咨询与建议

限定检索结果

文献类型

  • 4,132 篇 会议
  • 2,674 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,932 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,323 篇 计算机科学与技术...
    • 2,683 篇 软件工程
    • 855 篇 信息与通信工程
    • 677 篇 控制科学与工程
    • 467 篇 生物工程
    • 421 篇 电气工程
    • 313 篇 机械工程
    • 302 篇 生物医学工程(可授...
    • 280 篇 电子科学与技术(可...
    • 219 篇 光学工程
    • 166 篇 仪器科学与技术
    • 160 篇 动力工程及工程热...
    • 150 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 133 篇 建筑学
  • 1,972 篇 理学
    • 1,017 篇 数学
    • 530 篇 生物学
    • 496 篇 物理学
    • 315 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 155 篇 化学
  • 1,468 篇 管理学
    • 906 篇 管理科学与工程(可...
    • 666 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 352 篇 医学
    • 303 篇 临床医学
    • 252 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
  • 246 篇 法学
    • 207 篇 社会学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 158 篇 教育学
    • 149 篇 教育学
  • 81 篇 农学
  • 26 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 190 篇 deep learning
  • 181 篇 machine learning
  • 140 篇 computational mo...
  • 125 篇 artificial intel...
  • 123 篇 information syst...
  • 105 篇 training
  • 104 篇 software enginee...
  • 99 篇 accuracy
  • 95 篇 cloud computing
  • 94 篇 internet of thin...
  • 94 篇 semantics
  • 91 篇 feature extracti...
  • 91 篇 software
  • 86 篇 data mining
  • 84 篇 information tech...
  • 83 篇 predictive model...
  • 79 篇 security
  • 77 篇 data models
  • 75 篇 educational inst...
  • 73 篇 optimization

机构

  • 163 篇 school of comput...
  • 51 篇 school of comput...
  • 42 篇 department of in...
  • 41 篇 state key labora...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 38 篇 university of ch...
  • 37 篇 department of in...
  • 36 篇 school of inform...
  • 32 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 27 篇 school of comput...
  • 26 篇 school of softwa...
  • 26 篇 department of co...
  • 25 篇 college of intel...
  • 24 篇 faculty of infor...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 36 篇 buyya rajkumar
  • 28 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 25 篇 xiong zehui
  • 23 篇 john grundy
  • 23 篇 grundy john
  • 21 篇 el-sayed m.el-ke...
  • 21 篇 zidong wang
  • 20 篇 bailey james
  • 18 篇 abdelwahed motwa...
  • 18 篇 choo kim-kwang r...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,503 篇 英文
  • 377 篇 其他
  • 53 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6932 条 记 录,以下是4791-4800 订阅
排序:
Activity awareness based on simple sensors
Activity awareness based on simple sensors
收藏 引用
International Conference on Awareness Science and technology (iCAST)
作者: Chia-Ming Tsai Qiangfu Zhao Rung-Ching Chen Masato Taya Computer and Information Systems The University of Aizu Fukushima Japan Department of Information Management Chaoyang University of Technology Taichung Taiwan Web Data Computing Laboratory KDDI R&D Laboratories Inc. Saitama Japan
The basic concept of smart environment is to be aware of the context information related to environmental and human behavioral changes, and to provide appropriate services accordingly. To obtain the context informatio... 详细信息
来源: 评论
An empirical study of bug report field reassignment
An empirical study of bug report field reassignment
收藏 引用
software Maintenance, Reengineering, and Reverse Engineering, (CSMR-WCRE)
作者: Xin Xia David Lo Ming Wen Emad Shihab Bo Zhou College of Computer Science and Technology Zhejiang University China Singapore Management University Singapore Singapore SG School of Information Systems Singapore Management University Singapore Department of Software Engineering Rochester Institute of Technology USA
A bug report contains many fields, such as product, component, severity, priority, fixer, operating system (OS), platform, etc., which provide important information for the bug triaging and fixing process. It is impor... 详细信息
来源: 评论
Towards estimating computer users' mood from interaction behaviour with keyboard and mouse
收藏 引用
Frontiers of Computer Science 2013年 第6期7卷 943-954页
作者: Iflikhar Ahmed KHAN Willem-Paul BRINKMAN Robert HIERONS Department of Computer Software Engineering University of Engineering & Technology Mardan 23200 Pakistan Interactive Intelligence Group Delft University of Technology Delft 2628B the Netherlands Department of Information Systems and Computing Brunel University West London UB83PH UK
The purpose of this exploratory research was to study the relationship between the mood of computer users and their use of keyboard and mouse to examine the possibility of creating a generic or individualized mood mea... 详细信息
来源: 评论
Web information mining and decision support platform for the modern service industry  52
Web information mining and decision support platform for the...
收藏 引用
52nd Annual Meeting of the Association for Computational Linguistics, ACL 2014
作者: Li, Binyang Zhou, Lanjun Wei, Zhongyu Wong, Kam-Fai Xu, Ruifeng Xia, Yunqing Dept. of Information Science and Technology University of International Relations China Dept. of Systems Engineering and Engineering Management The Chinese University of Hong Kong N.T. Shatin Hong Kong MoE Key Laboratory of High Confidence Software Technologies China Shenzhen Research Institute The Chinese University of Hong Kong Harbin Institute of Technology Shenzhen Graduate School Shenzhen China Department of Computer Science and Technology TNList Tsinghua University China
This demonstration presents an intelligent information platform MODEST. MODEST will provide enterprises with the services of retrieving news from websites, extracting commercial information, exploring customers' o... 详细信息
来源: 评论
Performance and Network Power Evaluation of Tightly Mixed SRAM NUCA for 3D Multi-core Network on Chips
Performance and Network Power Evaluation of Tightly Mixed SR...
收藏 引用
IEEE International Symposium on Circuits and systems
作者: Yuang Zhang Li Li Zhonghai Lu Axel Jantsch Yuxiang Fu Minglun Gao Institute of VLSI Design Key Laboratory of Advanced Photonic and Electronic Materials Nanjing University Nanjing China Department of Electronic Computer and Software Systems School of Information and Communication Technology Royal Institute of Technology Stockholm Sweden
Last level cache (LLC) is crucial for the performance of chip multiprocessors (CMPs), while power is a significant design concern for 3D CMPs. In this paper, we focus on the SRAM-based Non-Uniform Cache Architecture (... 详细信息
来源: 评论
Gain characteristics and femto-second optical pulse response of 1550nm-band QD-SOA for ultra-fast all-optical logic gate devices
Gain characteristics and femto-second optical pulse response...
收藏 引用
Indium Phosphide and Related Materials Conference
作者: Atsushi Matsumoto Yuki Takei Asuka Matsushita Kouichi Akahane Yuichi Matsushima Katsuyuki Utaka Faculty of Science and Engineering Waseda University Tokyo Japan National Institute of Information and Communications Technology (NICT) Tokyo Japan Green Computing Systems Research Organization Waseda University Tokyo Japan
We fabricated the QD-SOA, which was composed of 20-layer-stacked InAs quantum dots structure with the strain-compensation technique grown by MBE, and evaluated the fundamental gain characteristics and ultra-fast optic... 详细信息
来源: 评论
Early Identification of Future Committers in Open Source software Projects
Early Identification of Future Committers in Open Source Sof...
收藏 引用
International Conference on Quality software
作者: Akinori Ihara Yasutaka Kamei Masao Ohira Ahmed E. Hassan Naoyasu Ubayashi Ken-ichi Matsumoto Graduate School of Information Science Nara Institute of Science and Technology JAPAN Faculty of Information Science and Electrical Engineering Kyushu University JAPAN Faculty of Systems Engineering Wakayarna University JAPAN School of Computing Queen's University CANADA
There exists two types of developers in Open Source software (OSS) projects: 1) Committers who have permission to commit edited source code to the Version Control System (VCS), 2) Developers who contribute source code... 详细信息
来源: 评论
ID-based deniable authentication protocol based on diffe-hellman problem on elliptic curve
收藏 引用
International Journal of Network Security 2013年 第5期15卷 357-364页
作者: Kar, Jayaprakash Department of Information Systems Faculty of Computing and Information Technology King Abduaziz University P.O.Box-80221 Jeddah-21589 Saudi Arabia
Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negot... 详细信息
来源: 评论
Study on the best irradiation time of special electromagnetic wave in therapy products
Study on the best irradiation time of special electromagneti...
收藏 引用
IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI
作者: Zichen Lu Xiwei Liu Zhen Gao Dong Zhang Mo Hong Dongguan Research Institute of CASIA Cloud Computing Center Chinese Academy of Sciences China Systems and Technology Chinese Academy of Sciences Beijing China College of Electrical &Information Engineering Changsha University of Science &Technology Changsha China
Using the special wavelength and given power LED light as the detected object, through irradiating human face with a given distance, observing the effect of face heating-up and the blood flow raise, to obtain the best... 详细信息
来源: 评论
Dimensionality Reduction Assisted Tensor Clustering
Dimensionality Reduction Assisted Tensor Clustering
收藏 引用
International Joint Conference on Neural Networks
作者: Yanfeng Sun Junbin Gao Xia Hong Yi Guo Chris J. Harris Beijing Municipal Key Lab of Multimedia and Intelligent Software Technology Beijing University of Technology School of Computing and Mathematics Charles Sturt University School of Systems Engineering University of Reading CSIRO Mathematics Informatics and Statistics Electronics and Computer Science University of Southampton
This paper is concerned with tensor clustering with the assistance of dimensionality reduction approaches. A class of formulation for tensor clustering is introduced based on tensor Tucker decomposition models. In thi... 详细信息
来源: 评论