咨询与建议

限定检索结果

文献类型

  • 1,141 篇 会议
  • 925 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 2,085 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,192 篇 工学
    • 828 篇 计算机科学与技术...
    • 698 篇 软件工程
    • 179 篇 信息与通信工程
    • 157 篇 控制科学与工程
    • 116 篇 生物医学工程(可授...
    • 112 篇 生物工程
    • 83 篇 电气工程
    • 73 篇 电子科学与技术(可...
    • 68 篇 机械工程
    • 53 篇 化学工程与技术
    • 52 篇 光学工程
    • 46 篇 材料科学与工程(可...
    • 39 篇 土木工程
  • 776 篇 理学
    • 466 篇 数学
    • 157 篇 物理学
    • 146 篇 生物学
    • 126 篇 统计学(可授理学、...
    • 88 篇 系统科学
    • 60 篇 化学
  • 381 篇 管理学
    • 226 篇 管理科学与工程(可...
    • 157 篇 图书情报与档案管...
    • 120 篇 工商管理
  • 195 篇 教育学
    • 193 篇 教育学
    • 39 篇 心理学(可授教育学...
  • 147 篇 医学
    • 108 篇 临床医学
    • 95 篇 基础医学(可授医学...
    • 50 篇 药学(可授医学、理...
    • 48 篇 公共卫生与预防医...
  • 54 篇 法学
    • 50 篇 社会学
  • 45 篇 经济学
    • 44 篇 应用经济学
  • 29 篇 农学
  • 11 篇 文学
  • 9 篇 军事学
  • 3 篇 艺术学

主题

  • 59 篇 students
  • 57 篇 computer science
  • 47 篇 machine learning
  • 45 篇 education
  • 32 篇 training
  • 27 篇 computational mo...
  • 25 篇 engineering educ...
  • 24 篇 data mining
  • 23 篇 deep learning
  • 23 篇 artificial intel...
  • 22 篇 support vector m...
  • 22 篇 feature extracti...
  • 20 篇 semantics
  • 17 篇 visualization
  • 16 篇 xml
  • 16 篇 neural networks
  • 16 篇 databases
  • 16 篇 mathematics
  • 15 篇 predictive model...
  • 15 篇 decision making

机构

  • 46 篇 school of comput...
  • 46 篇 beijing key labo...
  • 44 篇 gaoling school o...
  • 41 篇 school of comput...
  • 37 篇 key laboratory o...
  • 24 篇 key laboratory o...
  • 13 篇 school of scienc...
  • 13 篇 department of la...
  • 11 篇 department of co...
  • 11 篇 department of co...
  • 11 篇 engineering labo...
  • 10 篇 tsinghua univers...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 9 篇 department of sc...
  • 9 篇 department of ma...
  • 9 篇 department of au...
  • 8 篇 faculty of physi...
  • 8 篇 institute for fo...
  • 8 篇 pedagogical univ...

作者

  • 22 篇 wu xiaojun
  • 20 篇 wen ji-rong
  • 15 篇 li peng
  • 15 篇 yan ping
  • 14 篇 lv teng
  • 13 篇 xiaojun wu
  • 12 篇 dulski k.
  • 12 篇 zhang yumei
  • 12 篇 kubicz e.
  • 12 篇 kozik t.
  • 12 篇 korcyl g.
  • 12 篇 badriyya b.al-on...
  • 12 篇 marek r. ogiela
  • 11 篇 skurzok m.
  • 11 篇 moskal p.
  • 11 篇 silarski m.
  • 10 篇 tomasz hachaj
  • 10 篇 zhang lichen
  • 10 篇 teng lv
  • 10 篇 shopa r.y.

语言

  • 1,972 篇 英文
  • 86 篇 其他
  • 24 篇 中文
  • 3 篇 德文
  • 1 篇 俄文
检索条件"机构=Computer Science and Methods of Teaching Computer Science"
2085 条 记 录,以下是1681-1690 订阅
排序:
Improved chromosome encoding for genetic-algorithm-based assembly sequence planning
Improved chromosome encoding for genetic-algorithm-based ass...
收藏 引用
International Conference on Intelligent Computing and Integrated Systems (ICISS)
作者: Yong-qiang Liang Xiao-shu Zhu Miao Xie Department of Mathematics and Computer Science Yulin Normal University Yulin China Office of Teaching affairs Yulin Normal University Yulin China College of Profession Technology Yulin Normal University Yulin China
In order to ensure every feasible assembly sequence is included in the searching space of genetic algorithm, this paper proposes an improved genetic encoding method. In this method, every chromosome is encoded by a pe... 详细信息
来源: 评论
Anonymity leakage reduction in network latency
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous Engineering 2010年 第1期5卷 19-28页
作者: Anyanwu, Longy O. Keengwe, Jared Arome, Gladys Mathematics and Computer Science Fort Hays State University Hays KS United States Department of Teaching and Learning University of North Dakota ND United States Department of Media and Instructional Tech Florida Atlantic University FL United States
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity as to personal, source and destination ... 详细信息
来源: 评论
A Usage-Based Authorization Architecture for Multidomain Environments
A Usage-Based Authorization Architecture for Multidomain Env...
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Guang Zhao Junli Lu Fan Yang Jiajun Li Teaching Affairs Office Yunnan Nationalities University Kunming Yunnan China College of Mathematics and Computer Science Yunnan Nationalities University Kunming Yunnan China Library Yunnan Nationalities University Kunming Yunnan China
Establishing interoperability is the first and foremost problem of secure interoperation in multi-domain environments. This paper proposes a secure interoperation architecture to facilitate the establishment of secure... 详细信息
来源: 评论
Adaptive Control of a Class of Novel Hyperchaotic Systems with Fully Unknown Parameters
Adaptive Control of a Class of Novel Hyperchaotic Systems wi...
收藏 引用
The 2nd IEEE International Conference on Advanced computer Control(第二届先进计算机控制国际会议 ICACC 2010)
作者: Yan Zhao Xichang Han Lihua Miao Qiuye Sun Department of Automatic Control Engineering Shenyang Institute of Engineering Shenyang China Fundamental Teaching Department of Computer Mathematics and Physics Shenyang Medical College Sheny College of Information Science and Engineering Northeastern University Shenyang China
In this paper, the stabilization problems of a class of new hyperchaotic systems with fully unknown parameters are concerned. Based on the adaptive control idea, two novel adaptive state feedback controllers are desig... 详细信息
来源: 评论
Adaptive Generalized Synchronization of Two Nonidentical Hyperchaotic Systems with Unknown Parameters
Adaptive Generalized Synchronization of Two Nonidentical Hyp...
收藏 引用
The 2nd IEEE International Conference on Advanced computer Control(第二届先进计算机控制国际会议 ICACC 2010)
作者: Yan Zhao Tieyan Zhang Lihua Miao Qiuye Sun Department of Automatic Control Engineering Shenyang Institute of Engineering Shenyang China Fundamental Teaching Department of Computer Mathematics and Physics Shenyang Medical College Sheny College of Information Science and Engineering Northeastern University Shenyang China
This paper considers the generalized synchronization problems of two different hyperchaotic systems with unknown parameters. By denoting the synchronization error signals as the difference between the state variables ... 详细信息
来源: 评论
Compose & conquer: modularity for end-users
Compose & conquer: modularity for end-users
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Macneil Shonle Timothy T. Yuen Computer Science College of Sciences University of Texas at San Antonio San Antonio TX USA Interdisciplinary Learning and Teaching College of Education and Human Development University of Texas at San Antonio San Antonio TX USA
Users have vast amounts of information at their disposal and access to many tools that can compute on that data. Often, no particular program can fulfill a user's needs; or, when such a program exists, it may be t... 详细信息
来源: 评论
Scalable Intrusion Detection with Recurrent Neural Networks
Scalable Intrusion Detection with Recurrent Neural Networks
收藏 引用
International Conference on Information Technology: New Generations (ITNG)
作者: Longy O. Anyanwu Jared Keengwe Gladys A. Arome Department of Math and Computer Science Fort Hays State University Kansa USA Department of Teaching and Learning University of North Dakota ND USA College of Education Ldrshp & Tech Valdosta State University GA USA
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all solution model. Such IDS is not as ec... 详细信息
来源: 评论
Key Issues Concerning the Simultaneous Development of Technical and Linguistic Competences in a Single E-module
Key Issues Concerning the Simultaneous Development of Techni...
收藏 引用
International Conference on Developments in eSystems Engineering (DESE)
作者: Matka Zoric Venuti Tatjana Welzer Anthony E. Ward Centre of E-learning and Lifelong Learning University of Maribor Maribor Slovenia Faculty of Electrical Engineering and Computer Science University of Maribor Maribor Slovenia Centre of Excellence in Teaching and Learning in Enterprise University of York Heslington UK
Due to global communication systems, the borders are no longer important, and knowledge can be spread over continents, countries, cultures and languages. Sharing knowledge with people all over the world is one of the ... 详细信息
来源: 评论
Asymptotic suppression of a class of discrete-time hyperchaotic systems based on fuzzy control method
Asymptotic suppression of a class of discrete-time hyperchao...
收藏 引用
Chinese Control Conference (CCC)
作者: Zhidan Wu Ying Pan Wei Deng Fusheng Song Fundamental Teaching Department of Computer & Mathematics Shenyang Normal University Shenyang P. R. China School of Mathematics & Computer Science Harbin University Harbin P. R. China Department of Automatic Control Engineering Shenyang Institute of Engineering Shenyang P. R. China
The chaotic suppression problem for a class of typical discrete-time hyperchaotic systems is investigated in this paper. A T-S fuzzy model-based control method is employed to eliminate hyperchaos in the considered dis... 详细信息
来源: 评论
A survey of modelling uncertain data
A survey of modelling uncertain data
收藏 引用
International Conference on computer science and Information Technology (CSIT)
作者: Teng Lv Weimin He Ping Yan Teaching and Research Section of Computer Artillery Academy of PLA Hefei China Department of Computing and New Media Technologies University of Wisconsin Stevens Stevens Point WI USA School of Science Anhui Agricultural University Hefei China
Uncertainty in data is caused by various reasons such as data generated and transmitted in sensor networks, data mapping in uncertain data integrating environments, and data in some specific applications considering p... 详细信息
来源: 评论