咨询与建议

限定检索结果

文献类型

  • 907 篇 会议
  • 450 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 811 篇 工学
    • 600 篇 计算机科学与技术...
    • 435 篇 软件工程
    • 130 篇 控制科学与工程
    • 123 篇 信息与通信工程
    • 61 篇 电气工程
    • 50 篇 电子科学与技术(可...
    • 48 篇 机械工程
    • 47 篇 安全科学与工程
    • 38 篇 生物医学工程(可授...
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 34 篇 生物工程
    • 28 篇 仪器科学与技术
    • 26 篇 化学工程与技术
    • 24 篇 材料科学与工程(可...
    • 18 篇 动力工程及工程热...
  • 488 篇 理学
    • 335 篇 数学
    • 81 篇 统计学(可授理学、...
    • 64 篇 物理学
    • 64 篇 系统科学
    • 45 篇 生物学
    • 25 篇 化学
  • 207 篇 管理学
    • 148 篇 管理科学与工程(可...
    • 86 篇 工商管理
    • 61 篇 图书情报与档案管...
  • 41 篇 经济学
    • 39 篇 应用经济学
  • 34 篇 医学
    • 26 篇 基础医学(可授医学...
    • 26 篇 临床医学
  • 28 篇 教育学
    • 22 篇 教育学
  • 25 篇 法学
    • 23 篇 社会学
  • 15 篇 农学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 35 篇 artificial intel...
  • 33 篇 safety
  • 31 篇 computer science
  • 28 篇 computer archite...
  • 28 篇 software
  • 23 篇 monitoring
  • 23 篇 hardware
  • 21 篇 computational mo...
  • 20 篇 application soft...
  • 18 篇 software enginee...
  • 18 篇 semantics
  • 17 篇 data models
  • 16 篇 optimization
  • 15 篇 reliability
  • 14 篇 programming prof...
  • 14 篇 system-on-chip
  • 14 篇 iec standards
  • 14 篇 standards
  • 13 篇 computer languag...
  • 13 篇 functional progr...

机构

  • 47 篇 department of ap...
  • 25 篇 department of co...
  • 18 篇 department of ap...
  • 17 篇 department of sy...
  • 17 篇 computer archite...
  • 15 篇 department of co...
  • 15 篇 department of co...
  • 13 篇 department of pr...
  • 13 篇 department of co...
  • 11 篇 department of ap...
  • 10 篇 technical univer...
  • 9 篇 department of co...
  • 9 篇 icas institute f...
  • 9 篇 department of ap...
  • 8 篇 institute for co...
  • 8 篇 department of co...
  • 8 篇 computer techniq...
  • 7 篇 department of ma...
  • 7 篇 department of pr...
  • 7 篇 chair for comput...

作者

  • 43 篇 josef börcsök
  • 34 篇 pal madhumangal
  • 30 篇 ali hayek
  • 22 篇 börcsök josef
  • 20 篇 madhumangal pal
  • 19 篇 gancheva veska
  • 17 篇 veska gancheva
  • 15 篇 börcsök j.
  • 15 篇 boercsoek josef
  • 15 篇 fritzson peter
  • 14 篇 hayek ali
  • 12 篇 mondal shyamal k...
  • 12 篇 maiti manoranjan
  • 12 篇 gurkan tuna
  • 12 篇 mostafa abotaleb
  • 11 篇 mariana arghir
  • 10 篇 tuna gurkan
  • 10 篇 xue jingling
  • 10 篇 roy abi zeid dao...
  • 9 篇 roy sankar kumar

语言

  • 1,293 篇 英文
  • 76 篇 其他
  • 8 篇 中文
  • 2 篇 俄文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Computer Programming "
1380 条 记 录,以下是831-840 订阅
排序:
A Bio-inspired Fuzzy Agent Clustering Algorithm for Search Engines
收藏 引用
Procedia computer Science 2011年 7卷 305-307页
作者: Radu D. Găceanu Department of Computer Science Babeş-Bolyai University Cluj-Napoca Romania Department of Programming Theory and Software Engineering Eötvös Loránd University Budapest Hungary
In general, web search engines respond to queries by returning a list of links to web pages that are considered relevant. However, these queries are often ambiguous or too general and the users end up browsing through... 详细信息
来源: 评论
A Performance Evaluation of the Turkish Banking Sector after the Global Crisis via CAMELS Ratios
收藏 引用
Procedia - Social and Behavioral Sciences 2011年 24卷 1530-1545页
作者: Hasan Dincer Gulsah Gencer Nazife Orhan Kevser Sahinbas Department of Banking and Finance Beykent University Istanbul 34500Turkey Department of Foreign Languages Beykent University Istanbul 34500Turkey Department of Computer Programming Beykent University Istanbul 34500Turkey
After the crisis in November 2000 and February 2001, an important structural change occurred in financial sector especially in terms of banking in Turkey. It was tried to revise flaws with structural regulations of ba... 详细信息
来源: 评论
Security Goals Assurance Based on Software Active Monitoring
Security Goals Assurance Based on Software Active Monitoring
收藏 引用
International Conference on Secure System Integration and Reliability Improvement, SSIRI
作者: Changzhi Zhao Wei Dong Martin Leucker Zhichang Qi Department of Computer Science National University of Defense Technology Changsha China Institute of Software Technology and Programming Languages University of Lübeck Germany
Access control is a vital security mechanism in today's operating systems, and the security policies dictating the security relevant behaviors is lengthy and complex, for example in Security-Enhanced Linux (SELinu... 详细信息
来源: 评论
The Significance of Emotional Intelligence on the Innovative Work Behavior of Managers as Strategic Decision-Makers
收藏 引用
Procedia - Social and Behavioral Sciences 2011年 24卷 909-919页
作者: Hasan Dincer Gulsah Gencer Nazife Orhan Kevser Sahinbas Department of Banking and Finance Beykent University Istanbul 34500Turkey Department of Foreign Languages Beykent University Istanbul 34500Turkey Department of Computer Programming Beykent University Istanbul 34500Turkey
In recent years, the importance of innovation and emotional intelligence on strategic decision making has increased owing to the dynamic changes in the global world. That is why; managers as strategic decision makers ... 详细信息
来源: 评论
Determining the Necessary Criteria for the EU Membership by Using the Machine Learning Method: 2005 - 2010 Period Analysis
收藏 引用
Procedia - Social and Behavioral Sciences 2011年 24卷 808-814页
作者: Furkan Diskaya Senol Emir Nazife Orhan Department of Operational Research Beykent University Istanbul 34500Turkey Department of Computer Programming Beykent University Istanbul 34500Turkey Department of Foreign Languages Beykent University Istanbul 34500Turkey
In recent years, providing the required criteria put forward for the full membership by the union is one of the prior targets of Turkey in the European Union full membership process. The objective of this study is to ... 详细信息
来源: 评论
Measuring the Technical Efficiency of Telecommunication Sector within Global Crisis: Comparison of G8 Countries and Turkey
收藏 引用
Procedia - Social and Behavioral Sciences 2011年 24卷 206-218页
作者: Furkan Diskaya Senol Emir Nazife Orhan Department of Operational Research Beykent University Istanbul 34500Turkey Department of Computer Programming Beykent University Istanbul 34500Turkey Department of Foreign Languages Beykent University Istanbul 34500Turkey
In recent years, there has been a fierce competition in the telecommunication sector. Technologic competition has made the competition in the sector a kind of strategic war. The sector of which role increased in terms... 详细信息
来源: 评论
The diameter of an interval graph is twice of its radius
收藏 引用
World Academy of Science, Engineering and Technology 2011年 80卷 1363-1368页
作者: Pramanik, Tarasankar Mondal, Sukumar Pal, Madhumangal Department of Applied Mathematics with Oceanology and Computer Programming Vidyasagar University Midnapore 721102 India Raja N. L. Khan Women's College Midnapore - 721102 India
In an interval graph G = (V,E) the distance between two vertices u, v is de£ned as the smallest number of edges in a path joining u and v. The eccentricity of a vertex v is the maximum among distances from all ot... 详细信息
来源: 评论
Towards safe data flow processing by integration of design by contract in deterministic UML activities
Towards safe data flow processing by integration of design b...
收藏 引用
XXII International Symposium on Information, Communication and Automation Technologies, ICAT
作者: Zamira Daw Marcus Vetter Josef Boercsoek Institute of Embedded Systems Hochschule Mannheim-University of Applied Sciences Mannheim Germany Department of Computer Architecture and System Programming University of Kassel Kassel Germany
Data flow processing is a common task of embedded systems which is usually modeled as a pipeline. Errors in a block of this pipeline can be propagated through it thus leading to unexpected and erroneous behaviors. For... 详细信息
来源: 评论
computer assisted determination of mandibular cystic lesion volume from computed tomographic data
Computer assisted determination of mandibular cystic lesion ...
收藏 引用
2011 1st Middle East Conference on Biomedical Engineering, MECBME 2011
作者: Nassef, Tamer M. Fliefel, Reham M. Marei, Mona K. Solouma, Nahed H. Kadah, Yasser M. Computer and Programming Engineering Dept. Misr. University for Science and Technology MUST 6th of October City Egypt Tissue Engineering Lab. Alexandria University Alexandria Egypt National Institute of Laser Science Cairo University Giza Egypt Biomedical Engineering Dept. Cairo University Giza Egypt
In this paper, a new approach for computing different anatomical regions in dental Computed Tomography (CT) is presented. The approach consists of two steps. First, a HU threshold window sets to separate between diffe... 详细信息
来源: 评论
The diameter of an interval graph is twice of its radius
收藏 引用
World Academy of Science, Engineering and Technology 2011年 56卷 1366-1371页
作者: Pramanik, Tarasankar Mondal, Sukumar Pal, Madhumangal Department of Applied Mathematics with Oceanology and Computer Programming Vidyasagar University Midnapore 721102 India Raja N. L. Khan Women's College Midnapore - 721102 India
In an interval graph G = (V,E) the distance between two vertices u, v is defined as the smallest number of edges in a path joining u and v. The eccentricity of a vertex v is the maximum among distances from all other ... 详细信息
来源: 评论