咨询与建议

限定检索结果

文献类型

  • 848 篇 期刊文献
  • 404 篇 会议
  • 70 册 图书
  • 21 篇 学位论文

馆藏范围

  • 1,343 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,105 篇 工学
    • 894 篇 计算机科学与技术...
    • 323 篇 控制科学与工程
    • 259 篇 软件工程
    • 185 篇 电气工程
    • 126 篇 信息与通信工程
    • 56 篇 网络空间安全
    • 45 篇 机械工程
    • 23 篇 材料科学与工程(可...
    • 18 篇 电子科学与技术(可...
    • 14 篇 土木工程
    • 14 篇 测绘科学与技术
    • 12 篇 交通运输工程
    • 11 篇 力学(可授工学、理...
    • 11 篇 仪器科学与技术
    • 11 篇 石油与天然气工程
    • 11 篇 环境科学与工程(可...
  • 476 篇 理学
    • 398 篇 数学
    • 270 篇 系统科学
    • 22 篇 生物学
    • 19 篇 物理学
    • 14 篇 地球物理学
    • 12 篇 统计学(可授理学、...
    • 11 篇 化学
    • 11 篇 地理学
  • 145 篇 管理学
    • 76 篇 图书情报与档案管...
    • 70 篇 管理科学与工程(可...
  • 47 篇 教育学
    • 46 篇 教育学
  • 44 篇 医学
    • 27 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 13 篇 农学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 11 篇 文学
  • 5 篇 艺术学
  • 2 篇 法学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 1,343 篇 data structure
  • 260 篇 operating system
  • 259 篇 communication ne...
  • 247 篇 information syst...
  • 227 篇 information theo...
  • 59 篇 data structures
  • 51 篇 algorithm
  • 34 篇 data
  • 33 篇 algorithms
  • 26 篇 database
  • 23 篇 computational ge...
  • 23 篇 computational ma...
  • 21 篇 data mining
  • 20 篇 file
  • 19 篇 program
  • 17 篇 system
  • 15 篇 tree
  • 15 篇 visualization
  • 14 篇 machine learning
  • 14 篇 shared memory

机构

  • 10 篇 brno university ...
  • 6 篇 princeton univ d...
  • 4 篇 ibm corp thomas ...
  • 4 篇 stanford univ de...
  • 4 篇 univ waterloo ch...
  • 3 篇 univ waterloo de...
  • 3 篇 univ manitoba de...
  • 3 篇 penn state univ ...
  • 3 篇 univ manitoba wi...
  • 3 篇 univ melbourne s...
  • 3 篇 univ renal res &...
  • 3 篇 nanjing univ sta...
  • 3 篇 mit csail cambri...
  • 3 篇 mit cambridge ma...
  • 3 篇 nanjing univ dep...
  • 3 篇 aarhus univ aarh...
  • 3 篇 univ melbourne p...
  • 3 篇 univ babes bolya...
  • 3 篇 shanghai univ sc...
  • 3 篇 univ cent florid...

作者

  • 6 篇 wood d
  • 5 篇 mehlhorn k
  • 5 篇 durocher stephan...
  • 5 篇 liu zhi
  • 4 篇 munro j. ian
  • 4 篇 tarjan robert e.
  • 4 篇 rinard martin c.
  • 4 篇 czibula istvan g...
  • 4 篇 kuncak viktor
  • 4 篇 dickinson dm
  • 4 篇 czibula gabriela
  • 4 篇 aoe j
  • 3 篇 chan timothy m.
  • 3 篇 quintana vh
  • 3 篇 hoare c.a.r.
  • 3 篇 webb rl
  • 3 篇 mishra achyut
  • 3 篇 engelfriet j
  • 3 篇 yang tong
  • 3 篇 schuler p.f.

语言

  • 1,011 篇 英文
  • 319 篇 其他
  • 10 篇 中文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"主题词=Data structure"
1343 条 记 录,以下是81-90 订阅
排序:
A Dependable, Scalable, Distributed, Virtual data structure  15th
A Dependable, Scalable, Distributed, Virtual Data Structure
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP)
作者: Grampone, Silvia Litwin, Witold Schwarz, Thomas S. J. Univ Catolica Uruguay Montevideo Uruguay Univ Paris 09 Paris France Univ Ctr Amer San Salvador El Salvador
Cloud computing allows on-demand access to cheap computing resources. This capability can be used for solving problems autonomously by complete enumeration. We present here SDVRP a data structure based on range partit... 详细信息
来源: 评论
data Flow and data structure Design for Computer Interlocking Applied in Medium-Low Speed Maglev  8
Data Flow and Data Structure Design for Computer Interlockin...
收藏 引用
8th IEEE International Conference on Software Engineering and Service Science (ICSESS)
作者: Nai, Wei Jiang, Xi Chen, Yijun Zhang, Ting Dong, Decun Tongji Zhejiang Coll Dept Elect & Informat Engn Jiaxing 314051 Zhejiang Peoples R China Tongji Univ Minist Educ Key Lab Rd & Traff Engn Shanghai 201804 Peoples R China Tongji Univ Shanghai Cooperat Ctr Maglev & Rail Transit Shanghai 201804 Peoples R China
Computer interlocking (CI) is serving as a core part of operation and control system (OCS) in rail transit, with no exception in medium-low speed maglev transportation system which has almost the same strategy as urba... 详细信息
来源: 评论
Exploration and Practice about Bilingual Teachers and the Network Resources Construction for data structure
Exploration and Practice about Bilingual Teachers and the Ne...
收藏 引用
4th International Conference on Manufacturing Science and Engineering (ICMSE 2013)
作者: Xiang, Yi Peng, Jun Xiong, Qian Lei, Liang You, Mingying Chongqing Univ Sci & Technol Chongqing 401331 Peoples R China
Targeting at the "data structure" bilingual classes with regard to the lack of qualified teachers, a sharp learning curve and the poor teaching effect that are widespread in colleges and universities, this p... 详细信息
来源: 评论
Using Mind Map as Learning Tool in "data structure" Teaching  14
Using Mind Map as Learning Tool in "Data Structure" Teaching
收藏 引用
IEEE International Conference on Computer and Information Technology (CIT 2014)
作者: He, Feijuan Miao, Xianglin Wu, Bei Yao, Siyu Xi An Jiao Tong Univ City Coll Xian 710018 Shaanxi Peoples R China Xi An Jiao Tong Univ Dept Comp Sci Xian 710049 Shaanxi Peoples R China
data structure is a computer subject, which is hard to teach and learn, because it has the characteristic of various knowledge, strong theory and abstract. Therefore, we introduce mind map, the GUI-tool for knowledge ... 详细信息
来源: 评论
The Exploration and Practice of data structure Teaching Based on CDIO Model
The Exploration and Practice of Data Structure Teaching Base...
收藏 引用
7th International Conference on Computer Science and Education
作者: Wang, Xiuyou Fan, Jianzhong Sun, Gang Nan, Shuping Fu Yang Normal Coll Sch Comp & Informat Fu Yang Peoples R China
data structure is the core course in the computer specialty, which aims to cultivate undergraduates' abilities of selecting appropriate data structures to develop high quality application programs. CDIO teaching m... 详细信息
来源: 评论
Efficient Shared Peak Counting in database Peptide Search Using Compact data structure for Fragment-Ion Index
Efficient Shared Peak Counting in Database Peptide Search Us...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Haseeb, Muhammad Saeed, Fahad Florida Int Univ Sch Comp & Informat Sci Miami FL 33199 USA
database search is the most commonly employed method for identification of peptides from MS/MS spectra data. The search involves comparing experimentally obtained MS/MS spectra against a set of theoretical spectra pre... 详细信息
来源: 评论
Power-Aware data structure Using Memory Allocation Techniques in EPS-Based Motion Recognition Systems  6
Power-Aware Data Structure Using Memory Allocation Technique...
收藏 引用
6th International Conference on IT Convergence and Security (ICITCS)
作者: Kim, Young-Chul Lee, Seok-Hyun Jang, Jin-Soo Chonnam Natl Univ Coll Engn Dept Elect & Comp Engn Gwnag Ju South Korea
In this paper, we propose power-aware data structure using loop transformation in preprocessing of motion recognition systems based on EPS (Electromagnetic Potential Sensor). First, we estimate power consumption of sm... 详细信息
来源: 评论
Visualize and Learn Sorting Algorithms in data structure Subject in a Game-based Learning  21
Visualize and Learn Sorting Algorithms in Data Structure Sub...
收藏 引用
21st IEEE International Symposium on Mixed and Augmented Reality (ISMAR)
作者: Lim, Wee Han Cai, Yiyu Yao, Dezhong Cao, Qi Singapore Univ Social Sci Singapore Singapore Nanyang Technol Univ Singapore Singapore Huazhong Univ Sci & Technol Wuhan Peoples R China Univ Glasgow Glasgow Lanark Scotland
The data structure subject is an essential Computer Science subject. Sorting algorithms are important topics in data structure where students are expected to learn how various sorting algorithms work and their time co... 详细信息
来源: 评论
Considerations and Practice of Objectives and Ideologies of data structure Teaching  9
Considerations and Practice of Objectives and Ideologies of ...
收藏 引用
9th IEEE International Conference on Computer Science and Education (ICCSE)
作者: Chen, Yue Ding, Zhifang Dai, Qing Zhengzhou Informat Sci & Technol Inst Zhengzhou Peoples R China
Aiming at paying more attention to knowledge imparting rather than abilities training and qualities cultivating, the new objectives of data structure course teaching, including the aspects of knowledge, abilities and ... 详细信息
来源: 评论
Misleading Malware Similarities Analysis by Automatic data structure Obfuscation
Misleading Malware Similarities Analysis by Automatic Data S...
收藏 引用
13th Information Security Conference
作者: Xin, Zhi Chen, Huiyu Han, Hao Mao, Bing Xie, Li Nanjing Univ Dept Comp Sci & Technol State Key Lab Novel Software Technol Nanjing 210093 Peoples R China
Program obfuscation techniques have been widely used by malware to dodge the scanning from anti-virus detectors. However, signature based on the data structures appearing in the runtime memory makes traditional code o... 详细信息
来源: 评论