咨询与建议

限定检索结果

文献类型

  • 318 篇 期刊文献
  • 161 篇 会议
  • 2 册 图书

馆藏范围

  • 481 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 295 篇 工学
    • 164 篇 计算机科学与技术...
    • 132 篇 软件工程
    • 57 篇 电气工程
    • 48 篇 电子科学与技术(可...
    • 45 篇 控制科学与工程
    • 43 篇 信息与通信工程
    • 31 篇 生物医学工程(可授...
    • 29 篇 机械工程
    • 28 篇 生物工程
    • 26 篇 力学(可授工学、理...
    • 26 篇 光学工程
    • 20 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 17 篇 材料科学与工程(可...
    • 16 篇 化学工程与技术
    • 12 篇 交通运输工程
  • 293 篇 理学
    • 164 篇 物理学
    • 97 篇 数学
    • 48 篇 统计学(可授理学、...
    • 37 篇 生物学
    • 24 篇 化学
    • 20 篇 系统科学
  • 56 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 25 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 32 篇 医学
    • 30 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 20 篇 法学
    • 16 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 6 篇 农学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 4 篇 electroencephalo...
  • 3 篇 covid-19
  • 3 篇 deep learning
  • 3 篇 quantum entangle...
  • 3 篇 neural networks
  • 3 篇 resource managem...
  • 3 篇 asymptotic analy...
  • 3 篇 flux pinning
  • 3 篇 cognitive system...
  • 3 篇 quantum tomograp...
  • 3 篇 sensors
  • 3 篇 queueing theory
  • 2 篇 global positioni...
  • 2 篇 complex networks
  • 2 篇 surveys
  • 2 篇 project manageme...
  • 2 篇 spin hall effect
  • 2 篇 data privacy
  • 2 篇 modeling
  • 2 篇 smartphones

机构

  • 9 篇 faculty of compu...
  • 7 篇 faculty of engin...
  • 6 篇 faculty of engin...
  • 5 篇 faculty of compu...
  • 5 篇 institute of app...
  • 5 篇 state key labora...
  • 4 篇 1faculty of comp...
  • 4 篇 2dean of the fre...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 department of me...
  • 4 篇 faculty of engin...
  • 4 篇 heidelberg
  • 3 篇 faculty of compu...
  • 3 篇 university of pe...
  • 3 篇 school of comput...
  • 3 篇 perimeter instit...
  • 3 篇 department of co...
  • 3 篇 vector institute...
  • 3 篇 budapest univers...

作者

  • 8 篇 nazarov anatoly
  • 8 篇 phung-duc tuan
  • 6 篇 paul svetlana
  • 6 篇 zhengfeng ji
  • 5 篇 nengkun yu
  • 5 篇 bei zeng
  • 5 篇 miao ying
  • 4 篇 t. matsushita
  • 4 篇 erina jana
  • 4 篇 cimini beth a.
  • 4 篇 george popov
  • 4 篇 saez-rodriguez j...
  • 4 篇 reyes mauricio
  • 4 篇 kofler florian
  • 4 篇 cai han
  • 4 篇 teruo matsushita
  • 4 篇 erins ingars
  • 4 篇 masaru kiuchi
  • 4 篇 menze bjoern
  • 4 篇 katayama tetsuro

语言

  • 460 篇 英文
  • 14 篇 其他
  • 8 篇 日文
  • 2 篇 中文
检索条件"机构=1Faculty of Computer Science and Systems Engineering"
481 条 记 录,以下是41-50 订阅
排序:
Implementing the device driver of external human interaction device for the Android
Implementing the device driver of external human interaction...
收藏 引用
2013 IEEE/ACIS 12th International Conference on computer and Information science, ICIS 2013
作者: Ogawa, Naoto Oikawa, Shuich Department of Computer Science University of Tsukuba 1-1-1 Tennodai Tsukuba Ibaraki 305-8573 Japan Division of Information Engineering Faculty of Engineering Information and Systems University of Tsukuba Japan
Smartphones become popular. They have various sensors and connection modules. They employ a mobile operating system for the control of sensors and modules. In this situation, a large amount of data comes to the operat... 详细信息
来源: 评论
Measuring the effects of human interaction devices for Android
Measuring the effects of human interaction devices for Andro...
收藏 引用
1st IEEE Global Conference on Consumer Electronics, GCCE 2012
作者: Ogawa, Naoto Oikawa, Shuich Department of Computer Science University of Tsukuba 1-1-1 Tennodai Tsukuba Ibaraki 305-8573 Japan Division of Information Engineering Faculty of Engineering Information and Systems University of Tsukuba Japan
Smartphones become popular. They have various sensors in order to bring many functions to users. They employ a mobile operating system for the control of sensors. In this situation, a large amount of data comes to the... 详细信息
来源: 评论
A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database systems  1
收藏 引用
8th International Symposium on Security in Computing and Communications, SSCC 2020
作者: Mansouri, Houssem Pathan, Al-Sakib Khan Laboratory of Networks and Distributed Systems Computer Science Department Faculty of Sciences Ferhat Abbas Setif University 1 Setif Algeria Department of Computer Science and Engineering Independent University Dhaka Bangladesh
For better protection of distributed systems, two well-known techniques are: checkpointing and rollback recovery. While failure protection is often considered a separate issue, it is crucial for establishing better se... 详细信息
来源: 评论
Multi-level queue NVM/DRAM hybrid memory management with language runtime support
Multi-level queue NVM/DRAM hybrid memory management with lan...
收藏 引用
Research in Adaptive and Convergent systems, RACS 2015
作者: Nakagawa, Gaku Oikawa, Shuichi Department of Computer Science University of Tsukuba 1-1-1 Tennodai Tsukuba Ibaraki Japan Division of Information Engineering Faculty of Engineering Information and Systems University of Tsukuba 1-1-1 Tennodai Tsukuba Ibaraki Japan
Non-volatile memory devices (NVM) devices, such as PCM, STT-MRAM, and ReRAM, enable the integration of secondary storage into main memory. This integration reduces I/O access to slow block devices;however, it is curre... 详细信息
来源: 评论
UBI: User body interface for wearable and touch panel device
UBI: User body interface for wearable and touch panel device
收藏 引用
ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2015 ACM International Symposium on Wearable computers, UbiComp and ISWC 2015
作者: Kondo, Yuto Tanaka, Jiro Takahashi, Shin Department of Computer Science University of Tsukuba 1-1-1 Tennodai Tsukuba Ibaraki Japan Faculty of Engineering Information and Systems University of Tsukuba 1-1-1 Tennodai Tsukuba Ibaraki Japan
This study designed an interaction technique for transfer- ring digital information between a wearable device and a touch panel device. To this end, we developed a prototype system, referred to as a User Body Interfac... 详细信息
来源: 评论
A Resilient Hierarchical Checkpointing Algorithm for Distributed systems Running on Cluster Federation  1
收藏 引用
7th International Symposium on Security in Computing and Communications, SSCC 2019
作者: Mansouri, Houssem Pathan, Al-Sakib Khan Laboratory of Networks and Distributed Systems Computer Science Department Faculty of Sciences Ferhat Abbas Setif University 1 Sétif Algeria Department of Computer Science and Engineering Southeast University Dhaka Bangladesh
In distributed systems, checkpointing method can be used to ensure fault-tolerance, which in turn could help the system’s security and stability. In simple terms, checkpointing means saving status information of a sy... 详细信息
来源: 评论
An associative learning experiment using the plasmodium of Physarum polycephalum
收藏 引用
Nano Communication Networks 2011年 第2-3期2卷 99-105页
作者: Shirakawa, Tomohiro Gunji, Yukio-Pegio Miyake, Yoshihiro Department of Computer Science School of Electrical and Computer Engineering National Defense Academy of Japan 1-10-20 Hashirimizu Yokosuka Kanagawa 239-8686 Japan Department of Earth and Planetary Science Graduate School of Science Kobe University 1-1 Rokkodai Kobe Hyogo 657-8501 Japan Dept. of Earth and Planetary Science Faculty of Science Kobe University 1-1 Rokkodai Kobe Hyogo 657-8501 Japan Department of Computational Intelligence and Systems Science Interdisciplinary Graduate School of Science and Engineering Tokyo Institute of Technology 4259 Nagatsuta Midori Kanagawa 226-8502 Japan
The plasmodium of Physarum polycephalum is a unicellular and multinuclear giant amoeba that shows adaptive behaviors. To test the presence of memory and learning ability in the plasmodium, we performed an associative ... 详细信息
来源: 评论
Corrigendum to “Multi population-based chaotic differential evolution for multi-modal and multi-objective optimization problems” Appl. Soft Comput. 132 (2023) 109909
收藏 引用
Applied Soft Computing 2025年 169卷
作者: Hafiz Tayyab Rauf Jiechao Gao Ahmad Almadhor Ali Haider Yu-Dong Zhang Fadi Al-Turjman Centre for Smart Systems AI and Cybersecurity Staffordshire University Stoke-on-Trent United Kingdom Department of Computer Science University of Virginia USA Department of Computer Engineering and Networks College of Computer and Information Sciences Jouf University Sakaka 72388 Saudi Arabia Department of Computer Science University of Gujrat Gujrat Pakistan School of Informatics University of Leicester Leicester LE1 7RH UK Research Center for AI and IoT Faculty of Engineering University of Kyrenia Mersin 10 Turkey Artificial Intelligence Engineering Dept. AI and Robotics Institute Near East University Mersin 10 Turkey
来源: 评论
New Level-Set-Based Shape Recovery Method and its application to sparse-view shape tomography  4
New Level-Set-Based Shape Recovery Method and its applicatio...
收藏 引用
4th International Conference on Digital Medicine and Image Processing, DMIP 2021
作者: Ali, Haytham A. Kudo, Hiroyuki Department of Computer Science Graduate School of Systems and Information Engineering University of Tsukuba Tennoudai 1-1-1 Tsukuba305-8573 Japan Department of Mathematics Faculty of Science Sohag University Sohag82524 Egypt
The recovery of shapes from a few numbers of their projections is very important in Computed tomography. In this paper, we propose a novel scheme based on a collocation set of Gaussian functions to represent any objec... 详细信息
来源: 评论
A Study on Computational Methods of the Logistic Map over Integers for a Pseudorandom Number Generator  15
A Study on Computational Methods of the Logistic Map over In...
收藏 引用
15th International Symposium on Information Theory and Its Applications, ISITA 2018
作者: Araki, Shunsuke Muraoka, Hideyuki Miyazaki, Takeru Uehara, Satoshi Kakizaki, Kenrichi Faculty of Computer Science and Systems Engineering Kyushu Institute of Technology 680-4 Kawazu Iizuka Fukuoka820-8502 Japan Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology 680-4 Kawazu Iizuka Fukuoka820-8502 Japan Faculty of Environmental Engineering University of Kitakyushu 1-1 Hibikino Wakamatsu Kitakyushu Fukuoka808-0135 Japan
In this paper, we will discuss properties of different computational methods of the logistic map over integers. We will give four computational methods of the map in order to implement the map on a computer with limit... 详细信息
来源: 评论