咨询与建议

限定检索结果

文献类型

  • 493 篇 会议
  • 121 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 616 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 376 篇 工学
    • 269 篇 计算机科学与技术...
    • 220 篇 软件工程
    • 96 篇 信息与通信工程
    • 70 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 33 篇 生物工程
    • 29 篇 仪器科学与技术
    • 26 篇 生物医学工程(可授...
    • 25 篇 机械工程
    • 21 篇 光学工程
    • 20 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 14 篇 材料科学与工程(可...
    • 14 篇 交通运输工程
    • 12 篇 建筑学
    • 12 篇 安全科学与工程
  • 184 篇 理学
    • 88 篇 数学
    • 54 篇 物理学
    • 41 篇 生物学
    • 33 篇 统计学(可授理学、...
    • 29 篇 系统科学
    • 22 篇 化学
  • 110 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 45 篇 工商管理
    • 41 篇 图书情报与档案管...
  • 21 篇 医学
    • 20 篇 基础医学(可授医学...
    • 19 篇 临床医学
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 18 篇 internet of thin...
  • 15 篇 feature extracti...
  • 14 篇 computational mo...
  • 13 篇 convolutional ne...
  • 11 篇 accuracy
  • 9 篇 computer archite...
  • 9 篇 machine learning
  • 9 篇 software
  • 8 篇 bandwidth
  • 8 篇 real-time system...
  • 8 篇 security
  • 8 篇 training
  • 7 篇 delays
  • 7 篇 wireless communi...
  • 7 篇 cameras
  • 7 篇 optimization
  • 7 篇 predictive model...
  • 7 篇 complexity theor...
  • 6 篇 computer science
  • 6 篇 reliability

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...
  • 4 篇 dep. of computer...
  • 4 篇 zarqa university...
  • 4 篇 institute of com...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 kuo yaw-wen
  • 5 篇 yousif i hammadi

语言

  • 588 篇 英文
  • 20 篇 其他
  • 7 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Engineering and Computer Science"
616 条 记 录,以下是421-430 订阅
排序:
Nonminimum-phase channel equalization using all-pass CMA
Nonminimum-phase channel equalization using all-pass CMA
收藏 引用
2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2013
作者: Blom, Koen C.H. Gerards, Marco E.T. Kokkeler, Ándre B.J. Smit, Gerard J.M. Dep. of Electrical Engineering Mathematics and Computer Science University of Twente P.O. Box 217 7500 AE Enschede Netherlands
A nonminimum-phase channel can always be decomposed into a minimum-phase part and an all-pass part. In our approach, called all-pass CMA, the dimensionality of the CMA algorithm has been reduced to improve blind equal... 详细信息
来源: 评论
Static analysis of worst-case stack cache behavior  13
Static analysis of worst-case stack cache behavior
收藏 引用
21st International Conference on Real-Time Networks and Systems, RTNS 2013
作者: Jordan, Alexander Brandner, Florian Schoeberl, Martin Compilers and Languages Group Institute of Computer Languages Vienna University of Technology Austria Embedded Systems Engineering Section Dep. of Applied Mathematics and Computer Science Technical University of Denmark Denmark
Utilizing a stack cache in a real-time system can aid predictability by avoiding interference that heap memory traffic causes on the data cache. While loads and stores are guaranteed cache hits, explicit operations ar... 详细信息
来源: 评论
Ubiquitous mobile instrumentation
Ubiquitous mobile instrumentation
收藏 引用
2013 ACM Conference on Ubiquitous Computing, UbiComp 2013
作者: Ferreira, Denzil Koehler, Christian Karapanos, Evangelos Kostakos, Vassilis Dep. Computer Science and Engineering University of Oulu Finland Human-Computer Interaction Institute Carnegie Mellon University United States Madeira Interactive Technologies Institute University of Madeira Portugal
Mobile phones allow us to reach people anywhere, at anytime. In addition to the benefits for end users, researchers and developers can also benefit from the powerful devices that participants carry on a daily basis. C... 详细信息
来源: 评论
Wavelet compression inspired implementation for high performances and low complexity ECG removal in wireless sEMG electrodes
Wavelet compression inspired implementation for high perform...
收藏 引用
IEEE International Conference on Electronics, Circuits and Systems (ICECS)
作者: Mohamed El Fares Djellatou Daniel Massicotte Mounir Boukadoum Dep. Electrical and Computer Engineering LSSI Dep. Computer Science Université du Québec à Montréal
This study addresses the removal of electrocardiogram pulses (ECG) from surface electromyography signals (sEMG) in wireless sEMG electrodes. We describe a wavelet-compression inspired filtering technique in order to m... 详细信息
来源: 评论
Feature selection methods in persian sentiment analysis
收藏 引用
18th International Conference on Application of Natural Language to Information Systems, NLDB 2013
作者: Saraee, Mohamad Bagheri, Ayoub School of Computing Science and Engineering University of Salford Manchester United Kingdom Intelligent Database Data Mining and Bioinformatics Lab Electrical and Computer Engineering Dep. Isfahan University of Technology Isfahan Iran
With the enormous growth of digital content in internet, various types of online reviews such as product and movie reviews present a wealth of subjective information that can be very helpful for potential users. Senti... 详细信息
来源: 评论
Image denoising based on overcomplete topographic sparse coding
Image denoising based on overcomplete topographic sparse cod...
收藏 引用
20th International Conference on Neural Information Processing, ICONIP 2013
作者: Zhao, Haohua Luo, Jun Huang, Zhiheng Nagumo, Takefumi Murayama, Jun Zhang, Liqing MOE-Microsoft Key Laboratory for Intelligent Computing and Intelligent Systems Dep. of Computer Science and Engineering Shanghai Jiao Tong Univ. Shanghai China SONY Corporation Tokyo Japan
This paper presents a novel image denoising framework using overcomplete topographic model. To adapt to the statistics of natural images, we impose sparseness constraints on the denoising model. Based on the overcompl... 详细信息
来源: 评论
Image Deblurring Using Fast Best Kernel Retrieval
Image Deblurring Using Fast Best Kernel Retrieval
收藏 引用
Asian Conference on Pattern Recognition (ACPR)
作者: Hui-Yu Huang Wei-Chang Tsai Dep. of Computer Science and Information Engineering National Formosa University Taiwan
In this paper, we propose a kernel estimation algorithm using fast best kernel retrieval (FBKR) from spectral irregularities to achieve the deblurring. In daily life, when people take a photograph by any kinds of came... 详细信息
来源: 评论
Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel?
Physical layer security vs. network layer secrecy: Who wins ...
收藏 引用
IEEE International Workshop on computer-Aided Modeling, Analysis, and Design of Communication Links and Networks, CAMAD
作者: Johannes Richter Elke Franz Sabrina Engelmann Stefan Pfennig Eduard A. Jorswieck Dep. of Electrical Engineering and Information Technology/Communications Laboratory Dep. of Computer Science/Privacy and Data Security Technische Universität Dresden Dresden Germany
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an ... 详细信息
来源: 评论
On Rapid Releases and Software Testing
On Rapid Releases and Software Testing
收藏 引用
International Conference on Software Maintenance (ICSM)
作者: Mika V. Mäntylä Foutse Khomh Bram Adams Emelie Engström Kai Petersen Dep. of Computer Science and Engineering Aalto University Finland SWAT-MCIS École Polytechnique de Montréal Ouébec Canada Dep. of Computer Science Lund University Sweden School of Computing Blekinge Institute of Technology
Large open and closed source organizations like Google, Facebook and Mozilla are migrating their products towards rapid releases. While this allows faster time-to-market and user feedback, it also implies less time fo... 详细信息
来源: 评论
HIP-IKEv2: A proposal to improve internet key exchange protocol-based on host identity protocol
HIP-IKEv2: A proposal to improve internet key exchange proto...
收藏 引用
3rd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, SIMULTECH 2013
作者: Smaoui, S. Zarai, F. Obaidat, M.S. Hsiao, K.F. Kamoun, L. LETI laboratory University of Sfax Sfax Tunisia Computer Science and Software Engineering Department Monmouth University West Long Branch NJ 07764 United States Dep. of Information Management Ming-Chuan University Taoyuan County 333 Taiwan
IKEv2 offers authentication, authorization and key agreement services to establish a security association between two peers bound to IP addresses, but it is still vulnerable to some security problems such as denial of... 详细信息
来源: 评论