咨询与建议

限定检索结果

文献类型

  • 2,762 篇 会议
  • 37 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,807 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,010 篇 工学
    • 1,237 篇 计算机科学与技术...
    • 876 篇 软件工程
    • 357 篇 信息与通信工程
    • 213 篇 机械工程
    • 200 篇 控制科学与工程
    • 170 篇 电子科学与技术(可...
    • 167 篇 仪器科学与技术
    • 142 篇 电气工程
    • 122 篇 环境科学与工程(可...
    • 115 篇 材料科学与工程(可...
    • 110 篇 交通运输工程
    • 104 篇 土木工程
    • 102 篇 建筑学
    • 81 篇 动力工程及工程热...
    • 80 篇 化学工程与技术
    • 78 篇 生物医学工程(可授...
    • 71 篇 生物工程
    • 61 篇 光学工程
  • 694 篇 管理学
    • 475 篇 管理科学与工程(可...
    • 245 篇 工商管理
    • 158 篇 图书情报与档案管...
  • 681 篇 理学
    • 366 篇 数学
    • 123 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 88 篇 系统科学
    • 86 篇 生物学
    • 69 篇 化学
  • 214 篇 经济学
    • 205 篇 应用经济学
  • 91 篇 教育学
    • 80 篇 教育学
  • 82 篇 法学
    • 64 篇 社会学
  • 72 篇 医学
  • 63 篇 农学
  • 14 篇 文学
  • 14 篇 艺术学
  • 10 篇 军事学
  • 1 篇 历史学

主题

  • 29 篇 data mining
  • 29 篇 computational mo...
  • 27 篇 educational inst...
  • 25 篇 monitoring
  • 24 篇 software
  • 23 篇 sustainable deve...
  • 23 篇 visualization
  • 22 篇 wireless sensor ...
  • 22 篇 computers
  • 18 篇 web services
  • 18 篇 ontology
  • 17 篇 computer archite...
  • 17 篇 students
  • 16 篇 databases
  • 16 篇 analytical model...
  • 16 篇 feature extracti...
  • 16 篇 network security
  • 16 篇 mathematical mod...
  • 15 篇 semantics
  • 15 篇 genetic algorith...

机构

  • 10 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 university of co...
  • 7 篇 islamic azad uni...
  • 6 篇 school of comput...
  • 6 篇 institute for nu...
  • 6 篇 hunan university...
  • 6 篇 shenzhen graduat...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 school of civil ...
  • 5 篇 mahan center isl...
  • 5 篇 college of compu...
  • 5 篇 school of comput...
  • 4 篇 computer enginee...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 school of mechan...

作者

  • 21 篇 china
  • 7 篇 mohammad reza no...
  • 6 篇 hu ruimin
  • 5 篇 hamid nakhaie
  • 5 篇 rong chunming
  • 5 篇 li jun
  • 5 篇 li wei
  • 5 篇 zhang david
  • 5 篇 david zhang
  • 5 篇 zhang wei
  • 4 篇 wang jing
  • 4 篇 bo huang
  • 4 篇 park namje
  • 4 篇 xhafa fatos
  • 4 篇 li hong
  • 4 篇 liu hao
  • 4 篇 zhang yan
  • 4 篇 huang bo
  • 4 篇 yan li
  • 4 篇 debahuti mishra

语言

  • 2,794 篇 英文
  • 10 篇 中文
  • 2 篇 其他
  • 1 篇 法文
检索条件"任意字段=2011 3rd International Conference on Computer Research and Development, ICCRD 2011"
2807 条 记 录,以下是51-60 订阅
排序:
Extracting security requirements from reality
Extracting security requirements from reality
收藏 引用
2011 3rd international conference on computer research and development, iccrd 2011
作者: Al-Fedaghi, Sabah Al-Enazi, Khalid Assaf Computer Engineering Department Kuwait University Kuwait
In recent years, research efforts have been aimed at providing methodologies and techniques for secure software engineering. In this direction, UMLsec is proposed as a standard extension of UML for expressing security... 详细信息
来源: 评论
The research on DMSP nighttime cloud image segmentation
The research on DMSP nighttime cloud image segmentation
收藏 引用
IEEE international conference on computer research and development
作者: Liu, Kai Kou, Zheng Meteorological Institute PLA University of Science and Technology Nanjing 211101 Jiangsu Province China
In this paper we employ the Integrated Active Contour (IAC) model of vector-value image segmentation and C-V model based on PDE in the segmentation of two channels DMSP nighttime satellite cloud images. The results of... 详细信息
来源: 评论
Using LBP histogram for face recognition on Android platform
Using LBP histogram for face recognition on Android platform
收藏 引用
2011 3rd international conference on computer research and development(iccrd 2011)
作者: Kuikui Lu Lanfang Dong Department of Computer Science and Technology University of Science and Technology of China
In this paper, a new face recognition method based on local binary pattern(LBP) histogram is presented. First, the grey face image is divided into several parts, and then the LBP histogram of each part is calculated a... 详细信息
来源: 评论
Coordination-Assisted Connectivity Recovery Approach in Wireless Sensor and Actor Networks
Coordination-Assisted Connectivity Recovery Approach in Wire...
收藏 引用
2011 3rd international conference on computer research and development(iccrd 2011)
作者: Xinyuan Zhao Neng Wang Computer Science & Technology Department East China Normal University School of Math & Physics and Information XinJiang Normal University
Wireless sensor and actor networks (WSANs) can be considered as a combination of sensor network and actor network in which powerful and mobile actor nodes can perform application specific actions based on the received... 详细信息
来源: 评论
Monte Carlo EM algorithm for generalized linear models with linear structural random effects
Monte Carlo EM algorithm for generalized linear models with ...
收藏 引用
2011 3rd international conference on computer research and development(iccrd 2011)
作者: Xingcai Zhou Department of Mathematics and Computer Science Tongling University
We propose generalized linear mixed models with linear structural random effects based on generalized linear mixed models. In this article, an Monte Carlo EM type al- gorithm is developed for maximum likelihood estima... 详细信息
来源: 评论
The research and relization of the reconfigurable copututing system architecture oriented to space application
The research and relization of the reconfigurable copututing...
收藏 引用
IEEE international conference on computer research and development
作者: Duan, Qing-Ya Huang, Shi-Tan Research and Development Department Microelectronics Technology Research Institute Xi'An China
Such advantages as self-adaption, multi-functions, low cost and low power etc make the technology of reconfiguration be the development tread of embedded system. The aim of this paper is to give a reconfigurable, embe... 详细信息
来源: 评论
research on the Venture Capital Information Platform of Shanxi Province based on GWT Service
Research on the Venture Capital Information Platform of Shan...
收藏 引用
2011 3rd international conference on computer research and development(iccrd 2011)
作者: Li Xianjun Yan xuxian Wen Hongquan State Key Laboratory of Software Development Environment Beihang University Command Department Unit 93582 of PLA Huairen Shanxi 038301 China School of Management Science & Engineering Shanxi University of Financial & Economics
Aiming at the problems of that capital information, project information and enterprise information scattered, and the lack of supporting for the trading platform in Shanxi venture capital management, this paper summar... 详细信息
来源: 评论
A Lightweight Energy-efficient Reliable Broadcast Tree for Wireless Sensor Networks
A Lightweight Energy-efficient Reliable Broadcast Tree for W...
收藏 引用
2011 3rd international conference on computer research and development(iccrd 2011)
作者: Chenggang Tang Neng Wang Dept. of Computer Science & Technology East China Normal University
Security is of critical importance for many potential applications of wireless sensor networks. Broadcasting from base station to nodes is very important in the cases such as distributing secure keys in the network or... 详细信息
来源: 评论
A signature matching optimization policy for anti-virus programs
A signature matching optimization policy for anti-virus prog...
收藏 引用
2011 3rd international conference on computer research and development(iccrd 2011)
作者: Bo Li Eul Gyu Im Electronics and Computer Engineering Hanyang University Electronics and Computer Engineering Hanyang University Seoul Korea
signature library is key factor for performance of anti-virus programs considering accuracy and scanning *** ensure coverage of various emerging viruses,the scale of signature library grows larger and the consequence ... 详细信息
来源: 评论
Mining Contents in Web Page Using Cosine Similarity
Mining Contents in Web Page Using Cosine Similarity
收藏 引用
2011 3rd international conference on computer research and development(iccrd 2011)
作者: Swe Swe Nyein University of Computer Studies Mandalay MandalayMyanmar
Web pages typically contain a large amount of information that is not part of the main contents of the pages, e.g.;banner ads,navigation bars,copy right and privacy notices,advertisements which are not related to the ... 详细信息
来源: 评论