咨询与建议

限定检索结果

文献类型

  • 1,814 篇 会议
  • 1,557 篇 期刊文献
  • 51 册 图书

馆藏范围

  • 3,422 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,200 篇 工学
    • 1,684 篇 计算机科学与技术...
    • 1,362 篇 软件工程
    • 463 篇 信息与通信工程
    • 328 篇 控制科学与工程
    • 266 篇 生物工程
    • 258 篇 电气工程
    • 211 篇 生物医学工程(可授...
    • 156 篇 机械工程
    • 154 篇 电子科学与技术(可...
    • 137 篇 光学工程
    • 113 篇 动力工程及工程热...
    • 98 篇 安全科学与工程
    • 86 篇 交通运输工程
    • 83 篇 网络空间安全
    • 80 篇 化学工程与技术
  • 1,036 篇 理学
    • 573 篇 数学
    • 308 篇 生物学
    • 216 篇 物理学
    • 181 篇 统计学(可授理学、...
    • 130 篇 系统科学
    • 89 篇 化学
  • 682 篇 管理学
    • 450 篇 管理科学与工程(可...
    • 240 篇 图书情报与档案管...
    • 207 篇 工商管理
  • 244 篇 医学
    • 211 篇 临床医学
    • 182 篇 基础医学(可授医学...
    • 114 篇 公共卫生与预防医...
    • 96 篇 药学(可授医学、理...
  • 95 篇 法学
    • 72 篇 社会学
  • 74 篇 经济学
    • 74 篇 应用经济学
  • 50 篇 教育学
  • 44 篇 农学
  • 9 篇 文学
  • 7 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 118 篇 deep learning
  • 113 篇 machine learning
  • 86 篇 accuracy
  • 86 篇 training
  • 82 篇 feature extracti...
  • 75 篇 computational mo...
  • 72 篇 internet of thin...
  • 69 篇 software enginee...
  • 68 篇 computer science
  • 64 篇 educational inst...
  • 57 篇 optimization
  • 56 篇 artificial intel...
  • 51 篇 predictive model...
  • 50 篇 security
  • 48 篇 cloud computing
  • 48 篇 convolutional ne...
  • 45 篇 blockchain
  • 44 篇 semantics
  • 43 篇 data models
  • 41 篇 data mining

机构

  • 356 篇 college of compu...
  • 69 篇 shenzhen univers...
  • 46 篇 state key labora...
  • 42 篇 college of compu...
  • 35 篇 department of co...
  • 33 篇 department of co...
  • 33 篇 college of compu...
  • 32 篇 the college of c...
  • 30 篇 department of co...
  • 30 篇 national enginee...
  • 23 篇 software college...
  • 23 篇 college of compu...
  • 22 篇 college of intel...
  • 22 篇 department of co...
  • 22 篇 department of so...
  • 19 篇 school of inform...
  • 19 篇 college of compu...
  • 18 篇 department of co...
  • 17 篇 college of compu...
  • 16 篇 school of comput...

作者

  • 51 篇 leung victor c.m...
  • 29 篇 ismail leila
  • 26 篇 shen linlin
  • 23 篇 leung victor c. ...
  • 22 篇 lin qiuzhen
  • 20 篇 li jianqiang
  • 19 篇 pan haoyuan
  • 19 篇 yazeed yasin gha...
  • 19 篇 materwala huned
  • 17 篇 niyato dusit
  • 17 篇 muhammad waseem ...
  • 16 篇 victor c. m. leu...
  • 15 篇 chan tse-tin
  • 15 篇 wang xiaofei
  • 15 篇 jiacun wang
  • 15 篇 tan kay chen
  • 15 篇 guo ping
  • 14 篇 carmi paz
  • 14 篇 muhammad adnan k...
  • 13 篇 huang ziyun

语言

  • 3,143 篇 英文
  • 256 篇 其他
  • 26 篇 中文
  • 2 篇 日文
检索条件"机构=Department of College of Computer Science& Software Engineering"
3422 条 记 录,以下是3121-3130 订阅
排序:
Design of a Human-Robot Interaction System for Offshore Monitoring
Design of a Human-Robot Interaction System for Offshore Moni...
收藏 引用
11th IEEE International Conference on computer-Aided Design and computer Graphics(第11届IEEE国际计算机辅助设计与图形学学术会议 IEEE CAD/GRAPHICS 2009)
作者: Alian zhou Jianping zhou Software Engineering Academy Yaitai Vocational College Department of Computer Science Ocean University of Chinag
In China, there are some wide and environmentdisgusting offshore, which is not easy for manpower or ordinary ship to monitor. What’s more, ship with special materials is too expensive. This paper introduces a Huma... 详细信息
来源: 评论
thr2csp: Toward Transforming Threads into Communicating Sequential Processes
thr2csp: Toward Transforming Threads into Communicating Sequ...
收藏 引用
IEEE International Workshop on Source Code Analysis and Manipulation
作者: Robert Lange Spiros Mancoridis Software Engineering Research Group Department of Computer Science College of Engineering Drexel University Philadelphia PA USA
As multicore and heterogeneous multiprocessor platforms replace uniprocessor systems, software programs must be designed with a greater emphasis on concurrency. Threading has become the dominant paradigm of concurrent... 详细信息
来源: 评论
Converging on the divergent: The history (and future) of the international joint workshops in computational creativity
Converging on the divergent: The history (and future) of the...
收藏 引用
作者: Cardoso, Amílcar Veale, Tony Wiggins, Geraint A. Department of Informatics Engineering University of Coimbra Portugal RandD Centre for Informatics and Systems Portugal School of Computer Science University College Dublin Ireland School of Software Engineering Fudan University Shanghai China Department of Computing Centre for Cognition Computation and Culture at Goldsmiths University of London United Kingdom
In this article, we survey the history of studies of computational creativity, following the development of the International Conference on Computational Creativity pom its beginnings, a decade ago, in two parallel wo... 详细信息
来源: 评论
Privacy protection for RFID data  09
Privacy protection for RFID data
收藏 引用
24th Annual ACM Symposium on Applied Computing, SAC 2009
作者: Fung, Benjamin C. M. Cao, Ming Desai, Bipin C. Xu, Heng Concordia Institute for Information Systems Engineering Concordia University Montreal QC Canada Department of Computer Science and Software Engineering Concordia University Montreal QC Canada College of Information Sciences and Technology Penn State University University Park PA 16802 United States
Radio Frequency IDentification (RFID) is a technology of automatic object identification. Retailers and manufacturers have created compelling business cases for deploying RFID in their supply chains. Yet, the uniquely... 详细信息
来源: 评论
Improved Needham-Schroeder protocol for secured and efficient key distributions
Improved Needham-Schroeder protocol for secured and efficien...
收藏 引用
International Conference on computer and Information Technology (ICCIT)
作者: Shamima Sultana Md. Ismail Jabiullah Md. Lutfar Rahman Department of Computer Science and Engineering Dhaka City College Dhaka Bangladesh Department of Software Engineering Daffodil International University Dhaka Bangladesh Department of Computer Science and Engineering Dhaka University Dhaka Bangladesh
A key distribution procedure is an essential constituent of secured exchange of information between the participants. In this paper, a fast symmetric key distribution technique with additional security services is pre... 详细信息
来源: 评论
Pervasive computing in play-based occupational therapy for children
收藏 引用
IEEE Pervasive Computing 2009年 第3期8卷 66-73页
作者: Lo, Jin-Ling Chi, Pei-Yu Chu, Hao-Hua Wang, Hsin-Yen Chou, Seng-Cho T. National Taiwan University Taiwan National Taiwan University's School of Occupational Therapy College of Medicine Committee of Early Intervention Taiwan Software Agents Group at the MIT Media Lab United States National Taiwan University's Graduate Institute of Networking and Multimedia Department of Computer Science and Information Engineering Taiwan Taiwan Occupational Therapy Association Taiwan Department of Information Management College of Management at National Taiwan University Taiwan
Researchers conducted a study to demonstrate a play-based occupational therapy model based on the model of human occupation (MOHO). The model employed pervasive computing technologies to determine behavior and reveale... 详细信息
来源: 评论
Dependence Analysis for C Programs with Combinability of Dataflow Facts under Consideration
收藏 引用
Wuhan University Journal of Natural sciences 2009年 第4期14卷 321-326页
作者: QIAN Ju XU Baowen ZHOU Xiaoyu CHEN Lin SHI Liang College of Information Science and Technology NanjingUniversity of Aeronautics and Astronautics Nanjing 210016Jiangsu China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 Jiangsu China Department of Computer Science and Technology NanjingUniversity Nanjing 210093 Jiangsu China School of Computer Science and Engineering SoutheastUniversity Nanjing 211189 Jiangsu China Microsoft China Research and Development Group Beijing100080 China
To avoid the precision loss caused by combining data- flow facts impossible to occur in the same execution path in dependence analysis for C programs, this paper first proposes a flow-sensitive and context-insensitive... 详细信息
来源: 评论
A NEW FLATNESS PATTERN RECOGNITION MODEL BASED ON CA-CMAC NETWORK
A NEW FLATNESS PATTERN RECOGNITION MODEL BASED ON CA-CMAC NE...
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: HONG-LI YUAN YAN LI YONG-ZHENG LI Software Engineering Staff room Computer Engineering Department Ordnance Engineering College Shij College of Information Science and Engineering Yanshan University Qinhuangdao 066004 Hebei China
In the traditional flatness pattern recognition neural network, the topologic configurations need to be rebuilt with a changing width of cold strip. Furthermore, the large learn assignment, slow convergence, and local... 详细信息
来源: 评论
Modeling class cohesion as mixtures of latent topics
Modeling class cohesion as mixtures of latent topics
收藏 引用
International Conference on software Maintenance (ICSM)
作者: Yixun Liu Denys Poshyvanyk Rudolf Ferenc Tibor Gyimothy Nikos Chrisochoides Computer Science Department College of William and Mary Williamsburg VA USA Department of Software Engineering University of Szeged Szeged Hungary
The paper proposes a new measure for the cohesion of classes in object-oriented software systems. It is based on the analysis of latent topics embedded in comments and identifiers in source code. The measure, named as... 详细信息
来源: 评论
Self-Forensics Through Case Studies of Small-to-Medium software Systems
Self-Forensics Through Case Studies of Small-to-Medium Softw...
收藏 引用
International Conference on IT Security Incident Management and IT Forensics, IMF
作者: Serguei A. Mokhov Emil Vassev Department of Computer Science and Software Engineering Concordia University Montreal QUE Canada Lero-The Irish Software Engineering Research Center University College Dublin Dublin Ireland
The notion and definition of self-forensics was introduced by Mokhov to encompass software and hardware capabilities for autonomic and other systems to record their own states, events, and others encoded in a forensic... 详细信息
来源: 评论