咨询与建议

限定检索结果

文献类型

  • 4,011 篇 会议
  • 2,590 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 6,648 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,192 篇 工学
    • 2,766 篇 计算机科学与技术...
    • 2,216 篇 软件工程
    • 809 篇 信息与通信工程
    • 631 篇 控制科学与工程
    • 540 篇 电气工程
    • 458 篇 电子科学与技术(可...
    • 344 篇 生物工程
    • 337 篇 机械工程
    • 298 篇 光学工程
    • 283 篇 生物医学工程(可授...
    • 218 篇 动力工程及工程热...
    • 212 篇 仪器科学与技术
    • 163 篇 化学工程与技术
    • 138 篇 材料科学与工程(可...
    • 134 篇 交通运输工程
    • 124 篇 土木工程
    • 108 篇 建筑学
  • 2,052 篇 理学
    • 1,136 篇 数学
    • 512 篇 物理学
    • 420 篇 生物学
    • 300 篇 统计学(可授理学、...
    • 274 篇 系统科学
    • 180 篇 化学
  • 1,092 篇 管理学
    • 683 篇 管理科学与工程(可...
    • 443 篇 图书情报与档案管...
    • 292 篇 工商管理
  • 257 篇 医学
    • 219 篇 临床医学
    • 173 篇 基础医学(可授医学...
    • 113 篇 药学(可授医学、理...
  • 137 篇 法学
    • 100 篇 社会学
  • 98 篇 经济学
  • 54 篇 农学
  • 44 篇 教育学
  • 21 篇 文学
  • 20 篇 军事学
  • 14 篇 艺术学

主题

  • 303 篇 laboratories
  • 301 篇 computer science
  • 234 篇 software enginee...
  • 140 篇 application soft...
  • 133 篇 data mining
  • 114 篇 computational mo...
  • 106 篇 feature extracti...
  • 96 篇 costs
  • 94 篇 quality of servi...
  • 93 篇 semantics
  • 86 篇 computer archite...
  • 84 篇 wireless sensor ...
  • 83 篇 algorithm design...
  • 81 篇 deep learning
  • 80 篇 software
  • 78 篇 software systems
  • 78 篇 optimization
  • 78 篇 software testing
  • 78 篇 protocols
  • 78 篇 testing

机构

  • 231 篇 state key labora...
  • 159 篇 college of compu...
  • 118 篇 department of co...
  • 98 篇 national enginee...
  • 67 篇 department of co...
  • 67 篇 school of softwa...
  • 65 篇 state key labora...
  • 64 篇 department of co...
  • 54 篇 department of co...
  • 53 篇 state key labora...
  • 47 篇 national key lab...
  • 46 篇 peng cheng labor...
  • 46 篇 shanghai key lab...
  • 44 篇 university of ch...
  • 43 篇 key laboratory o...
  • 40 篇 tsinghua nationa...
  • 34 篇 school of comput...
  • 31 篇 department of el...
  • 30 篇 department of co...
  • 30 篇 beijing key labo...

作者

  • 52 篇 rajkumar buyya
  • 46 篇 shen linlin
  • 41 篇 junping du
  • 33 篇 mei-ling shyu
  • 33 篇 yu huiqun
  • 32 篇 shu-ching chen
  • 30 篇 fan guisheng
  • 29 篇 shen furao
  • 28 篇 zhao jian
  • 25 篇 chen shu-ching
  • 25 篇 baowen xu
  • 24 篇 zhou mengchu
  • 23 篇 yang yang
  • 22 篇 hamid soltanian-...
  • 22 篇 zongli lin
  • 22 篇 buyya rajkumar
  • 21 篇 mengchu zhou
  • 21 篇 sylvain martel
  • 21 篇 xu baowen
  • 20 篇 ji zhen

语言

  • 6,225 篇 英文
  • 296 篇 其他
  • 124 篇 中文
  • 2 篇 德文
  • 2 篇 日文
检索条件"机构=Department of Computer Engineering System Software Laboratory"
6648 条 记 录,以下是4931-4940 订阅
排序:
An Improved Test Case Generation Method for Web Service Testing from WSDL-S and OCL with Pair-Wise Testing Technique
An Improved Test Case Generation Method for Web Service Test...
收藏 引用
IEEE Annual International computer software and Applications Conference (COMPSAC)
作者: Siripol Noikajana Taratip Suwannasart Software Engineering Laboratory Center of Excellence in Software Engineering Department of Computer Engineering Faculty of Engineering Bangkok Thailand
Web Services are popular solutions that have been in recent years to implement software in every business domain. They provide an effective way to reuse functionality, which reduces development time and cost, and incr... 详细信息
来源: 评论
Warping of a spherical representation of image-based models on GPU
Warping of a spherical representation of image-based models ...
收藏 引用
VRCAI 2009: 8th International Conference on Virtual Reality Continuum and its Applications in Industry
作者: Zhu, Jian Liu, Youquan Bao, Kai Chang, Yuanzhang Wu, Enhua Department of Computer and Information Science University of Macau China School of Information Engineering Chang'an University Xi'an China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
Image warping techniques are frequently used to render 3D scenes from images with depth information for VR applications. In this paper, we first propose a spherical representation of image-based models call the Spheri... 详细信息
来源: 评论
A cumulant-based method for gait identification using accelerometer data with principal component analysis and support vector machine
收藏 引用
WSEAS Transactions on Signal Processing 2009年 第11期5卷 369-378页
作者: Sprager, Sebastijan Zazula, Damjan System Software Laboratory University of Maribor Faculty of Electrical Engineering and Computer Science Smetanova ulica 17 2000 Maribor Slovenia
In this paper a cumulant-based method for identification of gait using accelerometer data is presented. Acceleration data of three different walking speeds (slow, normal and fast) for each subject was acquired by the ... 详细信息
来源: 评论
Trusted resource dissemination in internetware systems  09
Trusted resource dissemination in internetware systems
收藏 引用
1st Asia-Pacific Symposium on Internetware, Internetware 2009
作者: Li, Zude Ye, Xiaojun Wang, Jianmin Computer Science Department University of Western Ontario London ON N6A 5B7 Canada Key Laboratory for Information System Security School of Software Tsinghua University Beijing 100084 China
Trusted resource dissemination over Internet is still an open problem. However, it is crucial to the success of Internet-based or Internetware systems. We propose an approach that supports trusted resource disseminati... 详细信息
来源: 评论
Texture Synthesis with Prioritized Pixel Re-synthesis
收藏 引用
Journal of Information Science and engineering 2009年 第2期25卷 389-402页
作者: 嚴崇仁 李同益 Computer Graphics Group/Visual System Laboratory Department of Computer Science and Information Engineering National Cheng Kung University
In this paper, we propose a new patch-based texture synthesis method. The core of the proposed method consists of two main components: (1) a feature-weighted similarity measurement to search for the best match and (2)... 详细信息
来源: 评论
Improve recognition-based segmentation for printed persian character recognition
Improve recognition-based segmentation for printed persian c...
收藏 引用
2009 International Conference on Image Processing, computer Vision, and Pattern Recognition, IPCV 2009
作者: Hatami, A. Majidi, M. Norouzi, Z. Mohamad, D. Center for Advanced Software Engineering UTM International Campus University Technology Malaysia Kuala Lumpur Malaysia Faculty of Computer Science and Information System University Technology Malaysia Johor Malaysia Department of Computer Science and Technology of Babol Babol Mazandaran Iran
The most scientific papers dealing with handwriting recognition systems make statements relating to recognition performance based on a forced-recognition rate. This rate describes the ratio between the number of the c... 详细信息
来源: 评论
Tighter and convex maximum margin clustering
Tighter and convex maximum margin clustering
收藏 引用
12th International Conference on Artificial Intelligence and Statistics, AISTATS 2009
作者: Li, Yu-Feng Tsang, Ivor W. Kwok, James T. Zhou, Zhi-Hua National Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China School of Computer Engineering Nanyang Technological University Singapore 639798 Singapore Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Maximum margin principle has been successfully applied to many supervised and semi-supervised problems in machine learning. Recently, this principle was extended for clustering, referred to as Maximum Margin Clusterin... 详细信息
来源: 评论
A particle-based method for viscoelastic fluids animation  09
A particle-based method for viscoelastic fluids animation
收藏 引用
VRST 2009 - 16th ACM Symposium on Virtual Reality software and Technology
作者: Chang, Yuanzhang Bao, Kai Liu, Youquan Zhu, Jian Wu, Enhua Department of Computer and Information Science University of Macau Macao China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Information Engineering Chang'an University Xi'an China
We present a particle-based method for viscoelastic fluids simulation. In the method, based on the traditional Navier-Stokes equation, an additional elastic stress term is introduced to achieve viscoelastic flow behav... 详细信息
来源: 评论
A task-deployment model for the simulation of computer network attack and defense exercises
A task-deployment model for the simulation of computer netwo...
收藏 引用
1st International Conference on Information Science and engineering, ICISE2009
作者: Yang, Yi Jiao, Jian Wang, Haiquan Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System Beihang University Beijing China Key Laboratory of Beijing Network Technology Beihang University Beijing China College of Software Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
The task-deployment models of simulation, is mainly used to solve the problem of the unreasonable tasks partition in the simulation of distributed computer network attack and defense exercises. This paper gives a task... 详细信息
来源: 评论
A modeling approach of mobile ad hoc networks survivability model
A modeling approach of mobile ad hoc networks survivability ...
收藏 引用
1st International Conference on Information Science and engineering, ICISE2009
作者: Wang, Haiquan Ma, Xinyi Xia, Chunhe Hao, Senshen State Key Laboratory of Virtual Reality Technology and System Beihang University Beijing China Key Laboratory of Beijing Network Technology Beihang University Beijing China College of Software Beihang University Beijing China Shool of Computer Science and Engineering Beihang University Beijing China
Survivability has become a focal point of research. Simulation is a common method for experimental verification to identify the advantages and deficiencies of survivability models and architectures. This paper propose... 详细信息
来源: 评论