咨询与建议

限定检索结果

文献类型

  • 3,536 篇 会议
  • 2,151 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,724 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,392 篇 工学
    • 2,059 篇 计算机科学与技术...
    • 1,647 篇 软件工程
    • 670 篇 信息与通信工程
    • 644 篇 控制科学与工程
    • 474 篇 电气工程
    • 433 篇 电子科学与技术(可...
    • 370 篇 生物工程
    • 304 篇 机械工程
    • 304 篇 生物医学工程(可授...
    • 253 篇 光学工程
    • 229 篇 仪器科学与技术
    • 208 篇 动力工程及工程热...
    • 185 篇 化学工程与技术
    • 145 篇 交通运输工程
    • 130 篇 材料科学与工程(可...
    • 108 篇 安全科学与工程
  • 1,852 篇 理学
    • 852 篇 数学
    • 572 篇 物理学
    • 429 篇 生物学
    • 282 篇 统计学(可授理学、...
    • 229 篇 系统科学
    • 184 篇 化学
  • 901 篇 管理学
    • 605 篇 管理科学与工程(可...
    • 323 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 316 篇 医学
    • 268 篇 临床医学
    • 208 篇 基础医学(可授医学...
    • 138 篇 药学(可授医学、理...
  • 137 篇 法学
    • 112 篇 社会学
  • 107 篇 经济学
    • 107 篇 应用经济学
  • 70 篇 农学
  • 53 篇 教育学
  • 18 篇 文学
  • 17 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 206 篇 computer science
  • 114 篇 deep learning
  • 100 篇 feature extracti...
  • 95 篇 computational mo...
  • 92 篇 control systems
  • 91 篇 systems engineer...
  • 89 篇 machine learning
  • 88 篇 accuracy
  • 87 篇 data mining
  • 78 篇 neural networks
  • 74 篇 artificial intel...
  • 71 篇 training
  • 70 篇 optimization
  • 67 篇 laboratories
  • 67 篇 costs
  • 65 篇 hardware
  • 61 篇 humans
  • 57 篇 testing
  • 56 篇 protocols
  • 54 篇 information syst...

机构

  • 71 篇 department of co...
  • 40 篇 national enginee...
  • 30 篇 college of compu...
  • 25 篇 department of co...
  • 24 篇 department of co...
  • 24 篇 department of co...
  • 23 篇 department of co...
  • 23 篇 university of ch...
  • 22 篇 key laboratory o...
  • 22 篇 department of sy...
  • 22 篇 department of el...
  • 22 篇 distributed mult...
  • 20 篇 department of el...
  • 18 篇 national enginee...
  • 18 篇 department of el...
  • 18 篇 frontiers scienc...
  • 18 篇 department of co...
  • 17 篇 distributed mult...
  • 17 篇 school of comput...
  • 16 篇 smart network sy...

作者

  • 25 篇 mei-ling shyu
  • 24 篇 shu-ching chen
  • 24 篇 hai jin
  • 22 篇 yang yang
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 20 篇 dutta paramartha
  • 17 篇 wang xingjun
  • 16 篇 paramartha dutta
  • 15 篇 han zhu
  • 15 篇 shyu mei-ling
  • 13 篇 mohamed k.nour
  • 13 篇 tei-wei kuo
  • 13 篇 yunhao liu
  • 13 篇 bowers john e.
  • 13 篇 shen linlin
  • 13 篇 ai bo
  • 12 篇 kazuyuki kobayas...
  • 12 篇 hayashi eiji
  • 12 篇 liu qi

语言

  • 5,355 篇 英文
  • 245 篇 其他
  • 113 篇 中文
  • 14 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=Computer Science and System Engineering Department"
5724 条 记 录,以下是4661-4670 订阅
排序:
New Coding Method to Reduce the Database Size and Algorithm with Significant Efficiency in Association Rules
New Coding Method to Reduce the Database Size and Algorithm ...
收藏 引用
IEEE Congress on Evolutionary Computation
作者: He, Huimin Du, Haiyan Liu, Yongjin Li, Fangping Xie, Yi Department of Computer Science Handan College Hebei Handan 056005 China Computer Structure and Embedded System Department of Electrical and Electronics Engineering Nanyang Technological University Singapore Singapore
The problem of discovery association rules in large databases is considered. An encoding method for converting large databases to small one is proposed. Significant efficiency is obtained by applying some modified kno... 详细信息
来源: 评论
Formalizing semantics of OWL-S process model
Formalizing semantics of OWL-S process model
收藏 引用
2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA 2008
作者: Yi, Peng Yong Ning, Huang Department of Computer Science Beihang University Beijing China Department of System Engineering BeijingChina Beihang University Beijing China
OWL-S is an important standard for semantic web and its process model not formalized complete. There are some researches working on formalizing semantics of OWL-S process model and this paper is one of them. Rewrite l... 详细信息
来源: 评论
Using a Genetic Algorithm to obtain a neural network-based model of a real autonomous vehicle
Using a Genetic Algorithm to obtain a neural network-based m...
收藏 引用
2008 IEEE International Symposium on Industrial Electronics, ISIE 2008
作者: Pulido, Nieves Pavón Melero, Joaquín Ferruz Ruano, A.E. Department of Computer Science University of Huelva Department of System Engineering and Automation University of Seville Centre of Intelligent Systems University of Algarve
In this paper, a set of Radial Basis Function (RBF) neural networks, capable to learn the kinematic and dynamic behavior of the Romeo 4R autonomous vehicle, is presented. In order to obtain a set of good RBF nets in t... 详细信息
来源: 评论
Application of a fuzzy C-mean algorithm for pulse waveform analysis in patients with myocardial ischemia
收藏 引用
International Journal of Electrical engineering 2008年 第5期15卷 399-407页
作者: Liu, Shing-Hong Chang, Kang-Ming Chen, Jian-Jung Tang, Kuo-Tai Department of Computer Science and Information Engineering Chaoyang University of Technology Taichung Taiwan Department of Computer and Communication Asia University Taichung Taiwan Department of Chinese Medicine Taichung Tzu Chi General Hospital Taichung Taiwan Department of Management Information System National Chengchi University Taipei Taiwan
Previous noninvasive measurements of the pulse waveform of the radial artery have not employed standard positioning procedures. Here we propose a new three-axis mechanism for simultaneously measuring the arterial diam... 详细信息
来源: 评论
Scheduling meetings by agents  7
Scheduling meetings by agents
收藏 引用
7th International Conference on the Practice and Theory of Automated Timetabling, PATAT 2008
作者: Gershman, A. Grubshtein, A. Meisels, A. Rokach, L. Zivan, Roie Department of Computer Science India Department of Information System Engineering United States Department of Industrial Engineering and Managment Ben-Gurion University of the Negev Beer-Sheva84105 Israel
The Scheduling of Meetings of multiple users is a real world problem that was studied intensively in recent years. The present paper proposes a realistic model for representing and solving meetings scheduling problems... 详细信息
来源: 评论
A framework of authentic post-issuance program modification for multi-application smart cards
A framework of authentic post-issuance program modification ...
收藏 引用
2008 International Conference on Wireless Networks, ICWN 2008
作者: Uddin, Mohammad Mesbah Zabir, Salahuddin Muhammad Salim Nohara, Yasunobu Yasuura, Hiroto Department of Computer Science and Communication Engineering Kyushu University Fukuoka Japan System LSI Research Center Kyushu University Fukuoka Japan
Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for ... 详细信息
来源: 评论
Discharge processes, electric field, and electron energy in ISUAL recorded gigantic jets
收藏 引用
Journal of Geophysical Research: Space Physics 2009年 第4期114.0卷
作者: Kuo, Cheng-Ling Chou, J.K. Tsai, L.Y. Chen, A.B. Su, H.T. Hsu, R.R. Cummer, S.A. Frey, H.U. Mende, S.B. Takahashi, Y. Lee, L.C. Department of Physics National Cheng Kung University Tainan 70101 No. 1 University Road Taiwan Institute of Space Science National Central University Jhongli City Taoyuan County 32001 No. 300 Jhongda Road Taiwan Institute of Space Astrophysical and Plasma Sciences National Cheng Kung University Tainan Taiwan Earth Dynamic System Research Center National Cheng Kung University Tainan Taiwan Department of Electrical and Computer Engineering Duke University Durham NC United States Department of Electrical and Computer Engineering Duke University Box 90291 Durham NC 27708 United States Space Sciences Laboratory University of California Berkeley CA 94720 7 Gauss Way United States Department of Geophysics Tohoku University Aramaki Aoba-ku Sendai Miyagi 980-8578 6-3 Aza-aoba Japan
This article reports the first high time resolution measurements of gigantic jets from the Imager of Sprites and Upper Atmospheric Lightning (ISUAL) experiment. The velocity of the upward propagating fully developed j... 详细信息
来源: 评论
A novel approach for multimedia information hiding using visual cryptography
A novel approach for multimedia information hiding using vis...
收藏 引用
8th IASTED International Conference on Visualization, Imaging, and Image Processing, VIIP 2008
作者: Abdallah, Moussa H. Al-Dallah, Randa A. Al-Khalid, Rola I. Department of Electronics Engineering Princess Sumaya University for Technology Amman Jordan Computer Science Department Al-Balqa Applied Univeristy Salt Jordan Department of Computer Information System University of Jordan Amman Jordan
In this paper, a novel approach is presented for multimedia information hiding using visual cryptography. The approach combines both the steganographic and cryptographic effect to improve the quality of security of th... 详细信息
来源: 评论
A Self-Repairable Microprocessor
收藏 引用
ECS Transactions 2009年 第1期18卷
作者: Yuanjiang Xie Xiang Fu Zijian He Yang Zhao Yu Hu Xiaowei Li Institute of Computing Technology Chinese Academy of Sciences Department of Computer Science and Engineering University of California Riverside Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences No. 6 Ke-Xue-Yuan South Road Beijing Beijing 100190 China
With increasing defect density, microprocessors, especially the embedded caches, will encounter more faults. Adding spare resources to replace defective components is a widely accepted method for yield enhancement. In...
来源: 评论
Providing continuous VCR function with interpolated active buffer management for near VoD system on ubiquitous multimedia environment
Providing continuous VCR function with interpolated active b...
收藏 引用
2008 the 1st IEEE International Conference on Ubi-Media Computing and Workshops, U-Media2008
作者: Tsai, Hsien-Ming Ding, Jen-Wen Cheng, Shu-Chen Huang, Yueh-Min Department of Engineering Science National Cheng-Kung University China Management of Information System National Kaohsiung University of Applied Science China Dept. of Computer Science and Information Engineering Southern Taiwan University of Technology China
A unicast video-on-demand (VOD) system is good at interactivity but bad at scalability. Many multicast schemes have been proposed to solve the scalability problem in recent years. However, the weakness of these scheme... 详细信息
来源: 评论