咨询与建议

限定检索结果

文献类型

  • 692 篇 期刊文献
  • 671 篇 会议
  • 14 册 图书

馆藏范围

  • 1,377 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 774 篇 工学
    • 515 篇 计算机科学与技术...
    • 433 篇 软件工程
    • 109 篇 控制科学与工程
    • 92 篇 信息与通信工程
    • 86 篇 生物医学工程(可授...
    • 75 篇 生物工程
    • 55 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 45 篇 机械工程
    • 41 篇 材料科学与工程(可...
    • 39 篇 化学工程与技术
    • 32 篇 光学工程
    • 28 篇 土木工程
  • 529 篇 理学
    • 308 篇 数学
    • 110 篇 物理学
    • 107 篇 生物学
    • 83 篇 统计学(可授理学、...
    • 63 篇 系统科学
    • 44 篇 化学
  • 247 篇 管理学
    • 159 篇 管理科学与工程(可...
    • 97 篇 工商管理
    • 90 篇 图书情报与档案管...
  • 139 篇 教育学
    • 137 篇 教育学
    • 28 篇 心理学(可授教育学...
  • 118 篇 医学
    • 84 篇 临床医学
    • 75 篇 基础医学(可授医学...
    • 42 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 37 篇 法学
    • 34 篇 社会学
  • 33 篇 经济学
    • 32 篇 应用经济学
  • 22 篇 农学
  • 9 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 37 篇 students
  • 34 篇 machine learning
  • 33 篇 computer science
  • 23 篇 education
  • 20 篇 engineering educ...
  • 18 篇 artificial intel...
  • 17 篇 deep learning
  • 17 篇 training
  • 13 篇 computational mo...
  • 12 篇 decision making
  • 11 篇 covid-19
  • 11 篇 semantics
  • 11 篇 accuracy
  • 10 篇 software enginee...
  • 10 篇 neural networks
  • 10 篇 data mining
  • 10 篇 diffusion
  • 10 篇 mathematics
  • 10 篇 curricula
  • 10 篇 intelligent syst...

机构

  • 25 篇 beijing key labo...
  • 24 篇 gaoling school o...
  • 13 篇 department of la...
  • 12 篇 school of scienc...
  • 11 篇 department of co...
  • 11 篇 department of co...
  • 9 篇 department of sc...
  • 9 篇 department of so...
  • 9 篇 department of ma...
  • 9 篇 department of au...
  • 8 篇 faculty of physi...
  • 8 篇 department of co...
  • 8 篇 department of nu...
  • 8 篇 department of sc...
  • 7 篇 computer network...
  • 7 篇 tsinghua univers...
  • 7 篇 beijing key labo...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of ap...

作者

  • 12 篇 dulski k.
  • 12 篇 kubicz e.
  • 12 篇 kozik t.
  • 12 篇 korcyl g.
  • 12 篇 badriyya b.al-on...
  • 11 篇 wen ji-rong
  • 11 篇 skurzok m.
  • 11 篇 moskal p.
  • 11 篇 silarski m.
  • 11 篇 gorgol m.
  • 11 篇 gajos a.
  • 10 篇 shopa r.y.
  • 10 篇 kisielewska d.
  • 10 篇 kowalski p.
  • 10 篇 hiesmayr b.c.
  • 10 篇 sharma s.
  • 10 篇 curceanu c.
  • 10 篇 rudy z.
  • 9 篇 olteanu mircea
  • 9 篇 ştefan radu

语言

  • 1,234 篇 英文
  • 128 篇 其他
  • 12 篇 中文
  • 2 篇 德文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Methods of Teaching Computer Science"
1377 条 记 录,以下是981-990 订阅
排序:
Evaluating the power of homophily and graph properties in Social Network: Measuring the flow of inspiring influence using evolutionary dynamics
Evaluating the power of homophily and graph properties in So...
收藏 引用
2013 science and Information Conference, SAI 2013
作者: Al-Qaheri, Hameed Banerjee, Soumya Ghosh, Goldina Department of Quantitative Methods and Information Systems Kuwait Universit Safat Kuwait Department of Computer Science Birla Institute of Technology India
Interaction with different person leads to different kinds of ideas and sharing or some nourishing effects which might influence others to believe or trust or even join some association and subsequently become the mem... 详细信息
来源: 评论
Probabilistic XML functional dependencies based on possible world model
收藏 引用
computer Modelling and New Technologies 2014年 第10期18卷 232-238页
作者: Yan, Ping Lv, Teng He, Weimin School of Science Anhui Agricultural University Hefei China Teaching and Research Section of Computer Army Officer Academy Hefei China Department of Computing and New Media Technologies University of Wisconsin-Stevens Point 2100 Main Street Stevens PointWI United States
With the increase of uncertain data in many new applications, such as sensor network, data integration, web extraction, etc., uncertainty both in relational databases and XML datasets has attracted more and more resea... 详细信息
来源: 评论
A big data based data storage systems for rock burst experiment
收藏 引用
International Journal of Wireless and Mobile Computing 2013年 第5期6卷 463-472页
作者: Zhang, Yu Bai, Yan-Ping Zhu, Dong-Feng Lv, Zhao-Yong Department of Computer Science Beijing University of Civil Engineering and Architecture Beijing China State Key Laboratory for GeoMechanics and Deep Underground Engineering China University of Mining and Technology Beijing China School of Management Capital Normal University Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China Department of Computer Teaching and Network Information Beijing University of Civil Engineering and Architecture Beijing China
State Key Laboratory for GeoMechanics and Deep Underground Engineering, Deep-Lab for short, has been committed to the study of rock burst. Deep-Lab accumulated a large number of rock-burst data. With the deepening of ... 详细信息
来源: 评论
A novel stable algorithm of getting user's account based on telnet protocol
A novel stable algorithm of getting user's account based on ...
收藏 引用
2012 International Conference on Mechanical Engineering, Industrial Electronics and Informatization, MEIEI 2012
作者: Wei, Li Deng, Da-Zhi Public Infrastructure Department Computer teaching and research section Henan Medical College for Staff and Workers Zhengzhou 450009 China Department of Computer Science Henan Institute of Engineering Zhengzhou 450009 China
In recent years,china input in the construction of the network management is constantly increasing;information technology has improved continuously,but,making a variety of network security incidents occur frequently,d... 详细信息
来源: 评论
An energy-based model for spatial social networks  12
An energy-based model for spatial social networks
收藏 引用
12th European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, ECAL 2013
作者: Antonioni, Alberto Egloff, Mattia Tomassini, Marco Information Systems Department Faculty of Business and Economics Section of Computer Science and Mathematical Methods Faculty of Arts and Humanities University of Lausanne Switzerland Switzerland
In the past decade, thanks to abundant data and adequate software tools, complex networks have been thoroughly investigated in many disciplines. Most of this work has dealt with networks in which distances do not have... 详细信息
来源: 评论
Weak heaps and friends: Recent developments
Weak heaps and friends: Recent developments
收藏 引用
24th International Workshop on Combinatorial Algorithms, IWOCA 2013
作者: Edelkamp, Stefan Elmasry, Amr Katajainen, Jyrki Weiß, Armin Faculty 3-Mathematics and Computer Science University of Bremen P.O. Box 330 440 Bremen 28334 Germany Department of Computer Engineering and Systems Alexandria University Alexandria 21544 Egypt Department of Computer Science University of Copenhagen Universitetsparken 5 Copenhagen East 2100 Denmark Institute for Formal Methods in Computer Science University of Stuttgart Universitätstraße 38 70569 Stuttgart Germany
A weak heap is a variant of a binary heap where, for each node, the heap ordering is enforced only for one of its two children. In 1993, Dutton showed that this data structure yields a simple worst-case-efficient sort... 详细信息
来源: 评论
Insect extraction based on the improved color channel comparison method
Insect extraction based on the improved color channel compar...
收藏 引用
2012 International Conference on Emerging Technologies for Information Systems, Computing, and Management, ICM 2012
作者: Yang, Yan Liu, Sa Zhu, Xiaodong Lian, Shibin Wang, Huaiwei Yan, Tingyu Department of Computer Science and Information Beijing University of Agriculture Beijing China Ministry of Basic Teaching Beijing University of Agriculture Beijing China
Color Channel Comparison Method is an effective method to transform color images into gray ones. This method can enhance pests' characteristics and remove the background to some extent. However, some interfering b... 详细信息
来源: 评论
Top-down mining of top-k frequent closed patterns from microarray datasets
Top-down mining of top-k frequent closed patterns from micro...
收藏 引用
2013 IEEE Conference Anthology, ANTHOLOGY 2013
作者: Huang, Haiping Miao, Yuqing Shi, Jianjun Department of Teaching and Practice Guilin University of Electronic Technology Guilin China School of Computer Science and Engineering Guilin University of Electronic Technology Guilin China
Mining frequent closed patterns from microarray datasets has attracted more attention. However, most previous studies needed users to specify a minimum support threshold. In practice, it is not easy for users to set a... 详细信息
来源: 评论
An extrapolation method of crank-nicolson finite difference scheme for distributed control equation
An extrapolation method of crank-nicolson finite difference ...
收藏 引用
2nd International Conference on Information Engineering and Applications, IEA 2012
作者: Zhou, Jun Xiong, Min School of Mathematics and Computer Science Yangtze Normal University Chongqing China Department of Basic Teaching Chengdu Aeronautic Vocational and Technical College Chengdu China
This paper studies a finite difference scheme for the distributed control equation, which is based on Crank-Nicolson finite difference scheme and is constructed by applying an extrapolation technique to the nonlinear ... 详细信息
来源: 评论
The worst case minimized upper bound in #2-SAT
The worst case minimized upper bound in #2-SAT
收藏 引用
2012 International Conference on Information Technology and Software Engineering, ITSE 2012
作者: Gu, Wenxiang Wang, Honglin School of Computer Science Northeast Normal University 130117 Changchun China Department of Basic Subjects Teaching ChangChun Architecture and Civil Engineering College 130607 Changchun China
#SAT problem is NP-complete, so the small improvement of #SAT problems at the worst case (such as from O(ck) to O((c-Ε)k)) will make the efficiency of the algorithm improved in the level of exponent. In this paper, w... 详细信息
来源: 评论