咨询与建议

限定检索结果

文献类型

  • 1,051 篇 期刊文献
  • 625 篇 会议
  • 20 册 图书

馆藏范围

  • 1,696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,162 篇 工学
    • 736 篇 计算机科学与技术...
    • 551 篇 软件工程
    • 218 篇 信息与通信工程
    • 176 篇 控制科学与工程
    • 169 篇 电气工程
    • 143 篇 电子科学与技术(可...
    • 111 篇 生物工程
    • 103 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 91 篇 机械工程
    • 72 篇 材料科学与工程(可...
    • 64 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 49 篇 仪器科学与技术
    • 45 篇 交通运输工程
    • 41 篇 力学(可授工学、理...
  • 849 篇 理学
    • 398 篇 数学
    • 299 篇 物理学
    • 150 篇 生物学
    • 125 篇 统计学(可授理学、...
    • 109 篇 系统科学
    • 75 篇 化学
  • 271 篇 管理学
    • 184 篇 管理科学与工程(可...
    • 105 篇 工商管理
    • 97 篇 图书情报与档案管...
  • 100 篇 医学
    • 84 篇 临床医学
    • 71 篇 基础医学(可授医学...
    • 43 篇 药学(可授医学、理...
    • 31 篇 公共卫生与预防医...
  • 45 篇 法学
    • 40 篇 社会学
  • 29 篇 经济学
  • 27 篇 农学
  • 22 篇 教育学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 20 篇 artificial intel...
  • 18 篇 machine learning
  • 13 篇 semantics
  • 11 篇 computer science
  • 10 篇 covid-19
  • 10 篇 deep learning
  • 10 篇 decision making
  • 9 篇 stylometry
  • 9 篇 software enginee...
  • 9 篇 feature selectio...
  • 9 篇 multi agent syst...
  • 8 篇 reinforcement le...
  • 8 篇 optimization
  • 8 篇 stochastic syste...
  • 8 篇 energy efficienc...
  • 7 篇 image segmentati...
  • 7 篇 neural networks
  • 7 篇 quality of servi...
  • 7 篇 wireless sensor ...
  • 7 篇 authorship attri...

机构

  • 19 篇 school of engine...
  • 14 篇 optical sciences...
  • 11 篇 department of ph...
  • 11 篇 department of el...
  • 10 篇 department of el...
  • 10 篇 department of el...
  • 10 篇 inrs-énergie mat...
  • 10 篇 systems research...
  • 9 篇 department of el...
  • 9 篇 department of el...
  • 9 篇 the department o...
  • 9 篇 department of ph...
  • 9 篇 department of gr...
  • 8 篇 institute of fun...
  • 8 篇 department of gr...
  • 8 篇 the school of co...
  • 8 篇 faculty of engin...
  • 8 篇 state key labora...
  • 7 篇 xi’an institute ...
  • 7 篇 department of el...

作者

  • 38 篇 pedrycz witold
  • 18 篇 moss david j.
  • 18 篇 morandotti rober...
  • 16 篇 niyato dusit
  • 16 篇 péter gáspár
  • 16 篇 tan mengxi
  • 16 篇 chu sai t.
  • 16 篇 xu xingyuan
  • 16 篇 mitchell arnan
  • 16 篇 little brent e.
  • 15 篇 morandotti r.
  • 14 篇 wu jiayang
  • 14 篇 boes andreas
  • 14 篇 nguyen thach g.
  • 14 篇 corcoran bill
  • 13 篇 shen xuemin
  • 12 篇 johansson karl h...
  • 12 篇 stanczyk urszula
  • 12 篇 balázs németh
  • 12 篇 xiong zehui

语言

  • 1,494 篇 英文
  • 192 篇 其他
  • 7 篇 中文
  • 4 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science 2: Programming Systems"
1696 条 记 录,以下是1321-1330 订阅
Semi-automatic tracking for mitral annulus dynamic analysis using real-time 3D echocardiography
Semi-automatic tracking for mitral annulus dynamic analysis ...
收藏 引用
2006 computers in Cardiology, CIC
作者: Veronesi, Federico Corsi, C. Caiani, E.G. Sugeng, L. Weinert, L. Mor-Avi, V. Lang, R.M. Lamberti, C. Department of Electronics Computer Science and Systems University of Bologna Italy Department of Bioengineering Polytechnic of Milan Italy University of Chicago Hospitals Chicago IL United States DEIS Viale Risorgimento 2 40136 Bologna Italy
Tissue Doppler is used to evaluate mitral annulus (MA) dynamics. This technique has two major limitations: it is two-dimensional and angle-dependent. To solve these limitations, our aim was to develop and test a tool ... 详细信息
来源: 评论
Applying Petri-Net-Based Reduction Approach for Verifying the Correctness of Workflow Models
收藏 引用
Wuhan University Journal of Natural sciences 2006年 第1期11卷 203-210页
作者: LI Xi-zuo HAN Gui-ying KIM Sun-ho School of Computer Science and Engineering Dalian Nationalities University Dalian 116600 Liaoning China School of Electromechanical Engineering Dalian Nationalities University Dalian 116600 Liaoning China Department of Industrial and Systems Engineering Myongji University San 38-2 Namdong Yonginsi Kyunggido 449 728Korea
The correctness of workflow models is one of the major challenges in context of workflow analysis. The aim of this paper is to provide an improved Petri net-based reduction approach for verifying the correctness of wo... 详细信息
来源: 评论
Willem Blok and modal logic
收藏 引用
Studia Logica 2006年 第1-3期83卷 15-30页
作者: Rautenberg, W. Zakharyaschev, M. Wolter, F. Freie Universität Berlin 2. Mathematisches Institut 14195 Berlin Arnimallee 2 Germany School of Computer Science and Information Systems Birbeck College Univ. of London London WC1E 7HX Malet Street United Kingdom University of Liverpool Department of Computer Science Liverpool L69 7ZF United Kingdom
We present our personal view on W.J. Blok's contribution to modal logic. © Springer 2006.
来源: 评论
Compiling model transformations to EJB3-specific transformer plugins  06
Compiling model transformations to EJB3-specific transformer...
收藏 引用
2006 ACM Symposium on Applied Computing
作者: Balogh, Andraás Varroá, Gergely Varroá, Daániel Pataricza, Andraás Budapest University of Technology and Economics Department of Measurement and Information Systems Magyar tudosok korutja 2 H-1117 Budapest Hungary Budapest University of Technology and Economics Dept. of Computer Science and Information Theory Magyar tudosok korutja 2 H-1117 Budapest Hungary
We present a technique for compiling model transformations defined by a combination of graph transformation and abstract state machine rules (as used within the VIATRA2 framework) into stand-alone transformer plugins ... 详细信息
来源: 评论
Addendum: On the statistical analysis of the first digits of the Feigenbaum constants
收藏 引用
Journal of the Franklin Institute 2006年 第7期343卷 759-761页
作者: Karamanos, K. Kotsireas, I.S. Center for Nonlinear Phenomena and Complex Systems Université Libre de Bruxelles C.P. 231 1050 Bruxelles Belgium Department of Physics and Computer Science Wilfrid Laurier University 75 University Avenue West Waterloo Ont. N2L 3C5 Canada
The block entropies computed by lumping and gliding are calculated for the binary expansions of the Feigenbaum constants α and δ, and for sqrt(2). Small but significant deviations from randomness are revealed for th... 详细信息
来源: 评论
Sequential Monte Carlo in probabilistic planning reachability heuristics
Sequential Monte Carlo in probabilistic planning reachabilit...
收藏 引用
ICAPS 2006 - 16th International Conference on Automated Planning and Scheduling
作者: Bryce, Daniel Kambhampati, Subbarao Smith, David E. Department of Computer Science and Engineering Arizona State University 699 South Mill Avenue Tempe AZ 85281 NASA Ames Research Center Intelligent Systems Division MS 269-2 Moffett Field CA 94035-1000
The current best conformant probabilistic planners encode the problem as a bounded length CSP or SAT problem. While these approaches can find optimal solutions for given plan lengths, they often do not scale for large... 详细信息
来源: 评论
Using hidden Markov models to evaluate the risks of intrusions system architecture and model validation
Using hidden Markov models to evaluate the risks of intrusio...
收藏 引用
9th International Symposium on Recent Advances in Intrusion Detection, RAID 2006
作者: Årnes, André Valeur, Fredrik Vigna, Giovanni Kemmerer, Richard A. Centre for Quantifiable Quality of Service in Communication Systems Norwegian University of Science and Technology O.S. Bragstads plass 2E N-7491 Trondheim Norway Department of Computer Science University of California Santa Barbara Santa Barbara CA 93106-5110 United States
Security-oriented risk assessment tools are used to determine the impact of certain events on the security status of a network. Most existing approaches are generally limited to manual risk evaluations that are not su... 详细信息
来源: 评论
Digital forensic reconstruction and the virtual security testbed ViSe
Digital forensic reconstruction and the virtual security tes...
收藏 引用
3rd International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, DIMVA 2006
作者: Årnes, André Haas, Paul Vigna, Giovanni Kemmerer, Richard A. Centre for Quantifiable Quality of Service in Communication Systems Norwegian University of Science and Technology O.S. Bragstads plass 2E N-7491 Trondheim Norway Department of Computer Science University of California Santa Barbara Santa Barbara CA 93106-5110 United States
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks and suspect tools as part of a computer crime reconstruction. Based on a hypothesis of th... 详细信息
来源: 评论
Batch and online spam filter comparison
Batch and online spam filter comparison
收藏 引用
3rd Conference on Email and Anti-Spam, CEAS 2006
作者: Cormack, Gordon V. Bratko, Andrej David R. Cheriton School of Computer Science University of Waterloo Waterloo ON N2L 3G1 Canada Department of Intelligent Systems Jozef Stefan Institute Jamova 39 Ljubljana SI1000 Slovenia
In the TREC 2005 Spam Evaluation Track, a number of popular spam filters - all owing their heritage to Graham's A Plan for Spam - did quite well. Machine learning techniques reported elsewhere to perform well were... 详细信息
来源: 评论
A robust image watermarking by embedding self-orthogonal finite-length sequences into wavelet domain
收藏 引用
WSEAS Transactions on Information science and Applications 2006年 第6期3卷 1028-1035页
作者: Li, Shuhong Tanada, Yoshihiro Department of Computer Science Henan Institute of Finance and Economics No. 80 WenHua Road Zhengzhou Henan 450002 China Department of Computer Science and Systems Engineering Yamaguchi University 2-16-1 Tokiwadai Ube Yamaguchi 755-8611 Japan
Digital watermarking techniques have been considered as an effective solution to protect the copyright of multimedia data. In this paper, an image watermarking scheme based on discrete wavelet transform is proposed. T... 详细信息
来源: 评论