咨询与建议

限定检索结果

文献类型

  • 612 篇 期刊文献
  • 587 篇 会议
  • 20 册 图书

馆藏范围

  • 1,219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 779 篇 工学
    • 550 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 140 篇 信息与通信工程
    • 95 篇 控制科学与工程
    • 87 篇 电气工程
    • 83 篇 生物工程
    • 60 篇 机械工程
    • 57 篇 电子科学与技术(可...
    • 54 篇 光学工程
    • 54 篇 生物医学工程(可授...
    • 41 篇 动力工程及工程热...
    • 29 篇 化学工程与技术
    • 25 篇 环境科学与工程(可...
    • 24 篇 安全科学与工程
    • 22 篇 仪器科学与技术
  • 419 篇 理学
    • 188 篇 数学
    • 120 篇 物理学
    • 96 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 29 篇 化学
    • 25 篇 大气科学
  • 212 篇 管理学
    • 134 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 59 篇 医学
    • 52 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
    • 23 篇 药学(可授医学、理...
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 25 篇 法学
  • 17 篇 教育学
  • 15 篇 农学
  • 6 篇 军事学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 40 篇 cloud computing
  • 38 篇 computational mo...
  • 25 篇 machine learning
  • 23 篇 deep learning
  • 22 篇 feature extracti...
  • 21 篇 training
  • 19 篇 reinforcement le...
  • 19 篇 computer archite...
  • 19 篇 semantics
  • 19 篇 artificial intel...
  • 18 篇 distributed comp...
  • 17 篇 laboratories
  • 16 篇 grid computing
  • 16 篇 resource managem...
  • 16 篇 accuracy
  • 15 篇 internet of thin...
  • 14 篇 quality of servi...
  • 14 篇 trajectory
  • 13 篇 learning systems
  • 13 篇 edge computing

机构

  • 51 篇 school of comput...
  • 39 篇 yunnan key labor...
  • 32 篇 laboratory schoo...
  • 29 篇 school of inform...
  • 24 篇 laboratory schoo...
  • 20 篇 institute for pl...
  • 19 篇 university of so...
  • 17 篇 department of as...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 17 篇 infn trento inst...
  • 16 篇 advanced technol...
  • 16 篇 king’s college l...
  • 16 篇 kamioka branch n...
  • 16 篇 the university o...
  • 16 篇 ligo laboratory ...
  • 16 篇 university of ma...
  • 16 篇 stony brook univ...

作者

  • 93 篇 buyya rajkumar
  • 56 篇 rajkumar buyya
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 ismail leila
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon
  • 17 篇 t. mcrae
  • 17 篇 a. parisi
  • 17 篇 s. rowan
  • 17 篇 s. m. aronson
  • 17 篇 v. p. mitrofanov
  • 17 篇 g. moreno
  • 17 篇 g. hemming
  • 17 篇 f. muciaccia
  • 17 篇 b. garaventa

语言

  • 1,158 篇 英文
  • 48 篇 其他
  • 13 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Cloud Computing and Distributed Systems Laboratory School of Computing and Information Systems"
1219 条 记 录,以下是981-990 订阅
排序:
Multifractal computation for nuclear classification and hepatocellular carcinoma grading
Multifractal computation for nuclear classification and hepa...
收藏 引用
10th IASTED International Conference on Biomedical Engineering, BioMed 2013
作者: Atupelage, Chamidu Nagahashi, Hiroshi Yamaguchi, Masahiro Kimura, Fumikazu Abe, Tokiya Hashiguchi, Akinori Sakamoto, Michiie Department of Computational Intelligence and Systems Science Tokyo Institute of Technology Japan Imaging Science and Engineering Laboratory Tokyo Institute of Technology Japan Global Scientific Information and Computing Center Tokyo Institute of Technology Japan Department of Pathology School of Medicine Keio University Japan
Hepatocellular carcinoma (HCC) is graded mainly based on the characteristics of liver cell nuclei. This paper proposes a textural feature descriptor and a novel computational method for classifying liver cell nuclei a... 详细信息
来源: 评论
A MapReduce-based distributed SVM ensemble for scalable image classification and annotation
A MapReduce-based distributed SVM ensemble for scalable imag...
收藏 引用
作者: Alham, Nasullah Khalid Li, Maozhen Liu, Yang Qi, Man Nuffield Division of Clinical Laboratory Sciences Radcliffe Department of Medicine University of Oxford OX3 9DU United Kingdom School of Engineering and Design Brunel University Uxbridge Middlesex UB8 3PH United Kingdom Key Laboratory of Embedded Systems and Service Computing Ministry of Education Tongji University China School of Electrical Engineering and Information Systems Sichuan University Chengdu 610065 China Department of Computing Canterbury Christ Church University Canterbury Kent CT1 1QU United Kingdom
A combination of classifiers leads to a substantial reduction of classification errors in a wide range of applications. Among them, support vector machine (SVM) ensembles with bagging have shown better performance in ... 详细信息
来源: 评论
Migrating into the cloud: Identifying the major security and privacy concerns
Migrating into the Cloud: Identifying the major security and...
收藏 引用
12th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2013
作者: Kalloniatis, Christos Manousakis, Vassilis Mouratidis, Haralambos Gritzalis, Stefanos Department of Cultural Technology and Communication University of the Aegean University Hill GR 81100 Mytilene Greece School of Architecture Computing and Engineering University of East London Docklands Campus 4-6 University Way E16 2RD London United Kingdom Information and Communication Systems Security Laboratory Department of Information and Communications Systems Engineering University of the Aegean GR 83200 Samos Greece
cloud computing is without a doubt one of the most significant innovations presented in the global technological map. The number of potential users enrolling and using cloud services increases exponentially on a daily... 详细信息
来源: 评论
Effect on generalization of using relational information in list-wise algorithms
Effect on generalization of using relational information in ...
收藏 引用
Joint International Conference on Pervasive computing and the Networked World, ICPCA/SWS 2012
作者: Chen, Guohua Tang, Yong Tang, Feiyi Ding, Shijin He, Chaobo School of Mathematical Sciences Souch China Normal University Guangzhou 510631 Guangdong China Shenzhen Engineering Laboratory for Mobile Internet Application Middleware Technology Shenzhen 518060 Guangdong China School of Computer Science Souch China Normal University Guangzhou 510631 Guangdong China School of Computing and Information Systems Univerisity of Melbourne VIC 3010 Australia
Learning to rank became a hot research topic in recent years and utilizing relational information in list-wise algorithms was discovered to be valuable and was widely adopted in various algorithms. These algorithms... 详细信息
来源: 评论
An empirical analysis of social interaction on tobacco-oriented social networks
An empirical analysis of social interaction on tobacco-orien...
收藏 引用
2013 International Conference for Smart Health, ICSH 2013
作者: Liang, Yunji Zheng, Xiaolong Zeng, Daniel Dajun Zhou, Xingshe Leischow, Scott School of Computer Science Northwestern Polytechnical University Xi'an China Department of Management Information System University of Arizona Tucson AZ United States State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences Beijing China Dongguan Research Institute of CASIA Cloud Computing Center Chinese Academy of Sciences Songshan Lake Dongguan China Mayo Clinic in Arizona Phoenix AZ United States
Social media is widely utilized in the tobacco control campaigns. It is a great challenge to evaluate the efficiency of tobacco control policies on social network sites and find gaps among tobacco-oriented social netw... 详细信息
来源: 评论
The role of trust in the development and adoption of cultural internet-based systems  10
The role of trust in the development and adoption of cultura...
收藏 引用
10th European, Mediterranean and Middle Eastern Conference on information systems - Transforming Societies: Managing the Change!, EMCIS 2013
作者: Pavlidis, Michalis Kavakli, Evangelia Bantimaroudis, Philemon Mouratidis, Haralambos Kalloniatis, Christos Gritzalis, Stefanos School of Architecture Computing and Engineering University of East London Docklands Campus 4-6 University Way LondonE16 2RD United Kingdom Cultural Informatics Laboratory Department of Cultural Technology and Communication University of the Aegean University Hill MytileneGR 81100 Greece Department of Cultural Technology and Communication University of the Aegean University Hill MytileneGR 81100 Greece School of Architecture Computing and Engineering University of East London Docklands Campus 4-6 University Way LondonE16 2RD United Kingdom Laboratory of Information and Communication Systems Security Department of Information and Communication Systems Engineering University of the Aegean Karlovassi SamosGR 83200 Greece
This paper examines the importance of trust factors in the development and adoption of internet based cultural information systems. The proposed trust model identifies the relationship between user communication goals... 详细信息
来源: 评论
Toward a Fully Automatic Learner Modeling Based on Web Usage Mining with Respect to Educational Preferences and Learning Styles
Toward a Fully Automatic Learner Modeling Based on Web Usage...
收藏 引用
International Conference on Advanced Learning Technologies (ICALT)
作者: Mohamed Koutheaïr Khribi Mohamed Jemni Olfa Nasraoui Sabine Graf Kinshuk Technologies of Information and Communication Laboratory Higher School of Sciences and Technologies of Tunis University of Tunis Tunisia Knowledge Discovery & Web Mining Laboratory Speed School of Engineering University of Louisville Louisville KY USA School of Computing and Information Systems Athabasca University Canada
In this paper, we describe a fully automatic learner modeling approach in learning management systems, taking into account learners' educational preferences including learning styles. We propose a learner model wi... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
Efficient public key cryptosystem resilient to key leakage c...
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论
Corrigendum to “A novel approach to collaborative testing in a crowdsourcing environment” in the Journal of systems and Software 86 (2013) 2143–2153
收藏 引用
Journal of systems and Software 2014年 87卷 137-137页
作者: Yuan-Hsin Tung Shian-Shyong Tseng Wei-Tek Tsai Department of Computer Science and Information Engineering National Chiao Tung University Taiwan ROC Telecommunication Laboratory Chunghwa Telecom Co. Ltd. Taiwan ROC Department of Applied Informatics and Multimedia Asia University Taiwan ROC School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ USA
来源: 评论
An Extensible Digital Library Service to Support Network Science
收藏 引用
Procedia Computer Science 2013年 18卷 419-428页
作者: S.M. Shamimul Hasan Keith Bisset Edward A. Fox Kevin Hall Jonathan P. Leidig Madhav V. Marathe Department of Computer Science Virginia Tech Blacksburg VA 24061 USA Network Dynamics and Simulation Science Laboratory VBI Virginia Tech Blacksburg VA 24061 USA School of Computing & Information Systems Grand Valley State University Allendale MI 49401 USA
Network science research aims to understand the underlying properties of complex networks. Large-scale modeling and simulation is the core of network science research. Existing systems take a long time to run large ne... 详细信息
来源: 评论