咨询与建议

限定检索结果

文献类型

  • 3,878 篇 会议
  • 2,020 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 5,900 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,687 篇 工学
    • 2,956 篇 计算机科学与技术...
    • 2,451 篇 软件工程
    • 741 篇 信息与通信工程
    • 489 篇 控制科学与工程
    • 414 篇 生物工程
    • 331 篇 电气工程
    • 261 篇 生物医学工程(可授...
    • 224 篇 机械工程
    • 217 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 138 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 123 篇 动力工程及工程热...
    • 117 篇 交通运输工程
  • 1,678 篇 理学
    • 955 篇 数学
    • 449 篇 生物学
    • 363 篇 物理学
    • 300 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 147 篇 化学
  • 1,128 篇 管理学
    • 700 篇 管理科学与工程(可...
    • 491 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 228 篇 医学
    • 202 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 156 篇 法学
    • 117 篇 社会学
  • 135 篇 教育学
    • 129 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 202 篇 software enginee...
  • 166 篇 computational mo...
  • 137 篇 feature extracti...
  • 136 篇 training
  • 132 篇 semantics
  • 118 篇 deep learning
  • 110 篇 computer science
  • 110 篇 machine learning
  • 110 篇 software
  • 100 篇 accuracy
  • 96 篇 data models
  • 95 篇 cloud computing
  • 87 篇 computer archite...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 78 篇 predictive model...
  • 78 篇 security
  • 71 篇 optimization
  • 71 篇 visualization
  • 70 篇 internet of thin...

机构

  • 221 篇 college of compu...
  • 96 篇 national enginee...
  • 69 篇 department of co...
  • 65 篇 shanghai key lab...
  • 63 篇 state key labora...
  • 55 篇 institute of com...
  • 53 篇 college of intel...
  • 51 篇 department of co...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 software enginee...
  • 46 篇 school of big da...
  • 45 篇 school of inform...
  • 45 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 37 篇 school of comput...
  • 37 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 51 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 25 篇 zuohua ding
  • 24 篇 yuanping xu
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 huibiao zhu
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 18 篇 xiuhua li
  • 18 篇 luo haiyong

语言

  • 5,654 篇 英文
  • 202 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
5900 条 记 录,以下是4921-4930 订阅
排序:
Prioritization of quality requirements: State of practice in eleven companies
Prioritization of quality requirements: State of practice in...
收藏 引用
IEEE International Conference on Requirements engineering
作者: Richard Berntsson Svensson Tony Gorschek Björn Regnell Richard Torkar Ali Shahrokni Robert Feldt Aybuke Aurum Department of Computer Science Lund University Lund Sweden School of Computing Blekinge Institute of Technology Karlskrona Sweden Software Engineering and Technology Chalmers University of Technology Goteborg Sweden School of Information Systems Technology and Management University of New South Wales Sydney Australia
Requirements prioritization is recognized as an important but challenging activity in software product development. For a product to be successful, it is crucial to find the right balance among competing quality requi... 详细信息
来源: 评论
Face recognition based on local uncorrelated and weighted global uncorrelated discriminant transforms
Face recognition based on local uncorrelated and weighted gl...
收藏 引用
IEEE International Conference on Image Processing
作者: Xiaoyuan Jing Sheng Li David Zhang Jingyu Yang State Key Laboratory for Software Engineering Wuhan University of China Wuhan China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China College of Automation Nanjing University of Posts and Telecommunications China Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong China College of Computer Science Nanjing University of Science and Technology of PLA China
Feature extraction is one of the most important problems in image recognition tasks. In many applications such as face recognition, it is desirable to eliminate the redundancy among the extracted discriminant features... 详细信息
来源: 评论
Class-imbalance learning based discriminant analysis
Class-imbalance learning based discriminant analysis
收藏 引用
Asian Conference on Pattern Recognition (ACPR)
作者: Xiaoyuan Jing Chao Lan Min Li Yongfang Yao David Zhang Jingyu Yang State Key Laboratory of Software Engineering Wuhan University of China Wuhan China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China College of Automation Nanjing University of Posts and Telecommunications Nanjing China Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong China College of Computer Science Nanjing University of Science and Technology of PLA Nanjing China
Feature extraction is an important research topic in the field of pattern recognition. The class-specific idea tends to recast a traditional multi-class feature extraction and recognition task into several binary clas... 详细信息
来源: 评论
IT 2008: The history of a new computing discipline
收藏 引用
Communications of the ACM 2010年 第12期53卷 133-141页
作者: Lunt, Barry Ekstrom, J. Reichgelt, Han Bailey, Michael Leblanc, Richard Department of IT Brigham Young University Provo UT United States Computing and Software Engineering Southern Polytechnic State University Marietta GA United States Adaptive Computing Provo UT United States Department of Computer Science and Software Engineering Seattle University Seattle WA United States
The IT model curriculum represents an excellent starting point toward understanding more about IT as an academic discipline. The early 1990s saw the emergence of the Internet from the environs of the technical cognosc... 详细信息
来源: 评论
Towards Progressive and Load Balancing Distributed Computation:A Case Study on Skyline Analysis
收藏 引用
Journal of Computer Science & Technology 2010年 第3期25卷 431-443页
作者: 黄晋 赵丰 陈健 裴健 印鉴 School of Information Science and Technology Sun Yat-Sen University School of Software Engineering South China University of Technology School of Computing Science Simon Fraser University
Many latest high performance distributed computational environments come with high bandwidth in commu- nication. Such high bandwidth distributed systems provide unprecedented opportunities for analyzing huge datasets,... 详细信息
来源: 评论
Color features integrated with line detection for object extraction and recognition in traffic images retrieval
收藏 引用
International Journal of Computer Science Issues 2011年 第6 6-3期8卷 192-198页
作者: Wang, Hui Hui Mohamad, Dzulkifli Ismail, N.A. Department Of Software Engineering and Multimedia Computing Faculty of Computer Science and Information Technology Universiti Malaysia Sarawak 94300 Kota Samarahan Sarawak Malaysia Department of Computer Graphics and Multimedia Faculty of Computer Science and Information Technology Universiti Teknologi Malaysia 81300 Skudai Johor Bahru Malaysia
This paper proposes a simple object extraction and recognition method with efficient searching for identifying and extracting the objects in a complex scene based on the color features. The background of the images is... 详细信息
来源: 评论
A Decomposition-Based Approach to OWL DL Ontology Diagnosis
A Decomposition-Based Approach to OWL DL Ontology Diagnosis
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Jianfeng Du Guilin Qi Jeff Z. Pan Yi-Dong Shen Guangdong University of Foreign Studies (GDUFS) Guangzhou China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Engineering South East University NanJing China Department of Computing Science University of Aberdeen Aberdeen UK
computing all diagnoses of an inconsistent ontology is important in ontology-based applications. However, the number of diagnoses can be very large. It is impractical to enumerate all diagnoses before identifying the ... 详细信息
来源: 评论
RASS: A real-time, accurate and scalable system for tracking transceiver-free objects
RASS: A real-time, accurate and scalable system for tracking...
收藏 引用
IEEE International Conference on Pervasive computing and Communications (PerCom)
作者: Dian Zhang Yunhuai Liu Lionel M. Ni College of Software Shenzhen University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China Shenzhen Institutes of Advanced Technology Chinese Academy and Sciences China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiaotong University China
Transceiver-free object tracking is to trace a moving object without carrying any communication device in an environment where the environment is pre-deployed with some monitoring nodes. Among all the tracking technol... 详细信息
来源: 评论
SKRWM based descriptor for pedestrian detection in thermal images
SKRWM based descriptor for pedestrian detection in thermal i...
收藏 引用
IEEE Workshop on Multimedia Signal Processing
作者: Zelin Li Qiang Wu Jian Zhang Glenn Geers School of Computer Science and Engineering University of New South Wales Australia National ICT Australia Limited Australia School of Computing and Communications University of Technology Sydney Germany Advanced Analytics Institute School of Software University of Technology Sydney Germany National ICT Australia Limited Sydney Australia
Pedestrian detection in a thermal image is a difficult task due to intrinsic challenges:1) low image resolution, 2) thermal noising, 3) polarity changes, 4) lack of color, texture or depth information. To address thes... 详细信息
来源: 评论
Vulnerability categorization using Bayesian networks  10
Vulnerability categorization using Bayesian networks
收藏 引用
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
作者: Wang, Ju An Guo, Minzhe Southern Polytechnic State University School of Computing and Software Engineering United States
This paper proposes a novel model and methodology to classify and categorize vulnerabilities according to their security types. We use Bayesian networks to automate the process. An example is provided to demonstrate t... 详细信息
来源: 评论