咨询与建议

限定检索结果

文献类型

  • 3,606 篇 会议
  • 2,160 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,803 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,421 篇 工学
    • 2,083 篇 计算机科学与技术...
    • 1,664 篇 软件工程
    • 680 篇 信息与通信工程
    • 649 篇 控制科学与工程
    • 476 篇 电气工程
    • 435 篇 电子科学与技术(可...
    • 375 篇 生物工程
    • 308 篇 机械工程
    • 305 篇 生物医学工程(可授...
    • 255 篇 光学工程
    • 230 篇 仪器科学与技术
    • 208 篇 动力工程及工程热...
    • 186 篇 化学工程与技术
    • 147 篇 交通运输工程
    • 131 篇 材料科学与工程(可...
    • 110 篇 安全科学与工程
  • 1,864 篇 理学
    • 856 篇 数学
    • 576 篇 物理学
    • 434 篇 生物学
    • 282 篇 统计学(可授理学、...
    • 229 篇 系统科学
    • 186 篇 化学
  • 912 篇 管理学
    • 615 篇 管理科学与工程(可...
    • 325 篇 图书情报与档案管...
    • 278 篇 工商管理
  • 319 篇 医学
    • 270 篇 临床医学
    • 210 篇 基础医学(可授医学...
    • 138 篇 药学(可授医学、理...
  • 141 篇 法学
    • 115 篇 社会学
  • 108 篇 经济学
    • 108 篇 应用经济学
  • 70 篇 农学
  • 53 篇 教育学
  • 20 篇 文学
  • 17 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 214 篇 computer science
  • 115 篇 deep learning
  • 106 篇 feature extracti...
  • 99 篇 computational mo...
  • 94 篇 accuracy
  • 92 篇 control systems
  • 91 篇 systems engineer...
  • 91 篇 machine learning
  • 89 篇 data mining
  • 80 篇 neural networks
  • 75 篇 artificial intel...
  • 72 篇 optimization
  • 69 篇 training
  • 67 篇 laboratories
  • 67 篇 costs
  • 65 篇 humans
  • 65 篇 hardware
  • 57 篇 testing
  • 56 篇 protocols
  • 54 篇 information syst...

机构

  • 71 篇 department of co...
  • 40 篇 national enginee...
  • 30 篇 college of compu...
  • 25 篇 department of co...
  • 24 篇 department of co...
  • 24 篇 department of co...
  • 23 篇 department of co...
  • 23 篇 university of ch...
  • 22 篇 key laboratory o...
  • 22 篇 department of sy...
  • 22 篇 department of el...
  • 22 篇 distributed mult...
  • 20 篇 department of el...
  • 18 篇 national enginee...
  • 18 篇 department of el...
  • 18 篇 frontiers scienc...
  • 18 篇 department of co...
  • 17 篇 distributed mult...
  • 17 篇 school of comput...
  • 16 篇 smart network sy...

作者

  • 25 篇 mei-ling shyu
  • 24 篇 shu-ching chen
  • 24 篇 hai jin
  • 22 篇 yang yang
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 20 篇 dutta paramartha
  • 17 篇 wang xingjun
  • 16 篇 paramartha dutta
  • 15 篇 han zhu
  • 15 篇 shyu mei-ling
  • 13 篇 mohamed k.nour
  • 13 篇 tei-wei kuo
  • 13 篇 yunhao liu
  • 13 篇 bowers john e.
  • 13 篇 shen linlin
  • 13 篇 ai bo
  • 12 篇 kazuyuki kobayas...
  • 12 篇 hayashi eiji
  • 12 篇 liu qi

语言

  • 5,430 篇 英文
  • 248 篇 其他
  • 114 篇 中文
  • 14 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=Department of Computer Science& System Engineering"
5803 条 记 录,以下是4671-4680 订阅
排序:
A New Vector Particle Swarm Optimization for Constrained Optimization Problems
A New Vector Particle Swarm Optimization for Constrained Opt...
收藏 引用
International Joint Conference on Computational sciences and Optimization, CSO
作者: Chao-li Sun Jian-chao Zeng Jeng-Shyang Pan Division of System Simulation and Computer Application Taiyuan University of Science and Technology Taiyuan China Department of Electronic Engineering National Kaohsiung University of Applied Sciences Kaohsiung Taiwan
A new vector particle swarm optimization (NVPSO) is proposed to solve constrained optimization problems in this paper. In NVPSO, we introduce a shrinkage coefficient to ensure that all dimensions of a particle are wit... 详细信息
来源: 评论
Model Checking Needham-Schroeder Security Protocol Based on Temporal Logic of Knowledge
Model Checking Needham-Schroeder Security Protocol Based on ...
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Xiangyu Luo Yan Chen Ming Gu Lijun Wu School of Software Key Laboratory of Security for Information System of Ministry of Education Tsinghua University Beijing China Department of Computer Science Guilin University of Electronic Technology Guilin China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the... 详细信息
来源: 评论
Time-domain front-end for short time windowing UWB WLAN transform-domain receiver
Time-domain front-end for short time windowing UWB WLAN tran...
收藏 引用
IEEE International Workshop on Radio-Frequency Integration Technology (RFIT)
作者: Mohamed Zebdi Daniel Massicotte Christian Jesus B. Fayomi Laboratory of Signal and System Integration Department of Electrical and Computer Engineering Université du Québec à Trois Rivières Trois-Rivieres Canada Computer Science Department Université du Quàbec á Montréal Montreal Canada
This paper addresses the selectivity problem, for the ultra-wide band (UWB), transform-domain receiver loss of orthogonality. A novel selective time-domain direct-sequence front-end for transform-domain ultra-wideband... 详细信息
来源: 评论
A Structured Description Approach for Emergency Preparedness Based on Open XML
A Structured Description Approach for Emergency Preparedness...
收藏 引用
International Conference on Information science and engineering (ICISE)
作者: Dan Liu Hongwei Wang Naixue Xiong Xi Chen Zhe Wang Yi Jiang Institute of System Engineering National Simulation Training Center for National Economy Mobilization Huazhong University of Science and Technology Wuhan China Department of Computer Science Georgia State University Atlanta GA USA
In the research of Emergency Preparedness (EP), knowledge representation and storage of the EP is one of the most important tasks. However, most of the existing plans are ill-structured and lacked compatibility, which... 详细信息
来源: 评论
An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy
An Efficient Time-Bound Access Control Scheme for Dynamic Ac...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Yan Sui Fabio Maino Yudong Guo Kai Wang Xukai Zou Department of Computer and Information Sciences Purdue University Indianapolis IN USA Advanced Networking Group Cisco System Inc. San Jose CA USA Department of Computer Science and Technology University of Information Engineering Zhengzhou Henan China
Embedding user subscription time into cryptographic key generation and assignment for hierarchical access control has raised tremendous interest among researchers and practitioners in multicast, broadcast, and secure ... 详细信息
来源: 评论
Web Service Selection Algorithm Based on Particle Swarm Optimization
Web Service Selection Algorithm Based on Particle Swarm Opti...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Hong Xia Yan Chen Zengzhi Li Haichang Gao Yanping Chen Institute of Computer System Architecture and Network Xi'an Jiaotong University Xi'an China Software Engineering Institute Xidian University Xi'an China Department of Computer Science and Technology Xi'an Institute of Post and Telecommunications Xi'an China
A novel multi-objective optimization based particle swarm optimization algorithm is presented to solve the global optimization problem for based services selecting in Web services composition technology. This algorith... 详细信息
来源: 评论
Quantized Feedback Stabilization of Hybrid Impulsive Control systems
Quantized Feedback Stabilization of Hybrid Impulsive Control...
收藏 引用
Joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference
作者: Zhichun Yang Yiguang Hong Zhong-Ping Jiang Xiaoli Wang Chongqing Key Lab of Operations Research and System Engineering Department of Mathematics and Computer ScienceChongqing Normal University Institute of Systems Science Chinese Academy of Sciences Key Laboratory of Systems and Control Institute of Systems ScienceChinese Academy of Sciences Dept.of Electrical & Computer Engineering Polytechnic Institute of New York University
In this paper,we consider the feedback stabilization problem of impulsive linear control systems with quantized input signals and quantized output *** concepts including quasi-invariant sets and attracting sets for hy... 详细信息
来源: 评论
Novel broadcasting scheme of the hierarchical interconnection network
Novel broadcasting scheme of the hierarchical interconnectio...
收藏 引用
IEEE Pacific Rim Conference on Communications, computers and Signal Processing
作者: Jywe-Fei Fang Ka-Lok Ng Hung-Jr Shiu Chien-Hung Huang Department of Digital Content and Technology National Taichung University Taiwan Department of Bioinformatics Asia University Taiwan Department of System Developing ModioTek Comapny Taiwan Department of Computer Science and Information Engineering National Formosa University Taiwan
A potential interconnection network named fully connected cubic network (FCCN) that demonstrates many attractive properties including efficient communication, regularity and small diameter has been proposed by Chang a... 详细信息
来源: 评论
Ideal perfect multilevel threshold secret sharing scheme
Ideal perfect multilevel threshold secret sharing scheme
收藏 引用
5th International Conference on Information Assurance and Security, IAS 2009
作者: Lin, Changlu Harn, Lein Ye, Dingfeng Key Laboratory of Network Security and Cryptology Fujian Normal University China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences China Key Laboratory of Communication and Information System Beijing Jiaotong University Beijing Municipal Commission of Education China Department of Computer Science Electrical Engineering University of Missouri-Kansas City United States
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,... 详细信息
来源: 评论
Intelligent ontological multi-agent for healthy diet planning
Intelligent ontological multi-agent for healthy diet plannin...
收藏 引用
IEEE International Conference on Fuzzy systems (FUZZ-IEEE)
作者: Mei-Hui Wang Chang-Shing Lee Kuang-Liang Hsieh Chin-Yuan Hsu Chong-Ching Chang Department of Computer Science and Information Engineering National University of Tainan Taiwan Graduate Institute of System Engineering National University of Tainan Taiwan Institute of Information Industry Innovative Digitech-Enabled Applications and Services Institute Taiwan
Good eating habits can make human beings to live in a healthy lifestyle. When a person constantly eats too much or too little, it will have a high risk of causing a disease for him. Therefore, developing healthy and b... 详细信息
来源: 评论