咨询与建议

限定检索结果

文献类型

  • 3,688 篇 会议
  • 41 册 图书
  • 40 篇 期刊文献

馆藏范围

  • 3,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,915 篇 工学
    • 1,280 篇 计算机科学与技术...
    • 847 篇 软件工程
    • 215 篇 信息与通信工程
    • 204 篇 机械工程
    • 189 篇 电气工程
    • 178 篇 控制科学与工程
    • 138 篇 仪器科学与技术
    • 110 篇 电子科学与技术(可...
    • 66 篇 生物医学工程(可授...
    • 65 篇 生物工程
    • 57 篇 建筑学
    • 52 篇 网络空间安全
    • 45 篇 土木工程
    • 43 篇 动力工程及工程热...
    • 43 篇 化学工程与技术
    • 39 篇 环境科学与工程(可...
  • 452 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 146 篇 工商管理
    • 128 篇 图书情报与档案管...
  • 390 篇 理学
    • 178 篇 数学
    • 84 篇 物理学
    • 74 篇 生物学
    • 58 篇 系统科学
    • 39 篇 统计学(可授理学、...
  • 141 篇 教育学
    • 137 篇 教育学
  • 115 篇 文学
    • 113 篇 新闻传播学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 60 篇 医学
    • 50 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 56 篇 法学
    • 50 篇 社会学
  • 51 篇 农学
  • 22 篇 艺术学
  • 8 篇 军事学
  • 1 篇 历史学

主题

  • 370 篇 computer science
  • 315 篇 application soft...
  • 216 篇 information tech...
  • 188 篇 computer archite...
  • 178 篇 educational inst...
  • 149 篇 costs
  • 145 篇 computer network...
  • 129 篇 programming
  • 121 篇 technology manag...
  • 116 篇 educational tech...
  • 116 篇 humans
  • 111 篇 data mining
  • 109 篇 internet
  • 106 篇 computer industr...
  • 100 篇 standards develo...
  • 92 篇 software enginee...
  • 92 篇 computational mo...
  • 92 篇 computer science...
  • 91 篇 control systems
  • 88 篇 hardware

机构

  • 21 篇 department of co...
  • 10 篇 research center ...
  • 10 篇 college of compu...
  • 10 篇 faculty of compu...
  • 9 篇 research center ...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 school of optica...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 department of co...
  • 5 篇 college of infor...
  • 5 篇 school of comput...
  • 5 篇 department of co...

作者

  • 18 篇 china
  • 7 篇 mohammad syuhaim...
  • 6 篇 vahid rafe
  • 6 篇 reza rafeh
  • 6 篇 kasmiran jumari
  • 5 篇 dominik ertl
  • 5 篇 guangyuan zhao
  • 5 篇 zhang rubo
  • 5 篇 boonchuan ng
  • 5 篇 zhang hao
  • 5 篇 wei wang
  • 4 篇 aswir premadi
  • 4 篇 jun wang
  • 4 篇 jing zhang
  • 4 篇 li li
  • 4 篇 x.m. han
  • 4 篇 tang jie
  • 4 篇 yang xiao
  • 4 篇 tomomasa nagashi...
  • 4 篇 yang xu

语言

  • 3,740 篇 英文
  • 15 篇 中文
  • 12 篇 其他
  • 2 篇 乌克兰文
检索条件"任意字段=2009 International Conference on Computer Technology and Development, ICCTD 2009"
3769 条 记 录,以下是1291-1300 订阅
排序:
Networked virtual and remote laboratories for research collaboration in natural sciences and engineering
Networked virtual and remote laboratories for research colla...
收藏 引用
12th IASTED international conference on computers and Advanced technology in Education, CATE 2009
作者: Jeschke, Sabina Hauck, Eckart Pfeiffer, Olivier Richter, Thomas RWTH Aachen University Center F. Learning and KM Inst. of Infor. Man. in Mechanical Engineering Dennewartstraße 18 52068 Aachen Germany Straße des 17. Juni 136 10623 Berlin Germany Allmandring 30 70550 Stuttgart Germany
Based on the BW-eLabs platform, the goal of the NETLABS is the development of a software infrastructure, allowing for the interlinking and integration of experimental superstructures and simulations, as well as the so... 详细信息
来源: 评论
A systematic approach for transformation of ER Schema to dimensional schema  09
A systematic approach for transformation of ER Schema to dim...
收藏 引用
6th international conference on Frontiers of Information technology, FIT '09
作者: Shahzad, Khurram Sohail, Abid Department of Computer and Systems Sciences Royal Institute of Technology Stockholm University Forum 100 SE 164 40 Kista Stockholm Sweden Department of Computer Science COMSATS Institute of Information Technology 1-Km Defense Road Lahore Pakistan
development of Star model for data warehouse (DW) requires ample amount of time, experience, expertise and adequate knowledge of data warehouse designing steps. As an alternative to data warehouse designing steps, tra... 详细信息
来源: 评论
Software cost estimation - An experimental approach
Software cost estimation - An experimental approach
收藏 引用
2009 international conference on Software Engineering Theory and Practice, SETP 2009
作者: Pournaghshband, Hassan Movafaghi, Shahriar Southern Polytechnic State University School of Computing and Software Engineering United States Southern New Hampshire University Computer Information Technology Department United States
One of the major problems of the software project planning is about understanding how much the project is likely to cost. Accurate cost estimates are critical not only to customers but also to software developers. Thi... 详细信息
来源: 评论
Security in Wireless Mesh Networks: Challenges and Solutions
Security in Wireless Mesh Networks: Challenges and Solutions
收藏 引用
6th international conference on Information technology - New Generations (ITNG 2009)
作者: Yi, Ping Tong, Tianhao Liu, Ning Wu, Yue Ma, Jianqing Shanghai Jiao Tong Univ Sch Informat Secur Engn Informat Secur Natl Engn Lab Shanghai 200030 Peoples R China Fudan Univ Sch Comp Sci Shanghai 200433 Peoples R China
Wireless Mesh Network(WMN) is an emerging technology that has developed a lot these years. WMN has the feather of self-organization, distributed structure. The main topological characteristic of WMN is that there are ... 详细信息
来源: 评论
computer-Based Assessment: From Objective Tests to Automated Essay Grading. Now for Automated Essay Writing?
Computer-Based Assessment: From Objective Tests to Automated...
收藏 引用
3rd international United Information Systems conference (UNISCON 2009)
作者: Williams, Robert Nash, John Curtin Univ Technol Perth WA Australia Univ Ottawa Ottawa ON Canada
Assessment of student learning is an important task undertaken by educators. However it can be time consuming and costly for humans to grade student work. technology has been available to assist teachers in grading ob... 详细信息
来源: 评论
A method for historical Ext3 inode to filename translation on honeypots
A method for historical Ext3 inode to filename translation o...
收藏 引用
2009 33rd Annual IEEE international computer Software and Applications conference, COMPSAC 2009
作者: Fairbanks, Kevin D. Xia, Ying H. Owen III, Henry L. School of Electrical and Computer Engineering Georgia Institute of Technology United States
In an environment where computer compromises are no longer anomalies, but are frequent occurrences, the field of computer forensics has increasingly gained importance. The development of this forensic field is matched... 详细信息
来源: 评论
Portable life support system using wearable biosensor worn by the elderly
Portable life support system using wearable biosensor worn b...
收藏 引用
ICCAS-SICE 2009 - ICROS-SICE international Joint conference 2009
作者: Yazaki, Syunji Matsunaga, Toshio School of Computer Science Tokyo University of Technology Tokyo Japan
We describe the development of a portable life support system called the Abnormal Condition Detection System (ACDS) involving the use of a wireless wearable biosensor that can be used to simultaneously observe triaxia... 详细信息
来源: 评论
Knowledge Creation and Creativity in Agile Teams
收藏 引用
international conference on Advanced Software Engineering and Its Applications held at the Future Generation Information technology conference
作者: Crawford, Broderick Leon de la Barra, Claudio PUCV Valparaiso Chile
Knowledge has been called the only meaningful economic resource of the Knowledge Society. Then, Knowledge Creation in organizations is a very important issue. Particularly, the development of new software products req... 详细信息
来源: 评论
Design and development of an automated band wrapper robot for grapevine pest control
Design and development of an automated band wrapper robot fo...
收藏 引用
4th international conference on Autonomous Robots and Agents, ICARA 2009
作者: Lee, Todd Hudson Prof., Scott Chang, Jen-Yuan School of Electrical Engineering and Computer Science Washington State University 2710 University Drive Tri-Cities Richland WA 99354 United States School of Engineering and Advanced Technology Massey University Albany New Zealand
With a view toward enhancing pest control and achieving organic requirements in wine industry, development of a prototypical autonomous vehicle that automatically applies a band barrier on grapevine is detailed in thi... 详细信息
来源: 评论
Trusted computing - Opportunities & risks
Trusted computing - Opportunities & risks
收藏 引用
2009 5th international conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009
作者: Awang, Nor Fatimah Bt Department of Computer Science Faculty of Defense Science and Technology National Defense University of Malaysia Kuala Lumpur Malaysia
computer security is undeniably important in IT era nowdays. Most computer users today are fighting for - either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy an... 详细信息
来源: 评论