咨询与建议

限定检索结果

文献类型

  • 2,762 篇 会议
  • 37 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,807 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,010 篇 工学
    • 1,237 篇 计算机科学与技术...
    • 876 篇 软件工程
    • 357 篇 信息与通信工程
    • 213 篇 机械工程
    • 200 篇 控制科学与工程
    • 170 篇 电子科学与技术(可...
    • 167 篇 仪器科学与技术
    • 142 篇 电气工程
    • 122 篇 环境科学与工程(可...
    • 115 篇 材料科学与工程(可...
    • 110 篇 交通运输工程
    • 104 篇 土木工程
    • 102 篇 建筑学
    • 81 篇 动力工程及工程热...
    • 80 篇 化学工程与技术
    • 78 篇 生物医学工程(可授...
    • 71 篇 生物工程
    • 61 篇 光学工程
  • 694 篇 管理学
    • 475 篇 管理科学与工程(可...
    • 245 篇 工商管理
    • 158 篇 图书情报与档案管...
  • 681 篇 理学
    • 366 篇 数学
    • 123 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 88 篇 系统科学
    • 86 篇 生物学
    • 69 篇 化学
  • 214 篇 经济学
    • 205 篇 应用经济学
  • 91 篇 教育学
    • 80 篇 教育学
  • 82 篇 法学
    • 64 篇 社会学
  • 72 篇 医学
  • 63 篇 农学
  • 14 篇 文学
  • 14 篇 艺术学
  • 10 篇 军事学
  • 1 篇 历史学

主题

  • 29 篇 data mining
  • 29 篇 computational mo...
  • 27 篇 educational inst...
  • 25 篇 monitoring
  • 24 篇 software
  • 23 篇 sustainable deve...
  • 23 篇 visualization
  • 22 篇 wireless sensor ...
  • 22 篇 computers
  • 18 篇 web services
  • 18 篇 ontology
  • 17 篇 computer archite...
  • 17 篇 students
  • 16 篇 databases
  • 16 篇 analytical model...
  • 16 篇 feature extracti...
  • 16 篇 network security
  • 16 篇 mathematical mod...
  • 15 篇 semantics
  • 15 篇 genetic algorith...

机构

  • 10 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 university of co...
  • 7 篇 islamic azad uni...
  • 6 篇 school of comput...
  • 6 篇 institute for nu...
  • 6 篇 hunan university...
  • 6 篇 shenzhen graduat...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 school of civil ...
  • 5 篇 mahan center isl...
  • 5 篇 college of compu...
  • 5 篇 school of comput...
  • 4 篇 computer enginee...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 school of mechan...

作者

  • 21 篇 china
  • 7 篇 mohammad reza no...
  • 6 篇 hu ruimin
  • 5 篇 hamid nakhaie
  • 5 篇 rong chunming
  • 5 篇 li jun
  • 5 篇 li wei
  • 5 篇 zhang david
  • 5 篇 david zhang
  • 5 篇 zhang wei
  • 4 篇 wang jing
  • 4 篇 bo huang
  • 4 篇 park namje
  • 4 篇 xhafa fatos
  • 4 篇 li hong
  • 4 篇 liu hao
  • 4 篇 zhang yan
  • 4 篇 huang bo
  • 4 篇 yan li
  • 4 篇 debahuti mishra

语言

  • 2,794 篇 英文
  • 10 篇 中文
  • 2 篇 其他
  • 1 篇 法文
检索条件"任意字段=2011 3rd International Conference on Computer Research and Development, ICCRD 2011"
2807 条 记 录,以下是321-330 订阅
排序:
The K computer and Its Application
The K Computer and Its Application
收藏 引用
3rd international conference on Networking and Computing (ICNC)
作者: Yokokawa, Mitsuo RIKEN Adv Inst Computat Sci Operat & Comp Syst Div Kobe Hyogo Japan
The K computer is a distributed memory supercomputer system with 82,944 compute nodes and 5,184 I/O nodes that was jointly developed by RIKEN and Fujitsu as a Japanese national project. Its development began in 2006 a... 详细信息
来源: 评论
computer Science and its Applications  2012
收藏 引用
丛书名: Lecture Notes in Electrical Engineering
2012年
作者: Sang-Soo Yeo Yi Pan Yang Sun Lee Hang Bae Chang
The 4th FTRA international conference on computer Science and its Applications (CSA-12) will be held in Jeju, Korea on November 22~25, ***-12 will be the most comprehensive conference focused on the various aspects of...
来源: 评论
A new software process model: The insect model
A new software process model: The insect model
收藏 引用
3rd international conference on computer Science and Its Applications, CSA 2011 and 2011 FTRA World Convergence conference, WCC 2011
作者: Moghaddam, Mahmood Vahedi Akbari, Mehdi Zand Department of Computer Engineering Science and Technology University of Mazandaran Babol Iran
Process models are common topic in the software engineering world. While there are many of these models, just one of them is used very commonly in the real cases which is classical model. In this article a new model t... 详细信息
来源: 评论
The research of Commonly Used Technologies and Application Fields on Data Mining
The Research of Commonly Used Technologies and Application F...
收藏 引用
3rd international conference on Mechanical and Electronics Engineering (ICMEE 2011)
作者: Meng Jianliang Yang Yanyan Niu Weihua N China Elect Power Univ Dept Comp Engn Baoding Peoples R China
Data mining is a computer analysis technology to birth not long but with rapid development, in these years, data mining theories have matured increasingly, and have shined in practice. This paper introduces briefly th... 详细信息
来源: 评论
A platform-independent smartphone application development framework
A platform-independent smartphone application development fr...
收藏 引用
3rd international conference on computer Science and Its Applications, CSA 2011 and 2011 FTRA World Convergence conference, WCC 2011
作者: Choi, Min Chungbuk National University 52 Naesudong-ro Heungdeok-gu Cheongju Chungbuk 361-763 Korea Republic of
Smartphones are generally less powerful than other mobile computing devices. Therefore, it is necessary to offload the computation-intensive part by careful partitioning of application functions across the cloud compu... 详细信息
来源: 评论
Exploration of the evolution process of IT outsourcing from 1992 to 2011: A main path analysis
Exploration of the evolution process of IT outsourcing from ...
收藏 引用
2012 3rd international conference on Intelligent Control and Information Processing, ICICIP 2012
作者: Cui, Xiaocong Wang, Jianjun Zhao, Jinhui Yao, Lin Luo, Yongchao Dalian University of Technology Dalian 116024 China
The aim of this paper is to identify a set of papers that play the central role in IT Outsourcing (ITO) field and to analyze the evolution process that has taken place in ITO. The methodology is based on the main path... 详细信息
来源: 评论
A study on the development of security evaluation methodology for wireless equipment
A study on the development of security evaluation methodolog...
收藏 引用
3rd international conference on Information Technology Convergence and Services, ITCS 2011 and 2011 FTRA international conference on Intelligent Robotics, Automations, Telecommunication Facilities, and Applications, IRoA 2011
作者: Park, Namje Lee, Changwhan Lee, Kwangwoo Won, Dongho Department of Computer Education Teachers College Jeju National University Jeju Korea Republic of Information Security Group Sungkyunkwan University Suwon Korea Republic of
Recently, there has been an increased interest in wireless security equipment because of the proliferation of distributed wireless networks and wireless equipment. The security functions of wireless security equipment... 详细信息
来源: 评论
Weakness in a user identification scheme with key distribution preserving user anonymity
Weakness in a user identification scheme with key distributi...
收藏 引用
3rd international conference on Information Technology Convergence and Services, ITCS 2011 and 2011 FTRA international conference on Intelligent Robotics, Automations, Telecommunication Facilities, and Applications, IRoA 2011
作者: Youn, Taek-Youn Kim, Jongsung Daejeon Korea Republic of Kyungnam University Masan Korea Republic of
Recently, Hsu and Chuang proposed a novel user identification scheme with key distribution for distributed computer networks. The Hsu-Chuang scheme permits a user to anonymously log into a system and establish a secre... 详细信息
来源: 评论
SoundBoom: Breaking app barriers
SoundBoom: Breaking app barriers
收藏 引用
3rd international conference on Mobile Computing, Applications, and Services, MobiCASE 2011
作者: Gawley, Rachel Barr, Jonathan Barr, Michael JamPot Technologies Limited Mobile Computing Research Department 405 Holywood Road Belfast United Kingdom
Cross-platform application development is a rapidly increasing area of research. SoundBoom is a mobile application created using innovative cross-platform development techniques. SoundBoom provides a unique ability to... 详细信息
来源: 评论
A framework for the development of mobile social software on android
A framework for the development of mobile social software on...
收藏 引用
3rd international conference on Mobile Computing, Applications, and Services, MobiCASE 2011
作者: Lübke, Robert Schuster, Daniel Schill, Alexander Computer Networks Group Technische Universität Dresden Dresden Germany
Nowadays, social aspects can be found in more and more mobile applications. Analyzing the domain of mobile social software and especially the offered features shows much similarity in the different apps. A framework t... 详细信息
来源: 评论