咨询与建议

限定检索结果

文献类型

  • 705 篇 期刊文献
  • 670 篇 会议
  • 14 册 图书

馆藏范围

  • 1,389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 777 篇 工学
    • 520 篇 计算机科学与技术...
    • 439 篇 软件工程
    • 109 篇 控制科学与工程
    • 93 篇 信息与通信工程
    • 88 篇 生物医学工程(可授...
    • 77 篇 生物工程
    • 55 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 45 篇 机械工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 35 篇 光学工程
    • 28 篇 土木工程
  • 533 篇 理学
    • 306 篇 数学
    • 110 篇 生物学
    • 109 篇 物理学
    • 81 篇 统计学(可授理学、...
    • 63 篇 系统科学
    • 45 篇 化学
  • 249 篇 管理学
    • 160 篇 管理科学与工程(可...
    • 97 篇 工商管理
    • 91 篇 图书情报与档案管...
  • 138 篇 教育学
    • 136 篇 教育学
    • 28 篇 心理学(可授教育学...
  • 124 篇 医学
    • 89 篇 临床医学
    • 79 篇 基础医学(可授医学...
    • 43 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 37 篇 法学
    • 34 篇 社会学
  • 33 篇 经济学
    • 32 篇 应用经济学
  • 23 篇 农学
  • 9 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 36 篇 students
  • 33 篇 computer science
  • 33 篇 machine learning
  • 23 篇 education
  • 20 篇 engineering educ...
  • 18 篇 artificial intel...
  • 17 篇 deep learning
  • 16 篇 training
  • 14 篇 computational mo...
  • 12 篇 semantics
  • 12 篇 decision making
  • 11 篇 covid-19
  • 11 篇 accuracy
  • 10 篇 software enginee...
  • 10 篇 neural networks
  • 10 篇 data mining
  • 10 篇 diffusion
  • 10 篇 mathematics
  • 10 篇 curricula
  • 10 篇 intelligent syst...

机构

  • 24 篇 gaoling school o...
  • 24 篇 beijing key labo...
  • 13 篇 department of la...
  • 12 篇 school of scienc...
  • 11 篇 department of co...
  • 11 篇 department of co...
  • 9 篇 department of sc...
  • 9 篇 department of ma...
  • 9 篇 department of au...
  • 8 篇 faculty of physi...
  • 8 篇 department of co...
  • 8 篇 department of so...
  • 8 篇 department of nu...
  • 8 篇 department of sc...
  • 7 篇 computer network...
  • 7 篇 tsinghua univers...
  • 7 篇 beijing key labo...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of ap...

作者

  • 12 篇 dulski k.
  • 12 篇 kubicz e.
  • 12 篇 kozik t.
  • 12 篇 korcyl g.
  • 12 篇 badriyya b.al-on...
  • 11 篇 wen ji-rong
  • 11 篇 skurzok m.
  • 11 篇 moskal p.
  • 11 篇 silarski m.
  • 11 篇 gorgol m.
  • 11 篇 gajos a.
  • 10 篇 shopa r.y.
  • 10 篇 kisielewska d.
  • 10 篇 kowalski p.
  • 10 篇 hiesmayr b.c.
  • 10 篇 sharma s.
  • 10 篇 curceanu c.
  • 9 篇 olteanu mircea
  • 9 篇 ştefan radu
  • 9 篇 krawczyk n.

语言

  • 1,307 篇 英文
  • 67 篇 其他
  • 12 篇 中文
  • 2 篇 德文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Methods of Teaching Computer Science"
1389 条 记 录,以下是1111-1120 订阅
排序:
Experiences from implementing an educational MMORPG
Experiences from implementing an educational MMORPG
收藏 引用
International IEEE Consumer Electronics Society's Games Innovations Conference, ICE-GIC
作者: Bian Wu Alf Inge Wang Yuanyuan Zhang Department of Computer and Information Science Norwegian University of Science and Technology Trondheim Norway Computer Teaching and Research Section Institute of Chemical Defense of People Liberation Army Beijing China
This paper describes the implementation of an educational Massively Multiplayer Online Role-Playing Game (MMORPG), named World of Wisdom (WoW). WoW is designed under the context of game design theory and game features... 详细信息
来源: 评论
Research of process concealment based on technology of Intercepting API calls
Research of process concealment based on technology of Inter...
收藏 引用
International Conference on computer science and Information Technology (CSIT)
作者: Hua Dong Wang Li Liao Computer Science Department Zhoukou Normal University Henan China Teaching and Research Department of Public Computer Zhoukou Normal University Zhoukou Henan China
API interception means a particular way of interrupting API calls and altering the original API execution to the code supplied by the user. This paper introduces how to realize process concealment by Intercepting API,... 详细信息
来源: 评论
Fairness resource allocation and scheduling for IEEE 802.16 mesh networks
收藏 引用
Journal of Networks 2010年 第6期5卷 724-731页
作者: Peng, Limin Cao, Zhanmao Computer application teaching and research department Guangzhou Sport University Guangzhou 510500 China School of Computer Science and Engineering South China University of Technology Guangzhou 510641 China
The IEEE 802.16 standard provides a scheme for creating multi-hop relay networks, which can be deployed as a high speed wide area wireless network at low cost. Although the standard defines signaling mechanisms in mes... 详细信息
来源: 评论
Link spam detection based on genetic programming
Link spam detection based on genetic programming
收藏 引用
International Conference on Natural Computation
作者: Niu, Xiaofei Li, Shengen Yuan, Ning Niu, Xuedong Zhu, Cuiling School of Computer Science and Technology Shandong Jianzhu University Jinan Shandong China School of Information Science and Engineering University of Jinan Jinan Shandong China Teaching Affairs Department Shandong University of Technology Zibo Shandong China School of Information Management Shandong Economic University Jinan Shandong China
Link spam refers to unfairly gaining a high ranking on search engines for a web page by means of trickily manipulating the link graph to confuse the hyper-link structure analysis algorithms. It seriously affects the q... 详细信息
来源: 评论
Prostate boundary detection in ultrasound images based on type-II fuzzy sets and modified fuzzy c-means
Advances in Intelligent and Soft Computing
收藏 引用
Advances in Intelligent and Soft Computing 2010年 75卷 187-195页
作者: Hassanien, Aboul Ella Schaefer, Gerald Al Qaheri, Hameed Information Technology Department Cairo University Egypt Department of Computer Science Loughborough University United Kingdom Department of Quantitative Methods and Information Systems Kuwait University Kuwait
Estimation of prostate location and volume is essential in determining a dose plan for ultrasound-guided brachytherapy, a common prostate cancer treatment. However, manual segmentation of the prostate area is difficul... 详细信息
来源: 评论
The teaching structure “with students as subject and teacher as leader” based on MOODLE platform
The teaching structure “with students as subject and teache...
收藏 引用
International Conference on Artificial Intelligence and Education (ICAIE)
作者: Xu-Huai Hu Jian-Ping Ouyang College of Computer Science Hunan Institute of Science and Technology Yueyang China Department of Non-major Foreign Languages Teaching Hunan Institute of Science and Technology Yueyang China
This paper proposes a teaching structure “with students as subject and teacher as leader” based on a popular open-source course management system(CMS)-MOODLE, and discusses the implementation of the pattern designed... 详细信息
来源: 评论
Ranking of gene regulators through differential equations and Gaussian processes
Ranking of gene regulators through differential equations an...
收藏 引用
IEEE Workshop on Machine Learning for Signal Processing
作者: Antti Honkela Marta Milo Matthew Holley Magnus Rattray Neil D. Lawrence Department of Information and Computer Science School of Science and Technology Aalto University Finland School of Medicine and Biomedical Science NIHR Cardiovascular Biomedical Research Unit Sheffield Teaching Hospitals NHS Trust Sheffield UK Department of Biomedical Science University of Sheffield UK School of Computer Science University of Manchester Institute of Science and Technology UK
Gene regulation is controlled by transcription factor proteins which themselves are encoded as genes. This gives a network of interacting genes which control the functioning of a cell. With the advent of genome wide e... 详细信息
来源: 评论
An anomaly detection model based on neighborhood preserving
An anomaly detection model based on neighborhood preserving
收藏 引用
International Conference on Intelligent Control and Information Processing (ICICIP)
作者: Weifeng Jia Ning Yang Bin Tong Department of Computer Teaching Anyang Normal University Anyang South Korea North China University of Water Resources and Electric Power Zhengzhou China School of Computer Science and Engineering University of Electronic Science and Technology Chengdu China
Real-time detection is one of the most important issues in intrusion detection. When the network data is becoming huge and is of high dimensionality, real-time detection with high detection accuracy and low false alar... 详细信息
来源: 评论
Measuring the progress of reference model-based business process modeling
Measuring the progress of reference model-based business pro...
收藏 引用
2nd International Symposium on Services science, ISSS 2010 and 3rd International Conference on Business Process and Services Computing, BPSC 2010 - INFORMATIK 2010
作者: Koschmider, Agnes De La Vara, Jose Luis Sánchez, Juan Department of Computer Science University of Pretoria Pretoria 0002 South Africa Institute of Applied Informatics and Formal Description Methods Karlsruhe Institute of Technology Germany Centro de Investigación en Métodos de Producción de Software Universidad Politécnica de Valencia Spain
Business process modeling plays a major role in industry and academia. As a result, current research focuses on its assistance. Business process modeling is a time-consuming task and its effort is hard to predict, and... 详细信息
来源: 评论
Successful women engineering students: A survey assessment to guide our efforts to boost women's retention
Successful women engineering students: A survey assessment t...
收藏 引用
2010 ASEE Annual Conference and Exposition
作者: Knight, Daniel Corner Sr., Katie Louie, Beverly Shoals Sr., Amber Cabrales, Cindy Integrated Teaching and Learning Program College of Engineering and Applied Science University of Colorado Boulder United States Department of Electrical and Computer Engineering University of Colorado Boulder United States Center College of Engineering and Applied Science University of Colorado Boulder United States College of Engineering and Applied Science University of Colorado Boulder United States Student Affairs Division Student Organizations Finance Office University of Colorado Boulder United States
In the fall of 2009, a college of engineering and applied science at a public, Rocky Mountain region university embarked on a new inclusive excellence initiative called Broadening Opportunity through Leadership & ... 详细信息
来源: 评论