咨询与建议

限定检索结果

文献类型

  • 538 篇 会议
  • 109 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 408 篇 工学
    • 271 篇 计算机科学与技术...
    • 216 篇 软件工程
    • 98 篇 信息与通信工程
    • 75 篇 控制科学与工程
    • 59 篇 电气工程
    • 48 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物工程
    • 22 篇 光学工程
    • 22 篇 化学工程与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 材料科学与工程(可...
    • 19 篇 仪器科学与技术
    • 16 篇 力学(可授工学、理...
    • 16 篇 生物医学工程(可授...
    • 13 篇 交通运输工程
    • 10 篇 农业工程
  • 208 篇 理学
    • 114 篇 数学
    • 62 篇 物理学
    • 31 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 23 篇 系统科学
    • 16 篇 化学
  • 114 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 15 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 农学
  • 11 篇 法学
    • 10 篇 社会学
  • 8 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 19 篇 internet of thin...
  • 19 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 training
  • 12 篇 computer archite...
  • 10 篇 data mining
  • 10 篇 computational mo...
  • 9 篇 wireless communi...
  • 9 篇 real-time system...
  • 9 篇 software
  • 9 篇 technological in...
  • 8 篇 monitoring
  • 8 篇 wireless sensor ...
  • 8 篇 predictive model...
  • 8 篇 genetic algorith...
  • 8 篇 topology
  • 8 篇 mathematical mod...
  • 8 篇 data models
  • 7 篇 fuzzy logic
  • 7 篇 reliability

机构

  • 8 篇 dep. of mathemat...
  • 7 篇 dep. of electric...
  • 7 篇 institute of com...
  • 6 篇 department of co...
  • 5 篇 university of ag...
  • 5 篇 kristiania unive...
  • 5 篇 tu wien inst. of...
  • 5 篇 institute of com...
  • 5 篇 school of inform...
  • 5 篇 advanced researc...
  • 4 篇 dep. of computer...
  • 4 篇 king mongkut's u...
  • 3 篇 dep. of electric...
  • 3 篇 guangxi key labo...
  • 3 篇 department of ma...
  • 3 篇 dep. of computer...
  • 3 篇 applied computer...
  • 3 篇 sichuan institut...
  • 3 篇 fir-uf universit...
  • 3 篇 dep. of integrat...

作者

  • 8 篇 arani elahe
  • 8 篇 zonooz bahram
  • 7 篇 thilo sauter
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 cerdà-alabern ll...
  • 5 篇 grønli tor-morte...
  • 5 篇 mukund bhole
  • 5 篇 kaindl hermann
  • 5 篇 wolfgang kastner
  • 5 篇 majchrzak tim a.
  • 4 篇 ganokratanaa thi...
  • 4 篇 kastner wolfgang
  • 4 篇 gómez-pulido jua...
  • 4 篇 ignacio rojas
  • 4 篇 vega-rodríguez m...
  • 4 篇 rosa agostinho c...
  • 4 篇 fernandes carlos...
  • 4 篇 sauter thilo
  • 4 篇 mehdi ghatee

语言

  • 580 篇 英文
  • 63 篇 其他
  • 9 篇 中文
检索条件"机构=Dep. of Computer Architecture and Computer Technology"
652 条 记 录,以下是401-410 订阅
排序:
Estimation of ship's extremely low frequency electromagnetic signature based on fuzzy fusion for target detection
Estimation of ship's extremely low frequency electromagnetic...
收藏 引用
IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)
作者: Yihai Liu Xiaomin Zhang Jianfeng Shao Bingqi Zhang School of Marine Science and Technology Northwestern Polytechnical University Xi'an China Dep. of Electrical & Computer Engineering State University of New York New Paltz USA
The alternative electromagnetic (EM) fields radiating from a ship are widely recognized as new contributors to the application of underwater target detection. This paper focuses on the estimation of this extremely low... 详细信息
来源: 评论
Photo rendering with swarms: From figurative to abstract pherogenic imaging
Photo rendering with swarms: From figurative to abstract phe...
收藏 引用
2013 IEEE Symposium on Computational Intelligence for Creativity and Affective Computing, CICAC 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013
作者: Fernandes, Carlos M. Mora, Antonio Merelo, Juan Julian Cotta, Carlos Rosa, Agostinho C. Dep. of Computer Architecture and Technology University of Granada Spain Systems and Robotics Institute Technical University of Lisbon Portugal Dept. of Computer Languages and Computer Science University of Malaga Spain
This paper describes the use of ant colony models for photographic rendering, that is, for the dep.ction or interpretation of photographic images. A description of a previously proposed ant-based edge detection method... 详细信息
来源: 评论
Ensemble SVM for imbalanced data and missing values in postoperative risk management
Ensemble SVM for imbalanced data and missing values in posto...
收藏 引用
2013 IEEE 15th International Conference on e-Health Networking, Applications and Services, Healthcom 2013
作者: Zieba, Maciej Swiatek, Jerzy Wroclaw University of Technology Dep. of Computer Science and Management Institute of Informatics Poland
In this work, we propose the ensemble SVM that solves the problem of missing values of attributes and the imbalanced data phenomenon in the domain of postoperative risk management. Contrary to the other approaches the... 详细信息
来源: 评论
Detection of JavaScript of Malware with Un-readability Using Mahalanobis-Distance
Detection of JavaScript of Malware with Un-readability Using...
收藏 引用
International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)
作者: Kentaro Takamori Mai Iwamoto Shunsuke Oshima Takuo Nakashima Production System Engineering Course Kumamoto National College of Technology Yatsushiro Kumamoto Japan Kumamoto National College of Technology ICT Center for Learning Support Yatsushiro Kumamoto Japan Kumamoto National College of Technology Center for Technical and Educational Support Yatsushiro Kumamoto Japan Dep. of Electronics Engineering and Computer Science Tokai University Kumamoto Japan
Increasing of Java Scripts of malware requires automatic malware detection systems in these days. Our research takes note of the appearence probability and the state transition probability of first order Markov source... 详细信息
来源: 评论
Comparision of multi-carrier techniques in seven-level asymmetric cascade multilevel inverter
Comparision of multi-carrier techniques in seven-level asymm...
收藏 引用
2013 4th International Conference on Power Engineering, Energy and Electrical Drives, POWERENG 2013
作者: Colak, Ilhami Kabalci, Ersan Keven, Gokhan Faculty of Technology Department of Electric and Electronic Engineering Gazi University Ankara Turkey Faculty of Engineering and Architecture Dep. of Electrical and Electronic Eng. Nevsehir University Nevsehir Turkey Vocational College of Haci Bektaş Veli Dep. of Computer Programming Nevsehir University Nevsehir Turkey
The multilevel inverters (MLIs) are classified into three topologies such as Diode Clamped, Flying Capacitor and Cascade Multilevel Inverter (CMLI). CMLI topologies include two kind of structure that is named symmetri... 详细信息
来源: 评论
ROOM STATISTICS AND DIRECT-TO-REVERBERANT RATIO ESTIMATION FROM DUAL-CHANNEL SIGNALS
ROOM STATISTICS AND DIRECT-TO-REVERBERANT RATIO ESTIMATION F...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: E. Georganti J. Mourjopoulos S. van de Par Laboratory of Experimental Audiology ENT department University Hospital of Zurich Zurich 8091 Switzerland Audio and Acoustic Technology Group Wire Communications Laboratory Electrical & Computer Engineering dep. University of Patras 26500 Greece Acoustics Group Institute of Physics Carl von Ossietzky University Oldenburg 26111 Germany
A method for the estimation of the direct-to-reverberant-ratio (DRR) from dual-channel microphone recordings without having knowledge of the source signal is proposed. The method is based on previous findings for the ... 详细信息
来源: 评论
Static analysis of worst-case stack cache behavior  13
Static analysis of worst-case stack cache behavior
收藏 引用
21st International Conference on Real-Time Networks and Systems, RTNS 2013
作者: Jordan, Alexander Brandner, Florian Schoeberl, Martin Compilers and Languages Group Institute of Computer Languages Vienna University of Technology Austria Embedded Systems Engineering Section Dep. of Applied Mathematics and Computer Science Technical University of Denmark Denmark
Utilizing a stack cache in a real-time system can aid predictability by avoiding interference that heap memory traffic causes on the data cache. While loads and stores are guaranteed cache hits, explicit operations ar... 详细信息
来源: 评论
Directing exploratory search: Reinforcement learning from user interactions with keywords  13
Directing exploratory search: Reinforcement learning from us...
收藏 引用
18th International Conference on Intelligent User Interfaces, IUI 2013
作者: Glowacka, Dorota Ruotsalo, Tuukka Konyushkova, Ksenia Athukorala, Kumaripaba Kaski, Samuel Jacucci, Giulio Helsinki Institute for Information Technology HIIT Dep. of Computer Science University of Helsinki Finland Helsinki Institute for Information Technology HIIT Aalto University Finland
Techniques for both exploratory and known item search tend to direct only to more specific subtopics or individual documents, as opposed to allowing directing the exploration of the information space. We present an in... 详细信息
来源: 评论
Expressing Best Practices in (Risk) Analysis and Testing of Safety-Critical Systems Using Patterns
Expressing Best Practices in (Risk) Analysis and Testing of ...
收藏 引用
IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp)
作者: Wolfgang Herzner Sven Sieverding Omar Kacimi Eckard Böde Thomas Bauer Brian Nielsen Safety & Security Department AIT Austrian Institute of Technology Vienna Austria Transp. Dept. OFFIS - Inst. for Inf. Technol. Oldenburg Germany Transportation Department OFFIS - Institute for Information Technology Oldenburg Germany Dep. of Embedded Systems Quality Assurance Fraunhofer IESE Kaiserslautern Germany Department of Computer Science Aalborg University Denmark
The continuing pervasion of our society with safety-critical cyber-physical systems not only demands for adequate (risk) analysis, testing and verification techniques, it also generates growing experience on their use... 详细信息
来源: 评论
CMOS photodiode model and HDL implementation
CMOS photodiode model and HDL implementation
收藏 引用
2013 European Conference on Circuit Theory and Design, ECCTD 2013
作者: Blanco-Filgueira, B. López, P. Suárez, M. Roldán, J.B. CITIUS University of Santiago de Compostela 15782 Santiago-de Compostela Spain Dep. of Electronics and Computer Technology University of Granada 18071 Granade Spain
With CMOS image sensors scaling down due to the resolution and miniaturization demands, compact models for these devices become essential. A physically based model can be used to optimize the device performance and al... 详细信息
来源: 评论