咨询与建议

限定检索结果

文献类型

  • 2,407 篇 会议
  • 1,316 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,760 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,305 篇 工学
    • 1,636 篇 计算机科学与技术...
    • 1,341 篇 软件工程
    • 623 篇 信息与通信工程
    • 366 篇 控制科学与工程
    • 300 篇 生物工程
    • 288 篇 电气工程
    • 229 篇 生物医学工程(可授...
    • 220 篇 电子科学与技术(可...
    • 180 篇 光学工程
    • 161 篇 机械工程
    • 160 篇 网络空间安全
    • 135 篇 化学工程与技术
    • 129 篇 安全科学与工程
    • 115 篇 动力工程及工程热...
    • 111 篇 核科学与技术
    • 107 篇 交通运输工程
    • 102 篇 仪器科学与技术
  • 1,344 篇 理学
    • 602 篇 数学
    • 472 篇 物理学
    • 327 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 154 篇 化学
    • 113 篇 系统科学
  • 691 篇 管理学
    • 431 篇 管理科学与工程(可...
    • 294 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 218 篇 医学
    • 161 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 111 篇 公共卫生与预防医...
  • 131 篇 法学
    • 109 篇 社会学
  • 66 篇 经济学
  • 65 篇 农学
  • 36 篇 教育学
  • 34 篇 文学
  • 20 篇 军事学
  • 5 篇 艺术学
  • 1 篇 哲学

主题

  • 172 篇 accuracy
  • 141 篇 deep learning
  • 105 篇 feature extracti...
  • 100 篇 hadron colliders
  • 98 篇 machine learning
  • 89 篇 computational mo...
  • 88 篇 training
  • 84 篇 convolutional ne...
  • 73 篇 real-time system...
  • 66 篇 support vector m...
  • 63 篇 predictive model...
  • 61 篇 artificial intel...
  • 55 篇 optimization
  • 53 篇 internet of thin...
  • 49 篇 reliability
  • 46 篇 genetic algorith...
  • 46 篇 cloud computing
  • 46 篇 data models
  • 44 篇 semantics
  • 44 篇 security

机构

  • 132 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 127 篇 university of sp...
  • 127 篇 indian institute...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 125 篇 irfu cea univers...
  • 124 篇 università di to...
  • 124 篇 academy of scien...
  • 124 篇 charles universi...
  • 124 篇 infn sezione di ...
  • 123 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 121 篇 infn sezione di ...
  • 120 篇 university of de...
  • 120 篇 department of ph...
  • 118 篇 imperial college...
  • 118 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 3,136 篇 英文
  • 584 篇 其他
  • 44 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science Engineering and Application"
3760 条 记 录,以下是3251-3260 订阅
排序:
A Scalable RNS Montgomery Multiplier over IF2m
A Scalable RNS Montgomery Multiplier over IF2m
收藏 引用
中国密码学会2013年密码芯片学术会议
作者: Jingwei Hu Jizeng Wei Wei Guo Ray C.C.Cheung School of Computer Science and Technology Tianjin University School of Computer Science and Technology Tianjin University Tianjin Key laboratory of Cognitive Computing and Application Department of Electronic Engineering City University of Hong Kong
This paper presents a fully parallelized and scalable RNS Montgomery multiplier over binary *** generalizing the RNS Montgomery Multiplication (RNS MM) and pseudo-Mersenne-like numbers, we are able to obtain a conside... 详细信息
来源: 评论
Efficient data-intensive processing in cloud computing environment
Efficient data-intensive processing in cloud computing envir...
收藏 引用
2013 International Conference on Communication Technology (ICCT 2013)
作者: Jiaman Ding Yi Du Qingxin Wang Ying Jiang Yunnan Provincial Key Laboratory of Computer Technology Application Faculty of Information Engineering and AutomationKunming University of Science and Technology City College Kunming University of Science and Technology
In order to solve the efficiency problem about the data-intensive query join in cloud computing environment, a Shrink-Semis Join for Cloud Computing(SSJFCC) method for data-intensive was proposed. This paper firstly a... 详细信息
来源: 评论
Passive localization based on local observations in wireless sensor network using finite element method and Kalman filter
Passive localization based on local observations in wireless...
收藏 引用
Nirma University International Conference on engineering (NUiCONE)
作者: Hrishikesh Tripathi Rahul Shukla Department of Computer Application ITM Gwalior M.P. India Department. of Computer Science & Engineering S. R. Group of Institutions Jhansi UP
This paper deals with the recently investigated physical field model in wireless sensor network without additional infrastructure for location estimation, i.e. passive localization, in the form of partial differential... 详细信息
来源: 评论
MULTI-CLASS ACTION RECOGNITION BASED ON INVERTED INDEX OF ACTION STATES
MULTI-CLASS ACTION RECOGNITION BASED ON INVERTED INDEX OF AC...
收藏 引用
IEEE International Conference on Image Processing
作者: Lishen Pei Mao Ye Pei Xu Xuezhuan Zhao Tao Li School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 P. R. China Chinese Academy of Science Chengdu Institute of Computer Application Chengdu 611731 P. R. China
A fast inverted index based algorithm is introduced for multi-class action recognition. At first, we compute the shape-motion features of the automatically localized actor. Secondly, a binary state tree is built by hi... 详细信息
来源: 评论
Color-space image compression with hardware Self-organizing map
Color-space image compression with hardware Self-organizing ...
收藏 引用
IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)
作者: Naoki Terahara Yoshiro Oba Hiroomi Hikawa Graduate School of Science and Engineering Kansai University Suita-shi Osaka Japan Mitsubishi Electric Micro-Computer Application Software Co. Ltd
This paper discusses the use of Self-organizing map (SOM) for color-space image compression. Two types of compressions, i.e., color and space compressions, are carried out by SOM. The feasibility of the proposed compr... 详细信息
来源: 评论
Fusion of Directional Spatial Discriminant Features for Face Recognition
收藏 引用
Procedia Technology 2013年 10卷 747-754页
作者: Aniruddha Dey Jamuna Kanta Sing Shiladitya Chowdhury Department of Computer Science & Engineering Jadavpur University 188 Raja S.C. Mullick Road Kolkata 700032 India Department of Master of Computer Application Techno India EM-4/1 Saltlake Sector V Kolkata-700091 India
Feature level fusion is one of the most important techniques, used to improve the performance of a face recognition system. This paper presents an approach of fusion of directional spatial discriminant features for fa... 详细信息
来源: 评论
Clustering in Wireless Sensor Networks: Performance Comparison of EAMMH and LEACH Protocols using MATLAB
Clustering in Wireless Sensor Networks: Performance Comparis...
收藏 引用
2013 International Conference on MEMS and Mechanics(MEMSM 2013)
作者: Monica R Mundada Nishanth Thimmegowda T Bhuvaneswari V CyrilRaj Dr M G R University Dept of Computer Science & Engineering MSRIT Dept of computer Application L N Govt College Dept of CSE and IT Dr M G R University
Conservation of the energy available in each sensor node and increasing network lifetime are most important design issues for a wireless sensor network(WSN). Many routing algorithms have been developed in this regar... 详细信息
来源: 评论
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
收藏 引用
第二届中国互联网学术年会
作者: Liehuang Zhu Hao Yang Zhenghe Yang Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology China Beijing
Most multicast data origin authentication schemes work under the fixed parameters without taking the problem of changeable network environment into ***,the network conditions will obviously influence the efficiency of... 详细信息
来源: 评论
Research on Encryption Model Based on AES and ECC in RFID
Research on Encryption Model Based on AES and ECC in RFID
收藏 引用
International Conference on computer sciences and applications (CSA)
作者: Yiran Lin Kaige Kang Yue Shi Department of Computer Science Southern Polytechnic State University Marietta Georgia United State Department of Software Engineering China University of Mining and Technology Beijing China Department of Computer Science and Application China University of Mining and Technolog Beijing China
Since the cost of RFID tags reducing constantly, the scale of its applications enlarges in industries and extends to various fields in our daily work and life. However, due to the openness of RFID, it owns a high atta... 详细信息
来源: 评论
Effect on generalization of using relational information in list-wise algorithms
Effect on generalization of using relational information in ...
收藏 引用
Joint International Conference on Pervasive Computing and the Networked World, ICPCA/SWS 2012
作者: Chen, Guohua Tang, Yong Tang, Feiyi Ding, Shijin He, Chaobo School of Mathematical Sciences Souch China Normal University Guangzhou 510631 Guangdong China Shenzhen Engineering Laboratory for Mobile Internet Application Middleware Technology Shenzhen 518060 Guangdong China School of Computer Science Souch China Normal University Guangzhou 510631 Guangdong China School of Computing and Information Systems Univerisity of Melbourne VIC 3010 Australia
Learning to rank became a hot research topic in recent years and utilizing relational information in list-wise algorithms was discovered to be valuable and was widely adopted in various algorithms. These algorithms... 详细信息
来源: 评论