咨询与建议

限定检索结果

文献类型

  • 2,309 篇 会议
  • 1,838 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 4,167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,515 篇 工学
    • 1,536 篇 计算机科学与技术...
    • 1,246 篇 软件工程
    • 469 篇 信息与通信工程
    • 433 篇 控制科学与工程
    • 353 篇 电气工程
    • 291 篇 电子科学与技术(可...
    • 274 篇 光学工程
    • 269 篇 生物工程
    • 239 篇 生物医学工程(可授...
    • 164 篇 机械工程
    • 153 篇 化学工程与技术
    • 127 篇 动力工程及工程热...
    • 126 篇 仪器科学与技术
    • 113 篇 材料科学与工程(可...
    • 95 篇 安全科学与工程
    • 83 篇 交通运输工程
  • 1,521 篇 理学
    • 667 篇 数学
    • 577 篇 物理学
    • 323 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 185 篇 系统科学
    • 177 篇 化学
  • 568 篇 管理学
    • 357 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 176 篇 工商管理
  • 255 篇 医学
    • 221 篇 临床医学
    • 178 篇 基础医学(可授医学...
    • 102 篇 药学(可授医学、理...
    • 87 篇 公共卫生与预防医...
  • 97 篇 法学
    • 73 篇 社会学
  • 61 篇 教育学
  • 59 篇 经济学
  • 45 篇 农学
  • 20 篇 军事学
  • 15 篇 文学
  • 8 篇 艺术学

主题

  • 138 篇 software enginee...
  • 97 篇 computer science
  • 71 篇 machine learning
  • 64 篇 neural networks
  • 63 篇 deep learning
  • 62 篇 feature extracti...
  • 59 篇 application soft...
  • 59 篇 control systems
  • 54 篇 optimization
  • 53 篇 computational mo...
  • 52 篇 accuracy
  • 49 篇 computer archite...
  • 47 篇 artificial intel...
  • 46 篇 predictive model...
  • 46 篇 humans
  • 45 篇 software testing
  • 45 篇 costs
  • 43 篇 testing
  • 42 篇 pattern recognit...
  • 41 篇 image segmentati...

机构

  • 89 篇 university of ch...
  • 67 篇 iccub universita...
  • 65 篇 department of ph...
  • 65 篇 universiteit maa...
  • 64 篇 hangzhou institu...
  • 63 篇 excellence clust...
  • 62 篇 infn sezione di ...
  • 62 篇 horia hulubei na...
  • 61 篇 van swinderen in...
  • 61 篇 school of physic...
  • 60 篇 physics and micr...
  • 60 篇 ds4ds la salle u...
  • 59 篇 massachusetts in...
  • 59 篇 infn sezione di ...
  • 59 篇 infn sezione di ...
  • 58 篇 h.h. wills physi...
  • 58 篇 infn sezione di ...
  • 57 篇 university of ma...
  • 57 篇 cavendish labora...
  • 56 篇 warsaw

作者

  • 65 篇 beiter a.
  • 65 篇 barter w.
  • 65 篇 brundu d.
  • 65 篇 bellee v.
  • 58 篇 ao d.
  • 57 篇 bobulska d.
  • 56 篇 aliouche z.
  • 56 篇 blake t.
  • 56 篇 andersson m.
  • 56 篇 borsato m.
  • 56 篇 betancourt c.
  • 56 篇 belin s.
  • 56 篇 afsharnia h.
  • 56 篇 carus l.
  • 56 篇 barbetti m.
  • 56 篇 beck a.
  • 56 篇 cali s.
  • 55 篇 casse g.
  • 55 篇 amato s.
  • 55 篇 baryshnikov f.

语言

  • 3,665 篇 英文
  • 455 篇 其他
  • 44 篇 中文
  • 2 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Center of Excellence in Software Engineering Department of Computer Engineering"
4167 条 记 录,以下是3421-3430 订阅
排序:
A New Shaped Reflector Antenna for Wide Beam Radiation Patterns
A New Shaped Reflector Antenna for Wide Beam Radiation Patte...
收藏 引用
International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications (MAPE)
作者: S. Karimkashi A. R. Mallahzadeh J. Rashed-Mohassel Center of Excellence on Applied Electromagnetic Systems School of Electrical and Computer Engineering Faculty of Engineering University of Tehran Iran ECE Department University of Shahed Tehran Iran
This paper presents a new shaped reflector antenna for wide beam azimuthal patterns and a cosecant squared elevation pattern. Elliptical strips instead of parabolic strips are used in horizontal planes of the reflecto... 详细信息
来源: 评论
Chunk Segmentation of Chinese Sentences Using a Combined Statistical and Rule-based Approach (CSRA)
收藏 引用
International Journal of computer Processing of Languages 2007年 第2N03期20卷 197-218页
作者: RONGBO WANG XIAOHUA WANG ZHIQUN CHEN ZHERU CHI Institute of Computer Application Technology School of Computer and Software Engineering Hangzhou Dianzi University Xiasha Higher Education Park Hangzhou Zhejiang China Center for Multimedia Signal Processing Department of Electronic and Information Engineering The Hong kong Polytechnic University Hong Kong
Deep parsing of Chinese sentences is a very challenging task due to their complexity such as ambiguous word boundaries and meanings. An alternative mode of Chinese language processing is to perform shallow parsing of ... 详细信息
来源: 评论
Text Segmentation from Complex Background Using Sparse Representations
Text Segmentation from Complex Background Using Sparse Repre...
收藏 引用
International Conference on Document Analysis and Recognition
作者: W. Pan T. Bui C. Suen Center for Pattern Recognition and Machine Intelligence Concordia University USA Department Computer Science and Software Engineering Concordia University USA
A novel text segmentation method from complex background is presented in this paper. The idea is inspired by the recent development in searching for the sparse signal representation among a family of over-complete ato... 详细信息
来源: 评论
A Bayesian approach to conceptualization using reinforcement learning
A Bayesian approach to conceptualization using reinforcement...
收藏 引用
IEEE/ASME (AIM) International Conference on Advanced Intelligent Mechatronics
作者: Saeed Amizadeh Majid Nili Ahmadabadi Babak N. Araabi Roland Siegwart Control and Intelligent Processing Center of Excellence Electrical and Computer Engineering Department University of Tehran Tehran Iran ASL ETHZ Zurich Switzerland
Abstraction provides cognition economy and generalization skill in addition to facilitating knowledge communication for learning agents situated in real world. Concept learning introduces a way of abstraction which ma... 详细信息
来源: 评论
Adaptive control for real-time computing system
Adaptive control for real-time computing system
收藏 引用
26th Chinese Control Conference, CCC 2007
作者: Chen, Yi Gao, Ge Liu, Hao National Engineering Research Center For-Multimedia Software Wuhan University Wuhan Hubei 430072 China Department of Computer Scienc Central China Normal University Wuhan Hubei 430079 China School of Info. Science. and Tech. Southwest Jiaotong University Chengdu 610031 China
There may be great degradation in service level management (e.g., an email server) due to dynamical variants of real systems and measured disturbance in the network. An adaptive predictive congestion control is presen... 详细信息
来源: 评论
Achieving dependable systems by synergistic development of architectures and assurance cases
Achieving dependable systems by synergistic development of a...
收藏 引用
Workshop on Architecting Dependable Systems, WADS 2006
作者: Graydon, Patrick J. Knight, John C. Strunk, Elisabeth A. Department of Computer Science University of Virginia 151 Engineer's Way Charlottesville VA 22904-4740 United States Software Systems Engineering Dept. Aerospace Corporation 15049 Conference Center Drive CH3/320 Chantilly VA 20151-3824 United States
Assurance Based Development (ABD) is an approach to the construction of critical computing systems in which the system and an argument that it meets its assurance goals are developed simultaneously. ABD touches all as... 详细信息
来源: 评论
Improve text classification accuracy based on classifier fusion methods
Improve text classification accuracy based on classifier fus...
收藏 引用
International Conference on Information Fusion
作者: Ali Danesh Behzad Moshiri Omid Fatemi Department of Elec. & Computer Engineering University of Tehran Tehran Iran Control & Intelligent Processing Center of Excellence University of Tehran Tehran Iran
Naive-Bayes and k-NN classifiers are two machine learning approaches for text classification. Rocchio is the classic method for text classification in information retrieval. Based on these three approaches and using c... 详细信息
来源: 评论
Parallel association rule mining based on FI-growth algorithm
Parallel association rule mining based on FI-growth algorith...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Bundit Manaskasemsak Nunnapus Benjamas Arnon Rungsawang Athasit Surarerks Putchong Uthayopas MIKE Laboratory Department of Computer Engineering Kasetsart University Bangkok Thailand HPCNC Laboratory Department of Computer Engineering Kasetsart University Bangkok Thailand Thai National Grid Center Software Industry Promotion Agency Ministry of Information and Communication Technology Thailand ELITE Laboratory Department of Computer Engineering Chulalongkom University Bangkok Thailand
Association rule mining is one of the most important techniques in data mining. It extracts significant patterns from transaction databases and generates rules used in many decision support applications. Many organiza... 详细信息
来源: 评论
DATA-ROBUST DESIGN OF PID CONTROLLERS VIA INTERVAL LINEAR PROGRAMMING
收藏 引用
IFAC Proceedings Volumes 2007年 第20期40卷 632-636页
作者: Sandipan Mitra L.H. Keel S.P. Bhattacharyya Department of Electrical & Computer Engineering Texas A&M University College Station TX USA Center of Excellence in Information Systems Tennessee State University Nashville TN USA
In this paper, the problem of finding the set of Proportional Integral Derivative (PID) controllers that can robustly stabilize a system based on its frequency response has been solved. The model of the system is not ... 详细信息
来源: 评论
A Web Database Security Model Using the Host Identity Protocol
A Web Database Security Model Using the Host Identity Protoc...
收藏 引用
International Symposium on Database engineering and Applications (IDEAS)
作者: Xueyong Zhu J. William Atwood Network Information Center University of Science and Technology Hefei Anhui China Department of Computer Science and Software Engineering Concordia University Montreal QUE Canada
Web database security is a very important issue in e-commerce. This paper presents a new Web database security model. It utilizes the host identity protocol (HIP), which is being defined by the IETF, and a proposed us... 详细信息
来源: 评论