咨询与建议

限定检索结果

文献类型

  • 2,436 篇 会议
  • 1,338 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,811 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,329 篇 工学
    • 1,666 篇 计算机科学与技术...
    • 1,363 篇 软件工程
    • 637 篇 信息与通信工程
    • 385 篇 控制科学与工程
    • 301 篇 生物工程
    • 300 篇 电气工程
    • 230 篇 生物医学工程(可授...
    • 225 篇 电子科学与技术(可...
    • 184 篇 光学工程
    • 167 篇 网络空间安全
    • 162 篇 机械工程
    • 139 篇 化学工程与技术
    • 132 篇 安全科学与工程
    • 117 篇 动力工程及工程热...
    • 110 篇 交通运输工程
    • 105 篇 仪器科学与技术
  • 1,362 篇 理学
    • 609 篇 数学
    • 478 篇 物理学
    • 328 篇 生物学
    • 216 篇 统计学(可授理学、...
    • 161 篇 化学
    • 113 篇 系统科学
  • 705 篇 管理学
    • 442 篇 管理科学与工程(可...
    • 297 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 220 篇 医学
    • 163 篇 临床医学
    • 161 篇 基础医学(可授医学...
    • 113 篇 公共卫生与预防医...
    • 94 篇 药学(可授医学、理...
  • 130 篇 法学
    • 108 篇 社会学
  • 69 篇 经济学
  • 66 篇 农学
  • 37 篇 教育学
  • 34 篇 文学
  • 20 篇 军事学
  • 5 篇 艺术学
  • 1 篇 哲学

主题

  • 173 篇 accuracy
  • 141 篇 deep learning
  • 106 篇 feature extracti...
  • 100 篇 hadron colliders
  • 100 篇 machine learning
  • 89 篇 computational mo...
  • 88 篇 training
  • 85 篇 convolutional ne...
  • 73 篇 real-time system...
  • 67 篇 support vector m...
  • 63 篇 predictive model...
  • 61 篇 artificial intel...
  • 57 篇 optimization
  • 53 篇 internet of thin...
  • 50 篇 reliability
  • 47 篇 cloud computing
  • 46 篇 genetic algorith...
  • 46 篇 data models
  • 44 篇 semantics
  • 44 篇 security

机构

  • 132 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 127 篇 university of sp...
  • 127 篇 indian institute...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 124 篇 università di to...
  • 124 篇 academy of scien...
  • 124 篇 charles universi...
  • 124 篇 infn sezione di ...
  • 123 篇 department of ph...
  • 122 篇 zhejiang univers...
  • 122 篇 irfu cea univers...
  • 121 篇 infn sezione di ...
  • 120 篇 university of de...
  • 120 篇 department of ph...
  • 118 篇 imperial college...
  • 118 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 2,961 篇 英文
  • 810 篇 其他
  • 46 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science Engineering and Application"
3811 条 记 录,以下是3181-3190 订阅
排序:
A DNA-based cryptosystem with length-fixed sticker model
收藏 引用
Journal of Computational and Theoretical Nanoscience 2015年 第12期12卷 5421-5424页
作者: Lin, Xuheng Ming, Zhong Guo, Ju Yan, Zhixiang Tan, Rendy Sun, Heng Department of Computer Science Jinan University Guangzhou510632 China Shenzhen Engineering Laboratory for Mobile Internet Application Middleware Technology Shenzhen University Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Institute of Urology Nanchang University Nanchang330006 China China National Genebank Shenzhen518083 China
As the computing power of computers is developed faster and faster nowadays, the traditional cryptosystems are challenged. In this paper, the traditional sticker model is modified to design a new cryptosystem. As a no... 详细信息
来源: 评论
Erasure Correcting Code to Optimize Partial Stripe Write in Raid-6
Erasure Correcting Code to Optimize Partial Stripe Write in ...
收藏 引用
2nd International Conference on Communication Technology(ICCT 2015)
作者: Ghulam Muhammad Shaikh Jiaqing Qu Quanxin Zhang Yu-an Tan Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Shanghai Radio Equipment Research Institute
In Large Scale database system storage system, Raid 6 is to be used to tolerate failure disks and provide high reliability with the support of different codes. In large system there is no any risk of data loss or disk... 详细信息
来源: 评论
User Profiling for Energy Optimisation in Mobile Cloud Computing
收藏 引用
Procedia computer science 2015年 52卷 1159-1165页
作者: Elhadj Benkhelifa Thomas Welsh Loai Tawalbeh Yaser Jararweh Anas Basalamah Cloud Computing and Application Research Lab Staffordshire University Beaconside Stafford ST18 0AD UK Computer Engineering Department Umm-Alqura University Makkah Saudi Arabia Jordan University of Science and Technology Irbid Jordan
Both mobile and cloud computing are two areas which are rapidly expanding in terms of use case and *** mobile and cloud computing are two areas which are rapidly expanding in terms of use case and functionality. This ... 详细信息
来源: 评论
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud
Efficient Searchable Symmetric Encryption for Storing Multip...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Chang Liu Liehuang Zhu Jinjun Chen Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Beijing China Faculty of Engineering and Information Technology University of Technology Sydney NSW Australia
Cloud computing has greatly facilitated large-scale data outsourcing due to its cost efficiency, scalability and many other advantages. Subsequent privacy risks force data owners to encrypt sensitive data, hence makin... 详细信息
来源: 评论
To study the architectural designs of a proposed comprehensive software extractor for reengineering tool: A literature survey
To study the architectural designs of a proposed comprehensi...
收藏 引用
International Conference on Advanced Computing, Networking and Informatics, ICACNI 2013
作者: Yadav, Rashmi Kothari, Abhay Patel, Ravindra Department of Computer Science Engineering Acropolis Technical Campus Indore India Department of Computer Science Engineering SIMS Indore India Department of Computer Application RGTU Bhopal India
Software is a critical issue nowadays. The selection and design suitable technique/process/method for maintenance phase for the same, we required suitable reengineering tool and technique, extractor one of the most im... 详细信息
来源: 评论
A fuzzy-rough set based ontology for hybrid recommendation
A fuzzy-rough set based ontology for hybrid recommendation
收藏 引用
IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)
作者: Hsun-Hui Huang Horng-Chang Yang Eric Hsueh-Chan Lu Dept. of Information Application and Management Tajen University Taiwan Dept. of Computer science and information engineering National Taitung University Dept. of Geomatics National Cheng Kung University Taiwan
In the paper, a novel ontology-based recommendation model based on a fuzzy-rough hybrid mechanism is proposed. This model integrates the principles of both content-based and collaborative filtering recommender systems... 详细信息
来源: 评论
Context-aware computing for smart home environment
收藏 引用
Journal of Computational Information Systems 2015年 第15期11卷 5453-5460页
作者: Liu, Li Fu, Xiaodong Liu, Lijun Huang, Qingsong Yunnan Provincial Key Laboratory of Computer Technology Application Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming China State-Province Joint Laboratory of Digital Home Interactive Applications School of Information Science & Technology Sun Yat-sen University Guangzhou China
Context-aware computing has proven to be successful in collecting and understanding various sensor data. However, providing an intelligent service by exploiting the collected context data from heterogeneous sensors is... 详细信息
来源: 评论
Research on the Wisdom Campus System of Higher Vocational College based on Internet of Things Technology
Research on the Wisdom Campus System of Higher Vocational Co...
收藏 引用
International Symposium on Computational Intelligence and Design
作者: Wenzhi Liu Zhaobin Liu Ligang Fang Caidong Gu Jiangsu Province Support Software Engineering R&D Center for Modern Information Technology Application in Enterprise Suzhou Jiangsu China Department of Computer Science Suzhou Vocational University Suzhou Jiangsu China
With the development of Internet of things technology and cloud technology, the Internet of things technology has been used in all walks of life, the informatization construction of higher vocational colleges is devel... 详细信息
来源: 评论
Code based community network for identifying low risk community
Code based community network for identifying low risk commun...
收藏 引用
International Conference on (ISCO) Intelligent Systems and Control
作者: S. Saravanan A. Sabari M. Geetha Quin priyanka Department of Computer Science & Engineering Dhirajlal Gandhi College of Technology Salem Department of IT K. S. Rangasamy College of Technology (Autonomous) Tiruchengode Department of Master of Computer Application Sona College of Technology Salem Sona College of Technology Salem-5
The modern day approach in boulevard network centers on efficient factor in safe routing. The safe routing must follow up the low risk cities. The troubles in routing are a perennial one confronting people day in and ... 详细信息
来源: 评论
Energy optimization for wireless sensor networks using a novel dynamic multicast routing protocol
收藏 引用
Research Journal of Applied sciences, engineering and Technology 2014年 第3期8卷 305-311页
作者: Senthil Kumar, M. Chaturvedi, Ashish Department of Computer Science and Engineering Monad University Hapur Utter Pradesh India Arni School of Computer Science and Application Arni University Indora (Kathgarh) Himachal Pradesh India
Minimization of energy consumption has always been the predominant factor deciding the acceptability of a routing protocol for wireless ad-hoc networks. In this study we have proposed a novel efficient multicast routi... 详细信息
来源: 评论