咨询与建议

限定检索结果

文献类型

  • 1,390 篇 会议
  • 93 册 图书
  • 19 篇 期刊文献

馆藏范围

  • 1,502 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,213 篇 工学
    • 993 篇 计算机科学与技术...
    • 813 篇 软件工程
    • 269 篇 信息与通信工程
    • 147 篇 生物工程
    • 125 篇 生物医学工程(可授...
    • 120 篇 控制科学与工程
    • 82 篇 电气工程
    • 74 篇 光学工程
    • 72 篇 机械工程
    • 67 篇 电子科学与技术(可...
    • 50 篇 安全科学与工程
    • 49 篇 化学工程与技术
    • 44 篇 仪器科学与技术
    • 40 篇 土木工程
  • 538 篇 理学
    • 285 篇 数学
    • 167 篇 生物学
    • 123 篇 物理学
    • 108 篇 统计学(可授理学、...
    • 65 篇 系统科学
    • 45 篇 化学
  • 346 篇 管理学
    • 184 篇 管理科学与工程(可...
    • 182 篇 图书情报与档案管...
    • 118 篇 工商管理
  • 113 篇 医学
    • 110 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 64 篇 药学(可授医学、理...
    • 45 篇 公共卫生与预防医...
  • 71 篇 法学
    • 61 篇 社会学
  • 60 篇 教育学
    • 60 篇 教育学
  • 52 篇 农学
    • 49 篇 作物学
  • 33 篇 经济学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 artificial intel...
  • 28 篇 computer communi...
  • 24 篇 machine learning
  • 22 篇 information syst...
  • 22 篇 students
  • 20 篇 internet of thin...
  • 18 篇 computer vision
  • 17 篇 convolutional ne...
  • 16 篇 support vector m...
  • 15 篇 computational in...
  • 15 篇 semantics
  • 14 篇 deep learning
  • 13 篇 information stor...
  • 12 篇 feature extracti...
  • 12 篇 accuracy
  • 12 篇 technological in...
  • 11 篇 human computer i...
  • 11 篇 wireless sensor ...
  • 11 篇 visualization
  • 11 篇 decision trees

机构

  • 6 篇 department of co...
  • 5 篇 beijing research...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 institute of com...
  • 5 篇 school of comput...
  • 4 篇 university of sc...
  • 4 篇 key laboratory o...
  • 4 篇 gits udaipur
  • 4 篇 jinan university
  • 4 篇 lovely professio...
  • 4 篇 insight sfi rese...
  • 4 篇 department of co...
  • 4 篇 mlr institute of...
  • 4 篇 purdue universit...
  • 4 篇 school of comput...
  • 4 篇 jaypee universit...
  • 4 篇 department of co...

作者

  • 7 篇 sun fuchun
  • 7 篇 harris frederick...
  • 6 篇 bein doina
  • 6 篇 vani v.
  • 6 篇 karthik n.
  • 5 篇 tyagi vipin
  • 5 篇 constantine step...
  • 5 篇 yang yujian
  • 5 篇 margherita anton...
  • 4 篇 rajalakshmi s.
  • 4 篇 de-shuang huang
  • 4 篇 jose joemon m.
  • 4 篇 sharma ajay kuma...
  • 4 篇 ootsu kanemitsu
  • 4 篇 rathore narendra...
  • 4 篇 patel mayank
  • 4 篇 xiaorui zhang
  • 4 篇 yokota takashi
  • 4 篇 baba takanobu
  • 4 篇 elisa bertino

语言

  • 1,374 篇 英文
  • 116 篇 其他
  • 65 篇 中文
检索条件"任意字段=7th IASTED International Conference on Advances in Computer Science and Technology"
1502 条 记 录,以下是861-870 订阅
排序:
A novel end-to-end authentication protocol for satellite mobile communication networks  7
收藏 引用
7th international conference on Intelligent Systems and Knowledge Engineering, ISKE 2012 with 1st international conference on Cognitive Systems and Information Processing, CSIP 2012
作者: Zhang, Xiaoliang Liu, Heyu Lu, Yong Sun, Fuchun National Key Laboratory of Integrated Information System Technology Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Intelligence Technology and Systems Department of Computer Science and Technology Tsinghua University Beijing100084 China
this paper establishes a model of satellite mobile communication network end-to-end authentication and designs a distributed end-to-end authentication protocol for the model including initial authentication, authentic... 详细信息
来源: 评论
Relationships Between Average Depth and Number of Nodes for Decision Trees
Relationships Between Average Depth and Number of Nodes for ...
收藏 引用
7th international conference on Intelligent Systems and Knowledge Engineering, ISKE 2012
作者: Chikalov, Igor Hussain, Shahid Moshkov, Mikhail Computer Electrical and Mathematical Sciences and Engineering King Abdullah University of Science and Technology Thuwal 23955-6900 Saudi Arabia
this paper presents a new tool for the study of relationships between total path length or average depth and number of nodes of decision trees. In addition to algorithm, the paper also presents the results of experime... 详细信息
来源: 评论
advances in Cryptology - ASIACRYPT 2014: 20th international conference on the theory and Application of Cryptology and Information Security Kaoshiung, Taiwan, December 7-11, 2014 Proceedings, Part I  20
Advances in Cryptology - ASIACRYPT 2014: 20th International ...
收藏 引用
20th international conference on the theory and Application of Cryptology and Information Security, ASIACRYPT 2014
作者: Sarkar, Palash Iwata, Tetsu Indian Statistical Institute Applied Statistics Unit 203 B.T. Road Kolkata700108 India Nagoya University Department of Computer Science and Engineering Furo-cho Chikusa-ku Nagoya464-8603 Japan
来源: 评论
Information Fusion: Popular Approaches and Applications
Information Fusion: Popular Approaches and Applications
收藏 引用
7th international conference on Intelligent Systems and Knowledge Engineering, ISKE 2012
作者: Wei, Min State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science Tsinghua University Beijing 100084 China Department of Basic Dalian Naval Academy Dalian 116018 China
Information fusion is a hot topic in computer and related fields. It is widely used in military and civilian areas. In this paper, we first describe information fusion architectures of it to give a blueprint of inform... 详细信息
来源: 评论
Taxonomy of source code security defects based on three-dimension-tree  7
Taxonomy of source code security defects based on three-dime...
收藏 引用
7th IFIP WG 5.14 international conference on computer and Computing Technologies in Agriculture, CCTA 2013
作者: Yan, Zhang Guowei, Dong Tao, Guo Jianyu, Yang School of Computer Science and Engineering Beihang University Beijing China China Information Technology Security Evaluation Center Beijing China China Agricultural University College of Information and Electrical Engineering Beijing China
the authors present a new taxonomy for source code security defects based on three-dimension-tree, which considers the information of defect’s cause, impact and representation synthetically. Case studies show that a ... 详细信息
来源: 评论
A novel data hiding method using sphere encoding  7
A novel data hiding method using sphere encoding
收藏 引用
7th international conference on Genetic and Evolutionary Computing, ICGEC 2013
作者: Hu, Ching-Min Wang, Ran-Zan Chen, Shang-Kuan Fang, Wen-Pinn Chang, Yu-Jie Lee, Yeuan-Kuen Department of Computer Science and Engineering Yuan Ze University Taiwan Department of Computer Science and Information Engineering Yuan Pei University Taiwan Department of Computer & Communication Engineering National Kaohsiung First University of Science and Technology Taiwan Department of Computer Science and Information Science Ming Chuan University Taiwan
In this paper a novel data hiding scheme using least square mapping is proposed. the method conceals a k-ary secret digit in n-pixel block in which the embedding function with minimum mean square error (MSE) between t... 详细信息
来源: 评论
Evaluation of window interface in remote cooperative work involving pointing gestures  7
Evaluation of window interface in remote cooperative work in...
收藏 引用
7th international conference on advances in computer-Human Interactions, ACHI 2014
作者: Ishii, Ryo Otsuka, Kazuhiro Ozawa, Shiro Kawamura, Harumi Kojima, Akira Nakano, Yukiko I. NTT Communication Science Laboratories NTT Corporation Kanagawa243-0198 Japan NTT Media Intelligence Laboratories NTT Corporation Kanagawa239-0847 Japan Faculty of Science and Technology Seikei University Tokyo180-8633 Japan
Gazes and pointing gestures are important in performing collaborative work involving instructions with shared objects. However, in general video conferencing systems, the geometrical consistency of size and positional... 详细信息
来源: 评论
the analysis of county science and technology worker internet usage and its influence factors  7
The analysis of county science and technology worker interne...
收藏 引用
7th IFIP WG 5.14 international conference on computer and Computing Technologies in Agriculture, CCTA 2013
作者: Huiping, Chen Zhihong, Tian Yubin, Wang Xue, Han Agricultural Information Institute of Chinese Academy of Agricultural Sciences Beijing100081 China College of Economics and Management China Agricultural University Beijing100083 China Department of Agricultural and Consumer Economics College of Agricultural Consumer and Environmental Sciences University of Illinois at Urbana-Champaign ChampaignIL61820 United States
the county science and technology workers are critical components of Chinese science and technology workers, playing an important role in science and technology application and popularization. Improving the skills for... 详细信息
来源: 评论
Usability evaluation of digital games for stroke rehabilitation in Taiwan  7
Usability evaluation of digital games for stroke rehabilitat...
收藏 引用
7th international conference on advances in computer-Human Interactions, ACHI 2014
作者: Chen, Mei-Hsiang Huang, Lan-Ling Lee, Chang-Franw School of Occupational Therapy Chung Shan Medical University/Chung Shan Medical University Hospital Taichung40201 Taiwan Graduate School of Design National Yunlin University of Science and Technology Yunlin640023 Taiwan
this study aimed to compare the effectiveness and usability of using conventional devices, Wii and XaviX, in rehabilitation, and to propose advices to improve the digital game design. A clinical trial was implemented ... 详细信息
来源: 评论
A trusted knowledge management system for multi-layer threat analysis
A trusted knowledge management system for multi-layer threat...
收藏 引用
7th international conference on Trust and Trustworthy Computing, TRUST 2014
作者: Petsas, thanasis Okada, Kazuya Tazaki, Hajime Blanc, Gregory Pawliński, Pawel Institute of Computer Science Foundation for Research and Technology Hellas Greece Nara Institute of Science and Technology Japan University of Tokyo Japan Télécom SudParis CNRS UMR 5157 SAMOVAR France CERT Polska Research and Academic Computer Network Poland
In recent years, we have seen a surge of cybersecurity incidents ranging fromwidespread attacks (e.g., large-scale attacks against infrastructures or end points [1]) to new technological advances (i.e., new generation... 详细信息
来源: 评论