咨询与建议

限定检索结果

文献类型

  • 2,402 篇 会议
  • 1,336 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,775 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,311 篇 工学
    • 1,658 篇 计算机科学与技术...
    • 1,351 篇 软件工程
    • 626 篇 信息与通信工程
    • 379 篇 控制科学与工程
    • 302 篇 生物工程
    • 291 篇 电气工程
    • 230 篇 生物医学工程(可授...
    • 217 篇 电子科学与技术(可...
    • 182 篇 光学工程
    • 160 篇 网络空间安全
    • 158 篇 机械工程
    • 139 篇 化学工程与技术
    • 129 篇 安全科学与工程
    • 113 篇 动力工程及工程热...
    • 107 篇 交通运输工程
    • 104 篇 仪器科学与技术
    • 94 篇 核科学与技术
  • 1,360 篇 理学
    • 609 篇 数学
    • 479 篇 物理学
    • 329 篇 生物学
    • 217 篇 统计学(可授理学、...
    • 158 篇 化学
    • 113 篇 系统科学
  • 696 篇 管理学
    • 436 篇 管理科学与工程(可...
    • 293 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 220 篇 医学
    • 162 篇 基础医学(可授医学...
    • 160 篇 临床医学
    • 111 篇 公共卫生与预防医...
  • 127 篇 法学
    • 106 篇 社会学
  • 66 篇 经济学
  • 65 篇 农学
  • 36 篇 教育学
  • 34 篇 文学
  • 20 篇 军事学
  • 5 篇 艺术学
  • 1 篇 哲学

主题

  • 171 篇 accuracy
  • 140 篇 deep learning
  • 102 篇 feature extracti...
  • 100 篇 hadron colliders
  • 99 篇 machine learning
  • 89 篇 computational mo...
  • 89 篇 training
  • 85 篇 convolutional ne...
  • 70 篇 real-time system...
  • 66 篇 support vector m...
  • 64 篇 predictive model...
  • 62 篇 artificial intel...
  • 54 篇 optimization
  • 53 篇 internet of thin...
  • 49 篇 reliability
  • 46 篇 genetic algorith...
  • 45 篇 security
  • 45 篇 cloud computing
  • 45 篇 data models
  • 44 篇 semantics

机构

  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 charles universi...
  • 125 篇 infn sezione di ...
  • 124 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 123 篇 irfu cea univers...
  • 122 篇 infn sezione di ...
  • 121 篇 university of de...
  • 121 篇 department of ph...
  • 119 篇 imperial college...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 3,438 篇 英文
  • 291 篇 其他
  • 47 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science Engineering and Application"
3775 条 记 录,以下是3491-3500 订阅
排序:
A color daytime and nighttime image fusion algorithm based on IHS and multi-wavelet transform
A color daytime and nighttime image fusion algorithm based o...
收藏 引用
International Conference on Mechatronics and Automation
作者: Tang, Guoliang Cai, Zhongmin Pu, Jiexin Huang, Xin-Han School of Information Technology Henan University of Traditional Chinese Medicine Zhengzhou China Department of Computer Application Henan Business College Zhengzhou China Institute of Electric Information Engineering University of Henan Science and Technology Luoyang China Department of Control Science and Engineering Huazhong University of Science and Technology Wuhan China
A daytime and nighttime color image fusion method based on IHS transform and Multi-Wavelet transform is presented. The method can automatically merge images of a scene captured under different illumination and can be ... 详细信息
来源: 评论
Entity answer extraction of web table
Entity answer extraction of web table
收藏 引用
2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010
作者: Xu, Yangbo Yu, Zhengtao Mao, Cunli Wang, Yasheng Guo, Jianyi School of Information Engineering and Automation Kunming University of Science and Technology Kunming 650051 China Institute of Intelligent Information Processing Computer Technology Application Key Laboratory of Yunnan Province Kunming 650051 China
This paper presents an entity answer extraction method based on list web table. Firstly, extract table from page using the features of web page table and label, segment the table that includes the potential entity ans... 详细信息
来源: 评论
Self-adapting semantic sensitivities for Semantic Similarity based Crossover
Self-adapting semantic sensitivities for Semantic Similarity...
收藏 引用
2010 6th IEEE World Congress on Computational Intelligence, WCCI 2010 - 2010 IEEE Congress on Evolutionary Computation, CEC 2010
作者: Uy, Nguyen Quang McKay, Bob O'Neill, Michael Hoai, Nguyen Xuan Natural Computing Research and Application Group University College Dublin Ireland School of Computer Science and Engineering Seoul National University Korea Republic of School of Information Technology Hanoi University Viet Nam
This paper presents two methods for self-adapting the semantic sensitivities in a recently proposed semantics-based crossover: Semantic Similarity based Crossover (SSC) [1]. The first self-adaptation method is inspire... 详细信息
来源: 评论
A four-level matching model for semantic web service selection based on QoS ontology
A four-level matching model for semantic web service selecti...
收藏 引用
作者: Guo, Guangjun Yu, Fei Chen, Zhigang Xie, Dong Department of Computer Science and Technology Hunan Institute of Humanities Science and Technology Loudi China Guangdong Province Key Lab of EC Market Application Technology GuangDong University of Business Studies Guangzhou China College of Information Science and Engineering Central South University Changsha China
Services discovery based on syntactic matching cannot adapt to the open and dynamic environment of the web. In order to realize service selection for supporting QoS constraints, a Four-Level Matching Model for Semanti... 详细信息
来源: 评论
Decision tree algorithm based on average Euclidean distance
Decision tree algorithm based on average Euclidean distance
收藏 引用
2010 2nd International Conference on Future computer and Communication, ICFCC 2010
作者: Liu, Quan Hu, Daojing Yan, Qicui JiangSu Province Support Software Engineering R and D Center for Information Technology Application in Enterprise Suzhou Jiangsu 215006 China School of Computer Science and Technology Soochow University Suzhou Jiangsu 215006 China
Traditionally, the algorithm of ID3 takes the information gain as a standard of expanding attributes. During the process of selection of expanded attributes, attributes with more values are usually preferred to be sel... 详细信息
来源: 评论
Multicast-tree construction and streaming mechanism for intra 802.16 mesh networks
Multicast-tree construction and streaming mechanism for intr...
收藏 引用
International Conference on Networking and Distributed Computing
作者: Tsai, Huan-Wen Lin, Hsu-Cheng Chou, Chih-Lun Cheng, Sheng-Tzong Dept. of Digital Home Service Application Technology Home Networking Technology Center ITRI South Tainan Taiwan Dept. of Computer Science and Information Engineering National Cheng Kung University Tainan Taiwan
This work proposes a novel two-stage scheme for constructing an effective multicast tree. The first stage applies a priority-based algorithm to find suitable multicast points and construct effective multicast subtrees... 详细信息
来源: 评论
Feature extraction by fusing local and global discriminant features: An application to face recognition
Feature extraction by fusing local and global discriminant f...
收藏 引用
IEEE International Conference on Computational Intelligence and Computing Research
作者: Shiladitya Chowdhury Jamuna Kanta Sing Dipak Kumar Basu Mita Nasipuri Department of Master of Computer Application Techno India Kolkata India Department of Computer Science & Engineering Jadavpur University Kolkata India
This paper presents a novel scheme for feature extraction for face recognition by fusing local and global discriminant features. The facial changes due to variations of pose, illumination, expression, etc. are often a... 详细信息
来源: 评论
Polynomial algorithms for evaluation of reliability of parallel computer interconnection systems
收藏 引用
Iranian Journal of Electrical and computer engineering 2010年 第1期9卷 52-58页
作者: Dash, R.K. Tripathy, C.R. Department of Computer Science and Application College of Engineering and Technology BP University of Technology Bhubaneswar Orissa India Department of Computer Science and Engineering and Information Technology Veer Surendra Sai University of Technology Burla Orissa India
Two new and efficient algorithms for evaluating the terminal reliability of parallel computer interconnection networks have been proposed. Both the algorithms are based on multiple decomposition approach. The former i... 详细信息
来源: 评论
A Hybrid Approach to Face Recognition Using Generalized Two-Dimensional Fisher's Linear Discriminant Method
A Hybrid Approach to Face Recognition Using Generalized Two-...
收藏 引用
International Conference on Emerging Trends in engineering and Technology, ICETET
作者: Shiladitya Chowdhury Jamuna Kanta Sing Dipak Kumar Basu Mita Nasipuri Department of Master of Computer Application Techno India Kolkata India Department of Computer Science & Engineering Jadavpur University Kolkata India
This paper presents a novel Hybrid Approach to Face Recognition using Generalized Two-Dimensional Fisher's Linear Discriminant (HAFR G-2DFLD) Method. It has been seen that the facial changes due to variations of p... 详细信息
来源: 评论
An efficient authentication protocol for virtual subnets on mobile ad hoc networks
An efficient authentication protocol for virtual subnets on ...
收藏 引用
International Symposium on computer Communication Control and Automation (3CA)
作者: Chuan-Wang Chang Ching-Hung Yeh Chen-Da Tsai Department of Computer Application Engineering Far East University Tainan Taiwan Department of Computer Science and Information Engineering Far East University Tainan Taiwan
Mobile Ad hoc networks are composed of self-organizing, multi-relaying nodes connected by wireless links that the virtual subnet technology provides support to reduce redundant transmission for efficient communication... 详细信息
来源: 评论