咨询与建议

限定检索结果

文献类型

  • 4,441 篇 会议
  • 1,747 篇 期刊文献
  • 44 册 图书

馆藏范围

  • 6,232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,555 篇 工学
    • 2,702 篇 计算机科学与技术...
    • 2,229 篇 软件工程
    • 933 篇 信息与通信工程
    • 618 篇 控制科学与工程
    • 478 篇 电气工程
    • 402 篇 生物工程
    • 353 篇 电子科学与技术(可...
    • 347 篇 生物医学工程(可授...
    • 267 篇 网络空间安全
    • 251 篇 动力工程及工程热...
    • 247 篇 光学工程
    • 221 篇 机械工程
    • 209 篇 安全科学与工程
    • 201 篇 化学工程与技术
    • 169 篇 仪器科学与技术
    • 165 篇 交通运输工程
  • 2,002 篇 理学
    • 1,024 篇 数学
    • 560 篇 物理学
    • 465 篇 生物学
    • 332 篇 统计学(可授理学、...
    • 229 篇 化学
    • 213 篇 系统科学
  • 1,064 篇 管理学
    • 645 篇 管理科学与工程(可...
    • 476 篇 图书情报与档案管...
    • 316 篇 工商管理
  • 414 篇 医学
    • 324 篇 临床医学
    • 309 篇 基础医学(可授医学...
    • 226 篇 公共卫生与预防医...
    • 182 篇 药学(可授医学、理...
  • 202 篇 法学
    • 163 篇 社会学
  • 116 篇 经济学
  • 105 篇 农学
  • 60 篇 教育学
  • 26 篇 文学
  • 15 篇 军事学
  • 7 篇 艺术学

主题

  • 332 篇 accuracy
  • 244 篇 deep learning
  • 198 篇 machine learning
  • 181 篇 feature extracti...
  • 177 篇 real-time system...
  • 171 篇 computational mo...
  • 165 篇 internet of thin...
  • 145 篇 convolutional ne...
  • 144 篇 predictive model...
  • 134 篇 support vector m...
  • 128 篇 training
  • 109 篇 optimization
  • 100 篇 security
  • 99 篇 cloud computing
  • 97 篇 technological in...
  • 97 篇 data models
  • 96 篇 artificial intel...
  • 90 篇 data mining
  • 87 篇 computer science
  • 87 篇 machine learning...

机构

  • 115 篇 lovely professio...
  • 109 篇 department of co...
  • 97 篇 department of co...
  • 77 篇 school of comput...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 47 篇 centre of resear...
  • 47 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 department of co...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 40 篇 lloyd law colleg...
  • 39 篇 chitkara univers...
  • 37 篇 key laboratory o...
  • 37 篇 beijing engineer...
  • 36 篇 the islamic univ...

作者

  • 53 篇 neeraj varshney
  • 42 篇 singh kamred udh...
  • 42 篇 varshney neeraj
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 30 篇 bibhuti bhusan d...
  • 29 篇 kumar rakesh
  • 29 篇 pan jeng-shyang
  • 28 篇 jian-ping li
  • 28 篇 tina babu
  • 28 篇 patra sudhansu s...
  • 27 篇 asha v.
  • 27 篇 kumar gaurav
  • 26 篇 teekam singh
  • 25 篇 sudhansu shekhar...
  • 24 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina

语言

  • 5,604 篇 英文
  • 593 篇 其他
  • 43 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering"
6232 条 记 录,以下是4931-4940 订阅
排序:
Maybe poor johnny really cannot encrypt - The case for a complexity theory for usable security  15
Maybe poor johnny really cannot encrypt - The case for a com...
收藏 引用
New Security Paradigms Workshop, NSPW 2015
作者: Benenson, Zinaida Lenzini, Gabriele Oliveira, Daniela Parkin, Simon Uebelacker, Sven Computer Science Department Friedrich-Alexander-Universität Erlangen-Nürnberg Germany Interdisciplinary Centre for Security Reliability and Trust University of Luxembourg Luxembourg Electrical and Computer Engineering Department University of Florida United States Department of Computer Science University College London London United Kingdom Security in Distributed Applications Hamburg University of Technology Germany
Psychology and neuroscience literature shows the existance of upper bounds on the human capacity for executing cognitive tasks and for information processing. These bounds are where, demonstrably, people start experie... 详细信息
来源: 评论
Observation of quantum equilibration in dilute Bose gases
收藏 引用
Physical Review A 2016年 第6期94卷 063603-063603页
作者: Linxiao Niu (牛临潇) Pengju Tang (唐鹏举) Baoguo Yang (杨保国) Xuzong Chen (陈徐宗) Biao Wu (吴飙) Xiaoji Zhou (周小计) School of Electronics Engineering and Computer Science Peking University Beijing 100871 China International Center for Quantum Materials School of Physics Peking University Beijing 100871 China Collaborative Innovation Center of Quantum Matter Beijing 100871 China Wilczek Quantum Center Department of Physics and Astronomy Shanghai Jiao Tong University Shanghai 200240 China Synergetic Innovation Center for Quantum Effects and Applications Hunan Normal University Changsha 410081 China
We investigate experimentally the dynamical relaxation of a nonintegrable quantum many-body system to its equilibrium state. A Bose-Einstein condensate is loaded into the first excited band of an optical lattice and l... 详细信息
来源: 评论
Improving latent factor models via personalized feature projection for one class recommendation  15
Improving latent factor models via personalized feature proj...
收藏 引用
24th ACM International Conference on Information and Knowledge Management, CIKM 2015
作者: Zhao, Tong McAuley, Julian King, Irwin Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute Chinese University of Hong Kong Shenzhen China Department of Computer Science and Engineering Chinese University of Hong Kong Shatin N.T. Hong Kong Department of Computer Science and Engineering UC San Diego San DiegoCA United States
Latent Factor models, which transform both users and items into the same latent feature space, are one of the most successful and ubiquitous models in recommender systems. Most existing models in this paradigm define ... 详细信息
来源: 评论
Fluid structure interaction in HPC multi-code coupling
Fluid structure interaction in HPC multi-code coupling
收藏 引用
作者: Cajas, J.C. Zavala, M. Houzeaux, G. Casoni, E. Vázquez, M. Moulinec, C. Fournier, Y. Computer Applications for Science and Engineering Barcelona Supercomputing Center Spain Scientific Computing Department Science and Technology Facilities Council Daresbury Laboratory Warrington United Kingdom Research and Development Électricité de France Chatou France
Fluid structure interaction (FSI) problems are of great interest in many applied fields such as aerodynamics, renewable energy generation, nuclear energy generation, vehicles design and biophysical systems research. T... 详细信息
来源: 评论
Foreword
Proceedings of the 2016 International Conference on Image Pr...
收藏 引用
Proceedings of the 2016 International Conference on Image Processing, computer Vision, and Pattern Recognition, IPCV 2016 2016年
作者: Abd-Wahab, Mohd Helmy Al-Bakry, Abbas Al-Holou, Nizar Arabnia, Hamid R. Bhattacharya, Mahua Martinez Castillo, Juan Jose Daimi, Kevin Deligiannidis, Leonidas Djoudi, Lamia Atma Duong, Trung Eshaghian-Wilner, Mary Mehrnoosh Gravvanis, George A. Huang, Ruizhu Jandieri, George Kim, Byung-Gyu Kim, Tai-hoon Korovin, Iakov Lai, Guoming Lee, Hyo Jong Bin Mansor, Muhammad Naufal Marsh, Andrew Mostafaeipour, Ali Park, James J. Patil, Shashikant Ponalagusamy, R. Schaefer, Gerald Singh, Akash Solo, Ashu M.G. Swee, Sim Kok Thomas, Jaya Tinetti, Fernando G. Vladimir, Hahanov Wang, Shiuh-Jeng Yang, Mary Yoe, Hyun You, Jane Zhao, Wenbing Department of Computer Engineering University Tun Hussein Onn Malaysia Malaysia University of IT and Communications Baghdad Iraq Electrical and Computer Engineering Department IEEE/SEM-Computer Chapter University of Detroit Mercy DetroitMI United States University of Georgia United States ABV Indian Institute of Information Technology and Management MHRD Government of India India Acantelys Alan Turing Nikola Tesla Research Group and GIPEB Universidad Nacional Abierta Venezuela Computer Science and Software Engineering Programs Department of Mathematics Computer Science and Software Engineering University of Detroit Mercy DetroitMI United States Department of Computer Information Systems Wentworth Institute of Technology BostonMA United States Synchrone Technologies France Rutgers University State University of New Jersey New Jersey United States University of Southern California California United States Electrical Engineering University of California Los Angeles Los Angeles [UCLA CA United States Advanced Scientific Computing Applied Math and Applications Research Group Applied Mathematics and Numerical Computing and Department of ECE School of Engineering Democritus University of Thrace Xanthi Greece Texas Advanced Computing Center University of Texas AustinTX United States Georgian Technical University Tbilisi Georgia Institute of Cybernetics Georgian Academy of Science Georgia Multimedia Processing CommunicationsLab.[MPCL Department of Computer Science and Engineering College of Engineering SunMoon University Korea Republic of School of Information and Computing Science University of Tasmania Australia Southern Federal University Russia Computer Science and Technology Sun Yat-Sen University Guangzhou China Center for Advanced Image and Information Technology Division of Computer Science and Engineering Chonbuk National University Korea Republic of Faculty of Engineering Technology Kampus Uniciti Alam Universiti Malaysia Perlis UniMAP Malaysi
来源: 评论
Exploiting game theoretic analysis for link recommendation in social networks  15
Exploiting game theoretic analysis for link recommendation i...
收藏 引用
24th ACM International Conference on Information and Knowledge Management, CIKM 2015
作者: Zhao, Tong Zhao, H. Vicky King, Irwin Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute Chinese University of Hong Kong Shenzhen China Department of Computer Science and Engineering Chinese University of Hong Kong Shatin N.T. Hong Kong Electrical and Computer Engineering Department University of Alberta EdmontonAB Canada
The popularity of Online Social Networks (OSNs) has attracted great research interests in different fields. In Economics, researchers use game theory to analyze the mechanism of network formation, which is called Netw... 详细信息
来源: 评论
Incremental updating approximations in confidential dominance relation based rough set
收藏 引用
Kongzhi yu Juece/Control and Decision 2016年 第6期31卷 1027-1031页
作者: Gou, Guang-Lei Wang, Guo-Yin School of Information Science and Technology Southwest Jiaotong University Chengdu610031 China Big Data Mining and Applications Center Chongqing Institute of Green and Intelligent Technology of Chinese Academy of Science Chongqing400714 China School of Computer Science and Engineering Chongqing University of Technology Chongqing400054 China
Confidential dominance relation based rough set is a model of incomplete ordered information processing, computation of approximations of which is a core issue. In real-life applications, the attribute set is dynamica... 详细信息
来源: 评论
An efficient cross-layer reliable retransmission scheme for the human body shadowing in IEEE 802.15.6-based wireless body sensor networks
An efficient cross-layer reliable retransmission scheme for ...
收藏 引用
Research in Adaptive and Convergent Systems, RACS 2015
作者: Tseng, Hsueh-Wen Wu, Yi-Zhang Wu, Ruei-Yu Chou, Shih-Chun Department of Computer Science and Engineering National Chung-Hsing University Taiwan Department of Management Information Systems Hwa Hsia University of Technology Taiwan Innovative DigiTech-Enabled Applications and Services Institute Institute for Information Industry Taiwan
Recently, wireless body area networks (WBANs) provide solutions for the aging population problem. IEEE 802.15.6 is able to achieve low complexity, low cost, high reliability, ultra-low power, and short range wireless ... 详细信息
来源: 评论
Ontology construction for explicit description of domain knowledge
Ontology construction for explicit description of domain kno...
收藏 引用
International Conference on Innovation Information in Computing Technologies (ICIICT)
作者: R. Mervin S. Murugesh A. Jaya Department of Computer Science and Engineering Research Scholar Department of Computer Applications Research Scholar Department of Computer Applications B.S. Abdur Rahman University Chennai Tamil Nadu India
In the modern era numerous information are available in the World Wide Web which makes it difficult to get the semantic information. Ontologies plays vital role after the evolution of the Semantic Web. Ontologies are ... 详细信息
来源: 评论
Large supports are required for well-supported nash equilibria
Large supports are required for well-supported nash equilibr...
收藏 引用
18th International Workshop on ApproximationAlgorithms for Combinatorial Optimization Problems, APPROX 2015, and 19th International Workshop on Randomization and Computation, RANDOM 2015
作者: Anbalagan, Yogesh Huang, Hao Lovett, Shachar Norin, Sergey Vetta, Adrian Wu, Hehui School of Computer Science McGill University Montreal Canada Institute for Mathematics and its Applications University of Minnesota Minneapolis United States Computer Science and Engineering Department University of California San Diego United States Department of Mathematics and Statistics McGill University Montreal Canada Department of Mathematics University of Mississippi University United States
We prove that for any constant k and any Ε © Yogesh Anbalagan, Hao Huang, Shachar Lovett, Sergey Norin, Adrian Vetta, and Hehui Wu.
来源: 评论