咨询与建议

限定检索结果

文献类型

  • 969 篇 期刊文献
  • 894 篇 会议
  • 10 册 图书

馆藏范围

  • 1,873 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,102 篇 工学
    • 639 篇 计算机科学与技术...
    • 529 篇 软件工程
    • 208 篇 信息与通信工程
    • 181 篇 电子科学与技术(可...
    • 165 篇 电气工程
    • 145 篇 光学工程
    • 132 篇 生物工程
    • 105 篇 生物医学工程(可授...
    • 104 篇 控制科学与工程
    • 95 篇 材料科学与工程(可...
    • 93 篇 化学工程与技术
    • 61 篇 仪器科学与技术
    • 56 篇 机械工程
    • 37 篇 土木工程
    • 36 篇 动力工程及工程热...
  • 868 篇 理学
    • 416 篇 物理学
    • 274 篇 数学
    • 192 篇 生物学
    • 118 篇 化学
    • 107 篇 统计学(可授理学、...
    • 40 篇 系统科学
  • 248 篇 管理学
    • 131 篇 管理科学与工程(可...
    • 121 篇 图书情报与档案管...
    • 77 篇 工商管理
  • 146 篇 医学
    • 110 篇 临床医学
    • 102 篇 基础医学(可授医学...
    • 47 篇 药学(可授医学、理...
    • 42 篇 公共卫生与预防医...
  • 50 篇 法学
    • 44 篇 社会学
  • 44 篇 农学
  • 30 篇 教育学
  • 27 篇 经济学
  • 7 篇 军事学
  • 4 篇 艺术学
  • 2 篇 文学
  • 1 篇 哲学

主题

  • 43 篇 computer science
  • 31 篇 machine learning
  • 26 篇 deep learning
  • 25 篇 feature extracti...
  • 23 篇 computational mo...
  • 23 篇 training
  • 21 篇 accuracy
  • 20 篇 support vector m...
  • 19 篇 semantics
  • 16 篇 image segmentati...
  • 16 篇 data mining
  • 15 篇 computer archite...
  • 15 篇 neural networks
  • 15 篇 cameras
  • 14 篇 reinforcement le...
  • 14 篇 face recognition
  • 14 篇 bandwidth
  • 14 篇 servers
  • 13 篇 monitoring
  • 13 篇 artificial intel...

机构

  • 51 篇 institute of com...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 39 篇 yerevan physics ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 dipartimento di ...
  • 38 篇 graduate school ...
  • 38 篇 institute of phy...
  • 38 篇 institute of phy...
  • 37 篇 faculté des scie...
  • 37 篇 department of mo...
  • 37 篇 centre de calcul...
  • 37 篇 research center ...

作者

  • 33 篇 m. klein
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 r. ströhmer
  • 32 篇 s. h. kim
  • 31 篇 f. buehrer
  • 31 篇 a. t. law
  • 31 篇 d. di valentino

语言

  • 1,545 篇 英文
  • 311 篇 其他
  • 11 篇 中文
  • 8 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Computing Institute - Graduate Program in Computer Science"
1873 条 记 录,以下是1431-1440 订阅
Measurement of capacitance and electrical potential of plural points for estimation of permittivity distribution
收藏 引用
IEEJ Transactions on Fundamentals and Materials 2013年 第4期133卷 173-179+5页
作者: Okada, Shota Ohchi, Masashi Furukawa, Tatsuya Itoh, Hideaki Fukumoto, Hisao Master's Program in Electrical Graduate School of Engineering Chiba Institute of Technology 2-17-1 Tudanuma Narashino 275-0016 Japan Department of Electrical Electronics and Computer Engineering Faculty of Engineering Chiba Institute of Technology 2-17-1 Tudanuma Narashino 275-0016 Japan Graduate School of Science and Engineering Saga University 1 Honjo-machi Saga 840-8502 Japan
Recently, a method for estimating permittivity distributions was reported. The method combined a numerical technique (Finite Element Method) with Genetic Algorithm (GA). However, methods for estimating the distributio... 详细信息
来源: 评论
Verifying data authenticity and integrity in server-aided confidential forensic investigation
Verifying data authenticity and integrity in server-aided co...
收藏 引用
International Conference on Information and Communication Technology, ICT-EurAsia 2013
作者: Hou, Shuhui Sasaki, Ryoichi Uehara, Tetsutaro Yiu, Siuming Department of Information and Computing Science University of Science and Technology Beijing China Graduate School of Science and Technology for Future Life Tokyo Denki University Japan Research Institute of Information Security Wakayama Japan Department of Computer Science University of Hong Kong Hong Kong Hong Kong
With the rapid development of cloud computing services, it is common to have a large server shared by many different users. As the shared server is involved in a criminal case, it is hard to clone a copy of data in fo... 详细信息
来源: 评论
Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association
Real-Time Detection of Encrypted Thunder Traffic Based on Tr...
收藏 引用
International Conference on Trustworthy computing and Services, ISCTCS 2012
作者: Xiong, Gang Huang, Wenting Zhao, Yong Song, Ming Li, Zhenzhen Guo, Li Institute of Computing Technology Chinese Academy of Science China Institute of Information Engineering Chinese Academy of Science China Graduate University of Chinese Academy of Science China National Computer Network Emergency Response Technical Team China Beijing University of Posts and Telecommunications Beijing China Ministry of Education Beijing China
Thunder, as the most popular P2P download software in China, has token up a large amount of bandwidth. And it is almost impossible to identify the encrypted thunder traffic. This paper proposes a method to detect encr... 详细信息
来源: 评论
Provenance traces of the swift parallel scripting system  13
Provenance traces of the swift parallel scripting system
收藏 引用
Joint EDBT/ICDT 2013 Workshops
作者: Gadelha Jr., Luiz M. R. Wilde, Michael Mattoso, Marta Foster, Ian National Laboratory for Scientific Computing Brazil Mathematics and Computer Science Division Argonne National Laboratory United States Computation Institute Argonne National Laboratory University of Chicago United States Computer and Systems Engineering Program Federal University of Rio de Janeiro Brazil Department of Computer Science University of Chicago United States
In this abstract, we describe provenance traces generated from executions of scientific workflows managed by the Swift parallel scripting system. They follow a provenance data model, used by MTCProv, the provenance ma...
来源: 评论
7th Drug hypersensitivity meeting: part two Malaga, Spain. 21-23 April 2016 abstracts
收藏 引用
CLINICAL AND TRANSLATIONAL ALLERGY 2016年 第SUPPL 3期6卷 30-30页
作者: [Anonymous] Hospital de la Cruz Roja Madrid Spain Allergy Unit Hospital Central Cruz Roja Madrid Spain Allergy Unit Hospital Central de la Cruz Roja Madrid Spain IIS La Fe Valencia Spain Department of Internal Medicine Faculty of Medicine Celal Bayar University Manisa Turkey Department of Allergy and Immunology Faculty of Medicine Celal Bayar University Manisa Turkey Department of Dermatology Faculty of Medicine Celal Bayar University Manisa Turkey Department of Pathology Faculty of Medicine Celal Bayar University Manisa Turkey Department of Dermatology Chang Gung Memorial Hospital Linkou Taiwan Department of Dermatology Drug Hypersensitivity Clinical and Research Center Chang Gung Memorial Hospital Linkou Taiwan Serviço de Imunoalergologia Centro Hospitalar de São João E.P.E. Porto Portugal Laboratório de Imunologia Faculdade de Medicina Universidade do Porto Porto Portugal Centro Hospitalar de São João Porto Portugal Federal University of São Paulo São Paulo Brazil Federal University of Rio de Janeiro Rio De Janeiro Brazil Pontificia Universidade Católica de Campinas Campinas Brazil Private Practice Goiania Brazil Department of Allergy and Clinical Immunology Ege University Medical Faculty Izmir Turkey Ege University Medical Faculty Izmir Turkey Hospital Central de la Defensa IMIDEF Madrid Spain Centro Hospitalar de Lisboa Central Hospital de Dona Estefânia Lisbon Portugal Faculty of Medicine University hospital University of Monastir Monastir Tunisia Faculty of Medicine and Health Sciences Department of Immunology Allergology Rheumatology and Antwerp University Hospital Immunology Allergology Rheumatology University of Antwerp Antwerp Belgium Allergy Unit Complesso Integrato Columbus Rome Italy IRCCS Oasi Maria S.S. Troina Italy Immunoallergy Department - Hospital de Santa Maria Centro Hospitalar Lisboa Norte Lisbon Portugal Faculdade de Medicina de Lisboa Lisbon Portugal Serviço de Imunoalergologia Hospital de São Bernardo Setúbal Port
Poster walk 11: miscellaneous drug hypersensitivity 2 (P92–P94, P96–P101) P92 16 years of experience with proton pump inhibitors (PPIs) Javier Dionicio Elera, Cosmin Boteanu, Maria Aranzazu Jimenez Blanco, ... 详细信息
来源: 评论
Terminology Learning through Taxonomy Discovery
Terminology Learning through Taxonomy Discovery
收藏 引用
Brazilian Conference on Intelligent Systems (BRACIS)
作者: Raphael Melo Kate Revoredo Aline Paes Postgraduate Information Systems Program UNIRIO Brazil Department of Computer Science Institute of Computing Brazil
Description Logics based languages have emerged as the standard knowledge representation scheme for ontologies. Typically, an ontology formalizes a number of dependent and related concepts in a domain, encompassed as ... 详细信息
来源: 评论
Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid
收藏 引用
Smart Grid and Renewable Energy 2013年 第4期4卷 313-324页
作者: Depeng Li Zeyar Aung Srinivas Sampalli John Williams Abel Sanchez Computing and Information Science Program Masdar Institute of Science and Technology Abu Dhabi UAE Faculty of Computer Science Dalhousie University Halifax Canada Massachusetts Institute of Technology (MIT) Cambridge USA.
Privacy preservation is a crucial issue for smart buildings where all kinds of messages, e.g., power usage data, control commands, events, alarms, etc. are transmitted to accomplish the management of power. Without ap... 详细信息
来源: 评论
Design and implementation of a bimodal face recognition system
Design and implementation of a bimodal face recognition syst...
收藏 引用
4th International Conference on Intelligence science and Big Data Engineering, IScIDE 2013
作者: Xu, Yong Yang, Jian Xu, Jiajie Zhu, Qi Fan, Zizhu Bio-Computing Center Harbin Institute of Technology Shenzhen Graduate School Shenzhen China Key Laboratory of Network Oriented Intelligent Computation Shenzhen China School of Computer Science and Technology Nanjing University of Science and Technology Nanjing China School of Basic Science East China Jiaotong University Nanchang China
Visible light face images usually have a high resolution;however, the performance of face recognition using visible light face images is usually affected by the varying illumination. It seems that near infrared face r... 详细信息
来源: 评论
Expert user discovery in a spontaneous social network an approach using knowledge retrieval
Expert user discovery in a spontaneous social network an app...
收藏 引用
International Conference on Computational Aspects of Social Networks, CASON
作者: Gustavo Freitas Cristiano da Costa Jorge Barbosa Rodrigo Righi Adenauer Yamin Applied Computing Graduate Program-PlPCA University of Vale do Rio dos Sinos Sao Leopoldo Brazil Graduate Program in Computer Science-PPGC Federal University of Pelotas Pelotas Brazil
Nowadays, we can observe that finding answers on social networks is a hard and time-consuming task. The main contribution of this article is the creation of a model and algorithm that allows users to find answers to t... 详细信息
来源: 评论
XReal-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association
XReal-Time Detection of Encrypted Thunder Traffic Based on T...
收藏 引用
作者: Xiong, Gang Huang, Wenting Zhao, Yong Song, Ming Li, Zhenzhen Guo, Li Institute of Computing Technology Chinese Academy of Science China Institute of Information Engineering Chinese Academy of Science China Graduate University of Chinese Academy of Science China National Computer Network Emergency Response Technical Team China Beijing University of Posts and Telecommunications Beijing China Ministry of Education Beijing China
Thunder, as the most popular P2P download software in China, has token up a large amount of bandwidth. And it is almost impossible to identify the encrypted thunder traffic. This paper proposes a method to detect encr... 详细信息
来源: 评论