咨询与建议

限定检索结果

文献类型

  • 2,396 篇 期刊文献
  • 763 篇 会议
  • 96 册 图书
  • 41 篇 学位论文
  • 1 篇 资讯

馆藏范围

  • 3,281 篇 电子文献
  • 21 种 纸本馆藏

日期分布

学科分类号

  • 2,828 篇 工学
    • 1,139 篇 计算机科学与技术...
    • 657 篇 电气工程
    • 509 篇 控制科学与工程
    • 446 篇 软件工程
    • 303 篇 信息与通信工程
    • 203 篇 机械工程
    • 196 篇 仪器科学与技术
    • 155 篇 电子科学与技术(可...
    • 88 篇 生物工程
    • 70 篇 动力工程及工程热...
    • 67 篇 化学工程与技术
    • 64 篇 力学(可授工学、理...
    • 54 篇 航空宇航科学与技...
    • 43 篇 材料科学与工程(可...
    • 37 篇 交通运输工程
    • 33 篇 土木工程
    • 30 篇 船舶与海洋工程
    • 25 篇 测绘科学与技术
    • 24 篇 建筑学
    • 22 篇 石油与天然气工程
  • 1,194 篇 理学
    • 533 篇 数学
    • 228 篇 物理学
    • 217 篇 系统科学
    • 182 篇 生物学
    • 111 篇 统计学(可授理学、...
    • 56 篇 化学
  • 262 篇 管理学
    • 250 篇 管理科学与工程(可...
  • 219 篇 医学
    • 103 篇 临床医学
    • 93 篇 基础医学(可授医学...
  • 55 篇 农学
  • 31 篇 经济学
    • 22 篇 应用经济学
  • 30 篇 教育学
  • 24 篇 艺术学
  • 11 篇 法学
  • 10 篇 文学
  • 5 篇 哲学
  • 2 篇 历史学
  • 2 篇 军事学

主题

  • 3,297 篇 computer algorit...
  • 168 篇 algorithms
  • 154 篇 computer simulat...
  • 135 篇 computer program...
  • 124 篇 wireless sensor ...
  • 96 篇 mathematical opt...
  • 82 篇 particle swarm o...
  • 81 篇 computational co...
  • 79 篇 machine learning
  • 79 篇 standing orders
  • 76 篇 mathematical mod...
  • 76 篇 computer softwar...
  • 74 篇 computer science
  • 72 篇 problem solving
  • 71 篇 neural networks ...
  • 70 篇 controllers
  • 64 篇 performance eval...
  • 63 篇 robust control
  • 58 篇 data analysis
  • 57 篇 electronic data ...

机构

  • 10 篇 russian acad sci...
  • 6 篇 russian acad sci...
  • 6 篇 harbin engn univ...
  • 6 篇 hong kong univer...
  • 5 篇 shanghai maritim...
  • 5 篇 northeastern uni...
  • 5 篇 harbin inst tech...
  • 5 篇 beijing univ pos...
  • 5 篇 beihang univ sch...
  • 5 篇 ucl london wc1e ...
  • 5 篇 univ calif san d...
  • 5 篇 nanjing univ aer...
  • 5 篇 stanford univ de...
  • 5 篇 univ elect sci &...
  • 4 篇 columbia univers...
  • 4 篇 russian acad sci...
  • 4 篇 russian acad sci...
  • 4 篇 ibm corp div res...
  • 4 篇 northeastern uni...
  • 4 篇 china univ min &...

作者

  • 6 篇 liu yang
  • 6 篇 wang wei
  • 5 篇 yongcan cao
  • 5 篇 singh bhim
  • 5 篇 wang jun
  • 4 篇 ye mao
  • 4 篇 masakatsu g. fuj...
  • 4 篇 wang yan
  • 4 篇 jesse b. hoagg
  • 4 篇 liu tian-hua
  • 4 篇 yilmaz sozer
  • 4 篇 karimi hamid rez...
  • 4 篇 liu wei
  • 4 篇 wang yu
  • 4 篇 zhang jun
  • 4 篇 nikhil chopra
  • 4 篇 tansel yucelen
  • 4 篇 dennis s. bernst...
  • 4 篇 li wei
  • 4 篇 wei wei

语言

  • 3,016 篇 英文
  • 184 篇 其他
  • 94 篇 中文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"主题词=computer algorithms"
3297 条 记 录,以下是2881-2890 订阅
排序:
Image-based rendering of range data with estimated depth uncertainty
收藏 引用
IEEE computer GRAPHICS AND APPLICATIONS 2004年 第4期24卷 34-42页
作者: Hofsetz, C Ng, K Chen, G McGuinness, P Max, N Liu, Y Univ Vale Rio dos Sinos UNISINOS BR-93022000 Sao Leopoldo RS Brazil STMicroelect San Diego Lab San Diego CA USA Univ Calif Davis Davis CA 95616 USA
Image-based rendering (IBR) involves constructing an image from a new viewpoint, using several input images from different viewpoints. A rendering framework must be flexible enough to handle this kind of data. It must... 详细信息
来源: 评论
Exploring music collections by browsing different views
收藏 引用
computer MUSIC JOURNAL 2004年 第2期28卷 49-62页
作者: Pampalk, E Dixon, S Widmer, G Austrian Res Inst Artificial Intelligence A-1010 Vienna Austria Med Univ Vienna Dept Med Cybernet & Artificial Intelligence A-1010 Vienna Austria
The article describes an approach to explore music collections by navigating through different views. The technique used is called aligned self-organizing maps (SOM). The SOM is an unsupervised neural network with app... 详细信息
来源: 评论
Selective encryption for consumer applications
收藏 引用
IEEE COMMUNICATIONS MAGAZINE 2004年 第5期42卷 124-129页
作者: Lookabaugh, T Sicker, DC Univ Colorado Dept Comp Sci Boulder CO 80309 USA Univ Colorado INterdisciplinary Telecommun Program Boulder CO 80309 USA
Selective encryption is a technique to save computational complexity or enable interesting new system functionality by only encrypting a portion of a compressed bitstream while still achieving adequate security. Altho... 详细信息
来源: 评论
The lazy adversary conjecture fails
收藏 引用
THEORY OF COMPUTING SYSTEMS 2004年 第3期37卷 397-403页
作者: Peserico, E MIT Comp Sci & Artificial Intelligence Lab Cambridge MA 02139 USA
In the context of competitive analysis of online algorithms for the k-server problem, it has been conjectured that every randomized, memoryless online algorithm exhibits the highest competitive ratio against an offlin... 详细信息
来源: 评论
Tabled logic programming based IP matching tool using forced simulation
收藏 引用
IEE PROCEEDINGS-computerS AND DIGITAL TECHNIQUES 2004年 第3期151卷 199-208页
作者: Roop, PS Sowmya, A Ramesh, S Guo, HF Univ Auckland Dept ECE Auckland 1 New Zealand Univ New S Wales Sch CSE Sydney NSW 2052 Australia Indian Inst Technol Dept CSE Bombay 400076 Maharashtra India Univ Nebraska Dept CS Omaha NE 68182 USA
Automatic IP (intellectual property) matching is a key to the reuse of IP cores. A new tabled logic programming-based IP matching algorithm is given that can check whether a given programmable IP can be adapted to mat... 详细信息
来源: 评论
Sharing sense of walking with locomotion interfaces
收藏 引用
INTERNATIONAL JOURNAL OF HUMAN-computer INTERACTION 2004年 第4期17卷 447-462页
作者: Yano, H Kasai, K Saito, H Iwata, H Univ Tsukuba Inst Engn Mech & Syst Tsukuba Ibaraki 3058573 Japan Hitachi Ltd Syst Dev Lab Hitachi Ibaraki Japan Tsukuba Mem Hosp Tsukuba Ibaraki Japan
This article proposes a method of enabling users to share the sensation of walking with each other in a virtual environment (VE). Achieving this shared sensation requires physical equipment, with algorithms to control... 详细信息
来源: 评论
Reducing non-determinism in right nulled GLR parsers
收藏 引用
ACTA INFORMATICA 2004年 第6-7期40卷 459-489页
作者: Scott, E Johnstone, A Univ London Royal Holloway & Bedford New Coll Dept Comp Sci Egham TW20 0EX Surrey England
Tomita's general parsing algorithm is linear on LR(1) grammars but fails to terminate on grammars with hidden left recursion and is not efficient in the presence of epsilon-rules. When Right Nulled (RN) parse tabl... 详细信息
来源: 评论
Optimal control for bouncing suppression of CNG injectors
收藏 引用
JOURNAL OF DYNAMIC SYSTEMS MEASUREMENT AND CONTROL-TRANSACTIONS OF THE ASME 2004年 第1期126卷 47-53页
作者: Dyntar, D Guzzella, L Swiss Fed Inst Technol Zurich Switzerland
This paper describes the model-based design and the experimental validation of a control system which suppresses the bouncing behavior of Compressed Natural Gas (CNG) fuel injectors. First a detailed model of the syst... 详细信息
来源: 评论
Compact routing schemes for dynamic ring networks
收藏 引用
THEORY OF COMPUTING SYSTEMS 2004年 第5期37卷 585-607页
作者: Krizanc, D Luccio, FL Raman, R Wesleyan Univ Dept Math Middletown CT 06459 USA Univ Trieste Dipartimento Sci Matemat I-34127 Trieste Italy Univ Leicester Dept Math & Comp Sci Leicester LE1 7RH Leics England
We consider the problem of routing in an asynchronous dynamically changing ring of processors using schemes that minimize the storage space for the routing information. In general, applying static techniques to a dyna... 详细信息
来源: 评论
Hardware-software design and validation framework for wireless LAN modems
收藏 引用
IEE PROCEEDINGS-computerS AND DIGITAL TECHNIQUES 2004年 第3期151卷 173-182页
作者: Drosos, C Bisdounis, L Metafas, D Blionas, S Tatsaki, A Papadopoulos, G INTRACOM SA GR-19002 Athens Greece Univ Patras Dept Elect & Comp Engn Appl Elect Lab Patras 26500 Greece
The implementation and validation of a 5-GHz wireless LAN modem based on the HIPERLAN/2 standard is presented. In modern wireless communication systems, there is a demand for higher flexibility and more computational ... 详细信息
来源: 评论