咨询与建议

限定检索结果

文献类型

  • 19,361 篇 会议
  • 220 篇 期刊文献
  • 107 册 图书

馆藏范围

  • 19,688 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,537 篇 工学
    • 9,824 篇 计算机科学与技术...
    • 7,209 篇 软件工程
    • 2,598 篇 信息与通信工程
    • 1,858 篇 控制科学与工程
    • 1,336 篇 机械工程
    • 1,066 篇 电气工程
    • 974 篇 电子科学与技术(可...
    • 883 篇 仪器科学与技术
    • 639 篇 生物医学工程(可授...
    • 607 篇 生物工程
    • 436 篇 动力工程及工程热...
    • 418 篇 建筑学
    • 361 篇 安全科学与工程
    • 341 篇 交通运输工程
    • 337 篇 光学工程
    • 336 篇 化学工程与技术
    • 317 篇 土木工程
  • 4,228 篇 理学
    • 2,342 篇 数学
    • 908 篇 系统科学
    • 738 篇 物理学
    • 691 篇 统计学(可授理学、...
    • 677 篇 生物学
  • 3,929 篇 管理学
    • 2,548 篇 管理科学与工程(可...
    • 1,563 篇 图书情报与档案管...
    • 1,133 篇 工商管理
  • 569 篇 法学
    • 388 篇 社会学
  • 536 篇 医学
    • 416 篇 临床医学
    • 394 篇 基础医学(可授医学...
  • 490 篇 经济学
    • 487 篇 应用经济学
  • 397 篇 教育学
    • 386 篇 教育学
  • 213 篇 农学
  • 162 篇 文学
  • 89 篇 军事学
  • 59 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 588 篇 quality of servi...
  • 571 篇 educational inst...
  • 447 篇 servers
  • 418 篇 computer archite...
  • 411 篇 computational mo...
  • 332 篇 cloud computing
  • 314 篇 monitoring
  • 295 篇 computers
  • 265 篇 web services
  • 226 篇 data mining
  • 193 篇 vectors
  • 187 篇 software
  • 185 篇 databases
  • 166 篇 routing
  • 166 篇 wireless sensor ...
  • 166 篇 semantics
  • 158 篇 algorithm design...
  • 158 篇 mathematical mod...
  • 157 篇 feature extracti...
  • 152 篇 optimization

机构

  • 84 篇 department of co...
  • 45 篇 school of comput...
  • 39 篇 school of comput...
  • 38 篇 school of comput...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 college of compu...
  • 25 篇 school of comput...
  • 23 篇 college of infor...
  • 23 篇 school of comput...
  • 22 篇 school of comput...
  • 21 篇 school of inform...
  • 20 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 department of co...
  • 18 篇 college of compu...
  • 18 篇 school of comput...
  • 18 篇 school of comput...

作者

  • 19 篇 wang lei
  • 19 篇 zhang lei
  • 17 篇 liu yang
  • 16 篇 li ying
  • 15 篇 wang wei
  • 14 篇 yang yang
  • 13 篇 ma yan
  • 13 篇 china
  • 12 篇 li yang
  • 12 篇 jiang wei
  • 12 篇 li li
  • 12 篇 wang tao
  • 11 篇 lei wang
  • 11 篇 zhang tao
  • 11 篇 li zhang
  • 11 篇 chen li
  • 11 篇 zhang yan
  • 10 篇 jing zhang
  • 10 篇 li tao
  • 10 篇 wang chao

语言

  • 19,179 篇 英文
  • 474 篇 中文
  • 31 篇 其他
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=2012 International Conference on Computer Science and Service System, CSSS 2012"
19688 条 记 录,以下是1531-1540 订阅
排序:
Real-time rolled fingerprint construction based on key-column extraction
收藏 引用
2012 international conference on service-Oriented Computing, ICSOC 2012
作者: Zhang, Yongliang Fang, Shanshan Bian, Yingjie Li, Yuanhong Department of Computer Science and Technology Zhejiang University of Technology No.288 Liuhe Road Hangzhou Zhejiang China
Fingerprint identification is an important biometric method for personal authentication. Rolled fingerprint can provide much more information than flat fingerprint, so the method is needed for construct a rolled finge... 详细信息
来源: 评论
European Design science Symposium, EDSS 2012
European Design Science Symposium, EDSS 2012
收藏 引用
European Design science Symposium, EDSS 2012
The proceedings contain 14 papers. The special focus in this conference is on Design science. The topics include: Valid knowledge for socio-technical system design;strategy formulation as a design science;a rationale ...
来源: 评论
Mobile SSL VPN based on port forwarding
Mobile SSL VPN based on port forwarding
收藏 引用
2012 international conference on Future Optical Materials and Circuit Design, FOMCD 2012
作者: Zhang, Yunhe Kou, Xiaohui Wang, Meizhen Xiao, Ling Li, Weiming School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Considering the inadequacy of deploying the SSL VPN on mobile devices, we proposed a mobile SSL VPN system which can be used on mobile devices without any complex setups. The system mainly based on port forwarding and... 详细信息
来源: 评论
Study on the computer Networks system Safety Detecting Technology
Study on the Computer Networks System Safety Detecting Techn...
收藏 引用
international conference of Intelligence Computation and Evolutionary Computation (ICEC 2012)
作者: Hu Liming Hunan Vocat Coll Sci & Technol Changsha 41004 Hunan Peoples R China
With the development of science technology, the computer networks systems has been widely used in all fields. However, threat to the security of computer networks systems has been a serious problem at present. So, thi... 详细信息
来源: 评论
Optimal Balking Strategies in Single-Server Queues with Erlangian service and Setup Times
Optimal Balking Strategies in Single-Server Queues with Erla...
收藏 引用
2nd international conference on Logistics, Informatics and service science (LISS)
作者: Huang, Ping Wang, Jinting Fu, Li Beijing Jiaotong Univ Dept Math Beijing 100044 Peoples R China
In many service systems arising in OR/MS applications, the server needs a setup time when it is turned on and the service time may be non-Markovian as usually assumed. In the present paper, we study the balking behavi... 详细信息
来源: 评论
Networking integration of enterprise services system based on service-oriented architecture
Networking integration of enterprise services system based o...
收藏 引用
2nd international conference on Green Communications and Networks, GCN 2012
作者: Deng, Rong Institute of Information Engineering Chongqing Vocational Institute of Engineering ChongQing 400037 China
With the development of computer and enterprise in formalization, enterprises depend more and more on a physical platform to realize sharing information resource and business collaboration. In order to achieve busines... 详细信息
来源: 评论
A ranking-based approach for service composition with multiple QoS constraints
收藏 引用
2012 international conference on Information Technology and Software Engineering, ITSE 2012
作者: Wang, Weidong Lu, Wei Wang, Liqiang Xing, Weiwei Li, Zhao School of Software Engineering Beijing Jiaotong University No. 3 Shanyancun Xizhimenwai Beijing 100044 China Department of Computer Science University of Wyoming Laramie WY 82071-3315 United States
In Web service Composition (WSC) field, service composition aims at selecting a set of existing services with different Quality of services (QoS) attributes then compositing them to accomplish a complex task to meet t... 详细信息
来源: 评论
Weight calculation based image recognition
收藏 引用
Applied Mechanics and Materials 2013年 303-306卷 1577-1580页
作者: Yuan, Yifan Du, Junping Zhou, Jun Lu, Cheng Bai, Erwei Li, Yawen Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China School of Economics and Management Beijing University of Posts and Telecommunications Beijing 100876 China
The method to recognize facial expression in images quickly has been widely applied in many areas, but there is no way to take into account the accuracy and speed of recognition. This paper presents a method based on ... 详细信息
来源: 评论
Proceedings - 31st international conference of the Chilean computer science Society, SCCC 2012
Proceedings - 31st International Conference of the Chilean C...
收藏 引用
31st international conference of the Chilean computer science Society, SCCC 2012
The proceedings contain 33 papers. The topics discussed include: method lookup simulation with a gradual typing language;validation strategies of competences in a computer science curriculum;selection of software deve...
来源: 评论
Game analysis on service recovery of the retail company
Game analysis on service recovery of the retail company
收藏 引用
2nd international conference on Green Communications and Networks, GCN 2012
作者: Li, Qingwen Guangxi International Business Vocational College Nanning 530007 China
From the perspective of game thesis, abilities of the company, market condition and the cost of service recovery are the main factors that the retail companies should consider when thinking their system of service rec... 详细信息
来源: 评论