咨询与建议

限定检索结果

文献类型

  • 7,500 篇 会议
  • 328 篇 期刊文献
  • 280 册 图书
  • 1 篇 学位论文

馆藏范围

  • 8,108 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 3,619 篇 工学
    • 2,471 篇 计算机科学与技术...
    • 1,825 篇 软件工程
    • 636 篇 控制科学与工程
    • 529 篇 信息与通信工程
    • 342 篇 电气工程
    • 304 篇 机械工程
    • 291 篇 生物工程
    • 258 篇 生物医学工程(可授...
    • 235 篇 电子科学与技术(可...
    • 198 篇 光学工程
    • 149 篇 仪器科学与技术
    • 149 篇 化学工程与技术
    • 128 篇 材料科学与工程(可...
    • 125 篇 动力工程及工程热...
    • 99 篇 安全科学与工程
    • 98 篇 力学(可授工学、理...
  • 2,406 篇 理学
    • 1,720 篇 数学
    • 557 篇 物理学
    • 463 篇 统计学(可授理学、...
    • 355 篇 系统科学
    • 322 篇 生物学
    • 144 篇 化学
  • 821 篇 管理学
    • 538 篇 管理科学与工程(可...
    • 310 篇 图书情报与档案管...
    • 250 篇 工商管理
  • 196 篇 医学
    • 162 篇 临床医学
    • 141 篇 基础医学(可授医学...
    • 106 篇 药学(可授医学、理...
  • 143 篇 教育学
    • 129 篇 教育学
  • 119 篇 法学
    • 106 篇 社会学
  • 97 篇 经济学
  • 62 篇 农学
  • 41 篇 文学
  • 10 篇 艺术学
  • 3 篇 哲学
  • 3 篇 军事学

主题

  • 2,049 篇 mathematical mod...
  • 587 篇 computational mo...
  • 457 篇 computer science
  • 398 篇 equations
  • 298 篇 mathematical mod...
  • 247 篇 predictive model...
  • 227 篇 optimization
  • 183 篇 accuracy
  • 178 篇 analytical model...
  • 178 篇 feature extracti...
  • 162 篇 data models
  • 154 篇 neural networks
  • 154 篇 training
  • 146 篇 iterative method...
  • 140 篇 approximation me...
  • 131 篇 data mining
  • 131 篇 algorithm design...
  • 127 篇 software enginee...
  • 127 篇 mathematical log...
  • 124 篇 educational inst...

机构

  • 23 篇 school of mathem...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 16 篇 state key labora...
  • 14 篇 school of comput...
  • 14 篇 lovely professio...
  • 14 篇 school of comput...
  • 13 篇 school of mathem...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 institute of com...
  • 10 篇 centre of resear...
  • 10 篇 centre for mathe...
  • 10 篇 school of mathem...
  • 9 篇 computer electri...
  • 9 篇 maharishi school...
  • 9 篇 school of comput...
  • 9 篇 novosibirsk stat...
  • 9 篇 school of physic...

作者

  • 20 篇 weickert joachim
  • 11 篇 mohamed-slim alo...
  • 8 篇 yi wang
  • 8 篇 peter pascal
  • 8 篇 dyvak mykola
  • 8 篇 bo liu
  • 7 篇 carl olsson
  • 7 篇 vikram kumar
  • 7 篇 nazir ahmad zafa...
  • 7 篇 gasnikov alexand...
  • 7 篇 shinji doki
  • 6 篇 a l zolkin
  • 6 篇 kulikov igor
  • 6 篇 raman ramakrishn...
  • 6 篇 masina olga n.
  • 6 篇 ying sun
  • 6 篇 ramakrishnan ram...
  • 6 篇 mykola dyvak
  • 6 篇 jinwen ma
  • 6 篇 ma jinwen

语言

  • 7,543 篇 英文
  • 527 篇 其他
  • 77 篇 中文
  • 8 篇 俄文
检索条件"任意字段=Conference on Mathematical Methods in Computer Science"
8109 条 记 录,以下是4991-5000 订阅
排序:
Watermarking XML structures using multi-valued dependencies
Watermarking XML structures using multi-valued dependencies
收藏 引用
9th International conference on Information Technology, ITNG 2012
作者: Quevedo-Torrero, Jesús Ubaldo Erickson, Geno Department of Computer Science University of Wisconsin-Parkside Kenosha WI United States Computer and Mathematical Sciences Columbia College of Missouri Gurnee IL United States
This article examines the basic concepts and offers an analysis of the strengths and weaknesses of common XML watermarking methods. It presents a notational system to describe XML documents and its structures. Then, t... 详细信息
来源: 评论
Petri-net-based modeling and resolving of black hole attack in WMN
Petri-net-based modeling and resolving of black hole attack ...
收藏 引用
36th Annual IEEE International computer Software and Applications conference Workshops, COMPSACW 2012
作者: Huang, Hejiao Zhou, Qiang Dept. of Computer Science Harbin Institute of Technology Shenzhen Graduate School Shenzhen China
As Wireless Mesh network (WMN) is self-organizing, self-adaptive, low-cost and multi-hop, it has gradually become one of the next generation wireless networks for communication. The routing security is an important as... 详细信息
来源: 评论
Theoretical Foundations of Gaussian Convolution by Extended Box Filtering
Theoretical Foundations of Gaussian Convolution by Extended ...
收藏 引用
3rd International conference on Scale Space and Variational methods in computer Vision
作者: Gwosdek, Pascal Grewenig, Sven Bruhn, Andres Weickert, Joachim Univ Saarland Math Image Anal Grp Dept Math & Comp Sci Campus E1-1 D-66041 Saarbrucken Germany Saarland Univ Vision Image Process Grp Cluster Excellence Multimodal Compt Interact Saarbrucken Germany
Gaussian convolution is of fundamental importance in linear scale-space theory and in numerous applications. We introduce iterated extended box filtering as an efficient and highly accurate way to compute Gaussian con... 详细信息
来源: 评论
Optical character recognition of printed mathematical symbols using a hierarchical classifier
Optical character recognition of printed mathematical symbol...
收藏 引用
2012 International conference on Image Processing, computer Vision, and Pattern Recognition, IPCV 2012
作者: Ranger, Jason Wang, Fei Cheng, Howard Department of Mathematics and Computer Science University of Lethbridge 4401 University Drive Lethbridge AB Canada
In this paper, we examine the effectiveness of a hierarchical approach for the optical character recognition of printed mathematical symbols in a document. We make use of a number of features extracted from the charac... 详细信息
来源: 评论
Personalized therapy selection by using multi-objective optimization
Personalized therapy selection by using multi-objective opti...
收藏 引用
IEEE 16th International conference on Intelligent Engineering Systems, INES 2012
作者: Karpics, Ivars Institute of Computer Control Automation and Computer Engineering Faculty of Computer Science and Information Technology Riga Technical University Riga Latvia
In the article a therapy selection method by using topological modelling and multi- objective optimization is presented. In a medicine practice a doctor by taking into the count patients' health state and laborato... 详细信息
来源: 评论
Principles and observation: How do people move?
Principles and observation: How do people move?
收藏 引用
5th International conference on Motion in Games, MIG 2012
作者: Lee, Jehee Department of Computer Science and Engineering Seoul National University Korea Republic of
The study on human movements and animal locomotion has revealed various principles based on physics, biomechanics, physiology, and psychology. Many of existing animation techniques rely on those principles, which may ... 详细信息
来源: 评论
Cloud Computing in Educational Applications methods of Virtual Desktops Deployment
Cloud Computing in Educational Applications Methods of Virtu...
收藏 引用
13th International conference on computer Aided Systems Theory (EUROCAST)
作者: Brzozowska, Agata Greblicki, Jerzy Kotowski, Jerzy Wroclaw Univ Technol Inst Comp Engn Control & Robot PL-50372 Wroclaw Poland
Task scheduling is one of the main parts of Cloud Computing (CC). We understand this process as mapping users tasks to appropriate resources to execute. Since we use virtual machines (VM) to hide physical resources fo... 详细信息
来源: 评论
Applications of Lie groups and Lie algebra to computer vision: A brief survey
Applications of Lie groups and Lie algebra to computer visio...
收藏 引用
2012 International conference on Systems and Informatics, ICSAI 2012
作者: Xu, Qiang Ma, Dengwu Department of Ordnance Science and Technology Naval Aeronautical and Astronautical University Yantai China
Recent years an extensive literature appears using the Lie groups theory to solve the problems of computer vision. Lie groups theory is the natural representation of a space of transformations. Lie algebra is the tang... 详细信息
来源: 评论
mathematical methods of research of the electric welding of soft biological tissues
Mathematical methods of research of the electric welding of ...
收藏 引用
11th International conference on Modern Problems of Radio Engineering, Telecommunications and computer science, TCSET'2012
作者: Dubko, A.G. Lebedev, A.V. Lopatkina, E.G. Paton Welding Institute st. Bozhenka 11 Kiev 03680 Ukraine NTUU KPI street Dashavskaya 6/2 228 Kiev 03056 Ukraine
The electric welding of soft biological tissues is difficult object for research. The properties of biological tissues are changed by high-frequency currents. Monitoring of these properties allows managing the process... 详细信息
来源: 评论
Stochastic model of interaction between botnets and distributed computer defense systems
Stochastic model of interaction between botnets and distribu...
收藏 引用
6th International conference on mathematical methods, Models and Architectures for computer Network Security, MMM-ACNS 2012
作者: Zegzhda, Dmitry P. Stepanova, Tatiana V. Saint-Petersburg State Polytechnical University Russia
Nowadays one of the main means for computer attack organization are botnets. One of botnets' goals is to break computer defense system and the goal of defense system is to neutralize botnets, staying resistant to ... 详细信息
来源: 评论