咨询与建议

限定检索结果

文献类型

  • 32 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 39 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 27 篇 理学
    • 24 篇 数学
    • 10 篇 统计学(可授理学、...
    • 7 篇 生物学
    • 2 篇 物理学
    • 1 篇 化学
  • 27 篇 工学
    • 19 篇 计算机科学与技术...
    • 18 篇 软件工程
    • 6 篇 控制科学与工程
    • 5 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 建筑学
    • 2 篇 信息与通信工程
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 网络空间安全
  • 8 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 3 篇 教育学
    • 3 篇 教育学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 畜牧学
    • 1 篇 兽医学

主题

  • 6 篇 educational inst...
  • 4 篇 computer science
  • 4 篇 fuzzy sets
  • 4 篇 mathematics
  • 3 篇 engineering educ...
  • 3 篇 information scie...
  • 2 篇 learning systems
  • 2 篇 internet
  • 2 篇 intelligent cont...
  • 1 篇 theorem proving
  • 1 篇 neurons
  • 1 篇 presses
  • 1 篇 curriculum devel...
  • 1 篇 reconnaissance
  • 1 篇 surface topograp...
  • 1 篇 probes
  • 1 篇 decision support...
  • 1 篇 operating system...
  • 1 篇 delays
  • 1 篇 design optimizat...

机构

  • 6 篇 coll. of math. a...
  • 5 篇 coll. of math. a...
  • 3 篇 coll. of math. a...
  • 2 篇 university of wi...
  • 2 篇 coll. of math. a...
  • 2 篇 coll. of info. s...
  • 1 篇 machine learning...
  • 1 篇 red rocks commun...
  • 1 篇 coll. of math./i...
  • 1 篇 huanggang normal...
  • 1 篇 college of mathe...
  • 1 篇 infonnation coll...
  • 1 篇 department of co...
  • 1 篇 pre-baccalaureat...
  • 1 篇 coll. of eng. ma...
  • 1 篇 dept. of math. &...
  • 1 篇 sci. math. & sta...
  • 1 篇 penn. state univ...
  • 1 篇 college of mathe...
  • 1 篇 dept. of food an...

作者

  • 4 篇 wang xi-zhao
  • 3 篇 ha ming-hu
  • 2 篇 liu yian-kui
  • 2 篇 mi ju-sheng
  • 2 篇 liu baoding
  • 2 篇 masoom abulkhair
  • 2 篇 xu zhaodi
  • 2 篇 yuan fang
  • 2 篇 li jun-hua
  • 2 篇 yao bo
  • 2 篇 masoom fahmida
  • 2 篇 li jia
  • 2 篇 tian jing
  • 2 篇 wu wei-zhi
  • 2 篇 liu yan-kui
  • 1 篇 rives d.v.
  • 1 篇 feng hui-min
  • 1 篇 yang xiao-yi
  • 1 篇 fraser c
  • 1 篇 j.g. taylor

语言

  • 31 篇 英文
  • 6 篇 中文
  • 2 篇 其他
检索条件"机构=Coll. of Math. and Computer Science"
39 条 记 录,以下是1-10 订阅
排序:
Robust Stability of Uncertain Nonlinear Delay Segmentation System Based on Delay
Robust Stability of Uncertain Nonlinear Delay Segmentation S...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Sun Shan Ruliang Wang Sci. Math. & Stat. Coll. Guangxi Teachers Educ. Univ. Nanning China Computer and Information Engineering College Guangxi Teachers Education University Nanning Guangxi China
Based on Lyapunov-krasovskii functional method, delay ideological division. Delay first by constructing a new Lyapunov function, and then use the system range segmentation method is divided into N parts range, and int... 详细信息
来源: 评论
Texture synthesis based on compute unified device architecture
Texture synthesis based on compute unified device architectu...
收藏 引用
International Conference on Multimedia Technology
作者: Zhang, Zhifeng Wang, Wei Jin, Wenbiao Info. and Math. Dept. Hangzhou Dianzi University Hangzhou China Computer Science Dept. Chongqing Zhengda Soft. Poly. Coll. Chongqing China
Texture synthesis is important in producing computer-generated animation. In order to tackle the issue of poor efficiency of traditional serial point matching texture synthesis algorithm, we propose a parallel approac... 详细信息
来源: 评论
Subdivision for generating NURBS curves and quadrics
Subdivision for generating NURBS curves and quadrics
收藏 引用
International Conference on computer Application and System Modeling (ICCASM)
作者: Li-wen Han Tao Yu Hai-yan Xi Coll. of Math. & Inf. Sci. Hebei Normal University Shijiazhuang Hebei CN College of Mathematics and Information Science Hebei Normal University Shijiazhuang China
This paper discusses the subdivision of NURBS curves and quadrics based on matrix representation of NURBS curves. Binary and ternary subdivision rules of quadratic NURBS curves are obtained, error and computation amou... 详细信息
来源: 评论
Reconnaissance Scan Detection Heuristics to disrupt the pre-attack information gathering
Reconnaissance Scan Detection Heuristics to disrupt the pre-...
收藏 引用
International Conference on Network and Service Security, N2S
作者: J. Udhayan M. Muruga Prabu V. Aravinda Krishnan R. Anitha Dept of Mathematics and Computer Applications PSG College of Technology Coimbatore India Dept of Math. & Comput. Applic. PSG Coll. of Technol. Coimbatore India PSG College of Technology Coimbatore Tamil Nadu IN
Inception stage of devastating attacks like DDoS attacks and botnet hosted attacks includes compromising numerous computers or networks over the Internet. The Port scanning tools are often used by the attackers not on... 详细信息
来源: 评论
Decision Making Method Based on Projection of Hybrid Vector
Decision Making Method Based on Projection of Hybrid Vector
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Congjun Rao Huanbin Liu Chuanfeng Li Huanggang Normal University Huanggang Hubei CN Coll. of Math. & Inf. Sci. Huanggang Normal Univ. Huanggang Institute of Systems Engineering Huazhong University of Science and Technology Wuhan China
The problem of hybrid multi-attribute decision making with real number, interval number and fuzzy number, is studied. First of all, the hybrid vector and the projection of hybrid vector are defined, then a new decisio... 详细信息
来源: 评论
Grid computing in the undergraduate classroom topics, exercises and experiences  05
Grid computing in the undergraduate classroom topics, exerci...
收藏 引用
IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID)
作者: J. Machea A. Apon Dept. of Math. & Comput. Sci. Lewis & Clark Coll. Portland OR USA Computer Science and Computer Engineering University of Arkansas Fayetteville Arkansas USA
Grid protocols and technologies arc being adopted in a wide variety of academic, government, and industrial environments, and there is a growing body of research-oriented literature in grid computing. However, there i... 详细信息
来源: 评论
A new method of information extraction from PDF files
A new method of information extraction from PDF files
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Fang Yuan Bo Lu College of Information Science and Engineering Northeastern University Shenyang China College of Mathematics and Computer Science Hebei University Baoding P.R. China Hebei University Baoding Hebei CN Coll. of Math. & Comput. Sci. Hebei Univ. Baoding China
With the rapid increase of the PDF files in Internet, how to manage and search PDF files efficiently and quickly has become an urgent problem to be solved. The most important step of solving this problem is to extract... 详细信息
来源: 评论
Classification of nonoscillatory solutions of second order self-adjoint neutral difference equations
收藏 引用
Journal of Applied math.matics and Computing 2004年 第1-2期14卷 237-249页
作者: Liu, Yujun Liu, Zhaoshuang Zhang, Zhenguo Coll. of Math./Info. of Science Hebei Normal University Shijiazhuang 050016 China
Consider the second order self-adjoint neutral difference equation of form Δ(an|Δ(xn - pnx τ;n)|αsgnΔ(xn - p nxτn)) + f(n, xgn) = 0. In this paper, we will give the classification of nonoscillatory solutions of ... 详细信息
来源: 评论
On the independence of fuzzy vectors
On the independence of fuzzy vectors
收藏 引用
Proceedings of 2004 International Conference on Machine Learning and Cybernetics
作者: Liu, Yan-Kui Zhao, Miao Coll. of Math. and Computer Science Hebei University Baoding 071002 China
Fuzzy variable is a function from a possibility space to the real line. By analogy of the independence of random variables, there are similar terms for fuzzy variables such as unrelated fuzzy variables, noninteractive... 详细信息
来源: 评论
Multicriteria optimization problems in fuzzy random decision systems
Multicriteria optimization problems in fuzzy random decision...
收藏 引用
Proceedings of 2004 International Conference on Machine Learning and Cybernetics
作者: Liu, Yan-Kui Chen, Yan-Ju Coll. of Math. and Computer Science Hebei University Baoding 071002 China
This paper first presents multicriteria fuzzy random expected value models via expected value operators, and variance of fuzzy random variables. Then, three types of minimization (maximization) fuzzy random expected v... 详细信息
来源: 评论