咨询与建议

限定检索结果

文献类型

  • 1,958 篇 会议
  • 1,773 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 3,767 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,124 篇 工学
    • 1,415 篇 计算机科学与技术...
    • 1,080 篇 软件工程
    • 377 篇 信息与通信工程
    • 290 篇 控制科学与工程
    • 257 篇 电气工程
    • 242 篇 光学工程
    • 234 篇 电子科学与技术(可...
    • 195 篇 生物工程
    • 167 篇 生物医学工程(可授...
    • 120 篇 材料科学与工程(可...
    • 115 篇 仪器科学与技术
    • 108 篇 化学工程与技术
    • 92 篇 机械工程
    • 86 篇 动力工程及工程热...
    • 73 篇 核科学与技术
  • 1,685 篇 理学
    • 830 篇 物理学
    • 676 篇 数学
    • 246 篇 生物学
    • 239 篇 统计学(可授理学、...
    • 177 篇 地球物理学
    • 171 篇 化学
    • 118 篇 系统科学
  • 474 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 132 篇 工商管理
  • 205 篇 医学
    • 173 篇 临床医学
    • 144 篇 基础医学(可授医学...
    • 89 篇 公共卫生与预防医...
    • 83 篇 药学(可授医学、理...
  • 95 篇 法学
    • 86 篇 社会学
  • 59 篇 农学
  • 46 篇 经济学
  • 33 篇 教育学
  • 13 篇 文学
  • 6 篇 艺术学
  • 4 篇 哲学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 143 篇 computer science
  • 134 篇 accuracy
  • 106 篇 deep learning
  • 89 篇 educational inst...
  • 82 篇 feature extracti...
  • 81 篇 computational mo...
  • 81 篇 machine learning
  • 69 篇 predictive model...
  • 66 篇 training
  • 57 篇 artificial intel...
  • 53 篇 support vector m...
  • 52 篇 real-time system...
  • 52 篇 convolutional ne...
  • 47 篇 internet of thin...
  • 44 篇 data models
  • 43 篇 optimization
  • 39 篇 data mining
  • 39 篇 machine learning...
  • 38 篇 cloud computing
  • 36 篇 semantics

机构

  • 100 篇 university of sc...
  • 89 篇 tianfu cosmic ra...
  • 85 篇 hebei normal uni...
  • 83 篇 faculty of scien...
  • 83 篇 department for p...
  • 83 篇 department of ph...
  • 83 篇 state key labora...
  • 80 篇 department of ph...
  • 80 篇 west university ...
  • 79 篇 department of ph...
  • 78 篇 department of mo...
  • 78 篇 department of ph...
  • 78 篇 department of ph...
  • 78 篇 yunnan observato...
  • 77 篇 department of ph...
  • 77 篇 research center ...
  • 77 篇 university of ch...
  • 75 篇 infn e laborator...
  • 71 篇 kirchhoff-instit...
  • 69 篇 centre de calcul...

作者

  • 100 篇 bastieri d.
  • 72 篇 fang j.
  • 72 篇 feng c.f.
  • 70 篇 axikegu
  • 69 篇 jiang k.
  • 63 篇 m. klein
  • 62 篇 c. alexa
  • 62 篇 j. m. izen
  • 62 篇 g. bella
  • 62 篇 j. strandberg
  • 62 篇 d. calvet
  • 62 篇 c. amelung
  • 62 篇 n. orlando
  • 62 篇 y. tayalati
  • 62 篇 g. spigo
  • 62 篇 v. chiarella
  • 62 篇 f. siegert
  • 61 篇 a. dimitrievska
  • 61 篇 f. deliot
  • 61 篇 r. ströhmer

语言

  • 3,478 篇 英文
  • 271 篇 其他
  • 20 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Department of Computer Science and Institute for Advanced Computing Studies"
3767 条 记 录,以下是3581-3590 订阅
排序:
ON THE NUMBER OF COMPONENTS OF A RECURSIVE GRAPH  1st
ON THE NUMBER OF COMPONENTS OF A RECURSIVE GRAPH
收藏 引用
1ST LATIN AMERICAN SYMP ON THEORETICAL INFORMATICS ( LATIN 92 )
作者: GASARCH, WI GUIMARAES, KS Department of Computer Science University of Maryland College Park 20742 MD United States Institute for Advanced Computer Studies University of Maryland College Park 20742 MD United States Department of Informatics Universidazte Federal de Pernambuco Recife 50739 PE Brazil
来源: 评论
Analysis of a fluid approximation to flow control dynamics
Analysis of a fluid approximation to flow control dynamics
收藏 引用
11th Annual Joint Conference of the IEEE computer and Communications Societies, INFOCOM'92
作者: Bolot, Jean-Chrysostome Udaya Shankar, A. Department of Computer Science University of Maryland College Park MD 20742 United States INRIA Sophia-Antipolis 2004 route des Lucioles 06565 Valbonne France Institute for Advanced Computer Studies United States
The authors consider a flow control mechanism that dynamically regulates the rate of data flow into a network based on feedback information about the network state. Such mechanisms have been introduced in a variety of... 详细信息
来源: 评论
Declarative foundations of secure deductive databases  4th
收藏 引用
4th International Conference on Database Theory, ICDT 1992
作者: Bonatti, Piero Kraus, Sarit Subrahmanian, V.S. Dip. Di Informatica Universita’ di Pisa Corso Italia 40 Pisa56100 Italy Department of Computer Science Bar-Dan University Ramat Gun Israel Institute for Advanced Computer Studies Department of Computer Science University of Maryland College ParkMD20742 United States
In this paper, we develop a formal logical foundation for secure deductive databases. This logical foundation is based on an extended logic involving several modal operators. We develop two models of interaction betwe... 详细信息
来源: 评论
REPLICATED IMAGE ALGORITHMS AND THEIR ANALYSES ON SIMD MACHINES
收藏 引用
International Journal of Pattern Recognition and Artificial Intelligence 1992年 第2N03期6卷 335-352页
作者: P. J. NARAYANAN LARRY S. DAVIS Institute for Advanced Computer Studies Department of Computer Science and Center for Automation Research University of Maryland College Park MD 20742-3411 USA
Data parallel processing on processor array architectures has gained popularity in data intensive applications, such as image processing and scientific computing, as massively parallel processor array machines became ... 详细信息
来源: 评论
Providing an empirical basis for optimizing the verification and testing phases of software development
Providing an empirical basis for optimizing the verification...
收藏 引用
International Symposium on Software Reliability Engineering (ISSRE)
作者: L.C. Briand V.R. Basili C.J. Hetmanski Institute for Advanced Computer Studies Computer Science Department University of Maryland College Park MD USA
Applying equal testing and verification effort to all parts of a software system is not very efficient, especially when resources are limited and scheduling is tight. Therefore, one needs to be able to differentiate l... 详细信息
来源: 评论
A classification procedure for the effective management of changes during the maintenance process
A classification procedure for the effective management of c...
收藏 引用
International Conference on Software Maintenance (ICSM)
作者: L.C. Briand V.R. Basili Computer Science Department and Institute for Advanced Computer Studies University of Maryland College Park MD USA
The authors address the issue of assessing the difficulty of a change based on known or predictable data. They consider the present work as a first step towards the construction of customized economic models for maint... 详细信息
来源: 评论
EXTERNAL SORTING ON A RECONFIGURABLE MESSAGE-PASSING MULTIcomputer - EXPERIMENTAL RESULTS AND ANALYSIS  35
EXTERNAL SORTING ON A RECONFIGURABLE MESSAGE-PASSING MULTICO...
收藏 引用
35TH MIDWEST SYMP ON CIRCUITS AND SYSTEMS
作者: MENEZES, BL RICARTE, ILM THURIMELLA, R Dept. of Electrical Engineering Institute for Advanced Computer Studies University of Maryland College Park 20742 MD United States Department of Mathematics and Computer Science University of Denver Denver 80208 CO United States Universidade Estadual de Campinas Brazil University of Maryland United States
In this paper, we report on an actual implementation of the external sorting problem on a multicomputer with careful attention paid to the overlap between computation and I/O in order to minimize total execution time.... 详细信息
来源: 评论
On the nature of bias and defects in the software specification process
On the nature of bias and defects in the software specificat...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: P. Straub M.V. Zelkowitz Computer Science Department Catholic University of Chile Chile Department of Computer Science and Institute for Advanced Computer Studies University of Maryland College Park USA
Implementation bias in a specification is an arbitrary constraint in the solution space. The authors describe the problem of bias and then present a model of the specification and design processes describing individua... 详细信息
来源: 评论
POLYNOMIAL HASH FUNCTIONS ARE RELIABLE  19th
收藏 引用
19TH INTERNATIONAL COLLOQUIUM ON AUTOMATA, LANGUAGES, AND PROGRAMMING ( ICALP 92 )
作者: DIETZFELBINGER, M GIL, J MATIAS, Y PIPPENGER, N Fachbereich Mathematik/inforinatik and Heinz-Nixdorf-lnstitute Universität-GH-Paderborn Paderborn D-W-4790 Germany Department of Computer Science University of British Columbia Vancouver V6T 3Z2 BC Canada Institute for Advanced Computer Studies University of Maryland College Park 20742 MD United States Department of Computer Science Tel Aviv University Israel
Polynomial hash functions are well studied and widely used in various applications. They have gained popularity because of certain performances they exhibit. It has been shown that even linear hash functions are expec... 详细信息
来源: 评论
Learning visual coordinate transformations with competition
Learning visual coordinate transformations with competition
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: S. Cho J.A. Reggia Department of Computer Science University of Maryland College Park MD USA Institute for Advanced Computer Studies and the Department of Neurology University of Maryland USA
As the angle of gaze changes, so does the retinal location of the visual image of a stationary object. Since the object is correctly perceived as stationary, the retinopic coordinates of the object have been transform... 详细信息
来源: 评论