咨询与建议

限定检索结果

文献类型

  • 681 篇 会议
  • 149 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 837 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 517 篇 工学
    • 363 篇 计算机科学与技术...
    • 301 篇 软件工程
    • 118 篇 信息与通信工程
    • 97 篇 控制科学与工程
    • 69 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 39 篇 生物工程
    • 38 篇 仪器科学与技术
    • 35 篇 生物医学工程(可授...
    • 32 篇 化学工程与技术
    • 30 篇 动力工程及工程热...
    • 28 篇 光学工程
    • 18 篇 材料科学与工程(可...
    • 16 篇 建筑学
    • 16 篇 交通运输工程
  • 239 篇 理学
    • 123 篇 数学
    • 66 篇 物理学
    • 52 篇 生物学
    • 48 篇 统计学(可授理学、...
    • 38 篇 系统科学
    • 31 篇 化学
  • 160 篇 管理学
    • 116 篇 管理科学与工程(可...
    • 65 篇 工商管理
    • 58 篇 图书情报与档案管...
  • 25 篇 农学
    • 20 篇 作物学
  • 24 篇 法学
    • 20 篇 社会学
  • 24 篇 医学
    • 22 篇 基础医学(可授医学...
    • 22 篇 临床医学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 21 篇 internet of thin...
  • 20 篇 computational mo...
  • 18 篇 feature extracti...
  • 14 篇 accuracy
  • 13 篇 convolutional ne...
  • 11 篇 security
  • 11 篇 software
  • 11 篇 training
  • 10 篇 computer archite...
  • 9 篇 bandwidth
  • 9 篇 optimization
  • 9 篇 predictive model...
  • 9 篇 machine learning
  • 9 篇 protocols
  • 9 篇 complexity theor...
  • 9 篇 mathematical mod...
  • 8 篇 computer science
  • 8 篇 wireless communi...
  • 8 篇 monitoring
  • 8 篇 real-time system...

机构

  • 8 篇 institute of com...
  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 graduate school ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...

作者

  • 9 篇 piattini mario
  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 7 篇 moura paulo
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 mukund bhole
  • 5 篇 ahmed aziz
  • 5 篇 kastner wolfgang

语言

  • 806 篇 英文
  • 21 篇 其他
  • 8 篇 中文
  • 1 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. Computer Science and Systems Engineering"
837 条 记 录,以下是631-640 订阅
排序:
Spatial and temporal mapping of leaf area index in Alpine pastures and meadows with satellite MODIS imagery
Spatial and temporal mapping of leaf area index in Alpine pa...
收藏 引用
International Workshop on The Analysis of Multi-temporal Remote Sensing Images
作者: Pasolli, Luca Notarnicola, Claudia Bruzzone, Lorenzo Zebisch, Marc Dep. of Information Engineering and Computer Science University of Trento Via Sommarive 14 I-38123 Trento Italy Institute for Applied Remote Sensing EURAC Research Viale Druso 1 I-39100 Bolzano Italy
This paper presents an improved algorithm for the retrieval of leaf area index (LAI) from satellite MODIS imagery specifically calibrated for Alpine meadows and pastures. The main features of the proposed algorithm, w... 详细信息
来源: 评论
Main principles on the integration of SOC and MDD paradigms to Business Processes: A systematic review
Main principles on the integration of SOC and MDD paradigms ...
收藏 引用
5th International Conference on Software and Data Technologies, ICSOFT 2010
作者: Delgado, Andrea Ruiz, Francisco de Guzmán, Ignacio García-Rodríguez Piattini, Mario Computer Science Institute University of the Republica Julio Herrera y Reissig 565 1300 Montevideo Uruguay Alarcos Research Group Dep. of Information Technologies and Systems University of Castilla - La Mancha Paseo de la Universidad 4 13071 Ciudad Real Spain
Over the last few years organizations have been dealing with the integration of their business processes and software and technologies to support their realization. One challenge is to unite the vision from business a... 详细信息
来源: 评论
Latency hiding and performance tuning with graph-based execution
Latency hiding and performance tuning with graph-based execu...
收藏 引用
1st International Workshop on Data-Flow Models, DFM 2011
作者: Cicotti, Pietro Baden, Scott B. San Diego Supercomputer Center University of California San Diego 9500 Gilman Dr. San Diego CA 92093-0505 United States Dep. of Computer Science and Engineering University of California San Diego 9500 Gilman Dr. San Diego CA 92093-0505 United States
In the current practice, scientific programmer and HPC users are required to develop code that exposes a high degree of parallelism, exhibits high locality, dynamically adapts to the available resources, and hides com... 详细信息
来源: 评论
Comparison of properties between entropy and X2 based anomaly detection method
Comparison of properties between entropy and X2 based anomal...
收藏 引用
2011 International Conference on Network-Based Information systems, NBiS 2011
作者: Oshima, Shunsuke Nakashima, Takuo Sueyoshi, Toshinori ICT Center for Learning Support Kumamoto National College of Technology 2627 Hirayama-Shinmachi Yatsushiro Kumamoto Japan Dep. of Electronics and Intelligent Systems Engineering Tokai University 9-1-1 Toroku Kumamoto Japan Graduate School of Science and Technology Kumamoto University 2-39-1 Kurokami Kumamoto Japan
As the typical anomaly detection methods using statistics, entropy and X2 based method has been researched and reported in terms of their properties for anomaly attacks. In this research, we compare the properties of ... 详细信息
来源: 评论
An anomaly detection system based on chi-square method with dynamic BIN algorithm
An anomaly detection system based on chi-square method with ...
收藏 引用
6th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA-2011
作者: Oshima, Shunsuke Ichimura, Yusuke Nakashima, Takuo Sueyoshi, Toshinori ICT Center for Learning Support Kumamoto National College of Technology 2627 Hirayama-Shinmachi Yatsushiro Kumamoto Japan Production Systems Engineering Course Kumamoto National College of Technology 2627 Hirayama-Shinmachi Yatsushiro Kumamoto Japan Dep. of Electronics and Intelligent Systems Engineering Tokai University 9-1-1 Toroku Kumamoto Japan Graduate School of Science and Technology Kumamoto University 2-39-1 Kurokami Kumamoto Japan
The statistic researches have been proposed to detect anomaly attacks using chi-square. In these researches, features such as the IP address and the port number are used as the probabilistic variables. The method base... 详细信息
来源: 评论
Average Consensus and Gossip Algorithms in Networks with Stochastic Asymmetric Communications
Average Consensus and Gossip Algorithms in Networks with Sto...
收藏 引用
IEEE Conference on Decision and Control
作者: Duarte Antunes Daniel Silvestre Carlos Silvestre Department of Mechanical Engineering Eindhoven University of Technology the Netherlands Dep. of Electrical Eng. and Computer Science Instituto Superior Tecnico ISR 1046-001 Lisboa Portugal
We consider that a set of distributed agents desire to reach consensus on the average of their initial state values, while communicating with neighboring agents through a shared medium. This communication medium allow... 详细信息
来源: 评论
Multiattribute value function for the assessment of distributed generation projects: Application to technical criteria
Multiattribute value function for the assessment of distribu...
收藏 引用
IEEE/Power and Energy Society Transmission and Distribution Conference and Exposition
作者: Sica, E.T. Brigatto, G.A.A. Carmargo, C.C.B. Palma, A.S. Carvalho, R.T. Okuda, B.S. Electrotechnical Department Federal Institute of Education Science and Tecnology Santa Catarina Brazil Technology Course in Energy Systems Federal Institute of Education Science and Tecnology Santa Catarina Brazil IF-SC Campus Florianópolis Av. Mauro Ramos 950 88.020-300 Florianópolis Brazil Department of Electrical Engineering Universidade Federal de Santa Catarina Brazil Planning Laboratory of Electrical Energy Systems Universidade Federal de Santa Catarina Brazil UFSC Campus Florianópolis CTC 88.040-900 Florianópolis Brazil Systems Planning Division Eletrosul Rua Dep. Antônio Edu Vieira 999 88.040-901 Florianópolis Brazil
The expansion of the electric power system by large central generators linked to end consumers through extensive transmission lines, at an ever-increasing voltage, points toward a complementarity and an ever-increasin... 详细信息
来源: 评论
The applicaiton of calculus on runtime verification
The applicaiton of calculus on runtime verification
收藏 引用
2010 2nd International Conference on Signal Processing systems, ICSPS 2010
作者: Xie, Ruiyun Hai, Benzhai Guo, Zuhua Shao, Mingzhu Dep. of Computer Science and Technology Henan Mechanical and Electrical Engineering College Xinxiang China Dep. of Computer Science and Technology Henan Normal University Xinxiang China
In this paper, a uniform calculus-based approach for synthesizing monitors checking correctness properties specified by a large variety of logics at runtime is provided, including future and past time logics, interval... 详细信息
来源: 评论
Predicting the time to localized muscle fatigue using ANN and evolved sEMG feature
Predicting the time to localized muscle fatigue using ANN an...
收藏 引用
International Conference on Autonomous Intelligent systems
作者: Al-Mulla, M.R. Sepulveda, F. Dep. of Computer Science and Electronic Engineering University of Essex Colchester United Kingdom
Surface Electromyography (sEMG) activity of the biceps muscle was recorded from nine subjects. Data were recorded while subjects performed dynamic contraction until fatigue. The signals were initially segmented into t... 详细信息
来源: 评论
QoS-based unequal frame protection for video streaming
QoS-based unequal frame protection for video streaming
收藏 引用
2010 International computer Symposium, ICS 2010
作者: Chang, Ching-Lung Kang, Huan-Yao Dep. of Computer Science and Info. Engineering National Yunlin University of Science and Technology Taiwan
Following with the advancements in digitization technology and broadband communication technology, real-time video streaming service has become an essential one for next generation Internet. When transmitting compress... 详细信息
来源: 评论