咨询与建议

限定检索结果

文献类型

  • 272 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 273 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 129 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 55 篇 机械工程
    • 41 篇 仪器科学与技术
    • 40 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 27 篇 信息与通信工程
    • 11 篇 网络空间安全
    • 5 篇 测绘科学与技术
    • 2 篇 光学工程
    • 2 篇 电气工程
    • 2 篇 化学工程与技术
    • 2 篇 生物工程
    • 1 篇 建筑学
    • 1 篇 地质资源与地质工...
    • 1 篇 轻工技术与工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 兵器科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 公安技术
  • 71 篇 管理学
    • 70 篇 管理科学与工程(可...
  • 20 篇 理学
    • 6 篇 数学
    • 6 篇 系统科学
    • 5 篇 地理学
    • 2 篇 生物学
    • 1 篇 物理学
  • 5 篇 艺术学
    • 5 篇 设计学(可授艺术学...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 医学
    • 1 篇 中西医结合
  • 1 篇 军事学

主题

  • 8 篇 data mining
  • 5 篇 particle swarm o...
  • 5 篇 neural network
  • 5 篇 web service
  • 5 篇 fpga
  • 4 篇 reliability
  • 4 篇 qpso
  • 4 篇 multi-agent
  • 4 篇 parallel
  • 4 篇 qos
  • 4 篇 genetic algorith...
  • 4 篇 web
  • 4 篇 bp neural networ...
  • 4 篇 fuzzy clustering
  • 4 篇 ontology
  • 3 篇 distributed syst...
  • 3 篇 xml
  • 3 篇 image segmentati...
  • 3 篇 workflow
  • 3 篇 mobile agent

机构

  • 1 篇 faculty of compu...
  • 1 篇 inria
  • 1 篇 department of ma...
  • 1 篇 computer enginee...
  • 1 篇 school of inform...
  • 1 篇 equipe architect...
  • 1 篇 武汉理工大学
  • 1 篇 department of ma...
  • 1 篇 department of ma...
  • 1 篇 faculty of compu...
  • 1 篇 school of mathem...
  • 1 篇 systonomy ltd so...
  • 1 篇 dienca-lab.di mo...
  • 1 篇 department of pr...
  • 1 篇 systonomy ltd so...
  • 1 篇 department of me...
  • 1 篇 faculty of compu...
  • 1 篇 university malay...

作者

  • 2 篇 norazaliza mohd....
  • 2 篇 noraziah ahmad
  • 2 篇 xiaohong wang ji...
  • 1 篇 ying yang xiuli ...
  • 1 篇 a.idesman
  • 1 篇 sadia aziz
  • 1 篇 jizi li zhiping ...
  • 1 篇 yanhong xie depa...
  • 1 篇 yuehua ding kui ...
  • 1 篇 hong wen huifu z...
  • 1 篇 zhihao zhou xiao...
  • 1 篇 xu ling~(1 2) 1 ...
  • 1 篇 feng bin wang zh...
  • 1 篇 halqam ablat
  • 1 篇 xiping gong junq...
  • 1 篇 huifu zhang ran ...
  • 1 篇 leiyue yao softw...
  • 1 篇 xiaofei wu depar...
  • 1 篇 yue huang wenbo ...
  • 1 篇 yu dai lei yang ...

语言

  • 272 篇 英文
  • 1 篇 中文
检索条件"任意字段=2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会"
273 条 记 录,以下是51-60 订阅
排序:
The Research and Realization of Clustering Algorithm Based On FPGA
The Research and Realization of Clustering Algorithm Based O...
收藏 引用
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会
作者: Jun Feng Wenbo Xu Zhilei Chai College of Information,Jiangnan University,Wuxi,214122,China
Clustering algorithm is an important method of researching neural *** paper introduces a method to implement this algorithm,under the FPGA, implement K-means clustering algorithm,accelerating the arithmetic by hardwar... 详细信息
来源: 评论
A Reliable and Efficient Communication Mechanism for Mobile Agents
A Reliable and Efficient Communication Mechanism for Mobile ...
收藏 引用
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会
作者: Shengjun Xue Xianju Zhou Department of Computer Science and Technology,Wuhan University of technology,Wuhan,Hubei,430063,China
The communication mechanism is the foundation of Mobile Agent systems,but there are some problems such as reliability and efficiency exist in former communication *** this essay,I bring forward a mobile agent communic... 详细信息
来源: 评论
Circular Object Recognition Based on Invariant Features
Circular Object Recognition Based on Invariant Features
收藏 引用
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会
作者: Aijun Chen College of Mechanical and Electrical Engineering,Northeast Forestry University,Harbin,Heilongjiang 150040,China
A circular object recognition method utilizing a group of geometric feature parameters is ***,Canny operator is used to extract edges and the edge points are traced to form series of sequential *** points in each set ... 详细信息
来源: 评论
Study on Architecture of Global Supply Chain with MAS
Study on Architecture of Global Supply Chain with MAS
收藏 引用
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会
作者: Jizi Li Zhiping Zuo Peilin Guo School of Economics & Management Wuhan University of Science & Engineering,Wuhan,430073,China
The last decades of the twentieth century witnessed a considerable expansion of supply chain into international *** and efficient global supply chain coordination is crucial way to sharpen the edges for the firms to w... 详细信息
来源: 评论
Design and Implementation of WebGIS in Coal Mine Excavating and Joining
Design and Implementation of WebGIS in Coal Mine Excavating ...
收藏 引用
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会
作者: Kaixing Wu Li Liu College of Information and Electrical Engineering,Hebei University of Engineering,Handan,Hebei,056038,China
With the analysis of user requirements about the coal mine excavating and joining,the overall framework based on *** platform and the technology of WebGIS was explored in the *** key techniques such as components,SSO(... 详细信息
来源: 评论
A Wireless Security Protocol Based on Ecc
A Wireless Security Protocol Based on Ecc
收藏 引用
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会
作者: Yuehua Zhao Fangkui Nong College of Computer Science and Communication Engineering,Jiangsu University,Zhenjiang,Jiangsu,China
With the rapid development of computer technology and mobile communication,at the same time,mobile data value-added service is widely used for it's efficiency and ***,security is still an overwhelming problem rela... 详细信息
来源: 评论
Study of Sensor Management Based on DWPSO Algorithm
Study of Sensor Management Based on DWPSO Algorithm
收藏 引用
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会
作者: Dingguo Jiang Xiaoliu Zhu Baoguo Xu School of Communication and Control Engineering,Jiangnan University,Wuxi,Jiangsu,214122,China
Sensor optimal management is very important to the performance of multi-sensor system in target assignment *** solve it effectively,main old algorithms for solving this problem are discussed first,based on Dynamic Wei... 详细信息
来源: 评论
AN Information Filter Based on Reversed Word Segmentation and Complexion Detection
AN Information Filter Based on Reversed Word Segmentation an...
收藏 引用
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会
作者: Leiyue Yao Software Research Center,Jiangxi Blue Sky University,Nanchang,Jiangxi,China Jianying Xiong Department of Computer Science and Technology,Jiangxi Blue Sky University,Nanchang,Jiangxi,China
The kernel of unhealthy network information filtering is to identify the web page *** overcome the shortages of traditional algorithm,we proposed a new method based on text analysis and color recognition.A mathematica... 详细信息
来源: 评论
Java For Embedded Real-time Systems
Java For Embedded Real-time Systems
收藏 引用
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会
作者: Yuan Shen Wenbo Xu Dept of Computer,School of Information Technology,Jiangnan University,Wuxi 214122,China
Though Java was first used in an embedded system,due to some technical reasons Java language is not widely applied to embedded *** change the situation, Sun defines some new Java specifications for embedded applicatio... 详细信息
来源: 评论
A Formal Description and Verification of Authentication Protocol
A Formal Description and Verification of Authentication Prot...
收藏 引用
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会
作者: Zhanting Yuan Xu Kang Qiuyu Zhang Shuang Liang College of Computer and Communication,Lanzhou University of Technology,Lanzhou,Gansu,730050,China
Identity authentication,as the first step to realize the network security,is the key technology for secure exchange of the online commercial information. Moreover,if there is any leak in the authentication protocol,se... 详细信息
来源: 评论