咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 13 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 35 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 10 篇 控制科学与工程
    • 9 篇 信息与通信工程
    • 6 篇 电气工程
    • 4 篇 仪器科学与技术
    • 3 篇 光学工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 生物工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 21 篇 理学
    • 11 篇 数学
    • 5 篇 物理学
    • 3 篇 生物学
    • 3 篇 系统科学
    • 2 篇 化学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 37 篇 computer science
  • 11 篇 neural networks
  • 8 篇 electronic mail
  • 8 篇 costs
  • 7 篇 conferences
  • 7 篇 computer archite...
  • 7 篇 humans
  • 7 篇 protocols
  • 7 篇 software
  • 7 篇 testing
  • 6 篇 traffic control
  • 6 篇 computational mo...
  • 6 篇 equations
  • 5 篇 asynchronous tra...
  • 5 篇 object detection
  • 5 篇 application soft...
  • 5 篇 software enginee...
  • 5 篇 signal processin...
  • 5 篇 pixel
  • 5 篇 bandwidth

机构

  • 12 篇 department of co...
  • 10 篇 dept. of comput....
  • 6 篇 national taiwan ...
  • 5 篇 institute of inf...
  • 3 篇 department of co...
  • 3 篇 dept. of comput....
  • 3 篇 dept. of inf. & ...
  • 3 篇 inst. of inf. sc...
  • 2 篇 inf. center guan...
  • 2 篇 dept of electric...
  • 2 篇 institutes of co...
  • 2 篇 school of comput...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 vipccl departmen...
  • 2 篇 dept. of compute...
  • 2 篇 fir-uf universit...
  • 2 篇 dept. of comput....
  • 2 篇 faculty of techn...
  • 2 篇 dept. of compute...

作者

  • 3 篇 felix dobslaw
  • 3 篇 mylopoulos john
  • 2 篇 binggui huang
  • 2 篇 lapouchnian alex...
  • 2 篇 shenghui he
  • 2 篇 feng-jian wang
  • 2 篇 y.-h. huang
  • 2 篇 francisco gomes ...
  • 2 篇 de virgilio robe...
  • 2 篇 h.-t. chu
  • 2 篇 c.-c. yang
  • 2 篇 hong-yuan mark l...
  • 2 篇 j. evans
  • 2 篇 w.-s. chen
  • 2 篇 di noia tommaso
  • 2 篇 g. minden
  • 2 篇 han-chieh chao
  • 2 篇 j.-y. chen
  • 2 篇 hsiao-rong tyan
  • 2 篇 tao lv

语言

  • 161 篇 英文
  • 4 篇 其他
检索条件"机构=Computer and Inf. Science and Engineering"
165 条 记 录,以下是81-90 订阅
排序:
Latent Ontological Feature Discovery for Text Clustering
Latent Ontological Feature Discovery for Text Clustering
收藏 引用
IEEE International Conference on Research, Innovation and Vision for the Future
作者: Van T. T. Duong Tru H. Cao Cuong K. Chau Tho T. Quan Fac. of Inf. Technol. & Appl. Math. Ton Duc Thang Univ. Ho Chi Minh City Vietnam Faculty of Computer Science and Engineering HCM City University of Technology Ho Chi Minh City Viet Nam
The content of a text is mainly defined by keywords and named entities occurring in it. In particular for news articles, named entities are usually important to define their semantics. However, named entities have ont... 详细信息
来源: 评论
A study of the adoption of self-service technologies by consumers in convenience stores
A study of the adoption of self-service technologies by cons...
收藏 引用
International Conference on Advanced Communication Technology (ICACT)
作者: Dong-Her Shih I-Ching Chen Shueh-Cheng Hu Dept. of Inf. Manage. Nat. Yunlin Univ. of Sci.&Technol. Dept. of Information Management National Yunlin University of Science & Technology Taiwan Dept. of Information Management ChungChou Institute of Technology Taiwan Dept. of Computer Science & Communication Engineering Providence University Taiwan
The emerging self-service technologies (SSTs) make people's daily life become more and more convenient. The users' attitude toward and requirements about the SST also become diversified due to its widely appli... 详细信息
来源: 评论
Simulation Experiment Result Forecast Method Based on Support Vector Machine
Simulation Experiment Result Forecast Method Based on Suppor...
收藏 引用
International Conference on Intelligent Computation Technology and Automation, ICICTA
作者: Shuguang Zhu Zhiqiang Li Xiaofeng Hu Guangya Si Liyan Qian Qian mo Guangqi Huang Center for Eng. Design & Res. Headquarters of Gen. Equip. Beijing China Dept. of Inf. Oper. & Command Training Nat. Defense Univ. Beijing China School of Electronics Engineering and Computer Science Peking University Beijing China Network Center Beijing Technology and Business University Beijing China School of Information System and Management National University of Defense Technology Changsha China
Simulation experiment result forecast method based on support vector machine (SVM) is put forward and elaborated. Two-class and multiclass forecast experiments are successfully performed. And SVMs are proved to be pow... 详细信息
来源: 评论
Locally adaptive selection of parameters in regularization-based denoising algorithms
Locally adaptive selection of parameters in regularization-b...
收藏 引用
5th IASTED International Conference on Signal Processing, Pattern Recognition, and Applications, SPPRA 2008
作者: Someya, Katsuhiko Kameyama, Keisuke Department of Risk Engineering Graduate school of Systems and Information Engineering University of Tsukuba 1-1-1 Tennoudai Tsukuba Ibaraki 305-8573 Japan Department of Computer Science Grad. Sch. of Sys. and Inf. Eng. University of Tsukuba 1-1-1 Tennoudai Tsukuba Ibaraki 305-8573 Japan
Noise removal from an observed signal is an important problem in signal processing. PDE-based methods have been widely used because of their common property being good at removing the noise while preserving the edges.... 详细信息
来源: 评论
Degraded Document Image Enhancement Using Hybrid Thresholding and Mathematical Morphology
Degraded Document Image Enhancement Using Hybrid Thresholdin...
收藏 引用
Indian Conference on computer Vision, Graphics & Image Processing (ICVGIP)
作者: Nija Babu Preethi N.G. S.S. Shylaja Department of Computer Science and Engineering PES Institute of Technology Bangalore India Dept. of Inf. Sci. & Eng. PES Inst. of Technol. Bangalore
The paper presents a hybrid thresholding approach for binarization and enhancement of degraded documents. Historical documents contain inf.rmation of great cultural and scientific value. But such documents are frequen... 详细信息
来源: 评论
Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks
Markov Chain-Based Trust Model for Analyzing Trust Value in ...
收藏 引用
IEEE Asia-Pacific Conference on Services Computing (APSCC)
作者: Ben-Jye Chang Szu-Liang Kuo Ying-Hsin Liang De-Yu Wang Department of Computer Science and Information Engineering Chaoyang University of Technology Taiwan Dept. of Comput. Sci. & Inf. Eng. Nan-Kai Univ. of Technol.
The multicast mobile ad-hoc network (multicast MANET) is proposed for a sender sending packets to several receivers through a multicast session. Since members of a multicast group changes frequently, the issue of supp... 详细信息
来源: 评论
An RFID-Based Automatic Identification System on Modern Grain Logistics
An RFID-Based Automatic Identification System on Modern Grai...
收藏 引用
International Conference on Management of e-Commerce and e-Government, ICMECG
作者: Zhuang Er Fei Yu Lian Jin Gong Lian Zhejiang Gongshang University Hangzhou Zhejiang CN Sch. of Comput. Sci. & Inf. Eng. Zhejiang Gongshang Univ. Hangzhou School of Computer Science and Information Engineering Zhejiang Gongshang University Hangzhou Zhejiang China
Radio frequency identification (RFID) is a newly-developed automatic identification technology, superior qualities of which would make it possible to substitute the bar code system in the future. Most importantly, it ... 详细信息
来源: 评论
Breaking instance I of new TTM cryptosystems
Breaking instance I of new TTM cryptosystems
收藏 引用
International Conference on Communications, Circuits and Systems (ICCCAS)
作者: Xuyun Nie Xin Jiang Lei Hu Jintai Ding Fengli Zhang University of Electronic Science and Technology of China Chengdu CN State Key Lab. of Inf. Security Grad. Sch. Chinese Acad. of Sci. Beijing Chinese Academy of Sciences Beijing Beijing CN School of Computer Science and Engineering University of Electronic Science and Technology Chengdu China
TTM is a type of multivariate public key cryptosystem. In 2007, the inventor of TTM proposed two new instances of TTM to resist the existing attack, in particular, the Nie et al attack. The two instances are claimed t... 详细信息
来源: 评论
A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement
A Fine-Grained Digital Rights Transfer Policy and Trusted Di...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Zhiyong Zhang Qingqi Pei Jianfeng Ma Lin Yang Kefeng Fan Key Lab of Computer Network & Information Security (Ministry of Education) Xidian University Xi'an Shaanxi China Electron. Inf. Engineering Coll. Henan University of Science and Technology Luoyang Henan China Research Institute China Electronic Equipment and Systems Engineering Corporation Beijing China China Electronics Standardization Institute Beijing China
Existing digital rights management (abbr. DRM) approaches lack a flexible fine-grained digital rights transfer policy, also could not guarantee the trustworthy distribution and enforcement of the transferable rights p... 详细信息
来源: 评论
Morphological NNs with orthonormal basis dendrites  44
Morphological NNs with orthonormal basis dendrites
收藏 引用
44th Annual ACM Southeast Conference, ACMSE 2006
作者: Barmpoutis, Angelos Computer and Inf. Science and Engineering University of Florida Gainesville FL United States
In this paper, a novel model of Morphological Neural Networks (MNN) is presented. MNNs use neurons with dendritic structure that bear a more faithful resemblance to the biological neurons of the celebral cortex than t... 详细信息
来源: 评论