咨询与建议

限定检索结果

文献类型

  • 3,688 篇 会议
  • 41 篇 期刊文献
  • 11 册 图书

馆藏范围

  • 3,740 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,916 篇 工学
    • 1,280 篇 计算机科学与技术...
    • 847 篇 软件工程
    • 215 篇 信息与通信工程
    • 204 篇 机械工程
    • 189 篇 电气工程
    • 178 篇 控制科学与工程
    • 138 篇 仪器科学与技术
    • 110 篇 电子科学与技术(可...
    • 66 篇 生物医学工程(可授...
    • 65 篇 生物工程
    • 57 篇 建筑学
    • 52 篇 网络空间安全
    • 45 篇 土木工程
    • 43 篇 动力工程及工程热...
    • 43 篇 化学工程与技术
    • 39 篇 环境科学与工程(可...
  • 453 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 147 篇 工商管理
    • 128 篇 图书情报与档案管...
  • 390 篇 理学
    • 178 篇 数学
    • 84 篇 物理学
    • 74 篇 生物学
    • 58 篇 系统科学
    • 39 篇 统计学(可授理学、...
  • 141 篇 教育学
    • 137 篇 教育学
  • 115 篇 文学
    • 113 篇 新闻传播学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 60 篇 医学
    • 50 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 56 篇 法学
    • 50 篇 社会学
  • 51 篇 农学
  • 22 篇 艺术学
  • 8 篇 军事学
  • 1 篇 历史学

主题

  • 370 篇 computer science
  • 315 篇 application soft...
  • 216 篇 information tech...
  • 188 篇 computer archite...
  • 178 篇 educational inst...
  • 149 篇 costs
  • 146 篇 computer network...
  • 129 篇 programming
  • 121 篇 technology manag...
  • 116 篇 educational tech...
  • 116 篇 humans
  • 111 篇 data mining
  • 109 篇 internet
  • 106 篇 computer industr...
  • 100 篇 standards develo...
  • 92 篇 computational mo...
  • 92 篇 computer science...
  • 91 篇 control systems
  • 89 篇 hardware
  • 88 篇 software enginee...

机构

  • 21 篇 department of co...
  • 10 篇 research center ...
  • 10 篇 college of compu...
  • 10 篇 faculty of compu...
  • 9 篇 research center ...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 school of optica...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 department of co...
  • 5 篇 college of infor...
  • 5 篇 school of comput...
  • 5 篇 department of co...

作者

  • 18 篇 china
  • 7 篇 mohammad syuhaim...
  • 6 篇 vahid rafe
  • 6 篇 reza rafeh
  • 6 篇 kasmiran jumari
  • 5 篇 dominik ertl
  • 5 篇 guangyuan zhao
  • 5 篇 zhang rubo
  • 5 篇 boonchuan ng
  • 5 篇 zhang hao
  • 5 篇 wei wang
  • 4 篇 aswir premadi
  • 4 篇 jun wang
  • 4 篇 jing zhang
  • 4 篇 li li
  • 4 篇 x.m. han
  • 4 篇 tang jie
  • 4 篇 tomomasa nagashi...
  • 4 篇 yang xu
  • 4 篇 yong liu

语言

  • 3,722 篇 英文
  • 15 篇 中文
  • 2 篇 乌克兰文
  • 1 篇 其他
检索条件"任意字段=2009 International Conference on Computer Technology and Development, ICCTD 2009"
3740 条 记 录,以下是3631-3640 订阅
排序:
Social context: Supporting interaction awareness in ubiquitous environments
Social context: Supporting interaction awareness in ubiquito...
收藏 引用
international conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous)
作者: Minh H. Tran Jun Han Alan Colman Faculty of Information and Communication Technologies Swinburne University of Technology Hawthorn VIC Australia
In ubiquitous computing environments, certain entities (or actors) often need to interact with each other in achieving a joint goal in a dynamically changing context. To perform such interactions in a seamless manner,... 详细信息
来源: 评论
Experimental Comparisons of Clonal Selection Algorithms with Different Metadynamics Strategies
Experimental Comparisons of Clonal Selection Algorithms with...
收藏 引用
2009 Fourth international conference on Bio-Inspired Computing:Theories and Applications(BIC-TA2009)
作者: Xingxin Pei1,2,Wenjian Luo1,2,Zhifang Li1,2,Baoliang Xu1,2 and Xufa Wang1,2 1 Nature Inspired Computation and Application Laboratory,School of computer Science and technology,University of Science and technology of China,Hefei 230027,Anhui,China 2 Anhui Key Laboratory of Software in Computing and Communication,University of Science and technology of China,Hefei 230027,China
Metadynamics is an important operator of Clonal Selection Algorithms(CSAs),which is considered as an embedded mechanism to increase the population *** the binary space,the traditional metadynamics usually adopts an eq... 详细信息
来源: 评论
Quality prediction model of object-oriented software system using computational intelligence
Quality prediction model of object-oriented software system ...
收藏 引用
Workshop on Power Electronics and Intelligent Transportation System, PEITS
作者: Cong Jin Shu-Wei Jin Jun-Min Ye Qing-Guo Zhang Department of Computer Science Central China Normal University Wuhan China The School of Physics & Technology Wuhan University of China Wuhan China
Effective prediction of the fault-proneness plays a very important role in the analysis of software quality and balance of software cost, and it also is an important problem of software engineering. Importance of soft... 详细信息
来源: 评论
Design and development of a Distributed Tabletop System Using EBITA Framework
Design and Development of a Distributed Tabletop System Usin...
收藏 引用
international conference on Ubiquitous Information Technologies and Applications (ICUT)
作者: Minyoung Kim Yongjoo Cho Kyoung Shin Park Department of Computer Science Sangmyung University South Korea Division of Digital Media Technology Sangmyung University South Korea Department of Multimedia Technology Dankook University South Korea
Over the past decade, tabletop systems are becoming more popular. However, prior works on tabletop system have mostly focused on supporting user interactions with digital contents on one single tabletop display, which... 详细信息
来源: 评论
Exploring user's habits and virtual communities to improve IP-connectivity management
Exploring user's habits and virtual communities to improve I...
收藏 引用
international conference on Ultra Modern Telecommunications and Workshops (ICUMT)
作者: Roberto Rigolin Ferreira Lopes Roberto Sadao Yokoyama Bruno Yuji Lino Kimura Pravin Pawar Bert-Jan van Beijnum Edson dos Santos Moreira University of Twente Enschede Netherlands University of São Paulo Sao Paulo Brazil
A wireless connectivity island is a geographic area covered by a particular wireless ISP. Nowadays, mobile users possessing multi-homing mobile devices can have IP-connectivity almost everywhere, while being on the mo... 详细信息
来源: 评论
A case for P2P infrastructure for social networks - opportunities & challenges
A case for P2P infrastructure for social networks - opportun...
收藏 引用
Annual conference on Wireless On Demand Network Systems and Services (WONS)
作者: Sonja Buchegger Anwitaman Datta Deutsche Telekom Research and Development Laboratories Berlin Germany Centre of Advanced Information Systems School of Computer Engineering NTU Singapore Singapore
Online Social Networks like Facebook, MySpace, Xing, etc. have become extremely popular. Yet they have some limitations that we want to overcome for a next generation of social networks: privacy concerns and requireme... 详细信息
来源: 评论
Software Risk Management
Software Risk Management
收藏 引用
international conference on Information Management and Engineering, ICIME
作者: Shehnila Zardari Department of Computer Science & IT NED University of Engineering & Technology Karachi Pakistan
Building and maintaining software is a risky business. Since software permeates and controls so much of the present-day enterprise (and its products), delay, cost excess, and failure to fulfill a command, can have far... 详细信息
来源: 评论
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Execution Anomaly Detection in Distributed Systems through U...
收藏 引用
IEEE international conference on Data Mining (ICDM)
作者: Qiang Fu Jian-Guang Lou Yi Wang Jiang Li Microsoft Research Asia Beijing China Department of Computer Science & Technology Beijing University of Posts and Telecommunications Beijing China
Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies include both work flow errors and low performance... 详细信息
来源: 评论
Invited Seminar
Invited Seminar
收藏 引用
international conference on Mobile Data Management
作者: Ling Liu Georgia Institute of Technology USA
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in data privacy area, the presenter descr... 详细信息
来源: 评论
The Effect of Spreading Factor on Network Lifetime and Energy Consumption Rate of Low Energy Adaptive Clustering Hierarchy (LEACH)
The Effect of Spreading Factor on Network Lifetime and Energ...
收藏 引用
international conference on Advances in Computing, Control, & Telecommunication Technologies (ACT)
作者: Bhaskar P. Deosarkar Narendra Singh Yadav R.P. Yadav Department of Electronics and Communication Engineering Malaviya National Institute of Technology Jaipur India
Clustering is a widely discussed as an important architecture for data centric wireless sensor networks. Low energy adaptive clustering hierarchy (LEACH), proposed in past, is used as benchmark scheme by many proposal... 详细信息
来源: 评论