咨询与建议

限定检索结果

文献类型

  • 5,209 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 5,216 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,326 篇 工学
    • 1,989 篇 计算机科学与技术...
    • 1,343 篇 软件工程
    • 553 篇 信息与通信工程
    • 528 篇 机械工程
    • 387 篇 仪器科学与技术
    • 331 篇 电子科学与技术(可...
    • 325 篇 控制科学与工程
    • 294 篇 电气工程
    • 130 篇 网络空间安全
    • 113 篇 生物医学工程(可授...
    • 91 篇 动力工程及工程热...
    • 90 篇 建筑学
    • 84 篇 生物工程
    • 77 篇 化学工程与技术
    • 74 篇 土木工程
    • 71 篇 光学工程
    • 58 篇 交通运输工程
  • 960 篇 理学
    • 629 篇 数学
    • 175 篇 统计学(可授理学、...
    • 165 篇 系统科学
    • 132 篇 物理学
    • 105 篇 生物学
  • 926 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 212 篇 工商管理
  • 154 篇 经济学
    • 150 篇 应用经济学
  • 88 篇 医学
    • 71 篇 基础医学(可授医学...
    • 69 篇 临床医学
  • 81 篇 文学
    • 78 篇 新闻传播学
  • 76 篇 教育学
    • 71 篇 教育学
  • 54 篇 法学
  • 41 篇 农学
  • 35 篇 军事学
  • 32 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 63 篇 data mining
  • 60 篇 educational inst...
  • 55 篇 wireless sensor ...
  • 55 篇 computational mo...
  • 51 篇 artificial neura...
  • 50 篇 monitoring
  • 47 篇 computers
  • 47 篇 cryptography
  • 45 篇 computer science
  • 41 篇 xml
  • 40 篇 databases
  • 39 篇 image segmentati...
  • 36 篇 software
  • 35 篇 variable speed d...
  • 34 篇 component
  • 33 篇 information mana...
  • 32 篇 authentication
  • 32 篇 web services
  • 31 篇 visualization
  • 31 篇 semantics

机构

  • 20 篇 school of inform...
  • 18 篇 school of comput...
  • 14 篇 school of electr...
  • 13 篇 engineering mana...
  • 12 篇 school of inform...
  • 12 篇 school of inform...
  • 11 篇 state key labora...
  • 10 篇 college of compu...
  • 10 篇 department of co...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 school of inform...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 school of comput...
  • 7 篇 college of infor...
  • 7 篇 school of inform...
  • 7 篇 college of infor...

作者

  • 101 篇 china
  • 12 篇 nadeem ehsan
  • 10 篇 li-minn ang
  • 9 篇 wang wei
  • 9 篇 p.r.china
  • 8 篇 yang yang
  • 8 篇 wu di
  • 7 篇 wang hui
  • 7 篇 yang xiao
  • 7 篇 wang yan
  • 7 篇 guangzhi qu
  • 7 篇 kiseon kim
  • 6 篇 jing zhang
  • 6 篇 chan tak-wai
  • 6 篇 suwimon kooptiwo...
  • 6 篇 vishnu kant soni
  • 6 篇 ebtisam mirza
  • 6 篇 zhang hongke
  • 6 篇 xiaoping li
  • 6 篇 manoj kumar mish...

语言

  • 5,202 篇 英文
  • 7 篇 其他
  • 6 篇 中文
  • 1 篇 法文
检索条件"任意字段=2010 3rd IEEE International Conference on Computer Science and Information Technology—ICCSIT 2010"
5216 条 记 录,以下是81-90 订阅
排序:
Enterprise Level IT Risks: An Assessment Framework and Tool
Enterprise Level IT Risks: An Assessment Framework and Tool
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Azizi, Nadhirah Hashim, Khairuddin Tenaga Nas Univ Software Engn Dept Selangor Bandar Baru Ban Malaysia
Increase in emphasis on risk management allows for better enterprise IT risk management. Early risk identification and assessment ensures effective risk management steps are formulated. The formulation and sustenance ... 详细信息
来源: 评论
Building a Believable and Effective Agent for a 3D Boxing Simulation Game
Building a Believable and Effective Agent for a 3D Boxing Si...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Mozgovoy, Maxim Umarov, Iskander Univ Aizu Aizu Wakamatsu Fukushima Japan TruSoft Intl Inc St Petersburg FL USA
This paper describes an approach used to build and optimize a practical AI solution for a 3D boxing simulation game. The two main features of the designed AI agent are believability (human-likeness of agent's beha... 详细信息
来源: 评论
Minimal Instruction Set AES Processor using Harvard Architecture
Minimal Instruction Set AES Processor using Harvard Architec...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Kong, J. H. Ang, L. -M. Seng, K. P. Univ Nottingham Malaysia Campus Dept Elect & Elect Engn Lalan Broga Semenyih 43500 Selangor Malaysia
This paper presents an FPGA implementation of Advance Encryption Standard (AES), using Minimal Instruction Set computer (MISC) with Harvard Architecture. With simple logic components and a minimum set of fundamental i... 详细信息
来源: 评论
The Design and Implementation of Plate-profile information Collecting and Processing System Based on FPGA
The Design and Implementation of Plate-profile Information C...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Xu Hong-zhe Wang Jian-xin ChaoLu-Meng Xi An Jiao Tong Univ Xian Shaanxi Peoples R China
this paper shows the design and implementation of a video capturing and processing system, which can collect plate-profile information and process image in the spatial domain. Strategy of buffer storage is used in the... 详细信息
来源: 评论
Application of RFID and SNMP technology in Highway Electronic Toll Collection System
Application of RFID and SNMP Technology in Highway Electroni...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Huang, Huiping Xiao, Shide Meng, Xiangyin Southwest Jiaotong Univ Dept Mech Engn Chengdu Peoples R China
An ETC system based on RFID technology uses radio wave to identify cars passing through the toll collection site and automatically debits toll rate from the car owner's pre-paid account RFID technology and its app... 详细信息
来源: 评论
information technology: A Means of Quality in Healthcare
Information Technology: A Means of Quality in Healthcare
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Ahmed, Adeel Mirza, Ebtisam Ehsan, Nadeem Awan, Suleman Ahmad Ishaque, Azam Ctr Adv Studies Engn Dept Engn Management Islamabad Pakistan
Healthcare services are becoming vital and growing immensely with the passage of time, and so is the use of information technology in every aspect of life. information and communication technologies are essential part... 详细信息
来源: 评论
information Searching Protocol for Color Image (ISPCI)
Information Searching Protocol for Color Image (ISPCI)
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Wattana, Monlica Bhattarakosol, Pattarasinee Han, Sunyoung Chulalongkorn Univ Fac Sci Dept Math Bangkok Thailand Konkuk Univ Dept Comp Sci & Engn Seoul South Korea
Search engine is very important for searching image over the Internet. Recently, there are many search engine techniques which narrow down the real image requirement of uses. This paper proposed a new protocol: a spec... 详细信息
来源: 评论
The System of Powerful computer Laboratory Class via Socket Programming
The System of Powerful Computer Laboratory Class via Socket ...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Jitbanyud, Aitichai Toadithep, Nunnapad Silpakorn Univ Fac Sci Dept Comp Nakhon Pathom 73000 Thailand
This paper aims to develop the system of powerful computer laboratory class by simulation the ideal learning procedure, teachers and their students can keep in touch with each other in 2-way and immediately communicat... 详细信息
来源: 评论
Research of Software Reuse technology Based on Component
Research of Software Reuse Technology Based on Component
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Du XianFeng Qiang ZanXia Zhongyuan Inst Technol Sch Comp Sci Zhengzhou 450007 Peoples R China
This paper highlights software reuse technology and classifies. The emphasis of the paper presents the model of component and Studies COTS. As the result, this paper points out component reuse is fine granularity'... 详细信息
来源: 评论
Mining Distinguishing Patterns Based on Malware Traces
Mining Distinguishing Patterns Based on Malware Traces
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Sun, Xiaoyan Huang, Qian Zhu, Yuefei Guo, Ning Zhengzhou Informat Sci & Technol Inst Zhengzhou Henan Peoples R China Lanzhou Univ Lanzhou Gansu Peoples R China
The automatic generation of malicious behavior pattern based on system call trace is important to malware detection. This paper studied the existing generation method of malicious behavior specification. In order to r... 详细信息
来源: 评论