咨询与建议

限定检索结果

文献类型

  • 3,469 篇 会议
  • 1,267 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,766 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,708 篇 工学
    • 2,097 篇 计算机科学与技术...
    • 1,727 篇 软件工程
    • 758 篇 信息与通信工程
    • 511 篇 控制科学与工程
    • 388 篇 电气工程
    • 329 篇 生物工程
    • 296 篇 生物医学工程(可授...
    • 287 篇 电子科学与技术(可...
    • 238 篇 网络空间安全
    • 197 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 186 篇 安全科学与工程
    • 167 篇 机械工程
    • 154 篇 化学工程与技术
    • 138 篇 交通运输工程
    • 124 篇 材料科学与工程(可...
  • 1,520 篇 理学
    • 763 篇 数学
    • 404 篇 物理学
    • 384 篇 生物学
    • 264 篇 统计学(可授理学、...
    • 178 篇 化学
    • 170 篇 系统科学
  • 868 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 388 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 360 篇 医学
    • 280 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 202 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 175 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 91 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 286 篇 accuracy
  • 203 篇 deep learning
  • 171 篇 machine learning
  • 156 篇 real-time system...
  • 152 篇 internet of thin...
  • 144 篇 feature extracti...
  • 140 篇 computational mo...
  • 138 篇 convolutional ne...
  • 120 篇 predictive model...
  • 112 篇 support vector m...
  • 112 篇 training
  • 95 篇 optimization
  • 88 篇 security
  • 85 篇 data models
  • 83 篇 artificial intel...
  • 80 篇 cloud computing
  • 80 篇 technological in...
  • 75 篇 machine learning...
  • 72 篇 data mining
  • 68 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 110 篇 department of co...
  • 100 篇 department of co...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 4,285 篇 英文
  • 463 篇 其他
  • 25 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering Department"
4766 条 记 录,以下是4211-4220 订阅
排序:
Multi-stage AUV-aided localization for underwater wireless sensor networks
Multi-stage AUV-aided localization for underwater wireless s...
收藏 引用
25th IEEE International Conference on Advanced Information Networking and applications Workshops, WAINA 2011
作者: Waldmeyer, Marc Tan, Hwee-Pink Seah, Winston K.G. Networking Protocols Department Institute for Infocomm Research Singapore Singapore Laboratory for Computer Communications and Applications EPFL Switzerland School of Engineering and Computer Science Victoria University Wellington New Zealand
Underwater Wireless Sensor Networks (UWSNs) are expected to support a variety of civilian and military applications. Sensed data can only be interpreted meaningfully when referenced to the location of the sensor, maki... 详细信息
来源: 评论
Combinatorial approach of association rule mining in software engineering
Combinatorial approach of association rule mining in softwar...
收藏 引用
2011 International Conference on Software engineering, CONSEG 2011
作者: Chaudhari, Narendra S. Pal, P.R. Pawar, Shweta India Department of Computer Science and Engineering Indian Institute of Technology Indore M.P. India Dept. of Computer Science and Applications Shri Vaishnav Institute of Management Indore M.P. India
Classification based on association rule mining aims to establish a model based on association rules, to classify an unknown object efficiently. In Software engineering it improves software productivity and quality;so... 详细信息
来源: 评论
Enhanced Adaptive data cache invalidation approach for mobile ad hoc network
Enhanced Adaptive data cache invalidation approach for mobil...
收藏 引用
International Conference on Electronic computer Technology
作者: Fatima, N. Sabiyath Khader, P. Sheik Abdul Department of Computer Science and Engineering B.S. Abdur Rahman University Chennai Tamil Nadu India Department of Computer Applications B.S. Abdur Rahman University Chennai Tamil Nadu India
A mobile ad-hoc network (MANET) is a collection of mobile nodes communicating within a transmission range and it is a self-configuring network of mobile routers. The concept of caching frequently accessed data provide... 详细信息
来源: 评论
Using NEM relay to improve 3DIC cost efficiency
Using NEM relay to improve 3DIC cost efficiency
收藏 引用
2011 IEEE International 3D Systems Integration Conference, 3DIC 2011
作者: Zhang, Tao Sun, Guangyu Department of Computer Science and Engineering Pennsylvania State University PA 16802 United States Center for Energy-efficient Computing and Applications Peking University Beijing 100871 China
This paper investigates the integration of Nanoelectromechanical (NEM) relays on top of TSVs, to reduce area overhead and also enable possible novel architecture design. NEM relay is used in this work to reduce the co... 详细信息
来源: 评论
Meetings through the cloud: Privacy-preserving scheduling on mobile devices
Meetings through the cloud: Privacy-preserving scheduling on...
收藏 引用
作者: Bilogrevic, Igor Jadliwala, Murtuza Kumar, Praveen Walia, Sudeep Singh Hubaux, Jean-Pierre Aad, Imad Niemi, Valtteri Laboratory for Communications and Applications 1 EPFL CH 1015 Lausanne Switzerland Department of Computer Science and Engineering IIT Kharagpur India Nokia Research Center Lausanne Switzerland
Mobile devices are increasingly being used to store and manage users' personal information, as well as to access popular third-party context-based services. Very often, these applications need to determine common ... 详细信息
来源: 评论
Comparing predictive power in climate data: Clustering matters
Comparing predictive power in climate data: Clustering matte...
收藏 引用
Lecture Notes in computer science
作者: Steinhaeuser, Karsten Chawla, Nitesh V. Ganguly, Auroop R. Department of Computer Science and Engineering Interdisciplinary Center for Network Science and Applications University of Notre Dame Notre Dame IN 46556 United States Computational Sciences and Engineering Division Oak Ridge National Laboratory Oak Ridge TN 37831 United States
Various clustering methods have been applied to climate, ecological, and other environmental datasets, for example to define climate zones, automate land-use classification, and similar tasks. Measuring the "good... 详细信息
来源: 评论
An extended method for recognition of broken typewritten characters special reference to Tamil script
An extended method for recognition of broken typewritten cha...
收藏 引用
2nd IEEE International Conference on Open Systems, ICOS 2011
作者: Abubacker, Nirase Fathima Gandhi, Raman Indra School of Information Technology City University College of Science and Technology Kuala Lumpur Malaysia Department of Computer Applications G.K.M College of Engineering and Technology Tamil Nadu India
Preparing clean and clear images for the recognition engines is often taken for granted as a trivial task that requires little attention. Most of the existing OCRs have been designed in such a way that which correctly... 详细信息
来源: 评论
25.1: Luminance Probes for Contrast Measurements in Medical Displays
收藏 引用
SID Symposium Digest of Technical Papers 2012年 第1期34卷
作者: Aldo Badano Scott Pappada Edward F. Kelley Michael J. Flynn Sandrine Martin Jerzy Kanicki Medical Imaging and Computer Applications Branch Center for Devices and Radiological Health U.S. Food and Drug Administration Department of Biomedical Engineering Marquette University Electricity Division Electronics and Electrical Engineering Laboratory Technology Administration U.S. Department of Commerce Department of Radiology Henry Ford Health System Department of Electrical Engineering and Computer Science University of Michigan
We report on a comparative study that examines four conic luminance probes in their ability to measure small-spot display contrast. We performed linear scans of a slit using a computer-controlled stage. We found that,...
来源: 评论
A metric suite for early estimation of software testing effort using requirement engineering document and its validation
A metric suite for early estimation of software testing effo...
收藏 引用
International Conference on computer and Communication Technology (ICCCT)
作者: Ashish Sharma Dharmender Singh Kushwaha Department of Computer Engineering & Applications GLA University Mathura India India Department of Computer Science & Engineering MNNIT Allahabad India
Software testing is one of the most important and critical activity of software development life cycle which ensures software quality and directly influences the development cost and success of the software. This pape... 详细信息
来源: 评论
Exploring the vulnerability of CMPs to soft errors with 3D stacked non-volatile memory
Exploring the vulnerability of CMPs to soft errors with 3D s...
收藏 引用
29th IEEE International Conference on computer Design 2011, ICCD 2011
作者: Sun, Guangyu Kursun, Eren Rivers, Jude A. Xie, Yuan Center for Energy-Efficient Computing and Applications Peking University China IBM Thomas J. Watson Research Center United States Computer Science and Engineering Department Pennsylvania State University United States
Spin-transfer Torque Random Access Memory (STT-RAM) emerges for on-chip memory in microprocessor architectures. Thanks to the magnetic field based storage STT-RAM cells have immunity to radiation induced soft errors t... 详细信息
来源: 评论