咨询与建议

限定检索结果

文献类型

  • 3,189 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 3,194 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,524 篇 工学
    • 1,344 篇 计算机科学与技术...
    • 965 篇 软件工程
    • 579 篇 机械工程
    • 546 篇 控制科学与工程
    • 359 篇 信息与通信工程
    • 307 篇 电子科学与技术(可...
    • 273 篇 仪器科学与技术
    • 222 篇 电气工程
    • 86 篇 动力工程及工程热...
    • 83 篇 航空宇航科学与技...
    • 79 篇 交通运输工程
    • 77 篇 化学工程与技术
    • 70 篇 光学工程
    • 66 篇 生物工程
    • 63 篇 生物医学工程(可授...
    • 60 篇 力学(可授工学、理...
    • 59 篇 建筑学
    • 56 篇 土木工程
    • 54 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 880 篇 理学
    • 584 篇 数学
    • 160 篇 系统科学
    • 145 篇 物理学
    • 108 篇 统计学(可授理学、...
    • 76 篇 生物学
    • 59 篇 化学
  • 498 篇 管理学
    • 381 篇 管理科学与工程(可...
    • 120 篇 图书情报与档案管...
    • 107 篇 工商管理
  • 68 篇 经济学
    • 67 篇 应用经济学
  • 41 篇 农学
  • 40 篇 医学
  • 28 篇 法学
  • 27 篇 军事学
  • 22 篇 艺术学
  • 20 篇 教育学
  • 10 篇 文学
  • 2 篇 历史学

主题

  • 42 篇 mathematical mod...
  • 38 篇 algorithm design...
  • 37 篇 optimization
  • 33 篇 educational inst...
  • 32 篇 feature extracti...
  • 31 篇 robot sensing sy...
  • 31 篇 genetic algorith...
  • 30 篇 wireless sensor ...
  • 28 篇 component
  • 28 篇 computational mo...
  • 26 篇 cameras
  • 26 篇 robots
  • 25 篇 visualization
  • 25 篇 semantics
  • 24 篇 automation
  • 24 篇 image segmentati...
  • 23 篇 computers
  • 23 篇 equations
  • 22 篇 force
  • 22 篇 planning

机构

  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 7 篇 faculty of compu...
  • 7 篇 institute of ele...
  • 6 篇 institute of ele...
  • 6 篇 international sc...
  • 6 篇 school of comput...
  • 6 篇 school of electr...
  • 6 篇 school of comput...
  • 6 篇 department of co...
  • 5 篇 school of comput...
  • 5 篇 school of mechan...
  • 5 篇 department of co...
  • 5 篇 college of autom...
  • 5 篇 school of comput...
  • 5 篇 school of inform...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 college of elect...
  • 5 篇 institute of aut...

作者

  • 99 篇 china
  • 8 篇 p.r.china
  • 7 篇 beijing
  • 7 篇 zhang wei
  • 6 篇 li wei
  • 5 篇 wang lei
  • 5 篇 xu zhan
  • 5 篇 shinn-ying ho
  • 5 篇 wang feng
  • 5 篇 cheng xiaohui
  • 5 篇 zhu quanyin
  • 4 篇 zhang huaiqing
  • 4 篇 zhang lin
  • 4 篇 zhang ning
  • 4 篇 li xin
  • 4 篇 li haibin
  • 4 篇 liu yang
  • 4 篇 zhang qiang
  • 4 篇 li yuan
  • 4 篇 lu kangning

语言

  • 3,174 篇 英文
  • 18 篇 中文
  • 2 篇 法文
检索条件"任意字段=2012 IEEE International Conference on Computer Science and Automation Engineering(CSAE 2012)"
3194 条 记 录,以下是531-540 订阅
排序:
Preface
Preface
收藏 引用
2012 ieee international conference on computer science and automation engineering(csae 2012)
作者: Mengqi Zhou,ieee Beijing Section,China Jian Wang,Tongji University,China Jun Guo,Hunan University of Humanities,science and Technology,China
Welcome to 2012 ieee international conference on computer science and automation engineering(csae 2012)!Welcome to Zhangjiajie,China!We believe that the solid conference program and the amazing city of Zhangjiajie wil... 详细信息
来源: 评论
The predication model for trade sizes based on PLS
The predication model for trade sizes based on PLS
收藏 引用
4th international conference on Modelling,Identification and Control(ICMIC 2012)
作者: Xiao Liangfen (Naval University of engineering Electrical and Information engineering department Hubei Wuhan 430033, China) Naval University of Engineering Electrical Information Engineering Department Hubei Wuhan 430033 China
Recently the measurement for tire tread rely on manual operation, even if there are measurement use laser equipment costs are too high, but accuracy can not be guaranteed. This paper established the tread size predict... 详细信息
来源: 评论
Analysis of detecting target in sea clutter using decoupled echo state network
Analysis of detecting target in sea clutter using decoupled ...
收藏 引用
2012 ieee 3rd international conference on Software engineering and Service science, ICSESS 2012
作者: Xu, Zhan Wan, Jianwei Su, Fang Xue, Yanbo School of Electronic Science and Engineering University of Defense Technology Changsha 410073 China Department of Mechanical Engineering McMaster Institute Hamilton ON L8S 4L7 Canada
This letter use echo state network (ESN) and three decoupled echo state network (DESN) to predict the sea clutter time series and detect target embedded in sea clutter. The performance of predicting and detecting usin... 详细信息
来源: 评论
Improved algorithm for UPnP discovery in smart space
Improved algorithm for UPnP discovery in smart space
收藏 引用
2012 ieee 3rd international conference on Software engineering and Service science, ICSESS 2012
作者: Wang, Zhi Zhao, Jizhong School of Electronic and Information Engineering Xi'An Jiaotong University Shaanxi China
The current UPnP service discovery algorithm can cause severe drops with response message rate when applied in pervasive computing environments with large scale of services. The deficiency lies in the instantaneous tr... 详细信息
来源: 评论
A behavior statistic based secure system in social networks
A behavior statistic based secure system in social networks
收藏 引用
2012 ieee 3rd international conference on Software engineering and Service science, ICSESS 2012
作者: Li, Shan Yu, Xiang Deng, Xuesong School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
In order to protect the normal operation of social networks from the influence of malicious communication, we established a system to help evaluate information and users. On one hand, based on behavior recognition tec... 详细信息
来源: 评论
The scheme of public key infrastructure for improving wireless sensor networks security
The scheme of public key infrastructure for improving wirele...
收藏 引用
2012 ieee 3rd international conference on Software engineering and Service science, ICSESS 2012
作者: Yu, Zhang Department of Software Engineering Cheng du Polytechnic Sichuan Province China
In this paper we have presented a Public Key Infrastructure for wireless sensor networks. The scheme tries to solve the problem of security in WSN by the use of public key cryptography as a tool for ensuring the authe... 详细信息
来源: 评论
Wireless sensor networks routing protocol based on ant colony algorithm
Wireless sensor networks routing protocol based on ant colon...
收藏 引用
2012 ieee 3rd international conference on Software engineering and Service science, ICSESS 2012
作者: Gu, Xiangping Jin, Ying Hu, Ronglin Chen, Liqing School of Computer Engineering Huaiyin Institute of Technology Huai'an Jiangsu China
In the paper, we provide a novel routing algorithm (ANRP), which is based on Ant Colony System. The aim of the ANRP is to solve the problem of limited energy for wireless sensor network routing process. It is able to ... 详细信息
来源: 评论
Campus access control system based on RFID
Campus access control system based on RFID
收藏 引用
2012 ieee 3rd international conference on Software engineering and Service science, ICSESS 2012
作者: Qiu, Yan Chen, Jinmei Zhu, Quanyin Faculty of Computer Engineering Huaiyin Institute of Technology Huaian Jiangsu Province China
In order to improve the campus securities and obtain the personnel information, and campus access control system is developed and introduced in this paper. TCP/IP, PPP, HTTP, HTML, POP3 and SMTP are used to constitute... 详细信息
来源: 评论
An Improved methodology for Service Oriented Architecture
An Improved methodology for Service Oriented Architecture
收藏 引用
2012 ieee international conference on computer science and automation engineering(csae 2012)
作者: Marzieh Emadi Reza Asgari Moghadam Mohamad Davarpanah Jazi Faranak Bahredar Department of Information Technology and Communication Payam Noor University Tehran Iran
With the growing trend of software systems in enterprises,normal approaches for software development could not satisfy these systems *** oriented architecture is proposed as a solution to this *** methodologies were i... 详细信息
来源: 评论
Analysis of reputation-based incentive mechanisms in ad hoc networks
Analysis of reputation-based incentive mechanisms in ad hoc ...
收藏 引用
2012 ieee 3rd international conference on Software engineering and Service science, ICSESS 2012
作者: Yu, Kun Chen, Xiaobing Department of Computer Engineering Huaiyin Institute of Technology Huaian Jiangsu China
The incentive mechanisms based on reputation are often used to induce cooperation among selfish nodes in ad hoc networks. In those mechanisms nodes with lower reputation value will receive less benefit, which suffers ... 详细信息
来源: 评论