咨询与建议

限定检索结果

文献类型

  • 134 篇 期刊文献

馆藏范围

  • 134 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 111 篇 工学
    • 81 篇 计算机科学与技术...
    • 66 篇 软件工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 机械工程
    • 5 篇 水利工程
    • 4 篇 控制科学与工程
    • 3 篇 航空宇航科学与技...
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 电气工程
    • 2 篇 化学工程与技术
    • 2 篇 船舶与海洋工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 交通运输工程
    • 1 篇 生物工程
  • 13 篇 管理学
    • 13 篇 管理科学与工程(可...
  • 10 篇 医学
    • 6 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 6 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 5 篇 教育学
    • 5 篇 教育学
  • 3 篇 农学
    • 1 篇 作物学
  • 2 篇 法学
    • 2 篇 马克思主义理论

主题

  • 6 篇 模型检测
  • 4 篇 web服务
  • 3 篇 uml
  • 3 篇 进程代数
  • 3 篇 力学性能
  • 3 篇 本体
  • 3 篇 等温淬火
  • 3 篇 安全关键系统
  • 3 篇 模型转换
  • 3 篇 服务组合
  • 2 篇 工程数据仓库系统
  • 2 篇 深圳
  • 2 篇 行为决策
  • 2 篇 评估指标体系
  • 2 篇 时序图
  • 2 篇 web服务组合
  • 2 篇 隐私保护
  • 2 篇 数据处理
  • 2 篇 软件测试
  • 2 篇 隐私策略

机构

  • 77 篇 南京航空航天大学
  • 12 篇 软件新技术与产业...
  • 8 篇 佳木斯大学
  • 5 篇 高安全系统的软件...
  • 5 篇 南京大学
  • 4 篇 江苏师范大学
  • 4 篇 徐州师范大学
  • 4 篇 深圳海事局
  • 3 篇 college of compu...
  • 3 篇 collaborative in...
  • 3 篇 college of compu...
  • 3 篇 南京邮电大学
  • 3 篇 college of compu...
  • 3 篇 福建船政交通职业...
  • 2 篇 成都中医药大学
  • 2 篇 广西大学
  • 2 篇 广东省妇幼保健院...
  • 2 篇 天津工业大学
  • 2 篇 key laboratory o...
  • 2 篇 安徽工程大学

作者

  • 85 篇 黄志球
  • 13 篇 沈国华
  • 12 篇 zhiqiu huang
  • 8 篇 黄志求
  • 8 篇 祝义
  • 8 篇 柯昌博
  • 7 篇 周航
  • 6 篇 陈哲
  • 6 篇 肖芳雄
  • 5 篇 曹子宁
  • 5 篇 胡军
  • 5 篇 黄志秋
  • 4 篇 王进
  • 4 篇 陈伟建
  • 4 篇 yaoshen yu
  • 4 篇 王勇
  • 4 篇 杨志斌
  • 4 篇 王金永
  • 3 篇 徐丙凤
  • 3 篇 袁敏

语言

  • 125 篇 中文
  • 9 篇 英文
检索条件"作者=Zhiqiu huang"
134 条 记 录,以下是1-10 订阅
排序:
Verifying specifications with associated attributes in graph transformation systems
收藏 引用
Frontiers of Computer Science 2015年 第3期9卷 364-374页
作者: Yu ZHOU Yankai huang Ou WEI zhiqiu huang College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Graph transformation is an important modeling and analysis technique widely applied in software engineer- ing. The attributes can naturally conceptualize the properties of the modeled artifacts. However, the lack of s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Code line generation based on deep context-awareness of onsite programming
收藏 引用
Science China(Information Sciences) 2020年 第9期63卷 64-66页
作者: Chuanqi TAO Panpan BAO zhiqiu huang College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Ministry Key Laboratory for Safety-Critical Software Development and Verification Nanjing University of Aeronautics and Astronautics National Key Laboratory for Novel Software Technology Nanjing University
Dear editor,Intelligent code generation has become an essential research task to accelerate modern software development. To facilitate effective code generation for programming languages, numerous approaches have been... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A user requirements-oriented privacy policy self-adaption scheme in cloud computing
收藏 引用
Frontiers of Computer Science 2023年 第2期17卷 33-44页
作者: Changbo KE Fu XIAO zhiqiu huang Fangxiong XIAO School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210003China College of computer science and technology Nanjing University of Aeronautics and AstronauticsNanjing 210016China School of Software Engineering Jinling Institute of TechnologyNanjing 210000China
In an ever-changing environment,Software as a Service(SaaS)can rarely protect users'*** able to manage and control the privacy is therefore an important goal for *** the participant of composite service is substituted... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Lightweight fault localization combined with fault context to improve fault absolute rank
收藏 引用
Science China(Information Sciences) 2017年 第9期60卷 178-193页
作者: Yong WANG zhiqiu huang Yong LI Bingwu FANG College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics College of Computer and Information Anhui Polytechnic University
Lightweight fault localization(LFL), which outputs a list of suspicious program entities in descending order based on their likelihood to be a root fault, is a popular method used by programmers to assist them in debu... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Specification and Verification of a Topology-Aware Access Control Model for Cyber-Physical Space
收藏 引用
Tsinghua Science and Technology 2019年 第5期24卷 497-519页
作者: Yan Cao zhiqiu huang Shuanglong Kan Dajuan Fan Yang Yang College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 211106 China School of Computer Engineering Nanjing Institute of Technology Nanjing 211167China
The cyber-physical space is a spatial environment that integrates the cyber and physical worlds to provide an intelligent environment for users to conduct their day-to-day activities. Mobile users and mobile objects a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A topology and risk-aware access control framework for cyber-physical space
收藏 引用
Frontiers of Computer Science 2020年 第4期14卷 181-195页
作者: Yan CAO zhiqiu huang Yaoshen YU Changbo KE Zihao WANG School of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing211106China Key Laboratory of Safety-Critical Software Ministry of Industry and Information TechnologyNanjing211106China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing211106China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210023China
Cyber-physical space is a spatial environment that integrates the cyber world and the physical world,aiming to provide an intelligent environment for users to conduct their day-to-day *** interplay between the cyber s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
ASTSDL:predicting the functionality of incomplete programming code via an AST-sequence-based deep learning model
收藏 引用
Science China(Information Sciences) 2024年 第1期67卷 86-104页
作者: Yaoshen YU zhiqiu huang Guohua SHEN Weiwei LI Yichao SHAO College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Collaborative Innovation Center of Novel Software Technology and Industrialization Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology
Code recommendation systems have been widely used in helping developers implement unfamiliar programming *** existing code recommenders or code search engines can retrieve relevant code rapidly with high accuracy,howe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Truthful Mechanism for Crowdsourcing Task Assignment
收藏 引用
Tsinghua Science and Technology 2018年 第6期23卷 645-659页
作者: Yonglong Zhang Haiyan Qin Bin Li Jin Wang Sungyoung Lee zhiqiu huang School of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 211106 China College of Information Engineering Yangzhou University Yangzhou 225127 China Department of Computer Engineering Kyung Hee University Suwon 449-701 Korea
As an emerging "human problem solving strategy", crowdsourcing has attracted much attention where requesters want to employ reliable workers to complete specific tasks. Task assignment is an important branch of crow... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Microstructure of fly ash cenosphere/AZ91D composite during solution treatment at 380-420℃
收藏 引用
China Foundry 2011年 第1期8卷 117-120页
作者: huang zhiqiu Yu Sirong Li Muqin Liu Hongli Key Laboratory of Automobile Materials (Jilin University) Ministry of Education and College of Materials Science and Engineering Jilin University Changchun 130025 China College of Materials Science and Engineering Jiamusi University Jiamusi 154007 China
The fly ash cenosphere/AZ91D (FAC/AZ91D) composites containing 5 wt.% and 100 μm in size of fly-ash cenosphere particles were fabricated by means of the compcasting *** microstructures of the as-cast samples and the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A strategy-proof auction mechanism for service composition based on user preferences
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2021年 第2期22卷 185-201页
作者: Yao XIA zhiqiu huang College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing 210016China
Service composition is an effective method of combining existing atomic services into a value-added service based on cost and quality of service(QoS).To meet the diverse needs of users and to offer pricing services ba... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论