咨询与建议

限定检索结果

文献类型

  • 2,264 篇 会议
  • 18 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 2,298 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,928 篇 工学
    • 1,213 篇 计算机科学与技术...
    • 961 篇 软件工程
    • 390 篇 信息与通信工程
    • 235 篇 控制科学与工程
    • 218 篇 机械工程
    • 167 篇 电子科学与技术(可...
    • 164 篇 化学工程与技术
    • 158 篇 材料科学与工程(可...
    • 154 篇 电气工程
    • 128 篇 仪器科学与技术
    • 126 篇 环境科学与工程(可...
    • 115 篇 生物医学工程(可授...
    • 97 篇 生物工程
    • 92 篇 动力工程及工程热...
    • 90 篇 土木工程
    • 78 篇 建筑学
    • 70 篇 光学工程
    • 69 篇 冶金工程
    • 68 篇 安全科学与工程
  • 822 篇 理学
    • 448 篇 数学
    • 157 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 116 篇 生物学
    • 114 篇 系统科学
    • 112 篇 化学
    • 102 篇 生态学
  • 506 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 198 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 75 篇 医学
  • 71 篇 经济学
    • 71 篇 应用经济学
  • 62 篇 教育学
  • 58 篇 法学
  • 51 篇 农学
  • 15 篇 艺术学
  • 11 篇 军事学
  • 5 篇 文学
  • 1 篇 哲学

主题

  • 35 篇 data mining
  • 30 篇 educational inst...
  • 26 篇 mobile ad hoc ne...
  • 25 篇 wireless sensor ...
  • 24 篇 bioinformatics
  • 24 篇 genetic algorith...
  • 19 篇 image segmentati...
  • 19 篇 authentication
  • 19 篇 cloud computing
  • 17 篇 feature extracti...
  • 17 篇 web services
  • 17 篇 genomics
  • 16 篇 quality of servi...
  • 16 篇 routing protocol...
  • 15 篇 support vector m...
  • 15 篇 computational mo...
  • 15 篇 remote sensing
  • 15 篇 cryptography
  • 14 篇 students
  • 12 篇 computers

机构

  • 29 篇 college of compu...
  • 12 篇 school of comput...
  • 11 篇 chongqing normal...
  • 11 篇 school of comput...
  • 9 篇 college of physi...
  • 9 篇 college of compu...
  • 8 篇 school of comput...
  • 8 篇 information and ...
  • 7 篇 school of comput...
  • 7 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 department of co...
  • 6 篇 school of mechan...
  • 6 篇 college of compu...
  • 6 篇 school of softwa...
  • 5 篇 school of inform...
  • 5 篇 college of elect...
  • 5 篇 college of manag...

作者

  • 12 篇 ma yan
  • 8 篇 zhang kun
  • 8 篇 dhavachelvan p.
  • 7 篇 wang jing
  • 6 篇 wang hai-feng
  • 6 篇 song li
  • 6 篇 maode ma
  • 6 篇 yuhang yang
  • 6 篇 li ming
  • 6 篇 he guotian
  • 6 篇 ramesh t.
  • 6 篇 mannava vishnuva...
  • 6 篇 wang jun
  • 5 篇 jiapeng xiu
  • 5 篇 xu jing
  • 5 篇 sukumar nandi
  • 5 篇 chen liu
  • 5 篇 liu fuyan
  • 5 篇 li ying
  • 5 篇 xu lijun

语言

  • 2,263 篇 英文
  • 32 篇 中文
  • 3 篇 其他
检索条件"任意字段=2012 2nd International Conference on Advances in Computer Science and Engineering, CES 2012"
2298 条 记 录,以下是81-90 订阅
排序:
On the efficiency of polynomial multiplication for lattice-based cryptography on GPUs using CUDA  2nd
On the efficiency of polynomial multiplication for lattice-b...
收藏 引用
2nd international conference on Cryptography and Information Security in the Balkans, BalkanCryptSec 2015
作者: Akleylek, Sedat Dağdelen, Özgur Tok, Zaliha Yüce Department of Computer Engineering Ondokuz Mayıs University Samsun Turkey Cryptography and Computer Algebra Group TU Darmstadt Darmstadt Germany BridgingIT GmbH Mannheim Germany Institute of Applied Mathematics METU Ankara Turkey
Polynomial multiplication is the most time-consuming part of cryptographic schemes whose security is based on ideal lattices. Thus, any efficiency improvement on this building block has great impact on the practicabil... 详细信息
来源: 评论
Research of K-means clustering method based on DNA genetic algorithm and P system  1
收藏 引用
2nd international conference on Human Centered Computing, HCC 2016
作者: Jiang, Zhenni Zang, Wenke Liu, Xiyu School of Management Science and Engineering Shandong Normal University JinanShandong China
This paper proposed a k-means clustering analysis method, which is based on DNA genetic algorithm and P system. DNA encoding is used to analyze the initial center of cluster and the P system is used to realize the clu... 详细信息
来源: 评论
Link mining in online social networks with directed negative relationships  2nd
Link mining in online social networks with directed negative...
收藏 引用
2nd international conference on Young computer Scientists, Engineers and Educators, ICYCSEE 2016
作者: Hu, Baofang Wang, Hong School of Information Technology Shandong Women’s University Jinan250014 China School of Information Science and Engineering Shandong Normal University Jinan250014 China
One of the most important work to analyse online social networks is link mining. A new type of social networks with positive and negative relationships are burgeoning. We present a link mining method based on random w... 详细信息
来源: 评论
Experiment Design of Information Security Classified Protection based on the Procedure oriented Cultivation
Experiment Design of Information Security Classified Protect...
收藏 引用
2016 2nd international conference on advances in Mechanical engineering and Industrial Informatics(AMEII 2016)
作者: Jian Jiao Xingfen Wang Xin Chen Qiyuan Liu School of Computer Beijing Information Science & Technology University
For the actual situation that it is generally lack of classified protection experiments in the experimental teaching of colleges and universities,analyzing the relevance between each knowledge points and basic knowled... 详细信息
来源: 评论
Imbalance effects on classification using binary logistic regression  2nd
Imbalance effects on classification using binary logistic re...
收藏 引用
2nd international conference on Soft Computing in Data science, SCDS 2016
作者: Abd Rahman, Hezlin Aryani Yap, Bee Wah Faculty of Computer and Mathematical Sciences Centre of Statistical and Decision Science Studies Universiti Teknologi MARA Shah AlamSelangor40450 Malaysia Faculty of Computer and Mathematical Sciences Advanced Analytics Engineering Centre Universiti Teknologi MARA Shah AlamSelangor40450 Malaysia
Classification problems involving imbalance data will affect the performance of classifiers. In predictive analytics, logistic regression is a statistical technique which is often used as a benchmark when other classi... 详细信息
来源: 评论
Character variable numeralization based on dimension expanding and its application on text classification  2nd
Character variable numeralization based on dimension expandi...
收藏 引用
2nd international conference on Young computer Scientists, Engineers and Educators, ICYCSEE 2016
作者: Xu, Li-Xun Yu, Xu Wang, Yong Feng, Yun-Xia Sino-German Faculty Qingdao University of Science and Technology Qingdao266061 China School of Information Science and Technology Qingdao University of Science and Technology Qingdao266061 China College of Computer Science and Technology Harbin Engineering University Harbin150001 China
The character variable discrete numeralization destroyed the disorder of character variables. As text classification problem contains more character variable, discrete numeralization approach affects the classificatio... 详细信息
来源: 评论
A transductive support vector machine algorithm based on ant colony optimization  2nd
A transductive support vector machine algorithm based on ant...
收藏 引用
2nd international conference on Young computer Scientists, Engineers and Educators, ICYCSEE 2016
作者: Yu, Xu Ren, Chun-Nian Zhou, Yan-Ping Wang, Yong School of Information Science and Technology Qingdao University of Science and Technology Qingdao266061 China College of Computer Science and Technology Harbin Engineering University Harbin150001 China
Transductive support vector machine optimization problem is a NP problem, in the case of larger number of labeled samples, it is often difficult to obtain a global optimal solution, thereby the good generalization abi... 详细信息
来源: 评论
Research on station location optimization CAD system based on the cooperative mode  2nd
Research on station location optimization CAD system based o...
收藏 引用
2nd international conference on Human Centered Computing, HCC 2016
作者: Xie, Qingxi Liu, Xiyu Yan, Xuebin College of Management Science and Engineering Shandong Normal University Jinan China China United Network Communications Co Beijing China
Currently, the mobile communications business has become a major driving force of China’s information communication industry. This means that a wireless communication network needs to provide better quality of servic... 详细信息
来源: 评论
Customer satisfaction analysis based on SVM  2nd
Customer satisfaction analysis based on SVM
收藏 引用
2nd international conference on Human Centered Computing, HCC 2016
作者: Jiang, Zhenni Zang, Wenke Liu, Xiyu School of Management Science and Engineering Shandong Normal University JinanShandong China
The current intense market competition environment force many enterprises take more and more attention to customer demands, and adopt effective methods to evaluate the importance of customer satisfaction. In order to ... 详细信息
来源: 评论
Base station location optimization based on the google earth and ACIS  2nd
Base station location optimization based on the google earth...
收藏 引用
2nd international conference on Human Centered Computing, HCC 2016
作者: Xie, Qingxi Liu, Xiyu Yan, Xuebin College of Management Science and Engineering Shandong Normal University Jinan China China United Network Communications Co Beijing China
At present, People quickly go into the era of 4 G, which requires vast amounts of 4 G base stations to be established. So How to use the algorithm to layout the base station reasonably in order to save costs for opera... 详细信息
来源: 评论