咨询与建议

限定检索结果

文献类型

  • 3,807 篇 会议
  • 2,349 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 6,186 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,702 篇 工学
    • 2,281 篇 计算机科学与技术...
    • 1,810 篇 软件工程
    • 729 篇 信息与通信工程
    • 664 篇 控制科学与工程
    • 546 篇 电气工程
    • 476 篇 电子科学与技术(可...
    • 353 篇 生物工程
    • 311 篇 机械工程
    • 269 篇 生物医学工程(可授...
    • 248 篇 光学工程
    • 232 篇 仪器科学与技术
    • 225 篇 动力工程及工程热...
    • 177 篇 化学工程与技术
    • 134 篇 交通运输工程
    • 126 篇 材料科学与工程(可...
    • 119 篇 土木工程
  • 2,057 篇 理学
    • 1,010 篇 数学
    • 614 篇 物理学
    • 403 篇 生物学
    • 300 篇 统计学(可授理学、...
    • 261 篇 系统科学
    • 182 篇 化学
  • 987 篇 管理学
    • 667 篇 管理科学与工程(可...
    • 346 篇 图书情报与档案管...
    • 283 篇 工商管理
  • 303 篇 医学
    • 259 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 123 篇 药学(可授医学、理...
  • 156 篇 法学
    • 123 篇 社会学
  • 123 篇 经济学
    • 122 篇 应用经济学
  • 72 篇 农学
  • 59 篇 教育学
  • 27 篇 文学
  • 19 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学

主题

  • 159 篇 computer science
  • 117 篇 deep learning
  • 98 篇 computer archite...
  • 97 篇 feature extracti...
  • 95 篇 computational mo...
  • 94 篇 machine learning
  • 88 篇 accuracy
  • 85 篇 laboratories
  • 78 篇 optimization
  • 74 篇 data mining
  • 74 篇 training
  • 73 篇 hardware
  • 67 篇 control systems
  • 63 篇 artificial intel...
  • 61 篇 testing
  • 60 篇 educational inst...
  • 60 篇 wireless sensor ...
  • 59 篇 algorithm design...
  • 56 篇 costs
  • 55 篇 application soft...

机构

  • 172 篇 department of co...
  • 87 篇 department of co...
  • 53 篇 key laboratory o...
  • 47 篇 school of softwa...
  • 40 篇 department of co...
  • 38 篇 tsinghua nationa...
  • 37 篇 department of co...
  • 37 篇 national enginee...
  • 35 篇 key laboratory o...
  • 28 篇 college of compu...
  • 26 篇 school of system...
  • 25 篇 university of ch...
  • 25 篇 vlsi and system ...
  • 24 篇 department of co...
  • 23 篇 key laboratory f...
  • 22 篇 department of co...
  • 22 篇 department of el...
  • 22 篇 the key laborato...
  • 20 篇 ieee
  • 19 篇 department of co...

作者

  • 33 篇 hai jin
  • 27 篇 zhou mengchu
  • 22 篇 guangwen yang
  • 21 篇 abdelwahed motwa...
  • 21 篇 dutta paramartha
  • 20 篇 mengchu zhou
  • 20 篇 liuchen chang
  • 18 篇 mohamed k.nour
  • 18 篇 jiang changjun
  • 17 篇 haohuan fu
  • 17 篇 ligang hou
  • 17 篇 changjun jiang
  • 17 篇 jin hai
  • 16 篇 han zhu
  • 16 篇 ishfaq yaseen
  • 15 篇 robbi rahim
  • 15 篇 gaol ford lumban
  • 15 篇 wang jinhui
  • 15 篇 hou ligang
  • 14 篇 xiang-yang li

语言

  • 5,885 篇 英文
  • 155 篇 其他
  • 140 篇 中文
  • 12 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 意大利文
  • 1 篇 荷兰文
检索条件"机构=Department of Computer System and Technology"
6186 条 记 录,以下是261-270 订阅
排序:
Digital watermarking using ant colony optimization in fractional Fourier domain
收藏 引用
Journal of Information Hiding and Multimedia Signal Processing 2010年 第3期1卷 179-189页
作者: Al-Qaheri, Hameed Mustafi, Abhijit Banerjee, Soumya Department of Quantitative and Information System CBA Kuwait University Kuwait Department of Computer Science Birla Institute of Technology Mesra India
The paper describes the implementation of a watermarking embedding and retrieval technique using a conceptual approach of bio-inspired algorithm e.g. ant colony optimization (ACO). The essential construct of ACO is ph... 详细信息
来源: 评论
SCStore: Managing Scientific Computing Packages for Hybrid system with Containers
收藏 引用
Tsinghua Science and technology 2017年 第6期22卷 675-681页
作者: Wusheng Zhang Jiao Lin Weiping Xu Haohuan Fu Guangwen Yang Department of Computer Science and Technology Tsinghua University Beijing 100084 China National Supercomputing Center in Wuxi Wuxi 210008 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China. Department of Earth System Science Tsinghua University Beijing 100084 China
Managing software packages in a scientific computing environment is a challenging task, especially in the case of heterogeneous systems. It is error prone when installing and updating software packages in a sophistica... 详细信息
来源: 评论
Dominant Skyline Query Processing over Multiple Time Series
收藏 引用
Journal of computer Science & technology 2013年 第4期28卷 625-635页
作者: 汪浩 王朝坤 徐亚军 宁苑池 Department of Computer Science and Technology Tsinghua University Tsinghua National Laboratory for Information Science and Technology Key Laboratory for Information System Security Ministry of Education School of Software Tsinghua University
Multiple time series (MTS), which describes an object in multi-dimensions, is based on single time series and has been proved to be useful. In this paper, a new analytical method called α/β-Dominant-Skyline on MTS... 详细信息
来源: 评论
Advancing Bankruptcy Forecasting With Hybrid Machine Learning Techniques: Insights From an Unbalanced Polish Dataset
收藏 引用
IEEE Access 2024年 12卷 9369-9381页
作者: Ainan, Ummey Hany Por, Lip Yee Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t... 详细信息
来源: 评论
Open source software adaptation in Africa: Is a matter of inferior or cheap is not quality?
收藏 引用
International Journal of Open Source Software and Processes 2014年 第1期5卷 1-15页
作者: Bakar, Abubakar Diwani Md Sultan, Abu Bakar Zulzalil, Hazura Din, Jamilah Department of Information System Faculty of Computer Science and Information Technology University Putra Malaysia Serdang Selangor Malaysia
The African continent has long benefited from adopting OSS in its private and public organizations that have changed their way of development, the use and how to acquire proprietary software. This frequency of adaptat... 详细信息
来源: 评论
Mining classification rules in multistrategy learning approach
收藏 引用
Intelligent Data Analysis 1998年 第3期2卷 165-185页
作者: Yuanhui, Zhou Yuchang, Lu Chunyi, Shi National Key Laboratory of Intelligence Technology and System Department of Computer Science Tsinghua University Beijing 100 China
Classification, which involves finding rules that partition a given dataset into disjoint groups, is one class of data mining problems. Approaches proposed so far for mining classification rules from databases are mai... 详细信息
来源: 评论
A systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords
收藏 引用
IEEE Access 2024年 12卷 53408-53423页
作者: Por, Lip Yee Ng, Ian Ouii Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj... 详细信息
来源: 评论
Digital nudging model for learning management systems: Saudi Arabia perspective
收藏 引用
Heliyon 2025年 第6期11卷
作者: Alotaibi, Salihah Issa, Tomayess Abu-Salih, Bilal Aljaafari, Mohammed Almiani, Muder Information Systems Department College of Computer and Information Sciences Imam Mohammad Ibn Saud Islamic University (IMSIU) Riyadh 11432 Saudi Arabia Faculty of Business and Law Curtin University Hayman Road Bentley 6102 WA Australia King Abdullah II School of Information Technology The University of Jordan Amman 11942 Jordan King Faisal University Al-Ahsa 31982 Saudi Arabia Department of Management Information System (MIS) Gulf University for Science and Technology Kuwait City Kuwait
Decisions related to education are complex and have long-term consequences. For higher education students, most of these decisions are made when students are young and with little academic experience;these decisions c... 详细信息
来源: 评论
An introduction to journal phishings and their detection approach
收藏 引用
Telkomnika (Telecommunication Computing Electronics and Control) 2015年 第2期13卷 373-380页
作者: Dadkhah, Mehdi Sutikno, Tole Jazi, Mohammad Davarpanah Stiawan, Deris Department of Computer and Information Technology Foulad Institute of Technology Foulad shahr Isfahan Iran Department of Electrical Engineering Universitas Ahmad Dahlan Yogyakarta Indonesia Department of Computer System Engineering Universitas Sriwijaya Palembang Indonesia
Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker dir... 详细信息
来源: 评论
Authenblue: A New Authentication Protocol for the Industrial Internet of Things
收藏 引用
computers, Materials & Continua 2021年 第4期67卷 1103-1119页
作者: Rachid Zagrouba Asayel AlAbdullatif Kholood AlAjaji Norah Al-Serhani Fahd Alhaidari Abdullah Almuhaideb Atta-ur-Rahman Department of Computer Information System College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Science College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia
The Internet of Things(IoT)is where almost anything can be controlled and managed remotely by means of *** the IoT evolution led to quality of life enhancement,many of its devices are *** lack of robust key management... 详细信息
来源: 评论