咨询与建议

限定检索结果

文献类型

  • 1,390 篇 会议
  • 93 册 图书
  • 19 篇 期刊文献

馆藏范围

  • 1,502 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,213 篇 工学
    • 993 篇 计算机科学与技术...
    • 813 篇 软件工程
    • 269 篇 信息与通信工程
    • 147 篇 生物工程
    • 125 篇 生物医学工程(可授...
    • 120 篇 控制科学与工程
    • 82 篇 电气工程
    • 74 篇 光学工程
    • 72 篇 机械工程
    • 67 篇 电子科学与技术(可...
    • 50 篇 安全科学与工程
    • 49 篇 化学工程与技术
    • 44 篇 仪器科学与技术
    • 40 篇 土木工程
  • 538 篇 理学
    • 285 篇 数学
    • 167 篇 生物学
    • 123 篇 物理学
    • 108 篇 统计学(可授理学、...
    • 65 篇 系统科学
    • 45 篇 化学
  • 346 篇 管理学
    • 184 篇 管理科学与工程(可...
    • 182 篇 图书情报与档案管...
    • 118 篇 工商管理
  • 113 篇 医学
    • 110 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 64 篇 药学(可授医学、理...
    • 45 篇 公共卫生与预防医...
  • 71 篇 法学
    • 61 篇 社会学
  • 60 篇 教育学
    • 60 篇 教育学
  • 52 篇 农学
    • 49 篇 作物学
  • 33 篇 经济学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 artificial intel...
  • 28 篇 computer communi...
  • 24 篇 machine learning
  • 22 篇 information syst...
  • 22 篇 students
  • 20 篇 internet of thin...
  • 18 篇 computer vision
  • 17 篇 convolutional ne...
  • 16 篇 support vector m...
  • 15 篇 computational in...
  • 15 篇 semantics
  • 14 篇 deep learning
  • 13 篇 information stor...
  • 12 篇 feature extracti...
  • 12 篇 accuracy
  • 12 篇 technological in...
  • 11 篇 human computer i...
  • 11 篇 wireless sensor ...
  • 11 篇 visualization
  • 11 篇 decision trees

机构

  • 6 篇 department of co...
  • 5 篇 beijing research...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 institute of com...
  • 5 篇 school of comput...
  • 4 篇 university of sc...
  • 4 篇 key laboratory o...
  • 4 篇 gits udaipur
  • 4 篇 jinan university
  • 4 篇 lovely professio...
  • 4 篇 insight sfi rese...
  • 4 篇 department of co...
  • 4 篇 mlr institute of...
  • 4 篇 purdue universit...
  • 4 篇 school of comput...
  • 4 篇 jaypee universit...
  • 4 篇 department of co...

作者

  • 7 篇 sun fuchun
  • 7 篇 harris frederick...
  • 6 篇 bein doina
  • 6 篇 vani v.
  • 6 篇 karthik n.
  • 5 篇 tyagi vipin
  • 5 篇 constantine step...
  • 5 篇 yang yujian
  • 5 篇 margherita anton...
  • 4 篇 rajalakshmi s.
  • 4 篇 de-shuang huang
  • 4 篇 jose joemon m.
  • 4 篇 sharma ajay kuma...
  • 4 篇 ootsu kanemitsu
  • 4 篇 rathore narendra...
  • 4 篇 patel mayank
  • 4 篇 xiaorui zhang
  • 4 篇 yokota takashi
  • 4 篇 baba takanobu
  • 4 篇 elisa bertino

语言

  • 1,374 篇 英文
  • 116 篇 其他
  • 65 篇 中文
检索条件"任意字段=7th IASTED International Conference on Advances in Computer Science and Technology"
1502 条 记 录,以下是981-990 订阅
排序:
Noninterference analysis of delegation subterfuge in distributed authorization systems  7th
Noninterference analysis of delegation subterfuge in distrib...
收藏 引用
7th IFIP WG 11.11 international conference on Trust Management, IFIPTM 2013
作者: Foley, Simon N. Department of Computer Science University College Cork Ireland
A principal carrying out a delegation may not be certain about the state of its delegation graph as it may have been perturbed by an attacker. this perturbation may come about from the attacker concealing the existenc... 详细信息
来源: 评论
A user-centric approach for developing mobile applications
A user-centric approach for developing mobile applications
收藏 引用
7th international conference on Knowledge Management in Organizations, KMO 2012
作者: Černezel, Aleš Heričko, Marjan University of Maribor Faculty of Electrical Engineering Computer and Information Science Institute of Informatics Smetanova 17 Maribor Slovenia
Creating mobile applications that are accepted by users is critical for a successful business. this article presents a user-centric approach for developing applications. In the theoretical part, we will present some b... 详细信息
来源: 评论
Reputation-based trust systems for wireless sensor networks: A comprehensive review  7th
Reputation-based trust systems for wireless sensor networks:...
收藏 引用
7th IFIP WG 11.11 international conference on Trust Management, IFIPTM 2013
作者: Alzaid, Hani Alfaraj, Manal Ries, Sebastian Jøsang, Audun Albabtain, Muneera Abuhaimed, Alhanof Computer Research Institute King Abdulaziz City for Science and Technology Riyadh Saudi Arabia Almaarefa College Riyadh Saudi Arabia CASED Hochschulstrasse 10 Darmstadt64293 Germany University of Oslo P.O. Box 1080 Blindern Oslo0316 Norway
Cryptographic mechanisms alone are insufficient to protect Wireless Sensor Networks (WSNs), because sensors are deployed for long periods in hostile environments where it is possible for an adversary to physically tak... 详细信息
来源: 评论
Modified deformable parts model for side profile facial feature detection
Modified deformable parts model for side profile facial feat...
收藏 引用
6th international conference on advances in Information technology 2013, IAIT 2013
作者: Setthawong, Pisal Vanijja, Vajirasak School of Information Technology King Mongkut's University of Technology Thonburi Thailand
Deformable Parts Model(DPM) is a facial feature detection approach. though the approach is accurate, robust, and works well for a wide range of facial profiles, when faced with a side profile, the typical approach pro... 详细信息
来源: 评论
Analysis of optimization techniques to improve user response time of web applications and their implementation for MOODLE
Analysis of optimization techniques to improve user response...
收藏 引用
6th international conference on advances in Information technology 2013, IAIT 2013
作者: Manchanda, Priyanka Department of Computer Science and Information Technology Jaypee Institute of Information Technology Sector 128 Noida UP - 201304 India
Analysis of six optimization techniques grouped under three categories (hardware, back-end, and front-end) is done to study the reduction in average user response time for Modular Object Oriented Dynamic Learning Envi... 详细信息
来源: 评论
RFID privacy and security risks: Italian case study
RFID privacy and security risks: Italian case study
收藏 引用
6th international conference on advances in Information technology 2013, IAIT 2013
作者: De Vivo, Maria Concetta Polzonetti, Alberto Tapanelli, Pietro School of Science and Technology Computer Science Division University of Camerino Camerino Italy
Radio Frequency Identification (RFID) technology can be used in different areas such as in occupational safety and health. this article discusses the development of the RFID technology and its legal implications in th... 详细信息
来源: 评论
Recompilation of broadcast videos based on real-world scenarios
Recompilation of broadcast videos based on real-world scenar...
收藏 引用
19th international conference on advances in Multimedia Modeling, MMM 2013
作者: Ide, Ichiro Graduate School of Information Science Nagoya University 1 Furo-cho Chikusa-ku Nagoya 464-8601 Japan
In order to effectively make use of videos stored in a broadcast video archive, we have been working on their recompilation. In order to realize this, we take an approach that considers the videos in the archive as vi... 详细信息
来源: 评论
Use of multi-agent based platform for providing document-centric interoperability in the realm of e-government
Use of multi-agent based platform for providing document-cen...
收藏 引用
6th international conference on advances in Information technology 2013, IAIT 2013
作者: Majeed, Muhammad Faran Esichaikul, Vatcharaporn e No, Mahe Computer Science and Information Management School of Engineering and Technology Asian Institute of Technology Thailand Khyber Pakhtunkhwa Pakistan CECOS University of IT and Emerging Sciences Peshawar Khyber Pakhtunkhwa Pakistan
E-government has become basic ingredient for good governance. through e-government different services are provided to different stakeholders that include business community, employees of different government departmen... 详细信息
来源: 评论
Legal protection for personal information privacy
Legal protection for personal information privacy
收藏 引用
1st international conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2013, Held as Part of 15th international conference on Human-computer Interaction, HCI 2013
作者: Liu, Yinan School of Economy and Law University of Science and Technology Liaoning Anshan City China
While the privacy concerns raised by advances in information technologies are widely recognized, recent developments have led to a convergence of these technologies in many situations, presenting new challenges to the... 详细信息
来源: 评论
A new multi-sensor track association approach based on intuitionistic fuzzy clustering
A new multi-sensor track association approach based on intui...
收藏 引用
6th international conference on advances in Information technology 2013, IAIT 2013
作者: Lingling, Zhao Xianglei, Dong Peijun, Ma Xiaohong, Su Chunmei, Shi Harbin Institute of Technology Harbin China
To extend some multi-target trackers to a multi-sensor scenario for improving their accuracy and dependable, an efficient track association and fusion algorithm is necessary. this paper proposes a new track associatio... 详细信息
来源: 评论