咨询与建议

限定检索结果

文献类型

  • 706 篇 期刊文献
  • 670 篇 会议
  • 14 册 图书

馆藏范围

  • 1,390 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 778 篇 工学
    • 522 篇 计算机科学与技术...
    • 438 篇 软件工程
    • 111 篇 控制科学与工程
    • 92 篇 信息与通信工程
    • 87 篇 生物医学工程(可授...
    • 75 篇 生物工程
    • 55 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 45 篇 机械工程
    • 39 篇 化学工程与技术
    • 37 篇 材料科学与工程(可...
    • 35 篇 光学工程
    • 28 篇 土木工程
  • 532 篇 理学
    • 305 篇 数学
    • 110 篇 生物学
    • 109 篇 物理学
    • 80 篇 统计学(可授理学、...
    • 63 篇 系统科学
    • 46 篇 化学
  • 247 篇 管理学
    • 159 篇 管理科学与工程(可...
    • 97 篇 工商管理
    • 90 篇 图书情报与档案管...
  • 138 篇 教育学
    • 136 篇 教育学
    • 28 篇 心理学(可授教育学...
  • 124 篇 医学
    • 90 篇 临床医学
    • 79 篇 基础医学(可授医学...
    • 43 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 37 篇 法学
    • 34 篇 社会学
  • 33 篇 经济学
    • 32 篇 应用经济学
  • 23 篇 农学
  • 9 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 36 篇 students
  • 34 篇 machine learning
  • 33 篇 computer science
  • 23 篇 education
  • 20 篇 engineering educ...
  • 18 篇 artificial intel...
  • 17 篇 deep learning
  • 17 篇 training
  • 14 篇 computational mo...
  • 12 篇 semantics
  • 12 篇 decision making
  • 11 篇 covid-19
  • 11 篇 accuracy
  • 10 篇 software enginee...
  • 10 篇 neural networks
  • 10 篇 data mining
  • 10 篇 diffusion
  • 10 篇 mathematics
  • 10 篇 curricula
  • 10 篇 intelligent syst...

机构

  • 24 篇 gaoling school o...
  • 24 篇 beijing key labo...
  • 13 篇 department of la...
  • 12 篇 school of scienc...
  • 11 篇 department of co...
  • 11 篇 department of co...
  • 9 篇 department of sc...
  • 9 篇 department of ma...
  • 9 篇 department of au...
  • 8 篇 faculty of physi...
  • 8 篇 department of co...
  • 8 篇 department of so...
  • 8 篇 department of nu...
  • 8 篇 department of sc...
  • 7 篇 computer network...
  • 7 篇 tsinghua univers...
  • 7 篇 beijing key labo...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 college of compu...

作者

  • 12 篇 dulski k.
  • 12 篇 kubicz e.
  • 12 篇 kozik t.
  • 12 篇 korcyl g.
  • 12 篇 badriyya b.al-on...
  • 11 篇 wen ji-rong
  • 11 篇 skurzok m.
  • 11 篇 moskal p.
  • 11 篇 silarski m.
  • 11 篇 gorgol m.
  • 11 篇 gajos a.
  • 10 篇 shopa r.y.
  • 10 篇 kisielewska d.
  • 10 篇 kowalski p.
  • 10 篇 hiesmayr b.c.
  • 10 篇 sharma s.
  • 10 篇 curceanu c.
  • 9 篇 olteanu mircea
  • 9 篇 ştefan radu
  • 9 篇 krawczyk n.

语言

  • 1,307 篇 英文
  • 68 篇 其他
  • 12 篇 中文
  • 2 篇 德文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Methods of Teaching Computer Science"
1390 条 记 录,以下是1241-1250 订阅
排序:
Data refinement for synchronous system specification and construction
收藏 引用
13th IFIP WG 10.5 Advanced Research Working Conference on Correct Hardware Design and Verification methods, CHARME 2005
作者: Tsow, Alex Johnson, Steven D. System Design Methods Laboratory Computer Science Department Indiana University
Design derivation, a correct-by-construction system design method, specifies behavior with abstract datatypes. Refining these abstract datatypes is necessary for architectural decomposition. A new transformation primi... 详细信息
来源: 评论
Is it really an algorithm - The need for explicit discourse  05
Is it really an algorithm - The need for explicit discourse
收藏 引用
ITiCSE 2005: 10th Annual SIGCSE Conference on Innovation and Technology in computer science Education
作者: Haberman, Bruria Averbuch, Haim Ginat, David Department of Computer Science Holon Academic Institute of Technology Rehovot Israel Department of Science Teaching Weizmann Institute of Science Rehovot Israel Department of Computer Science Open University Israel Computer Science Group Science Education Department Tel-Aviv University Israel
The notion of an algorithm is fundamental in computer science. Yet, it is not always fully conceived by novices. This paper focuses on a particular facet of algorithm conception - the relationship between an algorithm... 详细信息
来源: 评论
computer security awareness of college students
Computer security awareness of college students
收藏 引用
2005 International Conference on Security and Management, SAM'05
作者: Garrison, Chlotia Posey Computer Science and Quantitative Methods Department Winthrop University Rock Hill SC United States
computer security incidents cost companies billions of dollars each year and cause untold numbers of individuals considerable inconvenience and data loss. There are many common practices that companies can put in plac... 详细信息
来源: 评论
"computer science, academia, and industry" educational project  05
"Computer science, academia, and industry" educational proje...
收藏 引用
ITiCSE 2005: 10th Annual SIGCSE Conference on Innovation and Technology in computer science Education
作者: Yehezkel, Cecile Haberman, Bruria Dept. of Science Teaching Weizmann Institute of Science Rehovot Israel Department of Computer Science Holon Academic Institute of Technology Rehovot Israel Department of Science Teaching Weizmann Institute of Science Rehovot Israel
A special program in Software Engineering (SE) for high school has been in operation in Israel whose aim is to expose young students to the field of computing. During their studies the students are required to develop... 详细信息
来源: 评论
The DILIGENT knowledge processes
收藏 引用
Journal of Knowledge Management 2005年 第5期9卷 85-96页
作者: Vrandečić, Denny Pinto, Sofia Tempich, Christoph Sure, York University of Karlsruhe Institute of Applied Informatics and Formal Description Methods 76128 Karlsruhe Germany Department of Computer Science and Engineering Instituto Superior Tecnico Technical University of Lisbon Lisbon Portugal Institute of Applied Computer Science and Formal Description Methods University of Karlsruhe 76128 Karlsruhe Germany
Purpose - Aims to present the ontology engineering methodology DILIGENT, a methodology focussing on the evolution of ontologies instead of the initial design, thus recognizing that knowledge is a tangible and moving t... 详细信息
来源: 评论
Decompositions of the Hardy space _z^1(Ω)
收藏 引用
Acta Mathematica Sinica,English Series 2005年 第4期21卷 949-954页
作者: Zeng Jian LOU Shou Zhi YANG Dao Jin SONG Department of Mathematics Shantou University Shantou 515063 P. R. China Teaching Division of Computer Science Shandong University of Technology Zibo 255091 P. R. China
We give a decomposition of the Hardy space Hz^1(Ω) into "div-curl" quantities for Lipschitz domains in R^n. We also prove a decomposition of Hz^1(Ω) into Jacobians det Du, u ∈ W0^1,2 (Ω,R^2) for Ω in R^2.... 详细信息
来源: 评论
Automatic authentication based on inexact graph matching
收藏 引用
Journal of Computational Information Systems 2005年 第3期1卷 537-542页
作者: Chen, Ning Feng, Boqin Wang, Haixiao Zhang, Hao Computer Teaching and Experiment Center Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049 China 29 Bayowski Road West Orange NJ 07052 United States Shenzhen Traffic Control Center Shenzhen 518000 China
This paper introduced a technique for authenticating the vehicle engines. It has been compared by the images of the imprints of the identification number acquired when the vehicle was first registered and the ones acq... 详细信息
来源: 评论
Guidelines for a multiple-goal CS introductory course: Algorithmic problem-solving woven into OOP  05
Guidelines for a multiple-goal CS introductory course: Algor...
收藏 引用
ITiCSE 2005: 10th Annual SIGCSE Conference on Innovation and Technology in computer science Education
作者: Muller, Orna Haberman, Bruria Science Education Department School of Education Tel-Aviv University Israel Department of Computer Science Holon Academic Institute of Technology Rehovot Israel Department of Science Teaching Weizmann Institute of Science Rehovot Israel
Over the years educators have been debating about the most appropriate paradigm for teaching an introductory course in computer science (CS). Specifically, the pedagogical approach known as "objects early" o... 详细信息
来源: 评论
AP forecast: An adaptive forecasting method for data streams
AP forecast: An adaptive forecasting method for data streams
收藏 引用
9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005
作者: Wang, Yong-Li Xu, Hong-Bing Dong, Yi-Sheng Liu, Xue-Jun Qian, Jiang-Bo Department of Computer Science and Engineering Southeast University SiPaiLou No.2 Nanjing 210096 China Department of Common Computer Teaching Jiamusi University Jiamusi 154007 China
This research investigates continuous forecasting queries with alterable forecasting-step over data streams. A novel Adaptive Precision forecasting method to forecasting single attribute value of item in a single stea... 详细信息
来源: 评论
The formal verification of a reintegration protocol
The formal verification of a reintegration protocol
收藏 引用
5th ACM International Conference on Embedded Software, EMSOFT 2005
作者: Pike, Lee Johnson, Steven D. Formal Methods Group NASA Langley Research Center United States Department of Computer Science Indiana University Bloomington United States
We report the first formal verification of a reintegration protocol for a safety-critical distributed embedded system. A reintegration protocol increases system survivability by allowing a transiently-faulty node to r... 详细信息
来源: 评论