咨询与建议

限定检索结果

文献类型

  • 625 篇 会议
  • 140 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 448 篇 工学
    • 296 篇 计算机科学与技术...
    • 237 篇 软件工程
    • 112 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 74 篇 电气工程
    • 55 篇 电子科学与技术(可...
    • 34 篇 机械工程
    • 29 篇 生物工程
    • 28 篇 仪器科学与技术
    • 26 篇 动力工程及工程热...
    • 24 篇 生物医学工程(可授...
    • 22 篇 光学工程
    • 22 篇 化学工程与技术
    • 16 篇 材料科学与工程(可...
    • 15 篇 交通运输工程
    • 15 篇 环境科学与工程(可...
  • 249 篇 理学
    • 111 篇 数学
    • 103 篇 物理学
    • 33 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 128 篇 管理学
    • 97 篇 管理科学与工程(可...
    • 58 篇 工商管理
    • 44 篇 图书情报与档案管...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 23 篇 医学
    • 21 篇 基础医学(可授医学...
    • 21 篇 临床医学
    • 15 篇 药学(可授医学、理...
  • 20 篇 法学
    • 16 篇 社会学
  • 17 篇 农学
  • 7 篇 教育学
  • 3 篇 文学
  • 1 篇 军事学

主题

  • 24 篇 internet of thin...
  • 22 篇 feature extracti...
  • 17 篇 accuracy
  • 15 篇 training
  • 13 篇 computational mo...
  • 12 篇 wireless communi...
  • 10 篇 receivers
  • 10 篇 software
  • 10 篇 technological in...
  • 9 篇 large hadron col...
  • 9 篇 electroencephalo...
  • 9 篇 logic gates
  • 9 篇 data models
  • 8 篇 computer archite...
  • 8 篇 cameras
  • 8 篇 optimization
  • 8 篇 genetic algorith...
  • 8 篇 topology
  • 8 篇 industries
  • 8 篇 standards

机构

  • 32 篇 department of ph...
  • 32 篇 department of ph...
  • 32 篇 department of ph...
  • 31 篇 faculté des scie...
  • 31 篇 department of ph...
  • 31 篇 faculty of scien...
  • 31 篇 departamento de ...
  • 31 篇 department of ph...
  • 31 篇 department for p...
  • 31 篇 yerevan physics ...
  • 31 篇 kirchhoff-instit...
  • 31 篇 faculty of pure ...
  • 31 篇 graduate school ...
  • 31 篇 institute of phy...
  • 31 篇 institute of phy...
  • 31 篇 dsm/irfu cea sac...
  • 31 篇 physikalisches i...
  • 31 篇 instituto de fís...
  • 31 篇 physics departme...
  • 31 篇 fakultät für mat...

作者

  • 28 篇 f. buehrer
  • 28 篇 c. alexa
  • 28 篇 j. m. izen
  • 28 篇 s. veneziano
  • 28 篇 m. j. schultens
  • 28 篇 k. bos
  • 28 篇 g. bella
  • 28 篇 j. strandberg
  • 28 篇 d. calvet
  • 28 篇 c. amelung
  • 28 篇 f. pastore
  • 28 篇 e. guido
  • 28 篇 n. orlando
  • 28 篇 h. a. gordon
  • 28 篇 y. tayalati
  • 28 篇 g. spigo
  • 28 篇 v. chiarella
  • 28 篇 f. siegert
  • 28 篇 a. antonov
  • 28 篇 e. hines

语言

  • 743 篇 英文
  • 18 篇 其他
  • 7 篇 中文
  • 1 篇 日文
检索条件"机构=Dep. of Computer Engineering and Information Technology"
769 条 记 录,以下是491-500 订阅
排序:
Static analysis of worst-case stack cache behavior  13
Static analysis of worst-case stack cache behavior
收藏 引用
21st International Conference on Real-Time Networks and Systems, RTNS 2013
作者: Jordan, Alexander Brandner, Florian Schoeberl, Martin Compilers and Languages Group Institute of Computer Languages Vienna University of Technology Austria Embedded Systems Engineering Section Dep. of Applied Mathematics and Computer Science Technical University of Denmark Denmark
Utilizing a stack cache in a real-time system can aid predictability by avoiding interference that heap memory traffic causes on the data cache. While loads and stores are guaranteed cache hits, explicit operations ar... 详细信息
来源: 评论
Comparision of multi-carrier techniques in seven-level asymmetric cascade multilevel inverter
Comparision of multi-carrier techniques in seven-level asymm...
收藏 引用
2013 4th International Conference on Power engineering, Energy and Electrical Drives, POWERENG 2013
作者: Colak, Ilhami Kabalci, Ersan Keven, Gokhan Faculty of Technology Department of Electric and Electronic Engineering Gazi University Ankara Turkey Faculty of Engineering and Architecture Dep. of Electrical and Electronic Eng. Nevsehir University Nevsehir Turkey Vocational College of Haci Bektaş Veli Dep. of Computer Programming Nevsehir University Nevsehir Turkey
The multilevel inverters (MLIs) are classified into three topologies such as Diode Clamped, Flying Capacitor and Cascade Multilevel Inverter (CMLI). CMLI topologies include two kind of structure that is named symmetri... 详细信息
来源: 评论
Summary abstract for the 2nd ACM international workshop on multimedia analysis for ecological data  13
Summary abstract for the 2nd ACM international workshop on m...
收藏 引用
21st ACM International Conference on Multimedia, MM 2013
作者: Spampinato, Concetto Mezaris, Vasileios Van Ossenbruggen, Jacco Dep. of Electrical Electronics and Computer Engineering University of Catania 95125 Catania Italy Centre for Research and Technology Hellas Information Technologies Inst. Thermi 57001 Greece Centrum Wiskunde and Informatica 1098 XG Amsterdam NL Netherlands
The 2nd ACM InternationalWorkshop on Multimedia Analysis for Ecological Data (MAED'13) is held as part of ACM Multimedia 2013. MAED'13, following the first workshop of the MAED series (MAED'12) that was he... 详细信息
来源: 评论
Feature selection methods in persian sentiment analysis
收藏 引用
18th International Conference on Application of Natural Language to information Systems, NLDB 2013
作者: Saraee, Mohamad Bagheri, Ayoub School of Computing Science and Engineering University of Salford Manchester United Kingdom Intelligent Database Data Mining and Bioinformatics Lab Electrical and Computer Engineering Dep. Isfahan University of Technology Isfahan Iran
With the enormous growth of digital content in internet, various types of online reviews such as product and movie reviews present a wealth of subjective information that can be very helpful for potential users. Senti... 详细信息
来源: 评论
Image Deblurring Using Fast Best Kernel Retrieval
Image Deblurring Using Fast Best Kernel Retrieval
收藏 引用
Asian Conference on Pattern Recognition (ACPR)
作者: Hui-Yu Huang Wei-Chang Tsai Dep. of Computer Science and Information Engineering National Formosa University Taiwan
In this paper, we propose a kernel estimation algorithm using fast best kernel retrieval (FBKR) from spectral irregularities to achieve the deblurring. In daily life, when people take a photograph by any kinds of came... 详细信息
来源: 评论
Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel?
Physical layer security vs. network layer secrecy: Who wins ...
收藏 引用
IEEE International Workshop on computer-Aided Modeling, Analysis, and Design of Communication Links and Networks, CAMAD
作者: Johannes Richter Elke Franz Sabrina Engelmann Stefan Pfennig Eduard A. Jorswieck Dep. of Electrical Engineering and Information Technology/Communications Laboratory Dep. of Computer Science/Privacy and Data Security Technische Universität Dresden Dresden Germany
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an ... 详细信息
来源: 评论
Application of evolutionary algorithms to maximum lifetime coverage problem in wireless sensor networks
Application of evolutionary algorithms to maximum lifetime c...
收藏 引用
2013 IEEE 37th Annual computer Software and Applications Conference, COMPSAC 2013
作者: Tretyakova, Antonina Seredynski, Franciszek Polish-Japanese Institute of Information Technology Warsaw Poland Dep. of Mathematics and Natural Sciences Cardinal Stefan Wyszynski University Warsaw Poland Computer Science Department Siedlce University of Natural Sciences and Humanities Siedlce Poland
The paper analyzes three recently proposed algorithms, which differ not only in the method of finding solution to the Maximum Lifetime Coverage problem in Wireless Sensor Networks (WSN), but also approaches to a state... 详细信息
来源: 评论
HIP-IKEv2: A proposal to improve internet key exchange protocol-based on host identity protocol
HIP-IKEv2: A proposal to improve internet key exchange proto...
收藏 引用
3rd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, SIMULTECH 2013
作者: Smaoui, S. Zarai, F. Obaidat, M.S. Hsiao, K.F. Kamoun, L. LETI laboratory University of Sfax Sfax Tunisia Computer Science and Software Engineering Department Monmouth University West Long Branch NJ 07764 United States Dep. of Information Management Ming-Chuan University Taoyuan County 333 Taiwan
IKEv2 offers authentication, authorization and key agreement services to establish a security association between two peers bound to IP addresses, but it is still vulnerable to some security problems such as denial of... 详细信息
来源: 评论
Biometric iris image acquisition system with wavefront coding technology
Biometric iris image acquisition system with wavefront codin...
收藏 引用
5th International Symposium on Photoelectronic Detection and Imaging, ISPDI 2013
作者: Hsieh, Sheng-Hsun Yang, Hsi-Wen Huang, Shao-Hung Li, Yung-Hui Tien, Chung-Hao Dep. of Photonics National Chiao Tung Univ. 1001 University Rd. Hsinchu 300 Taiwan Dept. of Information Engineering and Computer Science Feng Chia Univ. 100 Wenhwa Rd. Seatwen Taichung 407 Taiwan
Biometric signatures for identity recognition have been practiced for centuries. Basically, the personal attributes used for a biometric identification system can be classified into two areas: one is based on physiolo... 详细信息
来源: 评论
Message from the MAED'13 workshop chairs
MAED 2013 - Proceedings of the 2nd ACM International Worksho...
收藏 引用
MAED 2013 - Proceedings of the 2nd ACM International Workshop on Multimedia Analysis for Ecological Data 2013年 iii页
作者: Spampinato, Concetto Mezaris, Vasileios Van Ossenbruggen, Jacco Dep. of Electrical Electronics and Computer Engineering University of Catania Italy Centre for Research and Technology Hellas Information Technologies Institute Greece Centrum Wiskunde and Informatica Netherlands
来源: 评论