咨询与建议

限定检索结果

文献类型

  • 3,688 篇 会议
  • 41 册 图书
  • 41 篇 期刊文献

馆藏范围

  • 3,770 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,916 篇 工学
    • 1,280 篇 计算机科学与技术...
    • 847 篇 软件工程
    • 215 篇 信息与通信工程
    • 204 篇 机械工程
    • 189 篇 电气工程
    • 178 篇 控制科学与工程
    • 138 篇 仪器科学与技术
    • 110 篇 电子科学与技术(可...
    • 66 篇 生物医学工程(可授...
    • 65 篇 生物工程
    • 57 篇 建筑学
    • 52 篇 网络空间安全
    • 45 篇 土木工程
    • 43 篇 动力工程及工程热...
    • 43 篇 化学工程与技术
    • 39 篇 环境科学与工程(可...
  • 453 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 147 篇 工商管理
    • 128 篇 图书情报与档案管...
  • 390 篇 理学
    • 178 篇 数学
    • 84 篇 物理学
    • 74 篇 生物学
    • 58 篇 系统科学
    • 39 篇 统计学(可授理学、...
  • 141 篇 教育学
    • 137 篇 教育学
  • 115 篇 文学
    • 113 篇 新闻传播学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 60 篇 医学
    • 50 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 56 篇 法学
    • 50 篇 社会学
  • 51 篇 农学
  • 22 篇 艺术学
  • 8 篇 军事学
  • 1 篇 历史学

主题

  • 370 篇 computer science
  • 315 篇 application soft...
  • 216 篇 information tech...
  • 188 篇 computer archite...
  • 178 篇 educational inst...
  • 149 篇 costs
  • 145 篇 computer network...
  • 129 篇 programming
  • 121 篇 technology manag...
  • 116 篇 educational tech...
  • 116 篇 humans
  • 111 篇 data mining
  • 109 篇 internet
  • 106 篇 computer industr...
  • 100 篇 standards develo...
  • 92 篇 software enginee...
  • 92 篇 computational mo...
  • 92 篇 computer science...
  • 91 篇 control systems
  • 88 篇 hardware

机构

  • 21 篇 department of co...
  • 10 篇 research center ...
  • 10 篇 college of compu...
  • 10 篇 faculty of compu...
  • 9 篇 research center ...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 school of optica...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 department of co...
  • 5 篇 college of infor...
  • 5 篇 school of comput...
  • 5 篇 department of co...

作者

  • 18 篇 china
  • 7 篇 mohammad syuhaim...
  • 6 篇 vahid rafe
  • 6 篇 reza rafeh
  • 6 篇 kasmiran jumari
  • 5 篇 dominik ertl
  • 5 篇 guangyuan zhao
  • 5 篇 zhang rubo
  • 5 篇 boonchuan ng
  • 5 篇 zhang hao
  • 5 篇 wei wang
  • 4 篇 aswir premadi
  • 4 篇 jun wang
  • 4 篇 jing zhang
  • 4 篇 li li
  • 4 篇 x.m. han
  • 4 篇 tang jie
  • 4 篇 yang xiao
  • 4 篇 tomomasa nagashi...
  • 4 篇 yang xu

语言

  • 3,752 篇 英文
  • 15 篇 中文
  • 2 篇 乌克兰文
  • 1 篇 其他
检索条件"任意字段=2009 International Conference on Computer Technology and Development, ICCTD 2009"
3770 条 记 录,以下是371-380 订阅
排序:
Evaluating access control of open source electronic health record systems
Evaluating access control of open source electronic health r...
收藏 引用
6th international Workshop on Automation of Software Test, AST 2011, Co-located with ICSE 2011
作者: Helms, Eric Williams, Laurie North Carolina State University Department of Computer Science Campus Box 8206 890 Oval Drive Raleigh NC 27695-8206 United States
Incentives and penalties for healthcare providers as laid out in the American Recovery and Reinvestment Act of 2009 have caused tremendous growth in the development and installation of electronic health record (EHR) s... 详细信息
来源: 评论
Automatic Generation and Verification of Interlocking Tables Based on Domain Specific Language for computer Based Interlocking Systems (DSL-CBI)
Automatic Generation and Verification of Interlocking Tables...
收藏 引用
2011 IEEE international conference on computer Science and Automation Engineering(CSAE 2011)
作者: Yan Cao,Tianhua Xu,Tao Tang,Haifeng Wang,Lin Zhao State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044,P.R.China
Interlocking tables,as the function specification of the computer Based Interlocking System (CBI),play an important role in ensuring safe train movements at a railway *** development and verification of interlocking t... 详细信息
来源: 评论
The quantification of overlay network congestion based on Compressive sensing
收藏 引用
2011 international conference on Advanced Materials and Information technology Processing(AMITP 2011)
作者: Hui He Ming Chang Xing Wang Wenjuan Li Hongli Zhang Hong-mei Ma Research Center of Computer Network and Information Security Technology Harbin Institute of Technology
To obtain overlay network traffic and delay information between two hosts is important for network management, monitoring, design, planning and assessment. Traffic matrix and delay matrix represent the traffic and del... 详细信息
来源: 评论
A Robust Blind Source Separation Alg orithm Based on Generalized Variance
A Robust Blind Source Separation Alg orithm Based on General...
收藏 引用
2011 IEEE international conference on computer Science and Automation Engineering(CSAE 2011)
作者: Huagang Yu,Gaoming Huang,and Jun Gao College of Electronic Engineering,Naval Univ.of Engineering,Wuhan,China
To solve the problem of blind source separation,a robust algorithm based on generalized variance is presented by exploiting the different temporal structure of uncorrelated source *** contrast to higher order cumulant... 详细信息
来源: 评论
IP Traffic Classification Based on Machine Learning
IP Traffic Classification Based on Machine Learning
收藏 引用
2011 IEEE 13th international conference on Communication technology(ICCT 2011)
作者: Donghong Qin and Jiahai Yang Department of computer Science and technology Tsinghua University Beijing, P. R. China Jiamian Wang and Bin Zhang Network Research Center Tsinghua University Beijing, P. R. China
With the rapid development of Internet, many network applications (e.g., P2P) use dynamic ports and encryption technology, which makes the traditional port and payload-based classification methods ineffective. Hence, ... 详细信息
来源: 评论
The Membrane Activity's Design and Evolution about ac E Service Flow
The Membrane Activity's Design and Evolution about ac E Serv...
收藏 引用
The 2011 international conference on Electric and Electronics (EEIC 2011)
作者: Xiaona Xia Baoxiang Cao Jiguo Yu School of Computer Science Qufu Normal University
Starting from semantic composition of services, ac E service flow as architecture researching point, this paper has designed and argued dynamic flow evolution mechanism. First of all, the architecture service topology... 详细信息
来源: 评论
An Improved Surface-based DNA Computing Model of Whole Error Permutation Problems
An Improved Surface-based DNA Computing Model of Whole Error...
收藏 引用
2011 international conference on Management Science and Intelligent Control(ICMSIC 2011)
作者: SUN Xia School of Science Anhui University of Science and technology Huainan P. R. China YIN Zhi-Xiang School of Science Anhui University of Science and technology Huainan P. R. China XU Hui School of computer Science and Engineering Anhui University of Science and technology Huainan P. R. China
The whole error permutation problem is one of the most important questions in combinatorial mathematics. It was transformed into the SAT problem in previous surface-based computing models. Though surface-based model o... 详细信息
来源: 评论
Infrared and Visible Image Registration Base on SIFT Features
Infrared and Visible Image Registration Base on SIFT Feature...
收藏 引用
2011 international conference on Advanced Materials in Microwaves and Optics(AMMO 2011)
作者: Yang Kai-Wei Chen Tian-Hua Xing Su-Xia Li Jing-Xian College of Computer and Information Engineering Beijing Technology and Business University
In the System of Target Tracking Recognition, infrared sensors and visible light sensors are two kinds of the most commonly used sensors;fusion effectively for these two images can greatly enhance the accuracy and rel... 详细信息
来源: 评论
Data Mining the Significance of the TCM Prescription for Pharmacodynamic Effect Indexs Based on ANN
Data Mining the Significance of the TCM Prescription for Pha...
收藏 引用
The 2011 international conference on Electric and Electronics(EEIC 2011)
作者: Bin Nie JianQiang Du RiYue Yu YuHui Liu GuoLiang Xu YueSheng Wang LiPing Huang School of Computer Science Jiangxi University of Traditional Chinese Medicine College of Pharmacy Jiangxi University of Traditional Chinese Medicine Key Laboratory of Modern Preparation Ministry of EducationJiangxi University of Traditional Chinese Medicine
The Traditional Chinese Medicine(TCM) Prescription include king drug,ministerial drug,assistant drug,sacrifice *** information may be reflected in the significance of the *** the paper put forward data mining the sign... 详细信息
来源: 评论
A Probabilistic Computing Approach of Attack Graph-Based Nodes in Large-scale Network
A Probabilistic Computing Approach of Attack Graph-Based Nod...
收藏 引用
2011 3rd international conference on Environmental Science and Information Application technology(ESIAT 2011)
作者: YE Yun XU Xi-shan QI Zhi-chang School of Computer Science National University of Defense Technology
To protect critical resources in networked environments, it is important to quantify the likelihood of potential multistep attacks in attack graphs. Aimed at the problems that probabilistic incorrect computing caused ... 详细信息
来源: 评论