咨询与建议

限定检索结果

文献类型

  • 4,132 篇 会议
  • 2,674 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,932 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,323 篇 计算机科学与技术...
    • 2,683 篇 软件工程
    • 855 篇 信息与通信工程
    • 677 篇 控制科学与工程
    • 467 篇 生物工程
    • 421 篇 电气工程
    • 313 篇 机械工程
    • 302 篇 生物医学工程(可授...
    • 280 篇 电子科学与技术(可...
    • 219 篇 光学工程
    • 166 篇 仪器科学与技术
    • 160 篇 动力工程及工程热...
    • 150 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 133 篇 建筑学
  • 1,972 篇 理学
    • 1,017 篇 数学
    • 530 篇 生物学
    • 496 篇 物理学
    • 315 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 155 篇 化学
  • 1,468 篇 管理学
    • 906 篇 管理科学与工程(可...
    • 666 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 352 篇 医学
    • 303 篇 临床医学
    • 252 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
  • 246 篇 法学
    • 207 篇 社会学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 158 篇 教育学
    • 149 篇 教育学
  • 81 篇 农学
  • 26 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 190 篇 deep learning
  • 181 篇 machine learning
  • 140 篇 computational mo...
  • 125 篇 artificial intel...
  • 123 篇 information syst...
  • 105 篇 training
  • 104 篇 software enginee...
  • 99 篇 accuracy
  • 95 篇 cloud computing
  • 94 篇 internet of thin...
  • 94 篇 semantics
  • 91 篇 feature extracti...
  • 91 篇 software
  • 86 篇 data mining
  • 84 篇 information tech...
  • 83 篇 predictive model...
  • 79 篇 security
  • 77 篇 data models
  • 75 篇 educational inst...
  • 73 篇 optimization

机构

  • 163 篇 school of comput...
  • 51 篇 school of comput...
  • 42 篇 department of in...
  • 41 篇 state key labora...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 38 篇 university of ch...
  • 37 篇 department of in...
  • 36 篇 school of inform...
  • 32 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 27 篇 school of comput...
  • 26 篇 school of softwa...
  • 26 篇 department of co...
  • 25 篇 college of intel...
  • 24 篇 faculty of infor...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 36 篇 buyya rajkumar
  • 28 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 25 篇 xiong zehui
  • 23 篇 john grundy
  • 23 篇 grundy john
  • 21 篇 el-sayed m.el-ke...
  • 21 篇 zidong wang
  • 20 篇 bailey james
  • 18 篇 abdelwahed motwa...
  • 18 篇 choo kim-kwang r...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,503 篇 英文
  • 377 篇 其他
  • 53 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6932 条 记 录,以下是4771-4780 订阅
排序:
Hybrid annex: An AADL extension for continuous behavior and cyber-physical interaction modeling
Hybrid annex: An AADL extension for continuous behavior and ...
收藏 引用
ACM SIGAda's Annual International Conference High Integrity Language technology, HILT 2014
作者: Ahmad, Ehsan Larson, Brian R. Barrett, Stephen C. Zhan, Naijun Dong, Yunwei State Key Lab. of Comput. Sci. Inst. of Software Northwestern Polytechnical University Chinese Academy of Sciences China Computing and Information Systems Kansas State University ManhattanKS66506 United States State Key Lab. of Comput. Sci. Inst. of Software Chinese Academy of Sciences Beijing100190 China School of Computer Science Northwestern Polytechnical University Xi'an710129 China
Correct design, and system-level dependability prediction of highly-integrated systems demand the collocation of requirements and architectural artifacts within an integrated development environment. Hybrid systems, h... 详细信息
来源: 评论
Reputation-Based Participant Incentive Approach in Opportunistic Cognitive Networks
Reputation-Based Participant Incentive Approach in Opportuni...
收藏 引用
10th Annual Conference of Advanced Computer Architecture, ACA 2014
作者: Li, Jie Liu, Rui Yu, Ruiyun Wang, Xingwei Zhao, Zhijie Computing Center Northeastern University Shenyang China Key Lab of Network Control Systems Chinese Acad. of Sci. Shenyang China Department of Computing Hong Kong Polytechnic University Hong Kong Software College Northeastern University Shenyang China College of Information Sci. and Eng. Northeastern University Shenyang China Info. and Tech. Center of China Mobile Group Liaoning Co. LTD China
Sufficient reputable participants are critical to effective data collections and data disseminations in opportunistic cognitive networks. However, it is difficult to identify reputable or malicious participants in opp... 详细信息
来源: 评论
Analyzing the characteristics of "East Turkistan" activities using text mining and network analysis
收藏 引用
Zidonghua Xuebao/Acta Automatica Sinica 2014年 第11期40卷 2456-2468页
作者: Fu, Ju-Lei Liu, Wen-Li Zheng, Xiao-Long Fan, Ying Wang, Shou-Yang College of Information System and Management National University of Defense Technology Changsha410073 China Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Management and Control Systems Institute of Automation Chinese Academy of Sciences Beijing100190 China Cloud Computing Industrial Technology Innovation and Incubation Center Chinese Academy of Sciences Dongguan523808 China School of Systems Science Beijing Normal University Beijing100875 China
Open source intelligence, with rich content and sophisticated collection and analytical techniques, is an alternative data source in many anti-terrorism studies and has manifested significant applicable prospects. In ... 详细信息
来源: 评论
Report: The process model matching contest 2013
Report: The process model matching contest 2013
收藏 引用
11th International Conference on Business Process Management, BPM 2013
作者: Cayoglu, Ugur Dijkman, Remco Dumas, Marlon Fettke, Peter García-Bañuelos, Luciano Hake, Philip Klinkmüller, Christopher Leopold, Henrik Ludwig, Andŕe Loos, Peter Mendling, Jan Oberweis, Andreas Schoknecht, Andreas Sheetrit, Eitam Thaler, Tom Ullrich, Meike Weber, Ingo Weidlich, Matthias Karlsruhe Germany Eindhoven University of Technology Eindhoven Netherlands University of Tartu Tartu Estonia DFKI Saarbrücken Germany Saarland University Saarbrücken Germany Information Systems Institute University of Leipzig Leipzig Germany Humboldt-Universität zu Berlin Arcata Germany Wirtschaftsuniversität Wien Vienna Austria Technion - Israel Institute of Technology Haifa Israel Software Systems Research Group NICTA Sydney Australia School of Computer Science and Engineering University of New South Wales Kensington Australia
Process model matching refers to the creation of correspondences between activities of process models. Applications of process model matching are manifold, reaching from model validation over harmonization of process ... 详细信息
来源: 评论
OBC-NG: Towards a reconfigurable on-board computing architecture for spacecraft
OBC-NG: Towards a reconfigurable on-board computing architec...
收藏 引用
IEEE Conference on Aerospace
作者: Daniel Lüdtke Karsten Westerdorff Kai Stohlmann Anko Börner Olaf Maibaum Ting Peng Benjamin Weps Görschwin Fey Andreas Gerndt German Aerospace Center (DLR) Simulation and Software Technology Braunschweig Germany Optical Information Systems German Aerospace Center (DLR) Berlin Germany German Aerospace Center (DLR) Institute of Space Systems Bremen Germany University of Bremen Institute of Space Systems Bremen Germany
The computational demands on spacecraft are rapidly increasing. Current on-board computing components and architectures cannot keep up with the growing requirements. Only a small selection of space-qualified processor... 详细信息
来源: 评论
A Method to Check Liveness of WS3PR  33
A Method to Check Liveness of WS3PR
收藏 引用
第三十三届中国控制会议
作者: WANG ShouGuang LIU Miao ZHOU MengChu WU WenHui IEEE School of Information & Electronic Engineering Zhejiang Gongshang University State Key Laboratory for Manufacturing Systems Engineering Xi’an Jiaotong University School of Electro-Mechanical Engineering Xidian University The Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji University Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102USA
Petri nets are widely used to model flexible manufacturing systems(FMSs) because they can help analyze the properties and synthesize deadlock-free supervisory controllers of *** System of Simple Sequential Processes w... 详细信息
来源: 评论
CIRF: Constructive interference-based reliable flooding in asynchronous duty-cycle wireless sensor networks
CIRF: Constructive interference-based reliable flooding in a...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Shuying Yu Xiaobing Wu Pan Wu Dingming Wu Haipeng Dai Guihai Chen National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China
Flooding is one of the most fundamental functions in wireless sensor networks (WSNs) and has been investigated extensively. Existing flooding schemes in duty-cycle WSNs can be categorized into two categories: synchron... 详细信息
来源: 评论
Time–data tradeoffs by aggressive smoothing  14
Time–data tradeoffs by aggressive smoothing
收藏 引用
Proceedings of the 28th International Conference on Neural information Processing systems - Volume 1
作者: John J. Bruer Joel A. Tropp Volkan Cevher Stephen R. Becker Dept. of Computing + Mathematical Sciences California Institute of Technology Laboratory for Information and Inference Systems EPFL Dept. of Applied Mathematics University of Colorado at Boulder
This paper proposes a tradeoff between sample complexity and computation time that applies to statistical estimators based on convex optimization. As the amount of data increases, we can smooth optimization problems m...
来源: 评论
ICEPOLE: High-speed, hardware-oriented authenticated encryption
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8731卷 392-413页
作者: Morawiecki, Pawel Gaj, Kris Homsirikamol, Ekawat Matusiewicz, Krystian Pieprzyk, Josef Rogawski, Marcin Srebrny, Marian Wójcik, Marcin Institute of Computer Science Polish Academy of Sciences Poland Section of Informatics University of Commerce Kielce Poland Department of Computing Macquarie University Australia Electrical Engineering and Computer Science School Queensland University of Technology Brisbane Australia Cryptographic Engineering Research Group George Mason University United States Cryptography and Information Security Group University of Bristol United Kingdom Cadence Design Systems San Jose United States Intel Gdańsk Poland
This paper introduces our dedicated authenticated encryption scheme ICEPOLE. ICEPOLE is a high-speed hardware-oriented scheme, suitable for high-throughput network nodes or generally any environment where specialized ... 详细信息
来源: 评论
Engineering Process Improvement in Heterogeneous Multi-disciplinary Environments with Defect Causal Analysis
Engineering Process Improvement in Heterogeneous Multi-disci...
收藏 引用
21st European Conference on systems, software and Services Process Improvement and Innovation, EuroSPI 2014
作者: Kovalenko, Olga Winkler, Dietmar Kalinowski, Marcos Serral, Estefania Biffl, Stefan Institute of Software Technology and Interactive Systems CDL-Flex Vienna University of Technology Favoritenstrasse 9/188 1040 Vienna Austria Federal University of Juiz de Fora NEnC Rua José Kelmer s/n 36036-330 Juiz de Fora Brazil Department of Decision Sciences and Information Management KU Leuven Naamsestraat 69 B-3000 Leuven Belgium
Multi-disciplinary engineering environments, e.g., in automation systems engineering, typically involve different stakeholder groups and engineering disciplines using a variety of specific tools and data models. Defec... 详细信息
来源: 评论