咨询与建议

限定检索结果

文献类型

  • 2,407 篇 会议
  • 1,329 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,773 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,299 篇 工学
    • 1,633 篇 计算机科学与技术...
    • 1,341 篇 软件工程
    • 622 篇 信息与通信工程
    • 365 篇 控制科学与工程
    • 300 篇 生物工程
    • 288 篇 电气工程
    • 229 篇 生物医学工程(可授...
    • 220 篇 电子科学与技术(可...
    • 180 篇 光学工程
    • 160 篇 机械工程
    • 160 篇 网络空间安全
    • 136 篇 化学工程与技术
    • 129 篇 安全科学与工程
    • 115 篇 动力工程及工程热...
    • 107 篇 交通运输工程
    • 104 篇 核科学与技术
    • 102 篇 仪器科学与技术
  • 1,346 篇 理学
    • 602 篇 数学
    • 473 篇 物理学
    • 327 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 154 篇 化学
    • 113 篇 系统科学
  • 691 篇 管理学
    • 432 篇 管理科学与工程(可...
    • 293 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 218 篇 医学
    • 161 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 111 篇 公共卫生与预防医...
  • 129 篇 法学
    • 107 篇 社会学
  • 67 篇 经济学
  • 65 篇 农学
  • 36 篇 教育学
  • 34 篇 文学
  • 20 篇 军事学
  • 5 篇 艺术学
  • 1 篇 哲学

主题

  • 172 篇 accuracy
  • 141 篇 deep learning
  • 105 篇 feature extracti...
  • 100 篇 hadron colliders
  • 98 篇 machine learning
  • 89 篇 computational mo...
  • 88 篇 training
  • 84 篇 convolutional ne...
  • 73 篇 real-time system...
  • 66 篇 support vector m...
  • 63 篇 predictive model...
  • 61 篇 artificial intel...
  • 56 篇 optimization
  • 53 篇 internet of thin...
  • 49 篇 reliability
  • 46 篇 genetic algorith...
  • 46 篇 cloud computing
  • 46 篇 data models
  • 44 篇 semantics
  • 44 篇 security

机构

  • 132 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 127 篇 university of sp...
  • 127 篇 indian institute...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 124 篇 università di to...
  • 124 篇 academy of scien...
  • 124 篇 charles universi...
  • 124 篇 infn sezione di ...
  • 123 篇 department of ph...
  • 122 篇 zhejiang univers...
  • 122 篇 irfu cea univers...
  • 121 篇 infn sezione di ...
  • 120 篇 university of de...
  • 120 篇 department of ph...
  • 118 篇 imperial college...
  • 118 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 3,148 篇 英文
  • 584 篇 其他
  • 45 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science Engineering and Application"
3773 条 记 录,以下是3191-3200 订阅
排序:
A cloaking-based approach to protect location privacy in location-based services  33
A cloaking-based approach to protect location privacy in loc...
收藏 引用
Proceedings of the 33rd Chinese Control Conference, CCC 2014
作者: Zheng, Jiangyu Tan, Xiaobin Zou, Cliff Niu, Yukun Zhu, Jin CAS Key Laboratory of Technology in Geo-spatial Information Processing and Application System University of Science and Technology of China Hefei230026 China Department of Automation University of Science and Technology of China Hefei230026 China Department of Electrical Engineering and Computer Science University of Central Florida OrlandoFL32816-2362 United States
With the widespread use of mobile devices, the location-based service (LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a ... 详细信息
来源: 评论
The first algorithm for solving two coins counterfeiting with ω(ΔH) = ω(ΔL)
The first algorithm for solving two coins counterfeiting wit...
收藏 引用
International Conference on Electrical and computer engineering (ICECE)
作者: Joydeb Ghosh Arpan Chakraborty Piyali Datta Lagnashree Dey Ankita Nandy Rajat Kumar Pal Ranjit Kumar Samanta Department of Computer Science and Application North Bengal University Darjeeling West Bengal India Department of Computer Science and Engineering University of Calcutta Kolkata West Bengal India
Counterfeit coin problem is of utmost importance and it is truly interesting in computer science and Game theory as well as in Mathematics. In this problem the objective is to detect the fake coin(s) of identical appe... 详细信息
来源: 评论
Comparative analysis of GA and SA for utility maximization of licensed and unlicensed users in a cognitive radio network
Comparative analysis of GA and SA for utility maximization o...
收藏 引用
International Conference on Control, Instrumentation, Energy and Communication (CIEC)
作者: Roukna Sengupta Subhasree Bhattacharjee Department of Computer Science and Engineering RCC Institute of Information Technology Kolkata India Department of Computer Application Narula Institute of Technology Kolkata India
In this paper we consider a cognitive radio network comprising of a number of primary users (PUs) and a number of secondary users (SUs). The spectrum has been divided into channels by means of frequency division multi... 详细信息
来源: 评论
An endeavour to find two unequal false coins
An endeavour to find two unequal false coins
收藏 引用
International Conference on Electrical and computer engineering (ICECE)
作者: Joydeb Ghosh Piyali Datta Arpan Chakraborty Ankita Nandy Lagnashree Dey Rajat Kumar Pal Ranjit Kumar Samanta Department of Computer Science and Application North Bengal University Darjeeling West Bengal India Department of Computer Science and Engineering University of Calcutta Kolkata West Bengal India
The counterfeit coin problem is well-known and truly interesting in computer science, Game theory, and also in Mathematics. In this problem the objective is to detect the fake coin(s) of identical appearance but diffe... 详细信息
来源: 评论
Adaptive Semi-Supervised Dimensionality Reduction
Adaptive Semi-Supervised Dimensionality Reduction
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Jia Wei Jiabing Wang Qianli Ma Xuan Wang School of Computer Science and Engineering South China University of Technology Computer Application Research Center Harbin Institute of Technology Shenzhen Graduate School
With the rapid accumulation of high dimensional data, dimensionality reduction plays a more and more important role in practical data processing and analysing tasks. This paper studies semi-supervised dimensionality r... 详细信息
来源: 评论
Assessing Ancestral Genome Reconstruction Methods by Resampling
Assessing Ancestral Genome Reconstruction Methods by Resampl...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine
作者: Jun Zhou Fei Hu William Hoskins Jijun Tang Department of Computer Science and Engineering University of South Carolina Tianjin Key Laboratory of Cognitive Computing and Application Tianjin University
Inference of ancestral or extinct genomes is important in evolutionary biology, cancer research and many other research areas. Whole-genome data has become readily available due to advances in large-scale sequencing t... 详细信息
来源: 评论
A Systematic Study of OpenStreetMap Data Quality Assessment
A Systematic Study of OpenStreetMap Data Quality Assessment
收藏 引用
International Conference on Information Technology: New Generations (ITNG)
作者: Sukhjit Singh Sehra Jaiteg Singh Hardeep Singh Rai Dept of Computer Science& Engineering GNDEC Ludhiana Punjab India Department of Computer Application CIET Punjab India Dept of Civil Engineering GNDEC Ludhiana Punjab India
The evolution of web has changed the way of interaction with the user. Web 2.0 encouraged more contribution from the user of varying level of mapping experience and is called Crowd Sourcing. Open Street Map is also th... 详细信息
来源: 评论
Study on data security mechanism in cloud computing
Study on data security mechanism in cloud computing
收藏 引用
International Conference on Current Trends in engineering and Technology (ICCTET)
作者: Sandha M. Ganaga Durga Department of Computer Application St. Michael College of Engineering and Technology Kalayar Koil Department of Computer Science Government Arts College for Women Sivagangai
Data integrity protection in outsourced data is challenging task in cloud computing. Client or third party auditor need to check the integrity of outsourced data. For this purpose so many approaches are introduced wit... 详细信息
来源: 评论
Performance analysis on agriculture ontology using SPARQL query system
Performance analysis on agriculture ontology using SPARQL qu...
收藏 引用
International Conference on Data Mining and Intelligent Computing (ICDMIC)
作者: Aditya Khamparia Babita Pandey Vikas Pardesi Department of Computer Science and Engineering Lovely Professional University Phagwara Punjab India Department of Computer Application Lovely Professional University Phagwara Punjab India
Ontologies are used to represent domain knowledge with help of object, their behaviour and properties. This paper represents web enabled approach on agriculture semantic web using SPARQL and specified tools to increas... 详细信息
来源: 评论
Semi-supervised fuzzy K-NN for cancer classification from microarray gene expression data
Semi-supervised fuzzy K-NN for cancer classification from mi...
收藏 引用
International Conference on Automation, Control, Energy and Systems (ACES)
作者: Anindya Halder Subhashis Misra Department Of Computer Application North-Eastern Hill University Tura Meghalaya India Department Of Computer Science Engineering Academy of Technology West Bengal India
Cancer classification from microarray gene expression data is a challenging task in computational biology and bioinformatics as the sufficient number of labeled samples (required to train the traditional classifiers) ... 详细信息
来源: 评论