咨询与建议

限定检索结果

文献类型

  • 3,234 篇 期刊文献
  • 2,932 篇 会议
  • 80 册 图书

馆藏范围

  • 6,246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,065 篇 工学
    • 1,567 篇 计算机科学与技术...
    • 1,165 篇 软件工程
    • 550 篇 信息与通信工程
    • 463 篇 电子科学与技术(可...
    • 454 篇 电气工程
    • 358 篇 控制科学与工程
    • 265 篇 核科学与技术
    • 253 篇 生物工程
    • 238 篇 光学工程
    • 236 篇 生物医学工程(可授...
    • 225 篇 化学工程与技术
    • 202 篇 仪器科学与技术
    • 158 篇 机械工程
    • 157 篇 材料科学与工程(可...
    • 127 篇 动力工程及工程热...
    • 117 篇 力学(可授工学、理...
    • 96 篇 冶金工程
  • 2,932 篇 理学
    • 1,769 篇 物理学
    • 790 篇 数学
    • 374 篇 生物学
    • 327 篇 化学
    • 281 篇 统计学(可授理学、...
    • 197 篇 地球物理学
    • 176 篇 系统科学
  • 545 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 171 篇 工商管理
  • 257 篇 医学
    • 214 篇 临床医学
    • 190 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 73 篇 法学
  • 69 篇 农学
  • 62 篇 经济学
  • 55 篇 教育学
  • 15 篇 文学
  • 6 篇 军事学
  • 2 篇 哲学
  • 2 篇 历史学
  • 2 篇 艺术学

主题

  • 544 篇 computer science
  • 235 篇 hadron colliders
  • 116 篇 application soft...
  • 98 篇 computational mo...
  • 95 篇 hadrons
  • 93 篇 hardware
  • 91 篇 costs
  • 85 篇 computer archite...
  • 83 篇 higgs bosons
  • 83 篇 machine learning
  • 82 篇 delay
  • 78 篇 neural networks
  • 78 篇 algorithm design...
  • 77 篇 bandwidth
  • 74 篇 protocols
  • 71 篇 particle decays
  • 71 篇 artificial intel...
  • 68 篇 throughput
  • 68 篇 proton-proton in...
  • 63 篇 switches

机构

  • 1,028 篇 department of ph...
  • 1,028 篇 cavendish labora...
  • 985 篇 physikalisches i...
  • 981 篇 oliver lodge lab...
  • 636 篇 infn sezione di ...
  • 624 篇 infn laboratori ...
  • 619 篇 fakultät physik ...
  • 616 篇 infn sezione di ...
  • 606 篇 infn sezione di ...
  • 577 篇 school of physic...
  • 571 篇 horia hulubei na...
  • 551 篇 school of physic...
  • 549 篇 iccub universita...
  • 546 篇 h.h. wills physi...
  • 539 篇 department of ph...
  • 532 篇 imperial college...
  • 525 篇 nikhef national ...
  • 522 篇 stfc rutherford ...
  • 518 篇 university of ch...
  • 514 篇 school of physic...

作者

  • 273 篇 barter w.
  • 264 篇 a. gomes
  • 257 篇 beiter a.
  • 249 篇 c. alexa
  • 249 篇 j. m. izen
  • 245 篇 g. bella
  • 245 篇 j. strandberg
  • 245 篇 blake t.
  • 243 篇 bellee v.
  • 242 篇 d. calvet
  • 240 篇 c. amelung
  • 236 篇 bowcock t.j.v.
  • 234 篇 g. spigo
  • 233 篇 f. siegert
  • 233 篇 brundu d.
  • 231 篇 betancourt c.
  • 230 篇 borsato m.
  • 230 篇 s. chen
  • 227 篇 amato s.
  • 225 篇 bencivenni g.

语言

  • 5,954 篇 英文
  • 258 篇 其他
  • 35 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Department of Computer Science&Computer Engineering La Trobe University"
6246 条 记 录,以下是4821-4830 订阅
排序:
Semantics modeling based image retrieval system using neural networks
Semantics modeling based image retrieval system using neural...
收藏 引用
IEEE International Conference on Image Processing
作者: Xiaohang Ma Dianhui Wang Department of Computer Science and Computer Engineering La Trobe University Melbourne VIC Australia
Semantics based image retrieval techniques show a promising direction to the development of CBIR systems. To design such systems, semantics modeling is one of the most difficult tasks. This paper aims to develop a sem... 详细信息
来源: 评论
Using adaptive Web service multi agents for collaborative forecasting and countering bullwhip effect in SCM
Using adaptive Web service multi agents for collaborative fo...
收藏 引用
International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS)
作者: U. Hassan B. Soh Department of Computer Science & Computer Engineering La Trobe University Bundoora VIC Australia
Forecasting is one of the most important elements of supply chain management (SCM). Propagation and magnification of errors in forecasting is a common problem in SCM arena. The main cause of this bullwhip effect is th... 详细信息
来源: 评论
Design and implementation of a model for business rules automation
Design and implementation of a model for business rules auto...
收藏 引用
International Conference on Information Technology and Applications, ICITA
作者: S. Ali B. Soh T. Torabi Department of Computer Science and Computer Engineering La Trobe University Bundoora VIC Australia
In this paper, we propose an approach to treat business logics and system logics separately. Using the proposed model, we can ensure that for any set of facts, business rules are applied efficiently and consistently. ... 详细信息
来源: 评论
A critical analysis of multilayer IP security protocol
A critical analysis of multilayer IP security protocol
收藏 引用
International Conference on Information Technology and Applications, ICITA
作者: J. Sing B. Soh Department of Computer Science and Computer Engineering La Trobe University Bundoora VIC Australia
A number of techniques have recently been developed which aim to increase the performance of transport and application layer protocols when used over links that exhibit high bit error rates and large propagation delay... 详细信息
来源: 评论
Multimedia data mining for building rule-based image retrieval systems
Multimedia data mining for building rule-based image retriev...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: D. Wang X. Ma Department of Computer Science and Computer Engineering La Trobe University Melbourne VIC Australia
This paper presents a framework for building rule-based image retrieval (RBIR) systems. Soft computing based multimedia data mining techniques are employed to extract and optimize fuzzy rules that infer semantic conce... 详细信息
来源: 评论
A new adaptive business model for e-commerce
A new adaptive business model for e-commerce
收藏 引用
International Conference on Information Technology and Applications, ICITA
作者: S. Ali B. Soh T. Torabi Department of Computer Science and Computer Engineering La Trobe University Bundoora VIC Australia
It is crucial for a company to build their business model in such a way that if it needs to adapt new changes then it has enough flexibility to adapt their system without redesigning the whole business model. The busi... 详细信息
来源: 评论
TCP New Vegas revisited
TCP New Vegas revisited
收藏 引用
IEEE International Conference on Networks
作者: J. Sing B. Soh Department of Computer Science and Computer Engineering La Trobe University Bundoora VIC Australia
TCP New Vegas is an implementation of TCP Vegas with three sender-side modifications that increase the protocol's performance, especially when used over long delay networks. Whilst these modifications have been sh... 详细信息
来源: 评论
An agent oriented framework for automating rules in business processes
An agent oriented framework for automating rules in business...
收藏 引用
IEEE International Conference on Industrial Informatics (INDIN)
作者: S. Ali B. Soh T. Torabi Department of Computer Science and Computer Engineering La Trobe University Bundoora VIC Australia
Every action a business process performs must be explicitly anticipated, designed for and implemented by business professionals. The business process is dependent upon business rules (BR) to achieve its objectives, wh... 详细信息
来源: 评论
A methodology for determining riskiness in peer-to-peer communications
A methodology for determining riskiness in peer-to-peer comm...
收藏 引用
2005 3rd IEEE International Conference on Industrial Informatics, INDIN
作者: Hussain, Omar Khadeer Chang, Elizabeth Hussain, Farookh Khadeer Dillon, Tharam S. Soh, Ben School of Information Systems Curtin University of Technology WA Australia Faculty of Information Technology University of Technology Sydney NSW Australia Dept of Computer Science and Computer Engineering La Trobe University Vic. Australia
Every activity has some Risk involved in it. Analyzing the Risk involved in a transaction is important to decide whether to proceed with the transaction or not. Similarly in Peer-to-Peer communication analyzing the Ri... 详细信息
来源: 评论
Risk in trusted decentralized communications
Risk in trusted decentralized communications
收藏 引用
21st International Conference on Data engineering Workshops 2005
作者: Hussain, Omar Khadeer Chang, Elizabeth Hussain, Farookh Khadeer Dillon, Tharam S. Soh, Ben School of Information Systems Curtin University of Technology WA Australia Faculty of Information Technology University of Technology Sydney NSW Australia Dept of Computer Science and Computer Engineering La Trobe University Vic. Australia
Risk is associated with almost every activity that is undertaken on a daily life. Risk is associated with Trust, Security and Privacy. Risk is associated with transactions, businesses, information systems, environment... 详细信息
来源: 评论