咨询与建议

限定检索结果

文献类型

  • 14,482 篇 会议
  • 86 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 14,608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,876 篇 工学
    • 5,284 篇 计算机科学与技术...
    • 3,499 篇 软件工程
    • 1,404 篇 控制科学与工程
    • 1,043 篇 机械工程
    • 1,013 篇 电气工程
    • 1,010 篇 信息与通信工程
    • 634 篇 电子科学与技术(可...
    • 545 篇 仪器科学与技术
    • 299 篇 动力工程及工程热...
    • 271 篇 建筑学
    • 250 篇 土木工程
    • 228 篇 生物医学工程(可授...
    • 227 篇 交通运输工程
    • 207 篇 化学工程与技术
    • 192 篇 安全科学与工程
    • 186 篇 材料科学与工程(可...
    • 184 篇 环境科学与工程(可...
    • 182 篇 光学工程
    • 182 篇 生物工程
  • 2,682 篇 管理学
    • 2,218 篇 管理科学与工程(可...
    • 583 篇 图书情报与档案管...
    • 530 篇 工商管理
  • 2,480 篇 理学
    • 1,306 篇 数学
    • 624 篇 系统科学
    • 472 篇 物理学
    • 308 篇 统计学(可授理学、...
    • 264 篇 生物学
    • 175 篇 化学
  • 227 篇 教育学
    • 215 篇 教育学
  • 204 篇 经济学
    • 202 篇 应用经济学
  • 178 篇 医学
  • 137 篇 文学
  • 129 篇 法学
  • 111 篇 农学
  • 69 篇 艺术学
  • 48 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 1,327 篇 computational mo...
  • 995 篇 biological syste...
  • 676 篇 application soft...
  • 546 篇 computer archite...
  • 431 篇 mathematical mod...
  • 309 篇 computer science
  • 289 篇 analytical model...
  • 253 篇 computer simulat...
  • 233 篇 monitoring
  • 213 篇 educational inst...
  • 200 篇 real time system...
  • 179 篇 power system mod...
  • 169 篇 data mining
  • 168 篇 object oriented ...
  • 166 篇 data models
  • 165 篇 adaptation model
  • 155 篇 modeling
  • 152 篇 databases
  • 152 篇 hardware
  • 151 篇 servers

机构

  • 32 篇 department of co...
  • 29 篇 school of contro...
  • 26 篇 college of compu...
  • 24 篇 school of comput...
  • 23 篇 school of contro...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 school of comput...
  • 16 篇 school of comput...
  • 16 篇 school of comput...
  • 16 篇 department of co...
  • 16 篇 school of comput...
  • 16 篇 school of comput...
  • 16 篇 college of compu...
  • 14 篇 college of compu...
  • 14 篇 college of compu...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 13 篇 college of compu...

作者

  • 15 篇 wei li
  • 14 篇 china
  • 13 篇 li li
  • 13 篇 wang wei
  • 12 篇 wang hui
  • 11 篇 wang li
  • 11 篇 xin li
  • 10 篇 zhang lei
  • 10 篇 li yang
  • 10 篇 hui wang
  • 10 篇 wei liu
  • 10 篇 li ying
  • 10 篇 li jing
  • 9 篇 lei wang
  • 9 篇 qing wang
  • 9 篇 li xin
  • 9 篇 wang jing
  • 9 篇 wang jian
  • 9 篇 jie li
  • 9 篇 gang liu

语言

  • 14,462 篇 英文
  • 127 篇 中文
  • 14 篇 其他
  • 3 篇 俄文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 乌克兰文
检索条件"任意字段=2010 International Conference on Computer Application and System Modeling, ICCASM 2010"
14608 条 记 录,以下是41-50 订阅
排序:
Chinese complex question analysis based on event extraction
Chinese complex question analysis based on event extraction
收藏 引用
international conference on computer application and system modeling
作者: Liu, Xiaoming Liu, Li School of Computer Beijing Institute of Technology Beijing China
question analysis is one of the important components in Question-Answering system. Since the existence of events, complex question analysis becomes extremely difficult. Using semantic role labeling based on CRFs, even... 详细信息
来源: 评论
Simulation on hot drug perfusion machine system
Simulation on hot drug perfusion machine system
收藏 引用
international conference on computer application and system modeling (iccasm)
作者: Zhao, Xinzhong Wu, Di Tianjin University of Technology and Education Tianjin China Qinhuangdao Radio Broadcasting and Television University Qinhuangdao China
In the research of hot drug perfusion machine, temperature control is very important. Hot drugs acting on the lesion is a direct impact on the efficacy of the patience. So the application of Intelligent control which ... 详细信息
来源: 评论
application analysis of complex adaptive systems for WSN
Application analysis of complex adaptive systems for WSN
收藏 引用
international conference on computer application and system modeling
作者: Chen, Yan Qiao, Ji-Hong School of Computer and Information Engineering Beijing Technology and Business University Beijing China
This article bases on the view of complex adaptive systems theory to give the methodological analysis to the wireless sensor network (WSN)'s Self- configuration, Self-healing and Agent characteristics. Wireless Se... 详细信息
来源: 评论
Some secret sharing algorithms for multimedia security
Some secret sharing algorithms for multimedia security
收藏 引用
international conference on computer application and system modeling
作者: Sheng, Cao Yong, Chen School of Computer Science and Engineering University of Electronic Science and Technology of China Guangzhou China Department of Software Engineering Zhongkai University of Agriculture and Engineering Chengdu China
Multimedia Security has been an important part of digital information protection. And secret sharing schemes are used for multimedia encryption in this paper. The algorithms proposed are computationally secure, effect... 详细信息
来源: 评论
The computer controlling detection system for cylindrically helical spring
The computer controlling detection system for cylindrically ...
收藏 引用
international conference on computer application and system modeling
作者: Liu, Yong Zhangsaifei School of Mechatronics Engineering North University of China Shanxi China
Cylindrically helical spring is a wide used mechanical part in the modern industry, but conventional examine method has some limitations. The newly designed spring's computer controlling examinable system examines... 详细信息
来源: 评论
A search algorithm on Gnutella networks based on resource replication
A search algorithm on Gnutella networks based on resource re...
收藏 引用
international conference on computer application and system modeling
作者: Tan, Le-Ting Tan, Tao Department of Computer Science and Technology China West Normal University Nanchong 637000 China
On the basis of study of Gnutella search arithmetic, this paper analyzes the latency of unblance of loads. This paper gives a arithmetic that use some hints of replication Resources to enhance search effect and load-b... 详细信息
来源: 评论
Research on the intrusion detection based on the clonal algorithm
Research on the intrusion detection based on the clonal algo...
收藏 引用
international conference on computer application and system modeling
作者: Liu, Dongming Song, Lipeng Electron and Computer Science and Technology Institute North University of China NUC Taiyuan China
This paper infers an intrusion detection way based on clone including the overall detection algorithms modules and susceptibility, memory test cells and mature cell detection algorithms, algorithm can be to dynamicall... 详细信息
来源: 评论
Role-based trust management system on TCP
Role-based trust management system on TCP
收藏 引用
international conference on computer application and system modeling (iccasm)
作者: Xiuhua, Geng Yanfang, Fan Software Engineering Department Beijing Information Technology College Beijing China School of Computer and Information Technology Beijing Jiaotong University Beijing China
When making authorization decision, previous trust management only considers the properties of entities while ignores the states of platforms on which entities are operating. An "irresponsible" platform may ... 详细信息
来源: 评论
Design and realization of a radar simulation system base on CPCI bus
Design and realization of a radar simulation system base on ...
收藏 引用
international conference on computer application and system modeling
作者: Liu, Haibo Zeng, Dazhi School of Information and Electronics Beijing Institute of Technology Beijing 100081 China
In this paper, design and implementation of a radar signal simulation system is introduced. It is based on standard CPCI bus and follow the design principle of standardized, modular and extendable in design process. T... 详细信息
来源: 评论
The application of ID authentication safety system in campus mobile education
The application of ID authentication safety system in campus...
收藏 引用
international conference on computer application and system modeling
作者: Wang, Haoliang Niu, Yi Bai, Chenming Wang, Lili Department of Computer and Information Science College of Dongguan University of Technology Dongguan China
In view of the potential security risk existing in mobile education wireless network terminal access and information transmission, the author proposes a security model which uses the speech recognition technology and ... 详细信息
来源: 评论