咨询与建议

限定检索结果

文献类型

  • 296 篇 会议
  • 57 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 217 篇 工学
    • 138 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 55 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 43 篇 电气工程
    • 32 篇 电子科学与技术(可...
    • 18 篇 机械工程
    • 17 篇 动力工程及工程热...
    • 14 篇 生物工程
    • 13 篇 化学工程与技术
    • 11 篇 光学工程
    • 10 篇 力学(可授工学、理...
    • 10 篇 仪器科学与技术
    • 10 篇 生物医学工程(可授...
    • 9 篇 材料科学与工程(可...
    • 8 篇 农业工程
    • 8 篇 环境科学与工程(可...
    • 7 篇 航空宇航科学与技...
  • 107 篇 理学
    • 54 篇 数学
    • 34 篇 物理学
    • 17 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 13 篇 系统科学
    • 9 篇 化学
  • 57 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 28 篇 工商管理
    • 15 篇 图书情报与档案管...
  • 12 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 9 篇 农学
  • 5 篇 教育学
  • 3 篇 法学
  • 1 篇 文学

主题

  • 14 篇 internet of thin...
  • 9 篇 feature extracti...
  • 8 篇 accuracy
  • 8 篇 training
  • 6 篇 wireless communi...
  • 5 篇 reliability
  • 5 篇 delays
  • 5 篇 computer archite...
  • 5 篇 logic gates
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 real-time system...
  • 5 篇 industries
  • 5 篇 software
  • 5 篇 cryptography
  • 4 篇 image segmentati...
  • 4 篇 educational inst...
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 genetic algorith...

机构

  • 7 篇 dep. of electric...
  • 7 篇 institute of com...
  • 6 篇 department of co...
  • 4 篇 dep. of computer...
  • 3 篇 dep. of electric...
  • 3 篇 guangxi key labo...
  • 3 篇 dep. of computer...
  • 3 篇 sichuan institut...
  • 3 篇 fir-uf universit...
  • 3 篇 dep. of integrat...
  • 3 篇 ministry of land...
  • 3 篇 institute of com...
  • 3 篇 state key labora...
  • 3 篇 deimos engenhari...
  • 3 篇 school of resour...
  • 3 篇 dep. of electric...
  • 3 篇 sri lanka instit...
  • 3 篇 dep. of computer...
  • 2 篇 school of electr...
  • 2 篇 dep. of industri...

作者

  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 5 篇 mukund bhole
  • 5 篇 thilo sauter
  • 5 篇 wolfgang kastner
  • 4 篇 kastner wolfgang
  • 4 篇 sauter thilo
  • 4 篇 chang ching-lung
  • 4 篇 bhole mukund
  • 4 篇 elke franz
  • 3 篇 mezaris vasileio...
  • 3 篇 tsao yung-chung
  • 3 篇 zezhong zheng
  • 3 篇 tsai yin-te
  • 3 篇 eduard a. jorswi...
  • 3 篇 shengli wang
  • 3 篇 qais al-na'amneh
  • 3 篇 van ossenbruggen...
  • 3 篇 jiang li
  • 3 篇 zhenlu yu

语言

  • 316 篇 英文
  • 33 篇 其他
  • 4 篇 中文
检索条件"机构=Dep. Computer Engineering Technology"
353 条 记 录,以下是241-250 订阅
排序:
The next generation textile antennas based on substrate integrated waveguide technology
The next generation textile antennas based on substrate inte...
收藏 引用
General Assembly and Scientific Symposium, URSI
作者: Sam Agneessens Sam Lemey Riccardo Moro Maurizio Bozzi Hendrik Rogier Dept. of Information Technology (INTEC) IMEC-Ghent University Ghent Belgium Dep. of Electrical Computer and Biomedical Engineering University of Pavia Pavia Italy
Textile antennas for body-worn applications have some very specific requirements and needs. From an electrical engineer's point of view, good radiation characteristics and impedance matching to the active electron... 详细信息
来源: 评论
Estimation of ship's extremely low frequency electromagnetic signature based on fuzzy fusion for target detection
Estimation of ship's extremely low frequency electromagnetic...
收藏 引用
IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)
作者: Yihai Liu Xiaomin Zhang Jianfeng Shao Bingqi Zhang School of Marine Science and Technology Northwestern Polytechnical University Xi'an China Dep. of Electrical & Computer Engineering State University of New York New Paltz USA
The alternative electromagnetic (EM) fields radiating from a ship are widely recognized as new contributors to the application of underwater target detection. This paper focuses on the estimation of this extremely low... 详细信息
来源: 评论
Detection of JavaScript of Malware with Un-readability Using Mahalanobis-Distance
Detection of JavaScript of Malware with Un-readability Using...
收藏 引用
International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)
作者: Kentaro Takamori Mai Iwamoto Shunsuke Oshima Takuo Nakashima Production System Engineering Course Kumamoto National College of Technology Yatsushiro Kumamoto Japan Kumamoto National College of Technology ICT Center for Learning Support Yatsushiro Kumamoto Japan Kumamoto National College of Technology Center for Technical and Educational Support Yatsushiro Kumamoto Japan Dep. of Electronics Engineering and Computer Science Tokai University Kumamoto Japan
Increasing of Java Scripts of malware requires automatic malware detection systems in these days. Our research takes note of the appearence probability and the state transition probability of first order Markov source... 详细信息
来源: 评论
ROOM STATISTICS AND DIRECT-TO-REVERBERANT RATIO ESTIMATION FROM DUAL-CHANNEL SIGNALS
ROOM STATISTICS AND DIRECT-TO-REVERBERANT RATIO ESTIMATION F...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: E. Georganti J. Mourjopoulos S. van de Par Laboratory of Experimental Audiology ENT department University Hospital of Zurich Zurich 8091 Switzerland Audio and Acoustic Technology Group Wire Communications Laboratory Electrical & Computer Engineering dep. University of Patras 26500 Greece Acoustics Group Institute of Physics Carl von Ossietzky University Oldenburg 26111 Germany
A method for the estimation of the direct-to-reverberant-ratio (DRR) from dual-channel microphone recordings without having knowledge of the source signal is proposed. The method is based on previous findings for the ... 详细信息
来源: 评论
Static analysis of worst-case stack cache behavior  13
Static analysis of worst-case stack cache behavior
收藏 引用
21st International Conference on Real-Time Networks and Systems, RTNS 2013
作者: Jordan, Alexander Brandner, Florian Schoeberl, Martin Compilers and Languages Group Institute of Computer Languages Vienna University of Technology Austria Embedded Systems Engineering Section Dep. of Applied Mathematics and Computer Science Technical University of Denmark Denmark
Utilizing a stack cache in a real-time system can aid predictability by avoiding interference that heap memory traffic causes on the data cache. While loads and stores are guaranteed cache hits, explicit operations ar... 详细信息
来源: 评论
Comparision of multi-carrier techniques in seven-level asymmetric cascade multilevel inverter
Comparision of multi-carrier techniques in seven-level asymm...
收藏 引用
2013 4th International Conference on Power engineering, Energy and Electrical Drives, POWERENG 2013
作者: Colak, Ilhami Kabalci, Ersan Keven, Gokhan Faculty of Technology Department of Electric and Electronic Engineering Gazi University Ankara Turkey Faculty of Engineering and Architecture Dep. of Electrical and Electronic Eng. Nevsehir University Nevsehir Turkey Vocational College of Haci Bektaş Veli Dep. of Computer Programming Nevsehir University Nevsehir Turkey
The multilevel inverters (MLIs) are classified into three topologies such as Diode Clamped, Flying Capacitor and Cascade Multilevel Inverter (CMLI). CMLI topologies include two kind of structure that is named symmetri... 详细信息
来源: 评论
Feature selection methods in persian sentiment analysis
收藏 引用
18th International Conference on Application of Natural Language to Information Systems, NLDB 2013
作者: Saraee, Mohamad Bagheri, Ayoub School of Computing Science and Engineering University of Salford Manchester United Kingdom Intelligent Database Data Mining and Bioinformatics Lab Electrical and Computer Engineering Dep. Isfahan University of Technology Isfahan Iran
With the enormous growth of digital content in internet, various types of online reviews such as product and movie reviews present a wealth of subjective information that can be very helpful for potential users. Senti... 详细信息
来源: 评论
Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel?
Physical layer security vs. network layer secrecy: Who wins ...
收藏 引用
IEEE International Workshop on computer-Aided Modeling, Analysis, and Design of Communication Links and Networks, CAMAD
作者: Johannes Richter Elke Franz Sabrina Engelmann Stefan Pfennig Eduard A. Jorswieck Dep. of Electrical Engineering and Information Technology/Communications Laboratory Dep. of Computer Science/Privacy and Data Security Technische Universität Dresden Dresden Germany
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an ... 详细信息
来源: 评论
Summary abstract for the 2nd ACM international workshop on multimedia analysis for ecological data  13
Summary abstract for the 2nd ACM international workshop on m...
收藏 引用
21st ACM International Conference on Multimedia, MM 2013
作者: Spampinato, Concetto Mezaris, Vasileios Van Ossenbruggen, Jacco Dep. of Electrical Electronics and Computer Engineering University of Catania 95125 Catania Italy Centre for Research and Technology Hellas Information Technologies Inst. Thermi 57001 Greece Centrum Wiskunde and Informatica 1098 XG Amsterdam NL Netherlands
The 2nd ACM InternationalWorkshop on Multimedia Analysis for Ecological Data (MAED'13) is held as part of ACM Multimedia 2013. MAED'13, following the first workshop of the MAED series (MAED'12) that was he... 详细信息
来源: 评论
HotCity: Enhancing ubiquitous maps with social context heatmaps  13
HotCity: Enhancing ubiquitous maps with social context heatm...
收藏 引用
12th International Conference on Mobile and Ubiquitous Multimedia, MUM 2013
作者: Komninos, Andreas Besharat, Jeries Ferreira, Denzil Garofalakis, John University of Strathclyde 26 Richmond St. Glasgow G1 1XH United Kingdom Computer Technology Institute and Press University of Patras Rion 26500 Greece Dep. CS and Engineering University of Oulu Finland
In this paper we present HotCity, a service that demonstrates how collecting and mining the interactions that users make with the urban environment through social networks, can help tourists better plan activities, th... 详细信息
来源: 评论