咨询与建议

限定检索结果

文献类型

  • 3,688 篇 会议
  • 41 册 图书
  • 40 篇 期刊文献

馆藏范围

  • 3,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,915 篇 工学
    • 1,280 篇 计算机科学与技术...
    • 847 篇 软件工程
    • 215 篇 信息与通信工程
    • 204 篇 机械工程
    • 189 篇 电气工程
    • 178 篇 控制科学与工程
    • 138 篇 仪器科学与技术
    • 110 篇 电子科学与技术(可...
    • 66 篇 生物医学工程(可授...
    • 65 篇 生物工程
    • 57 篇 建筑学
    • 52 篇 网络空间安全
    • 45 篇 土木工程
    • 43 篇 动力工程及工程热...
    • 43 篇 化学工程与技术
    • 39 篇 环境科学与工程(可...
  • 452 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 146 篇 工商管理
    • 128 篇 图书情报与档案管...
  • 389 篇 理学
    • 178 篇 数学
    • 84 篇 物理学
    • 74 篇 生物学
    • 58 篇 系统科学
    • 39 篇 统计学(可授理学、...
  • 141 篇 教育学
    • 137 篇 教育学
  • 115 篇 文学
    • 113 篇 新闻传播学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 60 篇 医学
    • 50 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 56 篇 法学
    • 50 篇 社会学
  • 51 篇 农学
  • 22 篇 艺术学
  • 8 篇 军事学
  • 1 篇 历史学

主题

  • 370 篇 computer science
  • 315 篇 application soft...
  • 216 篇 information tech...
  • 188 篇 computer archite...
  • 178 篇 educational inst...
  • 149 篇 costs
  • 148 篇 computer network...
  • 129 篇 programming
  • 121 篇 technology manag...
  • 116 篇 educational tech...
  • 116 篇 humans
  • 111 篇 data mining
  • 109 篇 internet
  • 106 篇 computer industr...
  • 100 篇 standards develo...
  • 93 篇 computer science...
  • 92 篇 software enginee...
  • 92 篇 computational mo...
  • 91 篇 control systems
  • 89 篇 hardware

机构

  • 21 篇 department of co...
  • 10 篇 research center ...
  • 10 篇 college of compu...
  • 10 篇 faculty of compu...
  • 9 篇 research center ...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 school of optica...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 department of co...
  • 5 篇 college of infor...
  • 5 篇 school of comput...
  • 5 篇 department of co...

作者

  • 18 篇 china
  • 7 篇 mohammad syuhaim...
  • 6 篇 vahid rafe
  • 6 篇 reza rafeh
  • 6 篇 kasmiran jumari
  • 5 篇 dominik ertl
  • 5 篇 guangyuan zhao
  • 5 篇 zhang rubo
  • 5 篇 boonchuan ng
  • 5 篇 zhang hao
  • 5 篇 wei wang
  • 4 篇 aswir premadi
  • 4 篇 jun wang
  • 4 篇 jing zhang
  • 4 篇 li li
  • 4 篇 x.m. han
  • 4 篇 tang jie
  • 4 篇 yang xiao
  • 4 篇 tomomasa nagashi...
  • 4 篇 yang xu

语言

  • 3,740 篇 英文
  • 15 篇 中文
  • 12 篇 其他
  • 2 篇 乌克兰文
检索条件"任意字段=2009 International Conference on Computer Technology and Development, ICCTD 2009"
3769 条 记 录,以下是981-990 订阅
排序:
DCADH: A generating algorithm of delay-constrained multicast routing tree
DCADH: A generating algorithm of delay-constrained multicast...
收藏 引用
IEEE 9th international conference on computer and Information technology, CIT 2009
作者: Zhu, Yu-Xi Zhou, Ling Department of Computer Science and Technology Foshan University Foshan China
Multicast is the ability of a communication network to accept a single message from an application and to deliver copies of the message to multiple recipients at different location. With the development of Internet, M... 详细信息
来源: 评论
Performance Analysis of Low Density Parity Check Codes for Cognitive Radio
Performance Analysis of Low Density Parity Check Codes for C...
收藏 引用
international conference on computer technology and development (icctd)
作者: Ashfaq Ahmed Adeel Akram Waleed Ejaz Department of Telecomnunication Engineering Taxila Pakistan
Error correcting coding is used to protect against errors introduced by transmission media. Error correcting code enables the communication systems to have a reliable transmission over noisy channels. Cognitive radio ... 详细信息
来源: 评论
Design and implementation of virtual networking experiment system
Design and implementation of virtual networking experiment s...
收藏 引用
12th IASTED international conference on computers and Advanced technology in Education, CATE 2009
作者: Han, X.-L. Chen, G. Zhang, W.-X. Huang, C.-S. College of Information Science and Technology Donghua University Shanghai 201620 China
This paper presented a virtual experiment system of computer networks. The system is designed based on a real network laboratory environment and experiment content. With Client/Server structure, MVC software developme... 详细信息
来源: 评论
development of a Movable Service Robot with Double Working Arms for the Elderly and the Disabled
Development of a Movable Service Robot with Double Working A...
收藏 引用
international conference on Electronic computer technology
作者: Zhang Zhihua Zheng Jianyong Liu Yang Lu Gang Huazhong Univ Sci & Technol Elect & Informat Engn Dept Wuhan 430074 Peoples R China Southeast Univ Sch Mech Engn Nanjing 211189 Peoples R China
This paper firstly introduces the main design concept of a novel movable service robot prototype for the elderly and the disabled. The robot has the characteristics of simple structure, low cost, double working arms, ... 详细信息
来源: 评论
development of business game simulator for supporting collaborative problem-based learning
Development of business game simulator for supporting collab...
收藏 引用
2009 9th IEEE international conference on Advanced Learning Technologies, ICALT 2009
作者: Tseng, Chung Cheng Lan, Chung Hsien Lai, Robert Department of Computer Science and Engineering Yuan Ze University Taiwan Department of Information Management Nanya Institute of Technology Taiwan
This paper presents a business gaming simulator via fuzzy constraints-directed approach for supporting collaborative problem-based learning. In this gaming simulator, the structure of the problem is displayed as decis... 详细信息
来源: 评论
A Novel Detection of Network Errrors by Study of Raw TCP/IP Packets
A Novel Detection of Network Errrors by Study of Raw TCP/IP ...
收藏 引用
international conference on computer technology and development (icctd)
作者: M. Ravindran R. Bhaskaran Government Arts College Bangalore Karnataka IN Department of Computer Science Government Arts College Madurai Tamil Nadu India
computer Security is a serious concern in today's growing environment of network. Every computer network is affected by malicious attacks in the way of security violations with varying degrees. Unauthorized access... 详细信息
来源: 评论
TSGen: A UML activity diagram-based test scenario generation tool
TSGen: A UML activity diagram-based test scenario generation...
收藏 引用
7th IEEE/IFIP international conference on Embedded and Ubiquitous Computing, EUC 2009
作者: Sun, Chang-Ai Zhang, Baobao Li, Jin School of Information Engineering Science and Technology University Beijing China School of Computer and Information Technology Beijing Jiaotong University China
UML Activity Diagrams (UADs) are widely employed to model the behavior of software systems under development. To test the implemented systems, the UAD specification is a reasonable basis. Generating a complete suite o... 详细信息
来源: 评论
Application of Modern technology in New Insurance Product development
Application of Modern Technology in New Insurance Product De...
收藏 引用
international conference on computer technology and development (icctd)
作者: Ondrej Matustik Pavel Pesout Department of Statistics University of Economics Prague Czech Republic
development of new technologies brings new opportunities to all business sectors. The work presented here represents a connection of the ubiquitous computing with the real world business opportunities. We are namely f... 详细信息
来源: 评论
The Challenges of Open Source Software development with Collaborative Environment
The Challenges of Open Source Software Development with Coll...
收藏 引用
international conference on computer technology and development (icctd)
作者: Rusli Abdullah Modi Lakulu Hamidah Ibrahim Mohd Hasan Selamat Mohd Zali Mohd Nor FCSIT Universiti Putra Malaysia Serdang Malaysia
The current practice of open source software (OSS) evolves around sharing the source codes. However, without a prudent methodology in OSS software development, OSS users seldom participate in software development and ... 详细信息
来源: 评论
Botnet: Survey and case study
Botnet: Survey and case study
收藏 引用
2009 4th international conference on Innovative Computing, Information and Control, ICICIC 2009
作者: Li, Chao Jiang, Wei Zou, Xin National Computer Network Emergency Response TechnicalTeam/Coordination Center of China Beijing 100029 China Research Center of Computer Network and Information Security Technology Harbin Institute of Technology Harbin 150001 China
Botnet is a hybrid of previous threats integrated with a command and control system and hundreds of millions of computers are infected. Although botnets are widespread development, the research and solutions for botne... 详细信息
来源: 评论