咨询与建议

限定检索结果

文献类型

  • 2,550 篇 会议
  • 9 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,563 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,934 篇 工学
    • 1,188 篇 计算机科学与技术...
    • 801 篇 软件工程
    • 360 篇 信息与通信工程
    • 238 篇 机械工程
    • 202 篇 电子科学与技术(可...
    • 193 篇 仪器科学与技术
    • 177 篇 控制科学与工程
    • 137 篇 电气工程
    • 62 篇 动力工程及工程热...
    • 60 篇 化学工程与技术
    • 58 篇 光学工程
    • 58 篇 网络空间安全
    • 57 篇 生物医学工程(可授...
    • 41 篇 生物工程
    • 39 篇 建筑学
    • 38 篇 土木工程
    • 37 篇 安全科学与工程
    • 36 篇 环境科学与工程(可...
  • 550 篇 理学
    • 354 篇 数学
    • 79 篇 统计学(可授理学、...
    • 78 篇 物理学
    • 68 篇 系统科学
    • 57 篇 生物学
    • 52 篇 化学
  • 502 篇 管理学
    • 349 篇 管理科学与工程(可...
    • 137 篇 图书情报与档案管...
    • 119 篇 工商管理
  • 106 篇 经济学
    • 105 篇 应用经济学
  • 58 篇 医学
    • 50 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 46 篇 法学
  • 45 篇 农学
  • 32 篇 教育学
  • 15 篇 文学
  • 14 篇 艺术学
  • 11 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 55 篇 computer science
  • 52 篇 data mining
  • 31 篇 educational inst...
  • 27 篇 network security
  • 25 篇 feature extracti...
  • 21 篇 information secu...
  • 21 篇 web services
  • 19 篇 component
  • 19 篇 authentication
  • 18 篇 information tech...
  • 17 篇 information anal...
  • 17 篇 electronic mail
  • 17 篇 cryptography
  • 16 篇 support vector m...
  • 16 篇 wireless sensor ...
  • 16 篇 routing protocol...
  • 14 篇 support vector m...
  • 14 篇 monitoring
  • 14 篇 wireless sensor ...
  • 14 篇 costs

机构

  • 16 篇 school of comput...
  • 9 篇 college of infor...
  • 8 篇 state key labora...
  • 8 篇 school of inform...
  • 7 篇 school of comput...
  • 7 篇 college of compu...
  • 7 篇 school of comput...
  • 6 篇 department of co...
  • 6 篇 college of compu...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 school of softwa...
  • 5 篇 school of comput...
  • 5 篇 school of electr...
  • 5 篇 it department sh...
  • 5 篇 college of compu...
  • 5 篇 center for infor...
  • 5 篇 electrical engin...
  • 5 篇 school of comput...
  • 4 篇 college of infor...

作者

  • 23 篇 china
  • 8 篇 zhu hongbing
  • 7 篇 yu ming
  • 7 篇 lee sangjin
  • 7 篇 zhang wei
  • 6 篇 dong yongfeng
  • 6 篇 liu chung-hsin
  • 6 篇 yong wang
  • 5 篇 yan ma
  • 5 篇 wenzheng li
  • 5 篇 hesham tolba
  • 5 篇 sridevi seshadri
  • 5 篇 gu junhua
  • 5 篇 dhruvendra chour...
  • 5 篇 lin chen
  • 5 篇 chang chin-chen
  • 5 篇 ying zhang
  • 4 篇 daeil yoon
  • 4 篇 li yang
  • 4 篇 yong gan

语言

  • 2,544 篇 英文
  • 16 篇 中文
  • 2 篇 法文
  • 1 篇 其他
检索条件"任意字段=2009 2nd IEEE International Conference on Computer Science and Information Technology(ICCSIT 2009)"
2563 条 记 录,以下是71-80 订阅
排序:
Study of Urban Planning information System based on Struts and Hibernate
Study of Urban Planning Information System based on Struts a...
收藏 引用
2nd ieee international conference on computer science and information technology
作者: Chen, Jianxin Wuhan Univ Technol Sch Arts & Design Wuhan 430070 Peoples R China
According to urban managing requirements an urban planning information system is designed using Struts as the presentation layer framework and Hibernate as the data layer framework architecture. This paper implements ... 详细信息
来源: 评论
A Mobile Agents Approach for 2D Geometrical Figures Recognition
A Mobile Agents Approach for 2D Geometrical Figures Recognit...
收藏 引用
2nd ieee international conference on computer science and information technology
作者: Popirlan, Claudiu Ionut Popirlan, Cristina Univ Craiova Dept Comp Sci Craiova Romania
The importance of 2D geometrical figures recognition in virtual reality and computational vision was a long motivation for researchers. In this paper the figures recognition using a mobile agents technology is present... 详细信息
来源: 评论
Comprehensive Evaluation of Fully Mechanized Mining Face Security Based on Unascertained-information Entropy Model
Comprehensive Evaluation of Fully Mechanized Mining Face Sec...
收藏 引用
2nd ieee international conference on computer science and information technology
作者: Ma Lihua Yan Huizhe Hebei Univ Engn Sch Econ & Management Handan Peoples R China
Under the fully mechanized coal mining face contains many security features of unascertained, in this pallier, the selection of the most able to face the impact of the safety of people, machines, and environmental fac... 详细信息
来源: 评论
General worm propagation model forwireless ad hoc networks
General worm propagation model forwireless ad hoc networks
收藏 引用
2009 2nd ieee international conference on computer science and information technology, iccsit 2009
作者: Junhua, Chen Shengjun, Wei Wu, Peng School of Computer Science and Technology Beijing Institute of Technology Beijing China Lab for Computer Network Defense Technology Beijing Institute of Technology Beijing China
The popularity of wireless communication networks makes them an attractive target to the creators of worms and other malicious code. Indeed, recently a number of worms designed specifically to spread via these wireles... 详细信息
来源: 评论
Implementation of the computer Aided Value Engineering System Based on UML and J2EE technology
Implementation of the Computer Aided Value Engineering Syste...
收藏 引用
2nd ieee international conference on computer science and information technology
作者: Jiang, Zhenjian Wu, Yongchun Han, Na Shandong Jianzhu Univ Sch Business Jinan Peoples R China
Value Engineering (VE) is a hotspot both in academic field and in modern business. In order to explore a effective value engineering model for modern enterprises in China, this paper studied VE and its development, an... 详细信息
来源: 评论
Natural Image Matting Using HSI Framework
Natural Image Matting Using HSI Framework
收藏 引用
2nd ieee international conference on computer science and information technology
作者: Khandelwal, Vineet Gupta, Abhinav Kashyap, Manish Gandhi, Hitesh Dhawan, Aishwar Informat Technol Univ Jaypee Inst Dept Elect & Commun Noida UP India
Natural Image Matting today, is widely used in various disciplines including media, animation industry, computer simulations for research etc. The process of estimating the foreground and background colors with proper... 详细信息
来源: 评论
A Model Based on information Entropy to Measure Developer Turnover Risk on Software Project
A Model Based on Information Entropy to Measure Developer Tu...
收藏 引用
2nd ieee international conference on computer science and information technology
作者: Jiang Rong Liao Hongzhi Yu Jiankun Feng Tao Zhao Chenggui Li Junlin Yunnan Univ Finance & Econ Sch Informat Kunming Peoples R China Yunnan Univ Sch Software Kunming Peoples R China
Risk can conduce to failure of software project, and make a loss for the enterprise. It is a focus topic for software engineering researchers. Developer turnover risk is a great risk at the process of software project... 详细信息
来源: 评论
Traffic Light Detection with Color and Edge information
Traffic Light Detection with Color and Edge Information
收藏 引用
2nd ieee international conference on computer science and information technology
作者: Omachi, Masako Omachi, Shinichiro Tohoku Bunka Gakuen Univ Fac Sci & Technol Sendai Miyagi Japan Tohoku Univ Grad Sch Engn Sendai Miyagi 980 Japan
The concern of the intelligent transportation system rises and many driver support systems have been developed. In this paper, a fast method of detecting a traffic light in a scene image is proposed. By converting the... 详细信息
来源: 评论
Route failure tolerant multicast in mobile ad hoc networks using disjoint minimum spanning trees
Route failure tolerant multicast in mobile ad hoc networks u...
收藏 引用
2009 2nd ieee international conference on computer science and information technology, iccsit 2009
作者: Kumar, Arun Lokanatha, B.R. Reddy, C. Rajan Hiremath, Prakash S. Dept. of CS School of Science and Technology Dravidian University Kuppam-A.P India Dept. of P.G Studies and Research Group Gulberga University Gulberga Karnataka India
In this paper, we study the problem of constructing minimum cost multicast trees and computing multiple multicast paths. Due to the lack of redundancy in multi-path and multicast structures, the multicast routing prot... 详细信息
来源: 评论
Throughput analysis of dynamic hybrid active reliable multicast (DHARM)
Throughput analysis of dynamic hybrid active reliable multic...
收藏 引用
2009 2nd ieee international conference on computer science and information technology, iccsit 2009
作者: Chourishi, Dharmendra Seshadri, Sridevi Chourishi, Dhruvendra IT Department Shinas College of Technology Shinas Oman Computer Department Govt. Women's Polytechnic Bhopal M.P. India
In recent years active reliable multicast protocols have gained popularity. However, the existing active reliable multicast protocols are based on receiver-initiated approach for loss recovery. Our approach, named DHA... 详细信息
来源: 评论