咨询与建议

限定检索结果

文献类型

  • 444 篇 会议
  • 224 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 677 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 253 篇 计算机科学与技术...
    • 217 篇 软件工程
    • 80 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 51 篇 生物工程
    • 41 篇 生物医学工程(可授...
    • 36 篇 机械工程
    • 31 篇 光学工程
    • 27 篇 电气工程
    • 26 篇 电子科学与技术(可...
    • 26 篇 土木工程
    • 22 篇 化学工程与技术
    • 18 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 17 篇 安全科学与工程
    • 14 篇 建筑学
    • 13 篇 交通运输工程
  • 222 篇 理学
    • 98 篇 数学
    • 70 篇 生物学
    • 49 篇 系统科学
    • 34 篇 物理学
    • 32 篇 统计学(可授理学、...
    • 19 篇 化学
  • 88 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 44 篇 医学
    • 37 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 17 篇 农学
  • 12 篇 法学
  • 11 篇 经济学
  • 9 篇 教育学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 26 篇 computer science
  • 19 篇 software enginee...
  • 16 篇 application soft...
  • 16 篇 software
  • 15 篇 mobile computing
  • 14 篇 protocols
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 accuracy
  • 12 篇 robustness
  • 11 篇 control systems
  • 11 篇 analytical model...
  • 11 篇 machine learning
  • 11 篇 routing protocol...
  • 11 篇 mobile communica...
  • 10 篇 mobile ad hoc ne...
  • 10 篇 educational inst...
  • 10 篇 monitoring
  • 10 篇 internet
  • 10 篇 predictive model...

机构

  • 39 篇 beijing key labo...
  • 28 篇 school of electr...
  • 22 篇 seventh research...
  • 11 篇 division of rese...
  • 9 篇 lovely professio...
  • 9 篇 school of electr...
  • 8 篇 department of co...
  • 8 篇 seventh research...
  • 8 篇 division of info...
  • 7 篇 department of co...
  • 7 篇 kkr and ksr inst...
  • 7 篇 department of co...
  • 6 篇 kkr and ksr inst...
  • 6 篇 division of scie...
  • 6 篇 division of info...
  • 6 篇 the seventh rese...
  • 6 篇 division of soft...
  • 6 篇 university of si...
  • 6 篇 department of so...
  • 5 篇 division of neph...

作者

  • 44 篇 yingmin jia
  • 41 篇 junping du
  • 24 篇 fashan yu
  • 16 篇 mohammad s. obai...
  • 12 篇 sanjay k. dhuran...
  • 9 篇 deyuan meng
  • 9 篇 shiying yuan
  • 9 篇 cheol-hoon lee
  • 8 篇 obaidat mohammad...
  • 7 篇 jun zhang
  • 7 篇 dhurandher sanja...
  • 7 篇 won-tae kim
  • 7 篇 do-hyung kim
  • 6 篇 isaac woungang
  • 6 篇 wenling li
  • 6 篇 azka mir
  • 6 篇 pei yan
  • 6 篇 rehman attique u...
  • 6 篇 attique ur rehma...
  • 6 篇 mir azka

语言

  • 648 篇 英文
  • 21 篇 其他
  • 7 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and Software Engineering Division"
677 条 记 录,以下是61-70 订阅
排序:
A Deep Learning-Based Approach for Mammographic Architectural Distortion Classification  1
收藏 引用
5th International Conference on Innovative Computing, IC 2022
作者: ur Rehman, Khalil Li, Jianqiang Pei, Yan Yasin, Anaa Ali, Saqib School of Software Engineering Beijing University of Technology Beijing China Beijing Engineering Research Center for IoT Software and Systems Beijing China Computer Science Division University of Aizu Aizuwakamatsu Japan
Breast cancer is the most deadly cancer in females globally. Architectural distortion is the third most often reported irregularity on digital mammograms among the masses and microcalcification. Physically identifying... 详细信息
来源: 评论
Future Intelligent Autonomous Robots, Ethical by Design. Lessons Learned from Autonomous Cars Ethics  14
Future Intelligent Autonomous Robots, Ethical by Design. Les...
收藏 引用
14th International Conference on Society and Information Technologies, ICSIT 2023
作者: Dodig-Crnkovic, Gordana Holstein, Tobias Pelliccione, Patrizio Thavarasa, Jathoosh Division of Computer Science and Software Engineering Mälardalen University Västerås Sweden Department of Computer Science and Engineering Chalmers University of Technology Gothenburg Sweden Department of Information Engineering Computer Science and Mathematics University of l'Aquila L'Aquila Italy Software Engineering Efrei Paris Villejuif France
The "ethical by design" approach involves examining all stages of a lifecycle of technology to ensure that they are ethically justifiable and socially sustainable. Building on our work on the ethics of auton... 详细信息
来源: 评论
Defect Detection Model Using Time Series Data Augmentation and Transformation
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1713-1730页
作者: Gyu-Il Kim Hyun Yoo Han-Jin Cho Kyungyong Chung Department of Computer Science Kyonggi UniversitySuwon-si16227Korea Contents Convergence Software Research Institue Kyonggi UniversitySuwon-si16227Korea Department of Energy IT Engineering Far East UniversityEumsung-gun27601Korea Division of AI Computer Science and Engineering Kyonggi UniversitySuwon-si16227Korea
Time-series data provide important information in many fields,and their processing and analysis have been the focus of much ***,detecting anomalies is very difficult due to data imbalance,temporal dependence,and ***,m... 详细信息
来源: 评论
Rule-based anti-anti-debugging system  13
Rule-based anti-anti-debugging system
收藏 引用
2013 Research in Adaptive and Convergent Systems, RACS 2013
作者: Lee, JaeKeun Kang, BooJoong Im, Eul Gyu Department of Computer and Software Hanyang University Seoul Korea Republic of Department of Electronics and Computer Engineering Hanyang University Seoul Korea Republic of Division of Computer Science and Engineering Hanyang University Seoul Korea Republic of
Anti-debugging technology refers to various ways of preventing binary files from being analyzed in debuggers or other virtual machine environments. If binary files conceal or modify themself using anti-debugging techn... 详细信息
来源: 评论
Design and implementation of smartphone edition based on embedded linux
Design and implementation of smartphone edition based on emb...
收藏 引用
10th International Conference on Advanced Communication Technology
作者: Kim, Do-Hyung Yun, Min-Hong Kim, Sun-Ja Lee, Cheol-Hoon Embedded SAV Research Division Electronics and Telecommunications Research Institute Dept. of Computer Engineering System Software Lab. Chungnam National University
The paper describes the design and implementation of Qplus Smartphone Edition based on embedded Linux. Existing Smartphone platforms entailed royalty expenses and had custornization difficulties due to the closure of ... 详细信息
来源: 评论
The design of real-time adaptive forensically sound secure critical infrastructure
The design of real-time adaptive forensically sound secure c...
收藏 引用
International Conference on Network and System Security
作者: Hunt, Ray Slay, Jill Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand Department of Research Division IT Engineering and the Environment University of South Australia Australia
Network security design has seen significant advances in recent years. This has been demonstrated by a growing number of new encryption algorithms, more intelligent firewall and intrusion detection techniques, new dev... 详细信息
来源: 评论
A Wireless Sensor Network Platform for Elderly Persons at Home
收藏 引用
稀有金属材料与工程 2006年 第A03期35卷 95-99页
作者: Young-Dong Lee Dae-Seok Lee Wan-Young Chung Risto Myllylae Dept of Computer Network Eng Graduate School of SoftwareDongseo UniversityBusan 617-716Korea Division of Computer & Information Eng Dongseo UniversityBusan 617-716Korea Dept of Electrical and Information Engineering University of OuluLinnanmaa 90570 OuluFinland
A small size ubiquitous healthcare system for the home care of elderly persons was designed and *** system comprised a wireless sensor network node,base station and server computer for the continuous monitoring of ECG... 详细信息
来源: 评论
A Performance Evaluation of Vertical Hanover Architecture with Low Latency Handover
A Performance Evaluation of Vertical Hanover Architecture wi...
收藏 引用
International Conference on Convergence and Hybrid Information Technology
作者: Kim, Do-Hyung Kim, Won-Tae Lee, Hwan-Gu Kim, Sun-Ja Lee, Cheol-Hoon Convergence SW Research Division Electronics and Telecommunications Research Institute Dept. of Computer Engineering System Software Lab. Chungnam National University
This paper describes the vertical handover architecture with Low Latency Handover for mobile terminals which supports interworking between heterogeneous networks. The vertical handover architecture defines handover-re... 详细信息
来源: 评论
Timed hazard analysis of self-healing systems
Timed hazard analysis of self-healing systems
收藏 引用
ESEC/FSE 2011 Workshop on Assurances for Self-Adaptive Systems, ASAS 2011
作者: Priesterjahn, Claudia Steenken, Dominik Tichy, Matthias Heinz Nixdorf Institute Software Engineering Group University of Paderborn Germany Research Group Specification and Modelling of Software Systems Department of Computer Science University of Paderborn Germany Software Engineering Division Chalmers University of Technology University of Gothenburg Sweden
Self-healing can be used to reduce hazards in embedded real-time systems which are applied in safety-critical environments. These systems may react to failures by a structural reconfiguration of the architecture durin... 详细信息
来源: 评论
Designing a Distributed Multi-agent System for Compiler Optimization
Designing a Distributed Multi-agent System for Compiler Opti...
收藏 引用
2021 Zooming Innovation in Consumer Technologies Conference, ZINC 2021
作者: Sari, Alparslan Sahin, Cagri Butun, Ismail University of Delaware Electrical and Computer Engineering Computer Systems and Networking NewarkDE United States Gazi University Computer Engineering Software Research Group Ankara Turkey Chalmers University of Technology Computer Science and Engineering Network and Systems Division Gothenburg Sweden
This paper explores the run time performance improvements using different GCC optimization flags in program compilation. As multi-core microprocessor systems replacing legacy single-core ones, tremendous effort is nee... 详细信息
来源: 评论