咨询与建议

限定检索结果

文献类型

  • 1,393 篇 会议
  • 93 册 图书
  • 21 篇 期刊文献

馆藏范围

  • 1,507 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,215 篇 工学
    • 995 篇 计算机科学与技术...
    • 814 篇 软件工程
    • 270 篇 信息与通信工程
    • 147 篇 生物工程
    • 125 篇 生物医学工程(可授...
    • 121 篇 控制科学与工程
    • 82 篇 电气工程
    • 74 篇 光学工程
    • 72 篇 机械工程
    • 67 篇 电子科学与技术(可...
    • 51 篇 安全科学与工程
    • 49 篇 化学工程与技术
    • 44 篇 仪器科学与技术
    • 40 篇 土木工程
  • 540 篇 理学
    • 286 篇 数学
    • 167 篇 生物学
    • 124 篇 物理学
    • 108 篇 统计学(可授理学、...
    • 65 篇 系统科学
    • 45 篇 化学
  • 347 篇 管理学
    • 185 篇 管理科学与工程(可...
    • 183 篇 图书情报与档案管...
    • 118 篇 工商管理
  • 113 篇 医学
    • 110 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 64 篇 药学(可授医学、理...
    • 45 篇 公共卫生与预防医...
  • 71 篇 法学
    • 61 篇 社会学
  • 60 篇 教育学
    • 60 篇 教育学
  • 52 篇 农学
    • 49 篇 作物学
  • 33 篇 经济学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 artificial intel...
  • 28 篇 computer communi...
  • 24 篇 machine learning
  • 22 篇 information syst...
  • 22 篇 students
  • 20 篇 internet of thin...
  • 18 篇 computer vision
  • 18 篇 convolutional ne...
  • 16 篇 support vector m...
  • 15 篇 deep learning
  • 15 篇 computational in...
  • 15 篇 semantics
  • 14 篇 feature extracti...
  • 13 篇 accuracy
  • 13 篇 information stor...
  • 12 篇 technological in...
  • 11 篇 human computer i...
  • 11 篇 wireless sensor ...
  • 11 篇 visualization
  • 11 篇 decision trees

机构

  • 6 篇 department of co...
  • 5 篇 beijing research...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 institute of com...
  • 5 篇 school of comput...
  • 4 篇 university of sc...
  • 4 篇 key laboratory o...
  • 4 篇 gits udaipur
  • 4 篇 jinan university
  • 4 篇 lovely professio...
  • 4 篇 insight sfi rese...
  • 4 篇 department of co...
  • 4 篇 mlr institute of...
  • 4 篇 purdue universit...
  • 4 篇 school of comput...
  • 4 篇 jaypee universit...
  • 4 篇 department of co...

作者

  • 7 篇 sun fuchun
  • 7 篇 harris frederick...
  • 6 篇 bein doina
  • 6 篇 vani v.
  • 6 篇 karthik n.
  • 5 篇 tyagi vipin
  • 5 篇 constantine step...
  • 5 篇 yang yujian
  • 5 篇 margherita anton...
  • 4 篇 rajalakshmi s.
  • 4 篇 de-shuang huang
  • 4 篇 jose joemon m.
  • 4 篇 sharma ajay kuma...
  • 4 篇 ootsu kanemitsu
  • 4 篇 rathore narendra...
  • 4 篇 patel mayank
  • 4 篇 xiaorui zhang
  • 4 篇 yokota takashi
  • 4 篇 baba takanobu
  • 4 篇 elisa bertino

语言

  • 1,356 篇 英文
  • 139 篇 其他
  • 66 篇 中文
检索条件"任意字段=7th IASTED International Conference on Advances in Computer Science and Technology"
1507 条 记 录,以下是1111-1120 订阅
排序:
Reconsidering mixed integer programming and MIP-based hybrids for scheduling
Reconsidering mixed integer programming and MIP-based hybrid...
收藏 引用
9th international conference on Integration of Artificial Intelligence and Operations Research Techniques in Constraint Programming, CPAIOR 2012
作者: Heinz, Stefan Beck, J. Christopher Zuse Institute Berlin Takustr. 7 14195 Berlin Germany Department of Mechanical and Industrial Engineering University of Toronto Toronto ON M5S 3G8 Canada
Despite the success of constraint programming (CP ) for scheduling, the much wider penetration of mixed integer programming (MIP ) technology into business applications means that many practical scheduling problems ar... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th international conference on Internet and Distributed Computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
Using Multidimensional Views of Photographs for Flood Modelling
Using Multidimensional Views of Photographs for Flood Modell...
收藏 引用
2012 IEEE 6th international conference on Information and Automation for Sustainability(ICIAFS2012)
作者: Vorawit Meesuk Zoran Vojinovic Arthur E.Mynett Hydro and Agro Informatics Institute Ministry of Science and Technology Bangkok Thai Tower8 th FloorRangnamPhayathai10400BangkokThailand UNESCO-IHE Institute for Water Education Westvest 7 2611 AXDelftThe Netherlands Faculty of Civil Engineering and Geosciences Delft University of Technology Stevinweg 12628 CNDelftThe Netherlands
Using physically based computational models coupled with remote sensing technologies,photogrammetry techniques,and GIS applications are important tools for flood hazard mapping and flood disaster ***,information proce... 详细信息
来源: 评论
Multimedia privacy protection system for mobil environments
Multimedia privacy protection system for mobil environments
收藏 引用
7th international conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011
作者: Lin, Chih-Yang Chang, Chao-Chin Chen, Yi-Hui Prangjarote, Panyaporn Department of Computer Science and Information Engineering Asia University Taichung Taiwan Department of Communications Engineering Chung-Cheng University Chiayi Taiwan Department of Information Science and Applications Asia University Taichung Taiwan
In recent years, mobile phones have become very popular due to technology advances. However, unprotected personal photos and videos can easily be leaked when the phone falls into the hands of a malicious user. In this... 详细信息
来源: 评论
Adaptive authoring of adaptive hypermedia towards, role-based, adaptive authoring
Adaptive authoring of adaptive hypermedia towards, role-base...
收藏 引用
14th iasted international conference on computers and Advanced technology in Education, CATE 2011
作者: Khan, Javed Cristea, Alexandra I. Stewart, Craig Department of Computer Science University of Warwick Coventry CV4 7AL United Kingdom School of Computer Science University of Nottingham Nottingham NG8 1BB United Kingdom
the paper proposes a method to improve authoring by displaying a simplified view of an Adaptive Educational Hypermedia (AEH) system via a user role functionality matrix. Adaptive presentations are starting to appear i... 详细信息
来源: 评论
Forensic analysis of plug computers  7th
Forensic analysis of plug computers
收藏 引用
7th IFIP WG 11.9 international conference on Digital Forensics, 2011
作者: Conrad, Scott Dorn, Greg Craiger, Philip National Center for Forensic Science University of Central Florida OrlandoFL United States Daytona State College Daytona BeachFL United States
A plug computer is essentially a cross between an embedded computer and a traditional computer, and with many of the same capabilities. However, the architecture of a plug computer makes it difficult to apply commonly... 详细信息
来源: 评论
A Model and Simulation of Early-Stage Vision as a Developmental Sensorimotor Process  1
收藏 引用
12th INNS EANN-SIG international conference (EANN 2011)/7th IFIP 12 5 international conference (AIAI 2011)
作者: Georgeon, Olivier L. Cohen, Mark A. Cordier, Amelie V. Univ Lyon 1 LIRIS CNRS UMR5205 F-69622 Villeurbanne France Lock Haven Univ Lock Haven PA USA
theories of embodied cognition and active vision suggest that perception is constructed through interaction and becomes meaningful because it is grounded in the agent's activity. We developed a model to illustrate... 详细信息
来源: 评论
Cloud forensics  7th
Cloud forensics
收藏 引用
7th IFIP WG 11.9 international conference on Digital Forensics, 2011
作者: Ruan, Keyun Carthy, Joe Kechadi, Tahar Crosbie, Mark Computer Science and Informatics University College Dublin Dublin Ireland IBM Dublin Ireland
Cloud computing may well become one of the most transformative technologies in the history of computing. Cloud service providers and customers have yet to establish adequate forensic capabilities that could support in... 详细信息
来源: 评论
Analyzing stylometric approaches to author obfuscation  7th
Analyzing stylometric approaches to author obfuscation
收藏 引用
7th IFIP WG 11.9 international conference on Digital Forensics, 2011
作者: Juola, Patrick Vescovi, Darren Duquesne University PittsburghPA United States
Authorship attribution is an important and emerging security tool. However, just as criminals may wear gloves to hide their fingerprints, so too may criminal authors mask their writing styles to escape detection. Most... 详细信息
来源: 评论
VOSS -A Voice Operated Suite for the Barbadian Vernacular  1
收藏 引用
international conference on Ergonomics and Health Aspects of Work with computers (EHAWC)/14th international conference on Human-computer Interaction (HCI)
作者: Byer, David Depradine, Colin Univ W Indies Cave Hill St Michael Barbados
Mobile devices are rapidly becoming the default communication device of choice. the rapid advances being experienced in this area has resulted in mobile devices undertaking many of the tasks once restricted to desktop... 详细信息
来源: 评论