咨询与建议

限定检索结果

文献类型

  • 1,688 篇 会议
  • 1,232 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 2,938 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,486 篇 工学
    • 1,044 篇 计算机科学与技术...
    • 842 篇 软件工程
    • 320 篇 信息与通信工程
    • 255 篇 控制科学与工程
    • 161 篇 电气工程
    • 153 篇 生物工程
    • 128 篇 生物医学工程(可授...
    • 118 篇 电子科学与技术(可...
    • 117 篇 网络空间安全
    • 103 篇 核科学与技术
    • 99 篇 仪器科学与技术
    • 93 篇 安全科学与工程
    • 92 篇 机械工程
    • 89 篇 光学工程
    • 76 篇 动力工程及工程热...
    • 71 篇 交通运输工程
  • 1,138 篇 理学
    • 575 篇 物理学
    • 393 篇 数学
    • 187 篇 生物学
    • 124 篇 统计学(可授理学、...
    • 78 篇 化学
  • 484 篇 管理学
    • 340 篇 管理科学与工程(可...
    • 188 篇 工商管理
    • 164 篇 图书情报与档案管...
  • 194 篇 医学
    • 148 篇 临床医学
    • 120 篇 基础医学(可授医学...
    • 102 篇 公共卫生与预防医...
  • 115 篇 法学
    • 98 篇 社会学
  • 87 篇 教育学
    • 79 篇 教育学
  • 71 篇 经济学
    • 71 篇 应用经济学
  • 61 篇 农学
  • 20 篇 文学
  • 6 篇 军事学
  • 1 篇 哲学

主题

  • 104 篇 accuracy
  • 99 篇 deep learning
  • 95 篇 machine learning
  • 64 篇 training
  • 61 篇 internet of thin...
  • 59 篇 real-time system...
  • 54 篇 feature extracti...
  • 53 篇 computational mo...
  • 52 篇 hadron colliders
  • 50 篇 higgs bosons
  • 47 篇 predictive model...
  • 43 篇 optimization
  • 41 篇 cloud computing
  • 40 篇 artificial intel...
  • 40 篇 machine learning...
  • 39 篇 data models
  • 38 篇 computer science
  • 38 篇 technological in...
  • 37 篇 security
  • 37 篇 students

机构

  • 363 篇 department for p...
  • 341 篇 institute of phy...
  • 324 篇 institute of phy...
  • 300 篇 faculty of scien...
  • 292 篇 department of ph...
  • 289 篇 department of ph...
  • 281 篇 department of ph...
  • 278 篇 kirchhoff-instit...
  • 272 篇 department of ph...
  • 272 篇 department of ph...
  • 258 篇 graduate school ...
  • 257 篇 department of ph...
  • 255 篇 marian smoluchow...
  • 254 篇 department of ph...
  • 251 篇 instituto de fís...
  • 246 篇 fakultät für phy...
  • 241 篇 west university ...
  • 240 篇 departamento de ...
  • 230 篇 universidade fed...
  • 227 篇 dipartimento di ...

作者

  • 238 篇 c. alexa
  • 238 篇 c. amelung
  • 236 篇 g. bella
  • 236 篇 d. calvet
  • 234 篇 j. m. izen
  • 234 篇 j. strandberg
  • 233 篇 n. orlando
  • 233 篇 y. tayalati
  • 233 篇 g. spigo
  • 233 篇 v. chiarella
  • 233 篇 f. siegert
  • 226 篇 y. abulaiti
  • 225 篇 r. ströhmer
  • 225 篇 m. rijssenbeek
  • 225 篇 s. jin
  • 225 篇 g. gaudio
  • 224 篇 m. klein
  • 223 篇 s. mohapatra
  • 223 篇 i. van vulpen
  • 222 篇 f. deliot

语言

  • 2,751 篇 英文
  • 169 篇 其他
  • 23 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Technologies in Management and Education and Computer Science"
2938 条 记 录,以下是2631-2640 订阅
排序:
Improving histogram-based reversible data hiding by tictactoemidlet predictions
Improving histogram-based reversible data hiding by tictacto...
收藏 引用
International Conference on Genetic and Evolutionary Computing
作者: Yang, Cheng-Hsing Hsu, Fu-Hau Wu, Min-Hao Wang, Shiuh-Jeng Department of Computer Science National Pingtung University of Education Pingtung 900 Taiwan Department of Computer Science and Information Engineering National Central University Jhongli 320 Taiwan Department of Information Management Central Police University Taoyuan 333 Taiwan
Reversible data hiding has drawn considerable attention in recent years. In this paper, we used the tictactoemidlet predictions to achieve a histogram-based reversible data hiding. The histogram is created by exploiti... 详细信息
来源: 评论
Secret embedding and reconstruction for authentications in steganography upon secret sharing systems
Secret embedding and reconstruction for authentications in s...
收藏 引用
5th International Conference on Future Information Technology, FutureTech 2010
作者: Chen, Yu-Ting Yang, Cheng-Hsing Wang, Shiuh-Jeng Department of Information Management Central Police University Taoyuan 333 Taiwan Department of Computer Science National Pingtung University of Education Pingtung 900 Taiwan
In this paper, we propose an enhanced authentication scheme that aims at the detection of stego-image preventing the fake share offers from the share-holder. Inspired by the past one study of Wang et al. scheme, the s... 详细信息
来源: 评论
Mobile ad hoc network applications in the library
Mobile ad hoc network applications in the library
收藏 引用
6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010
作者: Hsu, Kuo-Kai Tsai, Dwen-Ren Graduate Institute of Information Management School of Continue Education Chinese Culture University Taiwan Department of Computer Science Chinese Culture University Taiwan
In today's Digital Libraries, mobile devices belong to readers often move from one network to the other frequently. Communications with a fixed support infrastructure may not be suitable for original library appli... 详细信息
来源: 评论
Local methods for estimating SimRank score
Local methods for estimating SimRank score
收藏 引用
12th International Asia Pacific Web Conference, APWeb 2010
作者: Jia, Xu Liu, Hongyan Zou, Li He, Jun Du, Xiaoyong Cai, Yuanzhe Key Labs of Data Engineering and Knowledge Engineering Ministry of Education China Department of Computer Science Renmin University of China 100872 China Department of Management Science and Engineering Tsinghua University 100084 China Department of Computer Science University of Texas Arlington TX 76019 United States
SimRank is a well known algorithm which conducts link analysis to measure similarity between each pair of nodes (nodepair). But it suffers from high computational cost, limiting its usage in large-scale datasets. More... 详细信息
来源: 评论
Hybrid honey bees mating optimisation algorithm to assign terminals to concentrators
Hybrid honey bees mating optimisation algorithm to assign te...
收藏 引用
2010 3rd International Symposium on Applied sciences in Biomedical and Communication technologies, ISABEL 2010
作者: Bernardino, Eugénia M. Bernardino, Anabela M. Sánchez-Pérez, Juan Manuel Gómez-Pulido, Juan Antonio Vega-Rodríguez, Miguel Angel Department of Computer Science School of Technology and Management Polytechnic Institute of Leiria Leiria Portugal Department of Technologies of Computers and Communications Polytechnic School University of Extremadura Cáceres Spain
In this paper we propose a new approach to assign terminals to concentrators using a Hybrid Honey Bees Mating Optimisation algorithm. Honey Bees Mating Optimisation (HBMO) algorithm is a swarm-based optimisation algor... 详细信息
来源: 评论
Methods to enhance the performance of iterated timing analysis algorithm
Methods to enhance the performance of iterated timing analys...
收藏 引用
2010 IEEE International Conference on Information and Automation, ICIA 2010
作者: Chen, Chun-Jung Chen, Bin-Cheng Lee, Chih-Jen Tsai, Chang-Lung Chou, Li-Ping Chang, Allen Y. Department of Computer Science Chinese Culture University Taipei Taiwan Graduate Institute of Information Management School of Continue Education Chinese Culture University Taipei Taiwan
In circuit simulation, Relaxation-based algorithms have been proven to be faster and more flexible than the standard direct approach used in SPICE. ITA (Iterated Timing Analysis) algorithm has even been widely used in... 详细信息
来源: 评论
MOSFET and lossy coupled transmission line circuit simulation using iterated timing analysis and latency-checking method
MOSFET and lossy coupled transmission line circuit simulatio...
收藏 引用
International Conference on Information Engineering and computer science
作者: Chen, Chun-Jung Chen, Bin-Cheng Department of Computer Science Chinese Culture University Taipei Taiwan Graduate Institute of Information Management School of Continue Education Chinese Culture University Taipei Taiwan
This paper discusses methods to perform large-scale circuit simulation for MOSFET circuits containing lossy coupled transmission lines that appear in modern circuit design community. ITA (Iterated Timing Analysis) alg... 详细信息
来源: 评论
A hybrid population-based incremental learning algorithm for load balancing in RPR
A hybrid population-based incremental learning algorithm for...
收藏 引用
2010 3rd International Symposium on Applied sciences in Biomedical and Communication technologies, ISABEL 2010
作者: Bernardino, Anabela M. Bernardino, Eugénia M. Sánchez-Pérez, Juan Manuel Gómez-Pulido, Juan Antonio Vega-Rodríguez, Miguel Angel Department of Computer Science School of Technology and Management Polytechnic Institute of Leiria Leiria Portugal Department of Technologies of Computers and Communications Polytechnic School University of Extremadura Cáceres Spain
When managed properly, the ring networks are uniquely suited to deliver a large amount of bandwidth in a reliable and inexpensive way. An optimal load balancing is very important, because it increases the system capac... 详细信息
来源: 评论
Performance evaluation of datagram congestion control protocol in mobile ad hoc networks
Performance evaluation of datagram congestion control protoc...
收藏 引用
2010 2nd International Conference on Communication Systems, Networks and Applications, ICCSNA 2010
作者: Shekhar, H.M.P. Ramanatha, K.S. Education and Research Department Infosys Technologies Ltd. Hebbal Electronics City Mysore India Department of Computer Science and Engineering M S Ramaiah Institute of Technology MSRnagar Bangalore India
User Datagram Protocol (UDP) is proposed for the efficient servicing of multimedia traffic flows in Internet and it does not make use of any congestion control mechanism. The Internet Engineering Task Force (IETF) is ... 详细信息
来源: 评论
A fast two-stage algorithm for computing SimRank and its extensions
A fast two-stage algorithm for computing SimRank and its ext...
收藏 引用
1st International Workshop on Graph Database, IWGD 2010, 1st International Workshop on Advanced Techniques on XML Data management, XMLDM 2010, 2nd International Workshop on WCMT 2010, Held in Conj. with WAIM 2010
作者: Jia, Xu Liu, Hongyan Zou, Li He, Jun Du, Xiaoyong Key Labs. of Data Engineering and Knowledge Engineering Ministry of Education China Department of Computer Science Renmin University of China 100872 China Department of Management Science and Engineering Tsinghua University 100084 China
Similarity estimation can be used in many applications such as recommender system, cluster analysis, information retrieval and link prediction. SimRank is a famous algorithm to measure objects' similarities based ... 详细信息
来源: 评论