咨询与建议

限定检索结果

文献类型

  • 2,309 篇 会议
  • 1,838 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 4,167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,515 篇 工学
    • 1,536 篇 计算机科学与技术...
    • 1,246 篇 软件工程
    • 469 篇 信息与通信工程
    • 433 篇 控制科学与工程
    • 353 篇 电气工程
    • 291 篇 电子科学与技术(可...
    • 274 篇 光学工程
    • 269 篇 生物工程
    • 239 篇 生物医学工程(可授...
    • 164 篇 机械工程
    • 153 篇 化学工程与技术
    • 127 篇 动力工程及工程热...
    • 126 篇 仪器科学与技术
    • 113 篇 材料科学与工程(可...
    • 95 篇 安全科学与工程
    • 83 篇 交通运输工程
  • 1,521 篇 理学
    • 667 篇 数学
    • 577 篇 物理学
    • 323 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 185 篇 系统科学
    • 177 篇 化学
  • 568 篇 管理学
    • 357 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 176 篇 工商管理
  • 255 篇 医学
    • 221 篇 临床医学
    • 178 篇 基础医学(可授医学...
    • 102 篇 药学(可授医学、理...
    • 87 篇 公共卫生与预防医...
  • 97 篇 法学
    • 73 篇 社会学
  • 61 篇 教育学
  • 59 篇 经济学
  • 45 篇 农学
  • 20 篇 军事学
  • 15 篇 文学
  • 8 篇 艺术学

主题

  • 138 篇 software enginee...
  • 97 篇 computer science
  • 71 篇 machine learning
  • 64 篇 neural networks
  • 63 篇 deep learning
  • 62 篇 feature extracti...
  • 59 篇 application soft...
  • 59 篇 control systems
  • 54 篇 optimization
  • 53 篇 computational mo...
  • 52 篇 accuracy
  • 49 篇 computer archite...
  • 47 篇 artificial intel...
  • 46 篇 predictive model...
  • 46 篇 humans
  • 45 篇 software testing
  • 45 篇 costs
  • 43 篇 testing
  • 42 篇 pattern recognit...
  • 41 篇 image segmentati...

机构

  • 89 篇 university of ch...
  • 67 篇 iccub universita...
  • 65 篇 department of ph...
  • 65 篇 universiteit maa...
  • 64 篇 hangzhou institu...
  • 63 篇 excellence clust...
  • 62 篇 infn sezione di ...
  • 62 篇 horia hulubei na...
  • 61 篇 van swinderen in...
  • 61 篇 school of physic...
  • 60 篇 physics and micr...
  • 60 篇 ds4ds la salle u...
  • 59 篇 massachusetts in...
  • 59 篇 infn sezione di ...
  • 59 篇 infn sezione di ...
  • 58 篇 h.h. wills physi...
  • 58 篇 infn sezione di ...
  • 57 篇 university of ma...
  • 57 篇 cavendish labora...
  • 56 篇 warsaw

作者

  • 65 篇 beiter a.
  • 65 篇 barter w.
  • 65 篇 brundu d.
  • 65 篇 bellee v.
  • 58 篇 ao d.
  • 57 篇 bobulska d.
  • 56 篇 aliouche z.
  • 56 篇 blake t.
  • 56 篇 andersson m.
  • 56 篇 borsato m.
  • 56 篇 betancourt c.
  • 56 篇 belin s.
  • 56 篇 afsharnia h.
  • 56 篇 carus l.
  • 56 篇 barbetti m.
  • 56 篇 beck a.
  • 56 篇 cali s.
  • 55 篇 casse g.
  • 55 篇 amato s.
  • 55 篇 baryshnikov f.

语言

  • 3,665 篇 英文
  • 455 篇 其他
  • 44 篇 中文
  • 2 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Center of Excellence in Software Engineering Department of Computer Engineering"
4167 条 记 录,以下是3561-3570 订阅
排序:
Medical Data Mining using Particle Swarm Optimization for Temporal Lobe Epilepsy
Medical Data Mining using Particle Swarm Optimization for Te...
收藏 引用
Congress on Evolutionary Computation
作者: M. Ghannad-Rezaie H. Soltanain-Zadeh M.-R. Siadat K.V. Elisevich Henry Ford Health System and Wayne State University Detroit MI USA Radiology Image Analysis Laboratory Henry Ford Health System Detroit MI USA Control and Intelligent Processing Center of Excellence School of Electrical and Computer Engineering University of Tehran Tehran Iran Neurosurgery Department Henry Ford Health System Detroit MI USA
In clinical problems, numerous factors are usually involved in a medical syndrome. New advances in medicine provide a broad range of diagnosis methods to cover all aspects of a disease. However, huge amounts of raw in... 详细信息
来源: 评论
A Study of Traffic Survivability Under Malicious Attacks
A Study of Traffic Survivability Under Malicious Attacks
收藏 引用
IEEE Sarnoff Symposium
作者: Yen-Hung Hu Mira Yun Debra Tang Hyeong-Ah Choi Department of Computer Science Hampton University Hampton VA USA Department of Computer Science George Washington University Washington D.C. DC USA Software Engineering Center U.S. Army Cecom Belvoir VA USA
As the Internet becomes more mature and a part of our daily life, the management of its resources to provide guaranteed services is crucial and beyond the capability of every individual network domain. How to maintain... 详细信息
来源: 评论
Exploiting ebXML registry semantic constructs for handling archetype metadata in healthcare informatics
收藏 引用
International Journal of Metadata, Semantics and Ontologies 2006年 第1期1卷 21-36页
作者: Dogac, Asuman Laleci, Gokce B. Kabak, Yildiray Unal, Seda Heard, Sam Beale, Thomas Elkin, Peter L. Najmi, Farrukh Mattocks, Carl Webber, David Kernberg, Martin Software Research and Development Center Computer Engineering Department Middle East Technical University Ankara Turkey Ocean Informatics Australia Department of Health Informatics Central Queensland University Australia CHIME University College London United Kingdom United States Department of Medicine Mayo Clinic College of Medicine United States Sun Microsystems Inc. United States CHECKMi NJ United States OASIS CAM TC Washington DC United States UCSF Stanford Medical Informatics Project United States Department of Medicine University of California San Francisco United States
Using archetypes is a promising approach in providing semantic interoperability among healthcare systems. To realise archetype based interoperability, the healthcare systems need to discover the existing archetypes, b... 详细信息
来源: 评论
A possibilistic petri-nets-based service matchmaker for multi-agents system architecture
收藏 引用
International Journal of Fuzzy Systems 2005年 第4期7卷 199-213页
作者: Lee, Jonathan Wang, Yao-Chiang Wu, Chia-Ling Lee, Shin-Jie Ma, Shung-Pin Deng, Whan-Yo Department of Computer Science and Information Engineering National Central University Taoyuan 320 Taiwan Taiwan Taiwan Software Research Center NCU Taiwan Taiwan Software Engineering Association Taiwan IEEE Computer Society Taiwan ACM Taiwan Department of Computer Science and Information Engineering National Central University Taiwan
The focus of this paper is to devise a service-oriented architecture for multi-agents system (called SAM), to reach a wide adoption and routine use of agents, web services, and semantic web technologies. In order to b... 详细信息
来源: 评论
Evolutionary agents for intelligent transport systems
收藏 引用
International Journal of Fuzzy Systems 2005年 第2期7卷 85-93页
作者: Kuo, Jong Yih Lee, Shin Jie Wu, Chia Ling Hsueh, Nien Lin Lee, Jonathan Department of Computer Science and Information Engineering Fu Jen Catholic University HsinChuang 242 Taipei Taiwan Software Engineering Laboratory Department of Computer Science and Information Engineering Fu Jen Catholic University Taiwan Taiwan Department of Computer Science and Information Engineering National Central University Taiwan Department of Information Engineering and Computer Science Feng Chia University Taiwan Taiwan Office of Information Technology Feng Chia University Taiwan Taiwan Taiwan Software Research Center NCU Taiwan Software Engineering Association Taiwan IEEE Computer Society ACM
When agents are initially created, they have little knowledge and experience with relatively low capability. They strive to adapt themselves to the changing environment. It is an advantage if they have the ability to ... 详细信息
来源: 评论
Coverage-directed test generation with model checkers: Challenges and opportunities
Coverage-directed test generation with model checkers: Chall...
收藏 引用
29th Annual International computer software and Applications Conference, COMPSAC 2005
作者: Devaraj, George Heimdahl, Mats P. E. Liang, Donglin Department of Computer Science and Engineering University of Minnesota Software Engineering Center University of Minnesota
When using tools to automatically generate tests-suites from a specification, the selection of coverage criterion that guides the generation process is of imperative importance. In a previous study that evaluated test... 详细信息
来源: 评论
Meeting the Information Assurance Crisis in the U.S. Now
收藏 引用
EDPACS 2006年 第6期28卷 1-14页
作者: Corey Schou Deborah Frincke Charles Reynolds James Frost The Associate Dean of Information Systems Programs at Idaho State University (ISU) in Pocatello and the director of the Center for Decision Support. Currently he serves as the Chair of the National Colloquium on Information System Security Education. Schou also directs the ISU National Center of Excellence in Information Assurance Education and the ISU Technology Innovation Center. Contact Corey Schou one of the authors of this article and the Chair of the NCISSE by email at Schou@*** for help in finding additional ways to address the issues raised in this article. A member of the University of Idaho College of Engineering faculty. She graduated from the University of California at Davis. Frincke is the co-director and co-founder of the university's Center for Secure and Dependable Software (CSDS). She was the program chair for the 2nd International Workshop on Recent Advances in Intrusion Detection (RAID). A professor of Computer Science at the College of Integrated Science and Technology at James Madison University in Harrisonburg Virginia. He holds a Ph.D. in computer science from the University of Texas at Austin and a BA in philosophy from the University of Houston. Reynolds is the Director of Information System Security Education at James Madison University. Since 1997 Reynolds has led the development of the first remote Internet-based curriculum that leads to an M.S. degree in computer science with a concentration in information security. Thus far 160 students have completed this program. A professor of computer information systems at Idaho State University and the manager of its Simplot Decision Support Center.
T he only difference etween evolution and revolution is the speed at which each occurs.
来源: 评论
Kinematics modeling of a wheel-based Pole Climbing Robot (UT-PCR)
Kinematics modeling of a wheel-based Pole Climbing Robot (UT...
收藏 引用
2005 IEEE International Conference on Robotics and Automation
作者: Baghani, Ali Nili Ahmadabadi, Majid Harati, Ahad Control and Intelligent Processing Center of Excellence Department of Electrical and Computer Engineering University of Tehran
This paper is concerned with the derivation of the kinematics model of the University of Tehran-Pole Climbing Robot (UT-PCR). As the first step, an appropriate set of coordinates is selected and used to describe the s... 详细信息
来源: 评论
Malfunction detection in multi-cylinder engines using wavelet packet dictionary
Malfunction detection in multi-cylinder engines using wavele...
收藏 引用
SAE 2005 Noise and Vibration Conference and Exhibition
作者: Tafreshi, R. Sassani, F. Ahmadi, H. Dumont, G. Department of Mechanical Engineering Canada Department of Electrical and Computer Engineering University of British Colombia Vancouver BC Canada Department of Electrical and Computer Engineering University of Tehran Center of Excellence in Intelligent Signal Processing Iran
In this paper, wavelets as signal processing tools are used to analyze the acceleration data acquired at the cylinder head for the detection and characterization of combustion malfunctions in multi-cylinder industrial... 详细信息
来源: 评论
Fuzzy contributive games: An extension to the game of civic duty
Fuzzy contributive games: An extension to the game of civic ...
收藏 引用
ICTAI 2005: 17th IEEE International Conference on Tools with Artificial Intelligence, ICTAI'05
作者: Danak, Amir Kian, Ashkan Rahimi Control and Intelligent Processing Center of Excellence Department of Electrical and Computer Engineering University of Tehran Tehran Iran
Game theory deals with decision-making processes involving two or more parties with partly or completely conflicting interests. The players involved in the game usually make their decisions under conditions of risk or... 详细信息
来源: 评论