咨询与建议

限定检索结果

文献类型

  • 3,621 篇 会议
  • 2,170 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 5,827 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,439 篇 工学
    • 2,096 篇 计算机科学与技术...
    • 1,666 篇 软件工程
    • 693 篇 信息与通信工程
    • 652 篇 控制科学与工程
    • 485 篇 电气工程
    • 437 篇 电子科学与技术(可...
    • 376 篇 生物工程
    • 311 篇 机械工程
    • 306 篇 生物医学工程(可授...
    • 256 篇 光学工程
    • 233 篇 仪器科学与技术
    • 209 篇 动力工程及工程热...
    • 188 篇 化学工程与技术
    • 145 篇 交通运输工程
    • 133 篇 材料科学与工程(可...
    • 110 篇 安全科学与工程
  • 1,869 篇 理学
    • 859 篇 数学
    • 576 篇 物理学
    • 438 篇 生物学
    • 285 篇 统计学(可授理学、...
    • 228 篇 系统科学
    • 188 篇 化学
  • 920 篇 管理学
    • 621 篇 管理科学与工程(可...
    • 328 篇 图书情报与档案管...
    • 278 篇 工商管理
  • 323 篇 医学
    • 271 篇 临床医学
    • 214 篇 基础医学(可授医学...
    • 139 篇 药学(可授医学、理...
  • 147 篇 法学
    • 120 篇 社会学
  • 110 篇 经济学
    • 109 篇 应用经济学
  • 68 篇 农学
  • 56 篇 教育学
  • 21 篇 文学
  • 17 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 214 篇 computer science
  • 120 篇 deep learning
  • 111 篇 feature extracti...
  • 100 篇 computational mo...
  • 99 篇 accuracy
  • 95 篇 machine learning
  • 91 篇 systems engineer...
  • 91 篇 data mining
  • 91 篇 control systems
  • 82 篇 neural networks
  • 78 篇 artificial intel...
  • 71 篇 optimization
  • 70 篇 training
  • 67 篇 laboratories
  • 66 篇 costs
  • 66 篇 humans
  • 65 篇 hardware
  • 59 篇 testing
  • 55 篇 protocols
  • 54 篇 information syst...

机构

  • 71 篇 department of co...
  • 39 篇 national enginee...
  • 29 篇 college of compu...
  • 25 篇 department of co...
  • 24 篇 department of co...
  • 24 篇 department of co...
  • 22 篇 department of co...
  • 22 篇 key laboratory o...
  • 22 篇 department of sy...
  • 22 篇 department of el...
  • 22 篇 university of ch...
  • 22 篇 distributed mult...
  • 20 篇 department of el...
  • 19 篇 department of co...
  • 18 篇 department of el...
  • 18 篇 school of comput...
  • 18 篇 frontiers scienc...
  • 17 篇 distributed mult...
  • 17 篇 national enginee...
  • 17 篇 department of co...

作者

  • 25 篇 mei-ling shyu
  • 24 篇 shu-ching chen
  • 24 篇 hai jin
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 21 篇 yang yang
  • 20 篇 dutta paramartha
  • 17 篇 wang xingjun
  • 16 篇 shyu mei-ling
  • 15 篇 han zhu
  • 15 篇 paramartha dutta
  • 14 篇 bowers john e.
  • 13 篇 mohamed k.nour
  • 13 篇 tei-wei kuo
  • 13 篇 yunhao liu
  • 13 篇 shen linlin
  • 13 篇 ai bo
  • 12 篇 niyato dusit
  • 12 篇 kazuyuki kobayas...
  • 12 篇 hayashi eiji

语言

  • 5,005 篇 英文
  • 700 篇 其他
  • 119 篇 中文
  • 16 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=Department of Computer Science& System Engineering"
5827 条 记 录,以下是4181-4190 订阅
排序:
Tabular form editing with a hexadecimal grid graph model
Tabular form editing with a hexadecimal grid graph model
收藏 引用
IEEE Symposium on Visual Languages and Human Centric Computing (VL/HCC)
作者: Shinji Koka Kenshi Nomaki Koichi Anada Takeo Yaku Department Computer Science and System Analysis Nihon University Tokyo Japan Waseda Research Institute of Science and Engineering Waseda University Tokyo Japan
We discuss tabular forms. It is known in the previous studies that the “octgrid” is a data structure for single layer tabular forms with ruled line preserving algorithms. And the “hexadeci-grid” is known as a data...
来源: 评论
XML semantic constraint validation for XML updates: A survey
XML semantic constraint validation for XML updates: A survey
收藏 引用
International Conference on Semantic Technology and Information Retrieval (STAIR)
作者: Norfaradilla Wahid Eric Pardede Department of Computer Science and Engineering La Trobe University VIC Australia Faculty of Computer Science and Information System Universiti Tun Hussein Onn Malaysia Batu Pahat Malaysia
XML databases are commonly used for representing data with more complex structures than traditional relational data. Like in any data model, it is very important to ensure that the contents of the database always vali... 详细信息
来源: 评论
ACF comparison of various spreading sequences for T-DMB watermarking system
ACF comparison of various spreading sequences for T-DMB wate...
收藏 引用
2011 International Conference on ICT Convergence, ICTC 2011
作者: Lee, Seungho Lee, Junghoon Lee, Yongtae Baek, Myungsun Lim, Bomi Rho, Jungkyu Jeong, Incheol Cha, Jaesang Dept. of Media Eng. Seoul National Univ. of Science and Tech. Seoul Korea Republic of Broadcasting System Research Department Broadcasting and Telecommunication Media Research Division ETRI Korea Republic of Dept. of Computer Science Seokyeong Univ. Seoul Korea Republic of Dept. of Computer and Communication Engineering Sungkonghoe University Seoul Korea Republic of
This paper compared ACF(Auto Correlation Feature) characteristics for ZCD, Kasami and Golay codes. Sequence codes have been used as a spreading sequence in order to overcome ICI(Inter Code Interference) caused by tran... 详细信息
来源: 评论
Control of epidemic spreading on complex networks by local traffic dynamics
收藏 引用
Physical Review E 2011年 第4期84卷 045101(R)-045101(R)页
作者: Han-Xin Yang Wen-Xu Wang Ying-Cheng Lai Yan-Bo Xie Bing-Hong Wang Department of Physics Fuzhou University Fuzhou 350002 China Department of Modern Physics University of Science and Technology of China Hefei 230026 China School of Electrical Computer and Energy Engineering Arizona State University Tempe Arizona 85287 USA Research Center for Complex System Science University of Shanghai for Science and Technology and Shanghai Academy of System Science Shanghai 200093 China
Despite extensive work on traffic dynamics and epidemic spreading on complex networks, the interplay between these two types of dynamical processes has not received adequate attention. We study the effect of local-rou... 详细信息
来源: 评论
RAMC: A RSU-assisted multi-channel coordination MAC protocol for VANET
RAMC: A RSU-assisted multi-channel coordination MAC protocol...
收藏 引用
作者: Liu, Kai Guo, Jinhua Lu, Ning Liu, Fuqiang Wang, Xinhong Wang, Ping School of Electronics and Information Engineering Key Laboratory of Embedded System and Service Computing Tongji University 4800 Cao'an Road 201804 Shanghai China Department of Computer and Information Science University of Michigan-Dearborn 4901 Evergreen Rd Dearborn MI 48128 United States
Dedicated Short Range Communication (DSRC) employs one control channel for safety-oriented applications and six service channels for non-safety commercial applications. However, most existing multichannel schemes requ... 详细信息
来源: 评论
Enhanced authentication schemes for intrusion prevention using native language passwords
收藏 引用
International Journal of computer science Issues 2011年 第4 4-1期8卷 356-362页
作者: Malempati, Sreelatha Mogalla, Shashi Department of Computer Science and Engineering R.V.R. and J.C. College of Engineering Chowdavaram Guntur A.P India Department of Computer Science and System Engineering Andhra University College of Engineering Andhra University Visakhapatnam A.P India
Textual password authentication schemes are vulnerable to attacks like eves dropping, shoulder surfing and hidden cameras. An authentication scheme which integrates graphics and text is resistant to these attacks. Nat... 详细信息
来源: 评论
Extracting environmental constraints to make reactive system specifications realizable
Computer Software
收藏 引用
computer Software 2011年 第3期28卷 132-146页
作者: Hagihara, Shigeki Shimakawa, Masaya Yonezaki, Naoki Kitamura, Yusuke Sekido, Satoshi Department of Computer Science Graduate School of Information Science and Engineering Institute of Technology Japan System Engineering Dept. Sony Business Solutions Corporation Value Creation Division Japan Department of Communications and Integrated Systems Graduate School of Science and Engineering Tokyo Institute of Technology Japan
Many fatal accidents of safety critical reactive systems have occurred in unexpected situations which had not been considered during design and test phases of the systems. To prevent these accidents, reactive systems ... 详细信息
来源: 评论
Under Uncertainty Trust Estimation through Unknown Agents, in a Multi-valued Trust Environment
Under Uncertainty Trust Estimation through Unknown Agents, i...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Sina Honari Brigitte Jaumard Jamal Bentahar Department of Computer Science and Soft. Engineering Concordia University Montreal Canada Department of Computer Science and Soft. Eng Concordia University Montreal Canada Concordia Institute for Information System Engineering Concordia University Montreal Canada
In a world where an increasing number of transactions are made on the web, there is a need for a trust evaluation tool dealing with uncertainty, e.g., for customers interested in evaluating the trustworthiness of an u... 详细信息
来源: 评论
Determination of security limits with respect to voltage instability at RTE
Determination of security limits with respect to voltage ins...
收藏 引用
IEEE Power and Energy Society General Meeting
作者: Marie-Sophie Balavoine Vincent Sermanson Thierry Van Cutsem "Methods and Support" department of RTE (the French transmission system operator) Dept. of Electrical Engineering and Computer Science of the University of Liege
This paper reports on the implementation of Voltage Security Assessment tools in the energy management system of RTE, the French transmission system operator. In particular, secure operation limits are determined in v... 详细信息
来源: 评论
A nonlinear model predictive control using a continuation method and a step input constraint
A nonlinear model predictive control using a continuation me...
收藏 引用
2011 International Conference on Advanced Mechatronic systems, ICAMechS 2011
作者: Kogiso, Kota Masuda, Shiro Sato, Takao Faculty of System Engineering Tokyo Metropolitan University 6-6 Asahigaoka Hino Tokyo Japan Faculty of Electrical Engineering Mathematics and Computer Science Tokyo Metropolitan University 6-6 Asahigaoka Hino Tokyo Japan Department of Mechanical and Systems Engineering Graduate School of Engineering University of Hyogo 1-3-3 Higashikawasaki-cho Chuo-ku Kobe Hyogo Japan
The nonlinear model predictive control (MPC) needs to solve a two-point boundary-value problem (TP-BVP) at every sample time based on the receding horizon control strategy. However, solving a nonlinear algebraic equat... 详细信息
来源: 评论