咨询与建议

限定检索结果

文献类型

  • 1,141 篇 会议
  • 925 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 2,085 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,192 篇 工学
    • 828 篇 计算机科学与技术...
    • 698 篇 软件工程
    • 179 篇 信息与通信工程
    • 157 篇 控制科学与工程
    • 116 篇 生物医学工程(可授...
    • 112 篇 生物工程
    • 83 篇 电气工程
    • 73 篇 电子科学与技术(可...
    • 68 篇 机械工程
    • 53 篇 化学工程与技术
    • 52 篇 光学工程
    • 46 篇 材料科学与工程(可...
    • 39 篇 土木工程
  • 776 篇 理学
    • 466 篇 数学
    • 157 篇 物理学
    • 146 篇 生物学
    • 126 篇 统计学(可授理学、...
    • 88 篇 系统科学
    • 60 篇 化学
  • 381 篇 管理学
    • 226 篇 管理科学与工程(可...
    • 157 篇 图书情报与档案管...
    • 120 篇 工商管理
  • 195 篇 教育学
    • 193 篇 教育学
    • 39 篇 心理学(可授教育学...
  • 147 篇 医学
    • 108 篇 临床医学
    • 95 篇 基础医学(可授医学...
    • 50 篇 药学(可授医学、理...
    • 48 篇 公共卫生与预防医...
  • 54 篇 法学
    • 50 篇 社会学
  • 45 篇 经济学
    • 44 篇 应用经济学
  • 29 篇 农学
  • 11 篇 文学
  • 9 篇 军事学
  • 3 篇 艺术学

主题

  • 59 篇 students
  • 57 篇 computer science
  • 47 篇 machine learning
  • 45 篇 education
  • 32 篇 training
  • 27 篇 computational mo...
  • 25 篇 engineering educ...
  • 24 篇 data mining
  • 23 篇 deep learning
  • 23 篇 artificial intel...
  • 22 篇 support vector m...
  • 22 篇 feature extracti...
  • 20 篇 semantics
  • 17 篇 visualization
  • 16 篇 xml
  • 16 篇 neural networks
  • 16 篇 databases
  • 16 篇 mathematics
  • 15 篇 predictive model...
  • 15 篇 decision making

机构

  • 46 篇 school of comput...
  • 46 篇 beijing key labo...
  • 44 篇 gaoling school o...
  • 41 篇 school of comput...
  • 37 篇 key laboratory o...
  • 24 篇 key laboratory o...
  • 13 篇 school of scienc...
  • 13 篇 department of la...
  • 11 篇 department of co...
  • 11 篇 department of co...
  • 11 篇 engineering labo...
  • 10 篇 tsinghua univers...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 9 篇 department of sc...
  • 9 篇 department of ma...
  • 9 篇 department of au...
  • 8 篇 faculty of physi...
  • 8 篇 institute for fo...
  • 8 篇 pedagogical univ...

作者

  • 22 篇 wu xiaojun
  • 20 篇 wen ji-rong
  • 15 篇 li peng
  • 15 篇 yan ping
  • 14 篇 lv teng
  • 13 篇 xiaojun wu
  • 12 篇 dulski k.
  • 12 篇 zhang yumei
  • 12 篇 kubicz e.
  • 12 篇 kozik t.
  • 12 篇 korcyl g.
  • 12 篇 badriyya b.al-on...
  • 12 篇 marek r. ogiela
  • 11 篇 skurzok m.
  • 11 篇 moskal p.
  • 11 篇 silarski m.
  • 10 篇 tomasz hachaj
  • 10 篇 zhang lichen
  • 10 篇 teng lv
  • 10 篇 shopa r.y.

语言

  • 1,972 篇 英文
  • 86 篇 其他
  • 24 篇 中文
  • 3 篇 德文
  • 1 篇 俄文
检索条件"机构=Computer Science and Methods of Teaching Computer Science"
2085 条 记 录,以下是1661-1670 订阅
排序:
Design of Automata Online Judge
Design of Automata Online Judge
收藏 引用
International Conference on Information Engineering and computer science (ICIECS)
作者: Xiaoyu Du Chao Yi Yu Wei Su Feng Zhi Gong College of Information Science and Technology Beijing Normal University Beijing China Computer Teaching Capital Institute of Physical Education Beijing China
In this paper, a specific online judge for automata is designed. System architecture is developed according to it. Model representations, judging strategies and feasibility of automatic judge are also explored. Differ... 详细信息
来源: 评论
History-aware user awareness in web lectures
History-aware user awareness in web lectures
收藏 引用
IEEE Internaitonal Conference on Multimedia Information Processing and Retrieval
作者: Ketterl, Markus Mertens, Robert Emden, Johannes Vornberger, Oliver Center for Information Management and Virtual Teaching University of Osnabrück Heger-Tor-Wall 12 49074 Osnabrück Germany Fraunhofer IAIS Schloß Birlinghoven 53754 Sankt Augustin Germany Dept. of Computer Science University of Osnabrück Albrechtstrasse 28 49069 Osnabrück Germany
User awareness has become a popular feature in many social web applications. In classic text-based web-systems, user awareness features show how many users are online in a web application or how many users are accessi... 详细信息
来源: 评论
Provably Secure Certificateless Authenticated Key Agreement Protocol in the Standard Model
Provably Secure Certificateless Authenticated Key Agreement ...
收藏 引用
International Conference on Pervasive Computing Signal Processing and Applications (PCSPA)
作者: Xiaofen Wang Xiongda Li National Teaching Center of Computer Experiment University of Electronic Science and Technology Chengdu China Development Center Chengdu Information Technology Application Chengdu China
Inspired by the certificateless public key encryption scheme proposed by Jong et al, we present a new certificateless authenticated key agreement protocol (CLAK). It is provably secure in the standard model. CLAK prot... 详细信息
来源: 评论
Using Social Navigation for Multimedia Content Suggestion
Using Social Navigation for Multimedia Content Suggestion
收藏 引用
International Conference on Semantic Computing
作者: Markus Ketterl Johannes Emden Oliver Vornberger Center for Information Management and Virtual Teaching University of Osnabrück Osnabruck Germany Dept. of Computer Science University of Osnabrück Osnabruck Germany
This work presents a web lecture systems that allows its users to visualize and re-use aggregated actions taken from user's past interaction for enhanced content navigation and multimedia retrieval.
来源: 评论
Autonomic Learning in Course Software: A Case Study
Autonomic Learning in Course Software: A Case Study
收藏 引用
The 2010 International Conference on computer Application and System Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)
作者: Xiaoyu Du Chao Yi Qiao Tang Su Feng Yu Wei College of Infoimation Science and Technology Beijing Normal University Beijing China 100875 Computer Teaching Capital Institute of Physical Education Beijing China 100088
This paper presents a method to develop course software aiming at autonomic learning, and introducing The Formal Languages and Automata Course Software as a case to study. Then it lists six patterns in the Finite Auto... 详细信息
来源: 评论
Security enhancement of AODV against internal attacks
Security enhancement of AODV against internal attacks
收藏 引用
International Conference on Information science and Engineering (ICISE)
作者: Li pengwei Xu zhenqiang Teaching Department of computer Anyang normal university Anyang Henan South Korea College of information science and engineering Henan university of technology Zhengzhou Henan China
Ad Hoc is one sort of multi-hop, self-organization wireless network without the fixed base-station. The most challenging work is to prevent attacks of this kind of networks. This paper labors the security mechanism of... 详细信息
来源: 评论
Aligning assessment with learning outcomes in outcome-based education
Aligning assessment with learning outcomes in outcome-based ...
收藏 引用
2010 IEEE Education Engineering Conference, EDUCON 2010
作者: Crespo, Raquel M. Najjar, Jad Derntl, Michael Leony, Derick Neumann, Susanne Oberhuemer, Petra Totschnig, Michael Simon, Bernd Gutiérrez, Israel Delgado Kloos, Carlos Departamento de Ingeniería Telemática Universidad Carlos III de Madrid Leganés -Madrid Spain Institute for Information Systems and New Media Wirtschaftsuniversität Wien Vienna Austria Computer Science Didactics and Learning Research Center University of Vienna Vienna Austria Center for Teaching and Learning University of Vienna Vienna Austria
In outcome based learning, learning outcomes (knowledge, skills and competences) to be achieved by learners are in the focal point of the learning process. All educational activities and resources need to be related t... 详细信息
来源: 评论
H∞ Filter Design for T-S Nonlinear Discrete-Time with Interval Time Delays
H∞ Filter Design for T-S Nonlinear Discrete-Time with Inter...
收藏 引用
The 22nd China Control and Decision Conference(2010年中国控制与决策会议)
作者: Yakun Su Zhenling Wang Bing Chen Chong Lin Yingjian Lin Department of Mathematics Bohai University Jinzhou 121000 China Institute of Complexity Science Institute of Complexity Science Qingdao University Qingdao 266071 Department of Public Computer Teaching and Research Bohai University Jinzhou 121000 China
This paper deals with the problem of H∞ filter design for nonlinear discrete-time systems with time-varying delays via T-S fuzzy model approach. Some delay-dependent conditions for fuzzy H∞ filter design are propose... 详细信息
来源: 评论
Study on seismic imaging block modeling method
Study on seismic imaging block modeling method
收藏 引用
International Conference on Image Analysis and Signal Processing, IASP
作者: Meng Xiang-Bin Wei Zhi-Qiang Sui Zhi-Qiang Chu Jian Gui Lin Liu Ying-Ying Geophysical Methods Room of Geophysical Research Institute Geophysical Research Institute of Shengli Oil Field Dongying China Department of Computer Science and Technology Ocean University of China Qingdao China
Layer velocity modeling is not enough for high accuracy pre-stack imaging. But block velocity modeling may accurately describe complex subsurface geological structure. Through the research of seismic exploration block... 详细信息
来源: 评论
Face recognition based on 2DPCA and fuzzy-rough technique
Face recognition based on 2DPCA and fuzzy-rough technique
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jun-Hai Zhai Chen-Yan Bai Su-Fang Zhang Machine Learning Center Faculty of Mathematics and Computer Science Hebei University Baoding China Teaching and research of section of mathematics Hebei Information Engineering School Baoding China
To remove the redundant features extracted by using 2DPCA methods, a face recognition method is presented based on 2DPCA and fuzzy-rough technique in this paper. The proposed method selects the important features for ... 详细信息
来源: 评论