咨询与建议

限定检索结果

文献类型

  • 444 篇 会议
  • 224 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 677 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 253 篇 计算机科学与技术...
    • 217 篇 软件工程
    • 80 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 51 篇 生物工程
    • 41 篇 生物医学工程(可授...
    • 36 篇 机械工程
    • 31 篇 光学工程
    • 27 篇 电气工程
    • 26 篇 电子科学与技术(可...
    • 26 篇 土木工程
    • 22 篇 化学工程与技术
    • 18 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 17 篇 安全科学与工程
    • 14 篇 建筑学
    • 13 篇 交通运输工程
  • 222 篇 理学
    • 98 篇 数学
    • 70 篇 生物学
    • 49 篇 系统科学
    • 34 篇 物理学
    • 32 篇 统计学(可授理学、...
    • 19 篇 化学
  • 88 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 44 篇 医学
    • 37 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 17 篇 农学
  • 12 篇 法学
  • 11 篇 经济学
  • 9 篇 教育学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 26 篇 computer science
  • 19 篇 software enginee...
  • 16 篇 application soft...
  • 16 篇 software
  • 15 篇 mobile computing
  • 14 篇 protocols
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 accuracy
  • 12 篇 robustness
  • 11 篇 control systems
  • 11 篇 analytical model...
  • 11 篇 machine learning
  • 11 篇 routing protocol...
  • 11 篇 mobile communica...
  • 10 篇 mobile ad hoc ne...
  • 10 篇 educational inst...
  • 10 篇 monitoring
  • 10 篇 internet
  • 10 篇 predictive model...

机构

  • 39 篇 beijing key labo...
  • 28 篇 school of electr...
  • 22 篇 seventh research...
  • 11 篇 division of rese...
  • 9 篇 lovely professio...
  • 9 篇 school of electr...
  • 8 篇 department of co...
  • 8 篇 seventh research...
  • 8 篇 division of info...
  • 7 篇 department of co...
  • 7 篇 kkr and ksr inst...
  • 7 篇 department of co...
  • 6 篇 kkr and ksr inst...
  • 6 篇 division of scie...
  • 6 篇 division of info...
  • 6 篇 the seventh rese...
  • 6 篇 division of soft...
  • 6 篇 university of si...
  • 6 篇 department of so...
  • 5 篇 division of neph...

作者

  • 44 篇 yingmin jia
  • 41 篇 junping du
  • 24 篇 fashan yu
  • 16 篇 mohammad s. obai...
  • 12 篇 sanjay k. dhuran...
  • 9 篇 deyuan meng
  • 9 篇 shiying yuan
  • 9 篇 cheol-hoon lee
  • 8 篇 obaidat mohammad...
  • 7 篇 jun zhang
  • 7 篇 dhurandher sanja...
  • 7 篇 won-tae kim
  • 7 篇 do-hyung kim
  • 6 篇 isaac woungang
  • 6 篇 wenling li
  • 6 篇 azka mir
  • 6 篇 pei yan
  • 6 篇 rehman attique u...
  • 6 篇 attique ur rehma...
  • 6 篇 mir azka

语言

  • 648 篇 英文
  • 21 篇 其他
  • 7 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and Software Engineering Division"
677 条 记 录,以下是121-130 订阅
排序:
A handwritten character recognition system based on acceleration
A handwritten character recognition system based on accelera...
收藏 引用
7th International Conference on Digital Content, Multimedia Technology and Its Applications, IDCTA 2011
作者: Yuan, Chun Zhang, Shiqi Wang, Zhao Information Science and Technology Division Graduate School at Shenzhen Tsinghua University Shenzhen China Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China
In this paper, an handwritten character recognition system based on acceleration is presented. The character recognition system using a 3-dimensional (3D) accelerometer, includes three procedures: original signal dete... 详细信息
来源: 评论
Optimizing energy using probabilistic routing in Underwater Sensor Network
Optimizing energy using probabilistic routing in Underwater ...
收藏 引用
2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, SIMULTECH 2012
作者: Dhurandher, Sanjay K. Obaidat, Mohammad S. Gupta, Abhishek Gupta, Prateek Goel, Siddharth Division of Information Technology Netaji Subhas Institute of Technology University of Delhi New Delhi India Department of Computer Science and Software Engineering Monmouth University NJ United States
As the Importance of Applications, Such as Ocean Sampling, Environmental Monitoring, Disaster Prevention, and Distributed Tactical Surveillance, Has Recently Grown, the Need for Underwater Communication Has Become Mor... 详细信息
来源: 评论
Increasing resiliency through priority scheduling of asynchronous data replication
Increasing resiliency through priority scheduling of asynchr...
收藏 引用
11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005
作者: Adams, Kevin P. Gračanin, Denis Hinchey, Michael G. NSWC Dahlgren Division United States Department of Computer Science Virginia Tech United States NASA Software Engineering Lab Goddard Space Flight Center United States
Distributed systems commonly replicate data to enhance system dependability. In such systems, a logical update on a data item results in a physical update on a number of copies. The synchronization and communication r... 详细信息
来源: 评论
A performance comparison of graph analytic methods for supporting enterprise architecture model maintenance
A performance comparison of graph analytic methods for suppo...
收藏 引用
2019 Practice of Enterprise Modelling Conference Forum, PoEM 2019 Forum
作者: Rajashekar, Nikhitha Hacks, Simon Silva, Nuno Research Group Software Construction RWTH Aachen University Germany Division of Network and Systems Engineering KTH Royal Institute of Technology Sweden Department of Computer Science and Engineering Technical University of Lisbon Lisbon Portugal
Enterprise Architecture (EA) models help enterprise architects to make business decisions and to support organisations to understand and analyse its structure. Creating and maintaining such an EA model is expensive an... 详细信息
来源: 评论
SURVEY OF DYNAMIC TAINT ANALYSIS
SURVEY OF DYNAMIC TAINT ANALYSIS
收藏 引用
2014 4th IEEE International Conference on Network Infrastructure and Digital Content
作者: Junhyoung Kim Tae Guen Kim Eul Gyu Im Department of Computer and Software Hanyang University Division of Computer Science and Engineering Hanyang University
Dynamic taint analysis(DTA) is to analyze execution paths that an attacker may use to exploit a system. Dynamic taint analysis is a method to analyze executable files by tracing information flow without source code.... 详细信息
来源: 评论
Corrigendum to “LightSOD: Towards lightweight and efficient network for salient object detection” [J. Comput. Vis. Imag. Underst. 249 (2024) 104148]
收藏 引用
computer Vision and Image Understanding 2025年 252卷
作者: Thien-Thu Ngo Hoang Ngoc Tran Md. Delowar Hossain Eui-Nam Huh School of Information Technology Center for Applied Intelligent Systems Research Halmstad University Kristian IV:s väg 3 Halmstad 30118 Halland Sweden Department Computer Science and Engineering KyungHee University Global Campus Deogyeong-daero Yongin-si 17104 Gyeonggi-do Republic of Korea Department of Software Engineering FPT University 600 Nguyen Van Cu Street Ninh Kieu 94000 Can Tho Viet Nam Department of Computer Science and Engineering Hajee Mohammad Danesh Science & Technology University Basherhat Dinajpur 5200 Rangpur Division Bangladesh
来源: 评论
Application of Ant Colony Optimization to develop energy efficient protocol in Mobile Ad-Hoc Networks
Application of Ant Colony Optimization to develop energy eff...
收藏 引用
作者: Dhurandher, Sanjay K. Obaidat, Mohammad S. Gupta, Mayank Division of Information Technology Netaji Subhas Institute of Technology University of Delhi New Delhi India Department of Computer Science and Software Engineering Monmouth University NJ United States Division of Computer Engineering Netaji Subhas Institute of Technology University of Delhi New Delhi India
Foraging Behavior in Ant Swarms can be very helpful when applied to the protocols in Mobile Ad hoc NETworks (MANETs). When the Ant Colony Optimization Scheme (ACO) is applied to a protocol, larger number of paths are ... 详细信息
来源: 评论
A distributed wearable system based on multimodal fusion
A distributed wearable system based on multimodal fusion
收藏 引用
3rd International Conference on Embedded software and Systems, ICESS 2007
作者: Cho, Il-Yeon Sunwoo, John Jeong, Hyun-Tae Son, Yong-Ki Ahn, Hee-Joong Lee, Dong-Woo Han, Dong-Won Lee, Cheol-Hoon Digital Home Research Division Electronics and Telecommunications Research Institute Daejeon Korea Republic of System Software Laboratory Department of Computer Engineering Chungnam National University Daejeon Korea Republic of
Wearable computer can be worn anytime with the support of unrestricted communications and variety of services which provides maximum capability of information use. Key challenges in developing such wearable computers ... 详细信息
来源: 评论
Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain
收藏 引用
computers, Materials & Continua 2021年 第1期66卷 499-515页
作者: Lejun Zhang Minghui Peng Weizheng Wang Yansen Su Shuna Cui Seokhoon Kim College of Information Engineering Yangzhou UniversityYangzhou225127China School Math&Computer Science Quanzhou Normal UniversityQuanzhou362000China Division of Computer Science University of AizuAizu–Wakamatsu9658580Japan Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui UniversityHefei230601China Medical College of Yangzhou University Yangzhou225001China Department of Gynecology and Obstetrics Affiliated Hospital of Yangzhou UniversityYangzhouChina Department of Computer Software Engineering Soonchunhyang UniversityAsanKorea
In the digital era,electronic medical record(EMR)has been a major way for hospitals to store patients’medical *** traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic... 详细信息
来源: 评论
Putting the software radio on a low-calorie diet
Putting the software radio on a low-calorie diet
收藏 引用
9th ACM SIGCOMM Workshop on Hot Topics in Networks, HotNets-9
作者: Dutta, Prabal Kuo, Ye-Sheng Ledeczi, Akos Schmid, Thomas Volgyesi, Peter Computer Science and Engineering Division University of Michigan Ann Arbor MI 48109 United States Institute for Software Integrated Systems Vanderbilt University Nashville TN 37235 United States
Modern software-defined radios are large, expensive, and power-hungry devices and this, we argue, hampers their more widespread deployment and use, particularly in low-power, size-constrained application settings like... 详细信息
来源: 评论