咨询与建议

限定检索结果

文献类型

  • 2,797 篇 会议
  • 2,286 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 5,096 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,016 篇 工学
    • 1,511 篇 计算机科学与技术...
    • 1,216 篇 软件工程
    • 575 篇 电子科学与技术(可...
    • 529 篇 电气工程
    • 471 篇 信息与通信工程
    • 403 篇 生物工程
    • 397 篇 生物医学工程(可授...
    • 384 篇 材料科学与工程(可...
    • 375 篇 化学工程与技术
    • 352 篇 控制科学与工程
    • 348 篇 光学工程
    • 207 篇 仪器科学与技术
    • 189 篇 动力工程及工程热...
    • 186 篇 机械工程
    • 121 篇 土木工程
    • 108 篇 冶金工程
  • 2,261 篇 理学
    • 1,046 篇 物理学
    • 727 篇 数学
    • 559 篇 生物学
    • 440 篇 化学
    • 294 篇 统计学(可授理学、...
    • 128 篇 系统科学
  • 603 篇 管理学
    • 366 篇 管理科学与工程(可...
    • 248 篇 图书情报与档案管...
    • 223 篇 工商管理
  • 400 篇 医学
    • 319 篇 临床医学
    • 269 篇 基础医学(可授医学...
    • 163 篇 药学(可授医学、理...
  • 175 篇 教育学
    • 158 篇 教育学
  • 113 篇 法学
  • 86 篇 农学
  • 79 篇 经济学
  • 7 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 99 篇 computer science
  • 78 篇 deep learning
  • 76 篇 computational mo...
  • 76 篇 training
  • 72 篇 accuracy
  • 63 篇 feature extracti...
  • 61 篇 machine learning
  • 54 篇 students
  • 51 篇 computer archite...
  • 50 篇 neural networks
  • 47 篇 optimization
  • 43 篇 predictive model...
  • 42 篇 visualization
  • 41 篇 support vector m...
  • 41 篇 convolutional ne...
  • 40 篇 internet of thin...
  • 40 篇 data models
  • 35 篇 artificial intel...
  • 35 篇 testing
  • 32 篇 neurons

机构

  • 42 篇 renewable and su...
  • 32 篇 department of ph...
  • 32 篇 department of el...
  • 31 篇 photonics initia...
  • 30 篇 department of ph...
  • 30 篇 photonics initia...
  • 28 篇 department of ma...
  • 26 篇 department of el...
  • 24 篇 physics program ...
  • 23 篇 renewable and su...
  • 21 篇 department of el...
  • 21 篇 department of el...
  • 20 篇 department of in...
  • 18 篇 department of co...
  • 18 篇 interdisciplinar...
  • 17 篇 computer science...
  • 17 篇 applied mathemat...
  • 16 篇 department of el...
  • 16 篇 physics program ...
  • 16 篇 peng cheng labor...

作者

  • 42 篇 andrea alù
  • 41 篇 lukas
  • 40 篇 smalyukh ivan i.
  • 33 篇 ivan i. smalyukh
  • 30 篇 kono junichiro
  • 30 篇 zhang byoung-tak
  • 30 篇 alù andrea
  • 29 篇 heryadi yaya
  • 27 篇 yaya heryadi
  • 23 篇 pardamean bens
  • 23 篇 bens pardamean
  • 19 篇 balandin alexand...
  • 18 篇 kargar fariborz
  • 18 篇 daniel schneider
  • 18 篇 wayan suparta
  • 17 篇 niyato dusit
  • 16 篇 tay fuyang
  • 16 篇 weiss sharon m.
  • 15 篇 baydin andrey
  • 15 篇 jasra ajay

语言

  • 4,505 篇 英文
  • 551 篇 其他
  • 31 篇 中文
  • 6 篇 日文
  • 3 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Engineering Program"
5096 条 记 录,以下是4671-4680 订阅
排序:
Formalizing concurrent common knowledge as product of modal logics
Formalizing concurrent common knowledge as product of modal ...
收藏 引用
作者: Costa, Vania Benevides, Mario System Engineering and Computer Science Program UFRJ Mailbox 68511 21945-970 Rio de Janeiro Brazil System Engineering and Computer Science Program Institute of Mathematics UFRJ Mailbox 68511 21945-970 Rio de Janeiro Brazil
This work introduces a two-dimensional modal logic to represent agents' Concurrent Common Knowledge in distributed systems. Unlike Common Knowledge, Concurrent Common Knowledge is a kind of agreement reachable in ... 详细信息
来源: 评论
An efficient decryption method for RSA cryptosystem
An efficient decryption method for RSA cryptosystem
收藏 引用
19th International Conference on Advanced Information Networking and Applications, AINA 2005
作者: Hwang, Ren-Junn Su, Feng-Fu Yeh, Yi-Shiung Chen, Chia-Yao Department of Computer Science and Information Engineering TamKang University Tamsui Taipei 251 Taiwan Degree Program of Electrical Engineering and Computer Science National Chiao Tung University Hsinchu 300 Taiwan
This paper proposes an efficient method to implement RSA decryption algorithm. RSA cryptosystem is the most attractive and popular security technique for many applications, such as electronic commerce and secure inter... 详细信息
来源: 评论
Power efficient error control for bluetooth-based sensor networks
Power efficient error control for bluetooth-based sensor net...
收藏 引用
IEEE Conference on Local computer Networks - 30th Anniversary, LCN 2005
作者: Kleinschmidt, João H. Borelli, Walter C. Pellenz, Marcelo E. School of Electrical and Computer Engineering State University of Campinas - UNICAMP Graduate Program in Computer Science Pontifical Catholic University of Paraná - PUCPR
This paper- studies different error control schemes in wireless sensor networks with Bluetooth technology. The tradeoff between reliability and energy consumption of Bluetooth packets are analyzed, using different err... 详细信息
来源: 评论
A configuration memory architecture for fast run-time reconfiguration of FPGAs
A configuration memory architecture for fast run-time reconf...
收藏 引用
2005 International Conference on Field programmable Logic and Applications, FPL
作者: Malik, Usama Diessel, Oliver School of Computer Science and Engineering University of New South Wales Sydney Australia Program National ICT Australia
This paper presents a configuration memory architecture that offers fast FPGA reconfiguration. The underlying principle behind the design is the use of fine-grained partial reconfiguration that allows significant conf... 详细信息
来源: 评论
A kernel method for MicroRNA target prediction using sensible data and position-based features
A kernel method for MicroRNA target prediction using sensibl...
收藏 引用
2005 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, CIBCB '05
作者: Kim, Sung-Kyu Nam, Jin-Wu Lee, Wha-Jin Zhang, Byoung-Tak Graduate Program in Bioinformatics School of Computer Science and Engineering Seoul National University Seoul 151-744 Korea Republic of
MicroRNAs (miRNAs) are small endogenous RNAs of ∼22nt that act as direct post-transcriptional regulators in animals and plants. MicroRNAs generally perform a function by binding to the complementary site on the 3'... 详细信息
来源: 评论
Data Storage Media Sanitization Procedures at the U.S. Agency For International Development (USAID)
收藏 引用
EDPACS 2006年 第8期29卷 11-19页
作者: James Craft William Cleveland The Information Systems Security Officer at the United States Agency for International Development (USAID) Bureau for Management Information Resources Management (M/IRM) Information Systems Security Team. He has a BS in business management from George Mason University and has 22 years of experience focusing primarily on systems engineering cybersecurity and enterprise operations. He has played a major role in the implementation of the U.S. Government's Model Information Security Policy. The USAID PRIME Security Program Manager Computer Sciences Corporation in Arlington Virginia. He has MS degrees in information and telecommunications systems management and in military science. Cleveland has over 20 years of experience in the planning and management of a wide variety of functions including business process reengineering and IT security.
This article is derived from a Best Security Practice (BSP) developed by the U.S. Agency for International Development (USAID), Bureau for Management, Information Resources Management (M/IRM), Information Systems Secu...
来源: 评论
Analysis and evaluation of a new MAC protocol for broadband wireless access
Analysis and evaluation of a new MAC protocol for broadband ...
收藏 引用
2005 International Conference on Wireless Networks, Communications and Mobile Computing
作者: De Moraes, L.F.M. Maciel Jr., P.D. High-Speed Networks Laboratory - RAVEL Systems Engineering and Computer Science Program COPPE/UFRJ Rio de Janeiro - RJ Brazil
Broadband Wireless Access (BWA) systems offer a solution for broadband access and high data rate transmission of multimedia services with distinct Quality-of-Service (QoS) requirements through a wireless medium. IEEE ... 详细信息
来源: 评论
On-line system identification using context discernment
On-line system identification using context discernment
收藏 引用
International Joint Conference on Neural Networks, IJCNN 2005
作者: Holmstrom, Lars Santiago, Roberto Lendaris, George G. NW Computational Intelligence Laboratory Portland State University Portland OR 97201 Systems Science Ph.D. Program Department of Systems Science and Electrical and Computer Engineering
Mathematical models are often used in system identification applications. The dynamics of most systems, however, change over time and the sources of these changes cannot always be directly determined or measured. To m... 详细信息
来源: 评论
Edge detection using clustering algorithms
收藏 引用
WSEAS Transactions on computers 2005年 第5期4卷 417-423页
作者: Sirin, Tuba Saglam, Mehmet Izzet Erer, Isin Gokmen, Muhittin Informatics Institute Advanced Technologies in Engineering Computer Science and Engineering Istanbul Technical University Istanbul 34469 Turkey Informatics Institute Advanced Technologies in Engineering Satellite Communication and Remote Sensing Program Istanbul Technical University Istanbul 34469 Turkey Faculty of Electrical and Electronic Engineering Electronics and Communication Department Istanbul Technical University Istanbul 34469 Turkey Faculty of Electrical and Electronic Engineering Computer Engineering Department Istanbul Technical University Istanbul 34469 Turkey
Edge detection is an important topic in image processing and a main tool in pattern recognition and image segmentation. Many edge detection techniques are available in the literature. 'A number of recent edge dete... 详细信息
来源: 评论
MDAbench: A Tool for Customized Benchmark Generation Using MDA
MDAbench: A Tool for Customized Benchmark Generation Using M...
收藏 引用
OOPSLA'05 - 20th Annual ACM Conference on Object-Oriented programming, Systems, Languages, and Applications
作者: Zhu, Liming Liu, Yan Gorton, Ian Bui, Ngoc Bao School of Computer Science and Engineering University of Nsw Australia Empirical Software Engineering Program National Ict Australia Australia Faculty of Information Technology University of Technology Sydney Australia
Designing component-based application that meets performance requirements remains a challenging problem, and usually requires a prototype to be constructed to benchmark performance. Building a custom benchmark suite i... 详细信息
来源: 评论