咨询与建议

限定检索结果

文献类型

  • 3,688 篇 会议
  • 41 册 图书
  • 41 篇 期刊文献

馆藏范围

  • 3,770 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,916 篇 工学
    • 1,280 篇 计算机科学与技术...
    • 847 篇 软件工程
    • 215 篇 信息与通信工程
    • 204 篇 机械工程
    • 189 篇 电气工程
    • 178 篇 控制科学与工程
    • 138 篇 仪器科学与技术
    • 110 篇 电子科学与技术(可...
    • 66 篇 生物医学工程(可授...
    • 65 篇 生物工程
    • 57 篇 建筑学
    • 52 篇 网络空间安全
    • 45 篇 土木工程
    • 43 篇 动力工程及工程热...
    • 43 篇 化学工程与技术
    • 39 篇 环境科学与工程(可...
  • 453 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 147 篇 工商管理
    • 128 篇 图书情报与档案管...
  • 390 篇 理学
    • 178 篇 数学
    • 84 篇 物理学
    • 74 篇 生物学
    • 58 篇 系统科学
    • 39 篇 统计学(可授理学、...
  • 141 篇 教育学
    • 137 篇 教育学
  • 115 篇 文学
    • 113 篇 新闻传播学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 60 篇 医学
    • 50 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 56 篇 法学
    • 50 篇 社会学
  • 51 篇 农学
  • 22 篇 艺术学
  • 8 篇 军事学
  • 1 篇 历史学

主题

  • 370 篇 computer science
  • 315 篇 application soft...
  • 216 篇 information tech...
  • 188 篇 computer archite...
  • 178 篇 educational inst...
  • 149 篇 costs
  • 145 篇 computer network...
  • 129 篇 programming
  • 121 篇 technology manag...
  • 116 篇 educational tech...
  • 116 篇 humans
  • 111 篇 data mining
  • 109 篇 internet
  • 106 篇 computer industr...
  • 100 篇 standards develo...
  • 92 篇 software enginee...
  • 92 篇 computational mo...
  • 92 篇 computer science...
  • 91 篇 control systems
  • 88 篇 hardware

机构

  • 21 篇 department of co...
  • 10 篇 research center ...
  • 10 篇 college of compu...
  • 10 篇 faculty of compu...
  • 9 篇 research center ...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 school of optica...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 department of co...
  • 5 篇 college of infor...
  • 5 篇 school of comput...
  • 5 篇 department of co...

作者

  • 18 篇 china
  • 7 篇 mohammad syuhaim...
  • 6 篇 vahid rafe
  • 6 篇 reza rafeh
  • 6 篇 kasmiran jumari
  • 5 篇 dominik ertl
  • 5 篇 guangyuan zhao
  • 5 篇 zhang rubo
  • 5 篇 boonchuan ng
  • 5 篇 zhang hao
  • 5 篇 wei wang
  • 4 篇 aswir premadi
  • 4 篇 jun wang
  • 4 篇 jing zhang
  • 4 篇 li li
  • 4 篇 x.m. han
  • 4 篇 tang jie
  • 4 篇 yang xiao
  • 4 篇 tomomasa nagashi...
  • 4 篇 yang xu

语言

  • 3,751 篇 英文
  • 15 篇 中文
  • 2 篇 乌克兰文
  • 2 篇 其他
检索条件"任意字段=2009 International Conference on Computer Technology and Development, ICCTD 2009"
3770 条 记 录,以下是611-620 订阅
排序:
A Load Balancing-Supported ID Management Method for Constant Degree DHTs
A Load Balancing-Supported ID Management Method for Constant...
收藏 引用
2010 3rd IEEE international conference on computer Science and Information technology—ICCSIT 2010
作者: Xiaohai Wang , Yuxing Peng , Dongsheng Li Department of computer Science National University of Defense technology Hunan, Changsha, 410073, China
ID management method is the foundation to implement and maintain DHT overlays, especially for Constant Degree DHTs based on de Bruijn and Kautz, because their topologies are not incrementally expandable and using bit-... 详细信息
来源: 评论
Research on Structured Storage and Index of Data Flow in Disaster Tolerance System
Research on Structured Storage and Index of Data Flow in Dis...
收藏 引用
2010 international conference on computer,Mechatronics, Control and Electronic Engineering (CMCE 2010)
作者: Fangyuan Hou computer Network and Information Security Lab Harbin Institute of technology Harbin,China Dong Li,Xiangzhan Yu computer Network and Information Security Lab Harbin Institute of technology Harbin,China
Based on the problem that the storage of data flow lacks structure and the data retrieval speed is slow in some disaster tolerance systems,a structured data storage and high efficient data retrieval model is proposed ... 详细信息
来源: 评论
Devising A biological model to detect polymorphic computer viruses Artificial immune system (AIM) Review
Devising A biological model to detect polymorphic computer v...
收藏 引用
international conference on computer technology and development
作者: Abdulla, Saman Mirza Zakaria, Omar Univ Malaya Fac Comp Sci & IT Kuala Lumpur 50603 Malaysia
Currently, in most virus detection techniques the signature recognition process of unknown viruses are challenging task. The process has become more difficulties after the complexities of the viruses' structure ha... 详细信息
来源: 评论
Collaborative Spectrum Sensing using Coalitional Games in Cognitive Radio Networks
Collaborative Spectrum Sensing using Coalitional Games in Co...
收藏 引用
2010 3rd IEEE international conference on computer Science and Information technology—ICCSIT 2010
作者: Li Yan Institute of Signal Processing and Transmission Nanjing University of Posts and Telecommunications Nanjing,China Yang Zhen Institute of Signal Processing and Transmission Nanjing University of Posts and Telecommunications Nanjing,China
Collaborative spectrum sensing among secondary users (SUs) in cognitive networks is shown to yield a significant performance *** this paper,we study the dynamics of a network of SUs in order to reduce the interference... 详细信息
来源: 评论
An Effective Algorithm of Tracking Multiple Objects in Occlusion Scenes
An Effective Algorithm of Tracking Multiple Objects in Occlu...
收藏 引用
2010 The 2nd international conference on Industrial Mechatronics and Automation (ICIMA 2010)
作者: Hong Wu,Xiao Chen,Yun Gao,Hao Zhou,Xuejie Zhang Department of computer Science and Engineering,Yunnan University,Kunming,P.R.China,650091
In the field of computer Vision(CV),multiple object tracking has been one of the hot issues,and it is especially one of difficulties to effectively track multiple objects in occlusion *** this paper,we propose an effe... 详细信息
来源: 评论
Infrared and visible image Registration Base on SIFT Features
Infrared and visible image Registration Base on SIFT Feature...
收藏 引用
2010 international conference on Remote Sensing (ICRS 2010)
作者: YANG Kai-wei,CHEN Tian-hua,XING Su-xia,LI Jing-xian College of computer and Information Engineering Beijing technology and Business University Beijing,People’s Republic of China(100048)
In the System of Target Tracking Recognition,infrared sensors and visible light sensors are two kinds of the most commonly used sensors;fusion effectively for these two images can greatly enhance the accuracy and reli... 详细信息
来源: 评论
Application Research of E-learning System in Course Study
Application Research of E-learning System in Course Study
收藏 引用
2010 Third international conference on Education technology and Training (ETT 2010)
作者: JinHua Xu Modern Educational technology Center Zhejiang Gongshang University HangZhou,ZheJiang province,China YinXiaoMa College of computer and Information Engineering Zhejiang Gongshang University HangZhou,ZheJiang province,China
As the Internet continues to expand and develop,e-learning offers a completely new teaching *** paper presents an e-learning system for courses study,whose structure,application,and evaluation are *** on such the e-le... 详细信息
来源: 评论
Network Convergence in China:Opportunities and Challenges for Telecom Operators
Network Convergence in China:Opportunities and Challenges fo...
收藏 引用
2010 2nd IEEE international conference on Advanced Management Science(IEEE ICAMS 2010)
作者: Malik Muhammad Imran Pattal Economics and Management School Beijing University of Posts and Telecommunications
Driven by considerable technological development such as digitalization of information and the coming together of ICT,network convergence has emerged as an important phenomenon *** China,recent policies about the conv... 详细信息
来源: 评论
Correctness Proof and Complexity Analysis of the Hybrid Reasoning Algorithm of β-PSML
Correctness Proof and Complexity Analysis of the Hybrid Reas...
收藏 引用
international conference on computer technology and development
作者: Su, Yila Inner Mongolia Univ Technol Coll Informat Engn Hohhot 010051 Peoples R China
We have studied the theoretical problems of logic of beta-PSML (Problem Solver Markup Language) constructed by combining description logic and Horn clauses. In the nonrecursive case, we show that a single step of appl... 详细信息
来源: 评论
Vulnerability Analysis of SHA-0
Vulnerability Analysis of SHA-0
收藏 引用
2010 2nd international conference on Intellectual technology in Industrial Practice (ITIP2010)
作者: Fanbao Liu 1,2 1 School of computer National University of Defense technology, 410073 Changsha, Hunan, China 2 Trusted Computing Lab, School of computer Beijing University of technology, 100124 Beijing, China
SHA is one of the most widely used cryptographic hash functions nowadays, but researches shown that it can't hold some key security properties such as avalanche effect and collision resistance. Since Wang etc. int... 详细信息
来源: 评论