年 第1期138卷 939-956页
作者: Haifeng lin Xiangfeng liu Chen Chen Zhibo liu Dexin Zhao Yiwen Zhang Weizhuang li Mingsheng Cao College of Economics and Management Nanjing University of Aeronautics and AstronauticsNanjing211106China Chengdu Aircraft Industrial(Group)Co. Ltd.Chengdu610073China Academy of Military sciences of PLA Beijing100091China school of information and {2. Engineering University of Electronic Science and Technology of ChinaChengdu610054China Ningbo Web King technology Joint Stock Co. Ltd.Ningbo315000China The Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China
Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things(IoT).In this paper,a device management system is proposed to track the devices by using a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Proactive Caching at the Wireless Edge:A Novel Predictive User Popularity-Aware Approach
收藏 引用
computer Modeling in Engineering & {2.s 2024年 第8期140卷 1997-2017页
作者: Yunye Wan Peng Chen Yunni Xia Yong Ma Dongge Zhu Xu Wang Hui liu Weiling li Xianhua Niu Lei Xu Yumin Dong College of computer science Chongqing UniversityChongqing400044China school of computer and {2. Engineering Xihua UniversityChengdu610039China school of computer and {2. Engineering Jiangxi Normal UniversityNanchang330022China Electric Power Research Institute of State Grid Ningxia Electric Power Co. Ltd.Yinchuan750002China College of Mechanical and Vehicle Engineering Chongqing UniversityChongqing400030China school of computer {2. and technology Beijing Institute of TechnologyBeijing100083China school of computer {2. and technology Dongguan University of TechnologyDongguan523808China school of Emergency Management Xihua UniversityChengdu610039China College of computer and information {2. Chongqing Normal UniversityChongqing401331China
Mobile Edge Computing(MEC)is a promising technology that provides on-demand computing and efficient storage services as close to end users as *** an MEC environment,servers are deployed closer to mobile terminals to e... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Analysis of the Spatio-Temporal Characteristics of Winter Surface Urban Heat Island: A Case Study in Beijing, china
收藏 引用
Journal of Earth science 2024年 第5期35卷 1640-1653页
作者: Shanshan Lu Fujiang liu Yunshuang Ye Jiayu Tang Peng li Weihua lin Yan Guo Ruqiang Ma Jun Wang school of Geography and information Engineering China University of Geosciences Auto Navi software Co. Ltd. school of computer {2. China University of Geosciences Yantai Geological Survey of Coastal Resources Center
This study reveals the temporal and spatial evolution characteristics of the winter nighttime urban heat island(UHI) effect in the case of Beijing, china. The land surface temperature(LST) is retrieved by radiative tr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Knowledge Acquisition from ANSYS Analyzed Data for Driving Head of Hydraulic Drill
Knowledge Acquisition from ANSYS Analyzed Data for Driving H...
收藏 引用
2.10 International Colloquium on Computing,Communication, Control, and Management (CCCM2.10)
作者: Daohua liu school of {2. and information technology Xinyang Normal university Xinyang,china Jin li Network information Center Xinyang Normal university Xinyang,china
This paper mainly discusses how to obtain design knowledge from the finite element analyzed *** regard to one design problem,the orthogonal experiment table is established according to diverse values of design variabl... 详细信息
来源: cnki会议 评论
安全管理研究综述
收藏 引用
计算机科学 2004年 第8期31卷 1-4页
作者: 姚键 叶保留 蔡圣闻 袁卫忠 茅兵 黄皓 谢立 软件新技术国家重点实验室
本文提出了安全管理的三大目标:集成管理、综合管理和智能管理,综述了安全管理的模型、体系结构、产品和关键技术,强调了安全管理在安全领域的重要地位,指出了需要进一步研究的问题。
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论