咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是4591-4600 订阅
排序:
Estimation for presented images by EEGs during recongition and recalling
Estimation for presented images by EEGs during recongition a...
收藏 引用
International Conference on Fuzzy Theory and it's Applications (iFUZZY)
作者: Takahiro Yamanoi Yoshinori Tanaka Hisashi Toyoshima Mika Otsuki Shin-ichi Ohnishi Toshimasa Yamazaki Michio Sugeno Graduate School of Engineering Hokkai-Gakuen University Sapporo Japan Japan Technical Software Sapporo Japan Faculty of Health Sciences Hokkaido University Sapporo Japan Faculty of Computer Science and Systems Engineering Kyushu Institute of Technology Iizuka Japan Edificio Cientifico Technologico European Center for Soft Computing Mieres-Asutrias Spain
The present authors recorded electroencephalograms (EEGs) from subjects viewing four types of line drawings of body part, tetrapod, home appliance, that were presented on a CRT. The authors investigated a single trial... 详细信息
来源: 评论
Undo the codebook bias by linear transformation for visual applications  13
Undo the codebook bias by linear transformation for visual a...
收藏 引用
21st ACM International Conference on Multimedia, MM 2013
作者: Zhang, Chunjie Zhang, Yifan Wang, Shuhui Pang, Junbiao Liang, Chao Huang, Qingming Tian, Qi School of Computer and Control Engineering University of Chinese Academy of Sciences 100049 Beijing China National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences Beijing China Key Lab of Intell. Info. Process Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China College of Computer Science and Technology Beijing University of Technology 100124 Beijing China School of Computer National Engineering Research Center for Multimedia Software Wuhan University 430072 Wuhan China Department of Computer Sciences University of Texas at San Antonio San Antonio TX 78249 United States
The bag of visual words model (BoW) and its variants have demonstrate their effectiveness for visual applications and have been widely used by researchers. The BoW model first extracts local features and generates the... 详细信息
来源: 评论
A Monte-Carlo path planner for dynamic and partially observable environments
A Monte-Carlo path planner for dynamic and partially observa...
收藏 引用
2012 IEEE International Conference on Computational Intelligence and Games, CIG 2012
作者: Naveed, Munir Kitchin, Diane Crampton, Andrew Chrpa, Lukáš Gregory, Peter School of Computing and Engineering University of Huddersfield United Kingdom Department of Software Engineering Fatima Jinnah Women University Pakistan
In this paper, we present a Monte-Carlo policy rollout technique (called MOCART-CGA) for path planning in dynamic and partially observable real-time environments such as Real-time Strategy games. The emphasis is put o... 详细信息
来源: 评论
Inference of microbial interactions from time series data using vector autoregression model
Inference of microbial interactions from time series data us...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xingpeng Jiang Xiaohua Hu Weiwei Xu Guangrong Li Yongli Wang College of Computing and Informatics Drexel University Philadelphia PA USA International School of Software Wuhan University Wuhan Hubei China School of business Hunan University Changsha Hunan China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Jiangsu China
Microbial interaction, such as species competition and symbiotic relationships, plays important role to enable microorganisms to survive by establishing a homeostasis between microbial neighbors and local environments... 详细信息
来源: 评论
Discovering social media experts by integrating social networks and contents  23
Discovering social media experts by integrating social netwo...
收藏 引用
23rd Australasian Database Conference, ADC 2012, held as part of the Australasian Computer Science Week, ACSW 2012
作者: Zhang, Zhao Zhao, Bin Qian, Weining Zhou, Aoying Institute of Massive Computing Software Engineering Institute Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China
Social media are media contributed by common users and distributed in social networks. There may exist thousands of answers to a single question provided by different users. However, it is difficult to evaluate the au... 详细信息
来源: 评论
Identifying OS kernel objects for run-time security analysis
Identifying OS kernel objects for run-time security analysis
收藏 引用
6th International Conference on Network and System Security, NSS 2012
作者: Ibrahim, Amani S. Hamlyn-Harris, James Grundy, John Almorsy, Mohamed Centre for Computing and Engineering Software Systems Faculty of ICT Swinburne University of Technology Melbourne VIC Australia
As dynamic kernel runtime objects are a significant source of security and reliability problems in Operating Systems (OSes), having a complete and accurate understanding of kernel dynamic data layout in memory becomes... 详细信息
来源: 评论
A cloud computing resource pricing strategy research-based on resource swarm algorithm
A cloud computing resource pricing strategy research-based o...
收藏 引用
2012 International Conference on Computer Science and Service System, CSSS 2012
作者: Li, Hao Pu, Yu Lu, Joan School of Software Yunnan University Kunming China School of Computing and Engineering University of Huddersfield United Kingdom
Cloud computing arise as an efficient way to allocate resources for execution of task and services within a set of geographically dispersed providers from different organizations. In cloud computing, an IaaS computing... 详细信息
来源: 评论
An SVM-based approach to discover microRNA precursors in plant genomes
An SVM-based approach to discover microRNA precursors in pla...
收藏 引用
15th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2011
作者: Wang, Yi Jin, Cheqing Zhou, Minqi Zhou, Aoying Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University China
MicroRNAs (miRNAs) are noncoding RNAs of ∼22 nucleotides that play versatile regulatory roles in multicelluler organisms. Since the cloning methods for miRNAs identification are biased towards abundant miRNAs, the co... 详细信息
来源: 评论
Business process and software architecture model co-evolution patterns
Business process and software architecture model co-evolutio...
收藏 引用
2012 4th International Workshop on Modeling in software engineering, MiSE 2012
作者: Jamshidi, Pooyan Pahl, Claus Lero - The Irish Software Engineering Research Centre School of Computing Dublin City University Dublin Ireland
software systems are subject to change. To embrace change, the systems should be equipped with automated mechanisms. Business process and software architecture models are two artifacts that are subject to change in an... 详细信息
来源: 评论
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2013年 8232 LNCS卷 VI页
作者: Sun, Zhenan Shan, Shiguang Yang, Gongping Zhou, Jie Wang, Yunhong Yin, Yilong Chinese Academy of Sciences Institute of Automation National Laboratory of Pattern Recognition Beijing China Chinese Academy of Sciences Institute of Computing Technology Beijing China Shandong University School of Computer Science and Technology Jinan China Tsinghua University Software Engineering Institute Beijing China Beihang University School of Computer Science and Engineering Beijing China
来源: 评论