咨询与建议

限定检索结果

文献类型

  • 325 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 335 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 266 篇 工学
    • 243 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 34 篇 信息与通信工程
    • 25 篇 生物工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 控制科学与工程
    • 13 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 11 篇 建筑学
    • 10 篇 动力工程及工程热...
    • 7 篇 土木工程
    • 7 篇 环境科学与工程(可...
    • 6 篇 材料科学与工程(可...
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
  • 90 篇 理学
    • 57 篇 数学
    • 25 篇 生物学
    • 12 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 8 篇 系统科学
    • 4 篇 大气科学
  • 63 篇 管理学
    • 35 篇 图书情报与档案管...
    • 30 篇 管理科学与工程(可...
    • 23 篇 工商管理
  • 11 篇 法学
    • 8 篇 社会学
  • 7 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 5 篇 农学
  • 3 篇 教育学
  • 1 篇 军事学

主题

  • 22 篇 mobile computing
  • 12 篇 cloud computing
  • 7 篇 ubiquitous compu...
  • 6 篇 quantum computin...
  • 5 篇 distributed comp...
  • 5 篇 edge computing
  • 4 篇 computation theo...
  • 4 篇 application soft...
  • 4 篇 computer archite...
  • 4 篇 recommender syst...
  • 4 篇 processor schedu...
  • 4 篇 semantics
  • 4 篇 virtual machine
  • 3 篇 internet of thin...
  • 3 篇 reinforcement le...
  • 3 篇 genes
  • 3 篇 grid computing
  • 3 篇 computer applica...
  • 3 篇 energy utilizati...
  • 3 篇 computing power

机构

  • 8 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 2 篇 nit calicut
  • 2 篇 hong kong polyte...
  • 2 篇 university of be...
  • 2 篇 key laboratory o...
  • 2 篇 school of comput...
  • 2 篇 university of co...
  • 2 篇 the hong kong po...
  • 2 篇 marquette univer...
  • 2 篇 dept. of compute...
  • 2 篇 computing instit...
  • 2 篇 institute of com...
  • 2 篇 center for relia...
  • 2 篇 school of comput...
  • 2 篇 university of wa...

作者

  • 6 篇 hong jiman
  • 5 篇 hung chih-cheng
  • 5 篇 song enmin
  • 4 篇 zulkernine moham...
  • 4 篇 cho yookun
  • 4 篇 liu hong
  • 3 篇 kim bongjae
  • 3 篇 varadharajan vij...
  • 3 篇 zambonelli franc...
  • 3 篇 ahamed sheikh iq...
  • 3 篇 leong hong va
  • 3 篇 rahman ataur
  • 2 篇 song jie
  • 2 篇 kühn eva
  • 2 篇 sheikh iqbal aha...
  • 2 篇 weldemariam komm...
  • 2 篇 mayer wolfgang
  • 2 篇 freitas fred
  • 2 篇 claycomb william
  • 2 篇 yu mali

语言

  • 335 篇 英文
检索条件"任意字段=Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing"
335 条 记 录,以下是221-230 订阅
排序:
Filtering spams using the minimum description length principle  10
Filtering spams using the minimum description length princip...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Almeida, Tiago A. Yamakami, Akebo Almeida, Jurandy School of Electrical and Computer Engineering University of Campinas - UNICAMP 13083-970 Campinas SP Brazil Institute of Computing University of Campinas 13083-970 Campinas SP Brazil
Spam has become an increasingly important problem with a big economic impact in society. Spam filtering poses a special problem in text categorization, of which the defining characteristic is that filters face an acti... 详细信息
来源: 评论
Design and development of a real-time embedded inertial measurement unit  10
Design and development of a real-time embedded inertial meas...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Facchinetti, Tullio Savioli, Alberto Goldoni, Emanuele University of Pavia Dept. of Computer Eng. and System Science 27100 - Pavia Italy University of Pavia Dept. of Electronics 27100 - Pavia Italy
Micro-Electro-Mechanical Systems (MEMS) sensors are used nowadays in a wide range of applications, from robotics to entertainment. Recently, this technology has also been adopted to equip Inertial Measurement Units (I... 详细信息
来源: 评论
Inductive reasoning and semantic web search  10
Inductive reasoning and semantic web search
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: D'Amato, Claudia Esposito, Floriana Fanizzi, Nicola Fazzinga, Bettina Gottlob, Georg Lukasiewicz, thomas Dipartimento di Informatica Università di Bari Italy DEIS Università Della Calabria Italy University of Oxford United Kingdom Computing Laboratory Oxford-Man Institute of Quantitative Finance United Kingdom Computing Laboratory Institut für Informationssysteme TU Wien Austria
Extensive research activities are recently directed towards the Semantic Web as a future form of the Web. Consequently, Web search as the key technology of the Web is evolving towards some novel form of Semantic Web s... 详细信息
来源: 评论
On processing location based top-k queries in the wireless broadcasting system  10
On processing location based top-k queries in the wireless b...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Jung, HaRim Cho, ByungKu Chung, Yon Dohn Liu, Ling Department of Computer Science and Engineering Korea University Seoul Korea Republic of College of Computing Georgia Institute of Technology United States
In this paper, we explore the problem of processing a novel type of location based queries, named the location based top-k query, which involves both of spatial and non-spatial specifications for data objects in the w... 详细信息
来源: 评论
Efficient mapping and voltage islanding technique for energy minimization in NoC under design constraints  10
Efficient mapping and voltage islanding technique for energy...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Ghosh, Pavel Sen, Arunabha Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ 85287 United States
Voltage islanding technique in Network-on-Chip (NoC) can significantly reduce the computational energy consumption by scaling down the voltage levels of the processing elements (PEs). this reduction in energy consumpt... 详细信息
来源: 评论
Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities?  10
Can complexity, coupling, and cohesion metrics be used as ea...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Chowdhury, Istehad Zulkernine, Mohammad Dept. of Electrical and Computer Eng. Queen's University Kingston ON K7L3N6 Canada School of Computing Queen's University Kingston ON K7L3N6 Canada
It is difficult to detect vulnerabilities until they manifest themselves as security failures in the operational stage of software, because the security concerns are not addressed or known sufficiently early during so... 详细信息
来源: 评论
Chordet: An efficient and transparent replication for improving availability of peer-to-peer networked systems  10
Chordet: An efficient and transparent replication for improv...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Park, Geunyoung Kim, Seokhyun Cho, Yookun Kook, Joongjin Hong, Jiman Seoul National University Korea Republic of School of Computing Soongsil University Korea Republic of
In Peer-to-Peer (P2P) networked systems, participating nodes can be frequently disconnected from the networks because of several reasons such as users' intentions, nodes' failures, and network problems. this m... 详细信息
来源: 评论
Improving automatic music genre classification with hybrid content-based feature vectors  10
Improving automatic music genre classification with hybrid c...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Silla Jr., Carlos N. Koerich, Alessandro L. Kaestner, Celso A. A. School of Computing University of Kent Canterbury Canterbury Kent CT2 7NF United Kingdom Pontifical Catholic University of Paraná Curitiba PR 80215-901 Brazil Federal University of Technology of Paraná Curitiba PR 80230-901 Brazil
Current research on the task of automatic music genre classification has been focusing on new classification approaches based on combining information from other sources than the music signal. the reason for this is t... 详细信息
来源: 评论
Malware detection based on mining API calls  10
Malware detection based on mining API calls
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Sami, Ashkan Yadegari, Babak Rahimi, Hossein Peiravian, Naser Hashemi, Sattar Hamze, Ali CSE and IT Department Shiraz University Shiraz Iran Soft-Computing Laboratory Shiraz University Shiraz Iran APA Malware Research and Education Center Shiraz University Iran
Financial loss due to malware nearly doubles every two years. For instance in 2006, malware caused near 33.5 Million GBP direct financial losses only to member organizations of banks in UK. Recent malware cannot be de... 详细信息
来源: 评论
An improved K-view algorithm for image texture classification using new characteristic views selection methods  10
An improved K-view algorithm for image texture classificatio...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Lan, Yihua Liu, Hong Song, Enmin Hung, Chih-Cheng School of Computer Science Huazhong University of Science and Technology Wuhan China School of Computing and Software Engineering Southern Polytechnic State University GA United States
Image texture classification plays an important role in the computer processing of images. Many methods including the Gray Level Co-Occurrence (GLCO), Local Binary Patterns and K-View algorithms for image texture clas... 详细信息
来源: 评论