咨询与建议

限定检索结果

文献类型

  • 19,361 篇 会议
  • 232 篇 期刊文献
  • 107 册 图书

馆藏范围

  • 19,700 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,548 篇 工学
    • 9,831 篇 计算机科学与技术...
    • 7,211 篇 软件工程
    • 2,598 篇 信息与通信工程
    • 1,858 篇 控制科学与工程
    • 1,337 篇 机械工程
    • 1,068 篇 电气工程
    • 974 篇 电子科学与技术(可...
    • 883 篇 仪器科学与技术
    • 639 篇 生物医学工程(可授...
    • 609 篇 生物工程
    • 436 篇 动力工程及工程热...
    • 418 篇 建筑学
    • 362 篇 安全科学与工程
    • 341 篇 交通运输工程
    • 337 篇 光学工程
    • 337 篇 化学工程与技术
    • 317 篇 土木工程
  • 4,231 篇 理学
    • 2,342 篇 数学
    • 908 篇 系统科学
    • 738 篇 物理学
    • 693 篇 统计学(可授理学、...
    • 679 篇 生物学
  • 3,930 篇 管理学
    • 2,549 篇 管理科学与工程(可...
    • 1,564 篇 图书情报与档案管...
    • 1,134 篇 工商管理
  • 569 篇 法学
    • 388 篇 社会学
  • 536 篇 医学
    • 416 篇 临床医学
    • 394 篇 基础医学(可授医学...
  • 490 篇 经济学
    • 487 篇 应用经济学
  • 397 篇 教育学
    • 386 篇 教育学
  • 213 篇 农学
  • 162 篇 文学
  • 89 篇 军事学
  • 59 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 588 篇 quality of servi...
  • 571 篇 educational inst...
  • 446 篇 servers
  • 418 篇 computer archite...
  • 412 篇 computational mo...
  • 332 篇 cloud computing
  • 314 篇 monitoring
  • 295 篇 computers
  • 265 篇 web services
  • 226 篇 data mining
  • 192 篇 vectors
  • 187 篇 software
  • 185 篇 databases
  • 166 篇 routing
  • 166 篇 wireless sensor ...
  • 165 篇 semantics
  • 158 篇 algorithm design...
  • 158 篇 mathematical mod...
  • 156 篇 feature extracti...
  • 152 篇 optimization

机构

  • 84 篇 department of co...
  • 45 篇 school of comput...
  • 39 篇 school of comput...
  • 38 篇 school of comput...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 college of compu...
  • 25 篇 school of comput...
  • 23 篇 college of infor...
  • 23 篇 school of comput...
  • 22 篇 school of comput...
  • 21 篇 school of inform...
  • 20 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 department of co...
  • 18 篇 college of compu...
  • 18 篇 school of comput...
  • 18 篇 school of comput...

作者

  • 19 篇 wang lei
  • 19 篇 zhang lei
  • 17 篇 liu yang
  • 16 篇 li ying
  • 15 篇 wang wei
  • 14 篇 yang yang
  • 13 篇 ma yan
  • 13 篇 china
  • 12 篇 li yang
  • 12 篇 jiang wei
  • 12 篇 li li
  • 12 篇 wang tao
  • 11 篇 lei wang
  • 11 篇 zhang tao
  • 11 篇 li zhang
  • 11 篇 chen li
  • 11 篇 zhang yan
  • 10 篇 jing zhang
  • 10 篇 li tao
  • 10 篇 wang chao

语言

  • 19,202 篇 英文
  • 472 篇 中文
  • 20 篇 其他
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=2012 International Conference on Computer Science and Service System, CSSS 2012"
19700 条 记 录,以下是911-920 订阅
排序:
Enterprise innovation evaluation based on fuzzy language field  6
Enterprise innovation evaluation based on fuzzy language fie...
收藏 引用
6th international conference on Fuzzy Information and Engineering, ICFIE 2012 and 6th academic conference from Fuzzy Information and Engineering Branch of Operation Research Society of China, FIEBORSC 2012
作者: Yang, Bing-ru Li, Hui Qian, Wen-bin Zhang, Yu-chen Guo, Jian-wei School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China Beijing Key Laboratory of Knowledge Engineering for Materials Science Beijing100083 China School of Electronics and Information Engineering Liaoning Technical University Huludao125105 China School of Economics & Management Tongji University Shanghai200092 China
In this paper,we use fuzzy language field and themethod of fuzzy integrative evaluation algorithm that instead of the traditional method of Analytic Hierarchy Process in the background of the enterprise innovation lev... 详细信息
来源: 评论
A secured authentication system using an effective keystroke dynamics
A secured authentication system using an effective keystroke...
收藏 引用
1st international conference on Emerging Research in Electronics, computer science and Technology, ICERECT 2012
作者: Jagadamba, G. Sharmila, S.P. Gouda, Thejas Department of Information Science and Engineering Siddaganga Institute of Technology Tumkur-03 India Department of Computer Science and Engineering Siddaganga Institute of Technology Tumkur-03 India
In the field of computer security, most promising field is securing the data by allowing ease access to authorized users. The biometric techniques like face recognition, voice recognition and digital signatures provid... 详细信息
来源: 评论
Single point positioning algorithm of integrated system based on improve least squares Algorithm
Single point positioning algorithm of integrated system base...
收藏 引用
2nd international conference on Communications, Signal Processing, and systems, CSPS 2013
作者: Tian, Anhong Fu, Chengbiao Xu, Jian Department of Computer Science and Engineering Qujing Normal College Qujing China
In order to obtain position and clock bias, at least four GPS (Global Positioning system) pseudo-range measurements are needed, which are based on least squares iteration algorithm, the accuracy is dependent on the nu... 详细信息
来源: 评论
Probabilistic attribute mapping for cold-start recommendation  7
收藏 引用
7th international conference on Intelligent systems and Knowledge Engineering, ISKE 2012 with 1st international conference on Cognitive systems and Information Processing, CSIP 2012
作者: Wang, Guangxin Wang, Yinglin School of Computer Science and Engineering Shanghai JiaoTong University Shanghai China
Collaborative filtering recommender system performs well when there are enough historical data of the users’ online behavior, but it does not work on new users who have not rated any items, or new items that have not... 详细信息
来源: 评论
CPU load-based countermeasure technique for intelligent DoS attack targeting firewalls
CPU load-based countermeasure technique for intelligent DoS ...
收藏 引用
1st international conference on Emerging Research in Electronics, computer science and Technology, ICERECT 2012
作者: Vatsala, B.R. Vidya Raj, C. Department of Computer Science and Engineering National Institute of Engineering Mysore 570008 India
DoS attacks pose one of the most serious threats to firewalls which are considered as the first line of defence in any network. An attacker may use potential probing technique to discover last matching rules of a fire... 详细信息
来源: 评论
Model-driven approach for the development of web application system  7
收藏 引用
7th international conference on Intelligent systems and Knowledge Engineering, ISKE 2012 with 1st international conference on Cognitive systems and Information Processing, CSIP 2012
作者: Hou, Jinkui School of Computer Engineering Weifang University Weifang261061 China
In order to resolve the problems of model-driven software development, a model-driven approach for the development of Web application system is proposed in this paper. The development process starts from describing of... 详细信息
来源: 评论
Resource mining: Applying process mining to resource-oriented systems
Resource mining: Applying process mining to resource-oriente...
收藏 引用
17th international conference on Business Information systems, BIS 2014
作者: Stroiński, Andrzej Dwornikowski, Dariusz Brzeziński, Jerzy Institute of Computing Science Poznań University of Technology Piotrowo 2 60-965 Poznań Poland
service Oriented Architecture is an increasingly popular approach to implement complex distributed systems. It enables implementing complex functionality just by composing simple services into so called business proce... 详细信息
来源: 评论
High-performance service scheduling strategy for cloud environment
High-performance service scheduling strategy for cloud envir...
收藏 引用
1st international conference on Emerging Research in Electronics, computer science and Technology, ICERECT 2012
作者: Shobha, Y. Dakshayini, M. CMJ University Department of CSE BIT Bengaluru India Department of ISE BMSCE Bengaluru India
Cloud computing, as an emerging computing model, provides storage, network and computing resources as services to the requested users on demand over the Internet. Efficient and convenient utilization of cloud resource... 详细信息
来源: 评论
Integration of digital campus resources based on cloud computing
收藏 引用
2012 international conference on Cybernetics and Informatics, ICCI 2012
作者: Ma, Nan Yuan, Mei Cao, Guoliang Information College Beijing Union University and School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China Information College Beijing Union University Beijing China
The Construction of Digital Resources in colleges and universities has the problem of duplication of information, idleness, wasting and so on. This brings low resource utilization and difficulty in resource retrieval.... 详细信息
来源: 评论
service dynamic substitution approach based on cloud model
Service dynamic substitution approach based on cloud model
收藏 引用
1st international conference on Advanced Data and Information Engineering, DaEng 2013
作者: Gong, Yan Huang, Lin Han, Ke Chinese Electronic Equipment System Engineering Corporation Beijing China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
Performance of web service may fluctuate due to the dynamic Internet environment, which makes the Quality of service (QoS) inherently uncertain. It is necessary to reconfigure the web service to enable its QoS values ... 详细信息
来源: 评论