咨询与建议

限定检索结果

文献类型

  • 444 篇 会议
  • 221 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 674 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 416 篇 工学
    • 251 篇 计算机科学与技术...
    • 215 篇 软件工程
    • 80 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 52 篇 生物工程
    • 41 篇 生物医学工程(可授...
    • 36 篇 机械工程
    • 31 篇 光学工程
    • 27 篇 电气工程
    • 26 篇 电子科学与技术(可...
    • 26 篇 土木工程
    • 22 篇 化学工程与技术
    • 18 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 16 篇 安全科学与工程
    • 14 篇 建筑学
    • 12 篇 交通运输工程
  • 221 篇 理学
    • 99 篇 数学
    • 69 篇 生物学
    • 49 篇 系统科学
    • 34 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 19 篇 化学
  • 88 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 43 篇 医学
    • 37 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 17 篇 农学
  • 12 篇 法学
  • 11 篇 经济学
  • 9 篇 教育学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 26 篇 computer science
  • 19 篇 software enginee...
  • 16 篇 application soft...
  • 16 篇 software
  • 15 篇 mobile computing
  • 14 篇 protocols
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 accuracy
  • 12 篇 robustness
  • 11 篇 control systems
  • 11 篇 analytical model...
  • 11 篇 machine learning
  • 11 篇 routing protocol...
  • 11 篇 mobile communica...
  • 10 篇 mobile ad hoc ne...
  • 10 篇 educational inst...
  • 10 篇 monitoring
  • 10 篇 internet
  • 10 篇 predictive model...

机构

  • 39 篇 beijing key labo...
  • 28 篇 school of electr...
  • 22 篇 seventh research...
  • 10 篇 division of rese...
  • 9 篇 lovely professio...
  • 9 篇 school of electr...
  • 8 篇 department of co...
  • 8 篇 seventh research...
  • 8 篇 division of info...
  • 7 篇 department of co...
  • 7 篇 kkr and ksr inst...
  • 7 篇 department of co...
  • 6 篇 kkr and ksr inst...
  • 6 篇 division of scie...
  • 6 篇 division of info...
  • 6 篇 the seventh rese...
  • 6 篇 division of soft...
  • 6 篇 university of si...
  • 6 篇 department of so...
  • 5 篇 division of neph...

作者

  • 44 篇 yingmin jia
  • 41 篇 junping du
  • 24 篇 fashan yu
  • 16 篇 mohammad s. obai...
  • 12 篇 sanjay k. dhuran...
  • 9 篇 deyuan meng
  • 9 篇 shiying yuan
  • 9 篇 cheol-hoon lee
  • 8 篇 obaidat mohammad...
  • 7 篇 jun zhang
  • 7 篇 dhurandher sanja...
  • 7 篇 won-tae kim
  • 7 篇 do-hyung kim
  • 6 篇 isaac woungang
  • 6 篇 wenling li
  • 6 篇 azka mir
  • 6 篇 pei yan
  • 6 篇 rehman attique u...
  • 6 篇 attique ur rehma...
  • 6 篇 mir azka

语言

  • 648 篇 英文
  • 18 篇 其他
  • 7 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and Software Engineering Division"
674 条 记 录,以下是91-100 订阅
排序:
An Empirical analysis of software effort estimation with outlier elimination  08
An Empirical analysis of software effort estimation with out...
收藏 引用
30th International Conference on software engineering, ICSE 2008 - 4th International Workshop on Predictor Models in software engineering, PROMISE 2008
作者: Seo, Yeong-Seok Yoon, Kyung-A Bae, Doo-Hwan Software Engineering Laboratory Division of Computer Science EECS KAIST 373-1 Guseong-dong Yuseong-gu Daejeon 305-701 Korea Republic of
Accurate software effort estimation has always been challenge for software engineering communities. To improve the estimation accuracy of software effort, many studies have focused on effort estimation methods without... 详细信息
来源: 评论
Digital smartpen technology and revitalization of the myaamia language
收藏 引用
Journal on Computing and Cultural Heritage 2011年 第4期4卷 1-11页
作者: Obonyo, Victor Troy, Douglas Baldwin, Daryl Clarke, James Division of Water Quality Lexington-Fayette Urban County Government 201 Lisle Industrial Ave. Lexington KY 45011 United States Department of Computer Science and Software Engineering School of Engineering and Applied Science Miami University Oxford OH 45056 United States
The article reports the results of a usability test applying digital smartpen technology and interactive audio booklets to assist the Miami Tribe of Oklahoma in revitalization of the Myaamia language and culture. The ... 详细信息
来源: 评论
Design and implementation of software architecture for mobile terminals supporting interworking between CDMA and WiBro
Design and implementation of software architecture for mobil...
收藏 引用
2nd International Conference on Convergent Information Technology, ICCIT 07
作者: Kim, Do-Hyung Lee, Hwan-Gu Kim, Won-Tae Kim, Sun-Ja Lee, Cheol-Hoon Embedded S/WResearch Division Electronics and Telecommunications Research Institute Dept. of Computer Engineering System Software Lab. Chungnam National University
This paper describes the design and implementation of software architecture for Linux-based mobile terminals supporting interworking between CDMA and WiBro. The software architecture includes network switching control... 详细信息
来源: 评论
An efficient and secure routing protocol for wireless sensor networks using multicasting
An efficient and secure routing protocol for wireless sensor...
收藏 引用
IEEE International Conference on Green Computing and Communications
作者: Dhurandher, Sanjay K. Obaidat, Mohammad S. Jain, Gaurav Ganesh, Isha Mani Shashidhar, Vinay Division of Information Technology Netaji Subhas Institute of Technology University of Delhi New Delhi India Department of Computer Science and Software Engineering Monmouth University NJ United States Division of Computer Engineering Netaji Subhas Institute of Technology University of Delhi New Delhi India
Recent technological advancements in the field of nanotechnology have increased the computation power of the wireless nodes while adhering to the energy constraints. This has made the use of the Wireless Sensor Networ... 详细信息
来源: 评论
Creating a program and research a cryptosystem on the basis of Cardan grille
Creating a program and research a cryptosystem on the basis ...
收藏 引用
2013 2nd International Conference on Informatics and Applications, ICIA 2013
作者: Utepbergenov, Irbulat Kuandykova, Janna Mussin, Tamerlan Sagyndykova, Sholpan Department of Computer Science and Information Systems Kazakh Academy of Transport and Communications Almaty Kazakhstan Department of Computer and Software Engineering Turan University Almaty Kazakhstan Division of Research and Cooperation Caspian University of Technologies and Engineering Aktay Kazakhstan
Considered cryptosystems such as Cardano square lattices are characterized by the high-speed encryption in use today Enhanced Programming computers. This is because the number of different variants rapidly increases w... 详细信息
来源: 评论
Android malware classification method: Dalvik bytecode frequency analysis  13
Android malware classification method: Dalvik bytecode frequ...
收藏 引用
2013 Research in Adaptive and Convergent Systems, RACS 2013
作者: Kang, Byeongho Kang, BooJoong Kim, Jungtae Im, Eul Gyu Department of Computer and Software Hanyang University Seoul 133-791 Korea Republic of Department of Electronics and Computer Engineering Hanyang University Seoul 133-791 Korea Republic of Division of Computer Science and Engineering Hanyang University Seoul 133-791 Korea Republic of
The number of Android malware is increasing with the growth of Android, so there needs to have a method to classify malware families. There are many classification methods proposed so far, but most of them are based o... 详细信息
来源: 评论
Function matching-based binary-level software similarity calculation  13
Function matching-based binary-level software similarity cal...
收藏 引用
2013 Research in Adaptive and Convergent Systems, RACS 2013
作者: Lee, Yeo Reum Kang, BooJoong Im, Eul Gyu Department of Computer and Software Hanyang University Seoul 133-791 Korea Republic of Department of Electronics and Computer Engineering Hanyang University Seoul 133-791 Korea Republic of Division of Computer Science and Engineering Hanyang University Seoul 133-791 Korea Republic of
This paper proposes a method to calculate similarities of software without any source code information. The proposed method can be used for various applications such as detecting the source code theft and copyright in... 详细信息
来源: 评论
SlowFast Based Real-Time Human Motion Recognition with Action Localization
收藏 引用
computer Systems Science & engineering 2023年 第11期47卷 2135-2152页
作者: Gyu-Il Kim Hyun Yoo Kyungyong Chung Department of Computer Science Kyonggi UniversitySuwon16227Korea Contents Convergence Software Research Institute Kyonggi UniversitySuwon16227Korea Division of AI Computer Science and Engineering Kyonggi UniversitySuwon16227Korea
Artificial intelligence is increasingly being applied in the field of video analysis,particularly in the area of public safety where video surveillance equipment such as closed-circuit television(CCTV)is used and auto... 详细信息
来源: 评论
Abnormal Behavior Detection Using Deep-Learning-Based Video Data Structuring
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2371-2386页
作者: Min-Jeong Kim Byeong-Uk Jeon Hyun Yoo Kyungyong Chung Department of Computer Science Kyonggi UniversitySuwon-si16227Gyeonggi-doKorea Contents Convergence Software Research Institute Kyonggi UniversitySuwon-si16227Gyeonggi-doKorea Division of AI Computer Science and Engineering Kyonggi UniversitySuwon-si16227Gyeonggi-doKorea
With the increasing number of digital devices generating a vast amount of video data,the recognition of abnormal image patterns has become more ***,it is necessary to develop a method that achieves this task using obj... 详细信息
来源: 评论
Possibilities about the design Lean canvas model and its adaptation in the agile testing
Possibilities about the design Lean canvas model and its ada...
收藏 引用
2017 Symposium for Young Scientists in Technology, engineering and Mathematics, SYSTEM 2017
作者: Nidagundi, Padmaraj Novickis, Leonids Faculty of Computer Science and Information Technology Institute of Applied Computer Systems Riga Technical University Riga Latvia Head of the Division of Software Engineering Faculty of Computer Science and Information Technology Riga Technical University Riga Latvia
software development industry is inventing new development methodologies in last 10 years for improving the existing developing tools, process and delivering a high-quality software to end customer in short time. In r... 详细信息
来源: 评论