咨询与建议

限定检索结果

文献类型

  • 1,688 篇 会议
  • 1,232 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 2,938 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,486 篇 工学
    • 1,044 篇 计算机科学与技术...
    • 842 篇 软件工程
    • 320 篇 信息与通信工程
    • 255 篇 控制科学与工程
    • 161 篇 电气工程
    • 153 篇 生物工程
    • 128 篇 生物医学工程(可授...
    • 118 篇 电子科学与技术(可...
    • 117 篇 网络空间安全
    • 103 篇 核科学与技术
    • 99 篇 仪器科学与技术
    • 93 篇 安全科学与工程
    • 92 篇 机械工程
    • 89 篇 光学工程
    • 76 篇 动力工程及工程热...
    • 71 篇 交通运输工程
  • 1,138 篇 理学
    • 575 篇 物理学
    • 393 篇 数学
    • 187 篇 生物学
    • 124 篇 统计学(可授理学、...
    • 78 篇 化学
  • 484 篇 管理学
    • 340 篇 管理科学与工程(可...
    • 188 篇 工商管理
    • 164 篇 图书情报与档案管...
  • 194 篇 医学
    • 148 篇 临床医学
    • 120 篇 基础医学(可授医学...
    • 102 篇 公共卫生与预防医...
  • 115 篇 法学
    • 98 篇 社会学
  • 87 篇 教育学
    • 79 篇 教育学
  • 71 篇 经济学
    • 71 篇 应用经济学
  • 61 篇 农学
  • 20 篇 文学
  • 6 篇 军事学
  • 1 篇 哲学

主题

  • 104 篇 accuracy
  • 99 篇 deep learning
  • 95 篇 machine learning
  • 64 篇 training
  • 61 篇 internet of thin...
  • 59 篇 real-time system...
  • 54 篇 feature extracti...
  • 53 篇 computational mo...
  • 52 篇 hadron colliders
  • 50 篇 higgs bosons
  • 47 篇 predictive model...
  • 43 篇 optimization
  • 41 篇 cloud computing
  • 40 篇 artificial intel...
  • 40 篇 machine learning...
  • 39 篇 data models
  • 38 篇 computer science
  • 38 篇 technological in...
  • 37 篇 security
  • 37 篇 students

机构

  • 363 篇 department for p...
  • 341 篇 institute of phy...
  • 324 篇 institute of phy...
  • 300 篇 faculty of scien...
  • 292 篇 department of ph...
  • 289 篇 department of ph...
  • 281 篇 department of ph...
  • 278 篇 kirchhoff-instit...
  • 272 篇 department of ph...
  • 272 篇 department of ph...
  • 258 篇 graduate school ...
  • 257 篇 department of ph...
  • 255 篇 marian smoluchow...
  • 254 篇 department of ph...
  • 251 篇 instituto de fís...
  • 246 篇 fakultät für phy...
  • 241 篇 west university ...
  • 240 篇 departamento de ...
  • 230 篇 universidade fed...
  • 227 篇 dipartimento di ...

作者

  • 238 篇 c. alexa
  • 238 篇 c. amelung
  • 236 篇 g. bella
  • 236 篇 d. calvet
  • 234 篇 j. m. izen
  • 234 篇 j. strandberg
  • 233 篇 n. orlando
  • 233 篇 y. tayalati
  • 233 篇 g. spigo
  • 233 篇 v. chiarella
  • 233 篇 f. siegert
  • 226 篇 y. abulaiti
  • 225 篇 r. ströhmer
  • 225 篇 m. rijssenbeek
  • 225 篇 s. jin
  • 225 篇 g. gaudio
  • 224 篇 m. klein
  • 223 篇 s. mohapatra
  • 223 篇 i. van vulpen
  • 222 篇 f. deliot

语言

  • 2,751 篇 英文
  • 169 篇 其他
  • 23 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Technologies in Management and Education and Computer Science"
2938 条 记 录,以下是2661-2670 订阅
排序:
The development on obstacle avoidance design for a humanoid robot based on four ultrasonic sensors for the learning behavior and performance
The development on obstacle avoidance design for a humanoid ...
收藏 引用
IEEE International Conference on Industrial Engineering and Engineering management, IEEM2010
作者: Li, Ya-Ju Chou, Wei-Chung Chen, Chen-Yuan Shih, Bih-Yaw Chen, Lien-Tung Chung, Pei-Yin Department of Computer Science National Pingtung University of Education No. 4-18 Ming Shen Rd. Pingtung 90003 Taiwan Doctoral Program in Management National Kaohsiung First University of Science and Technology Kaohsiung Taiwan Department of Management Information System Yung-Ta Institute of Technology and Commerce Pingtung 90003 Taiwan Department of Information Management Meiho University 23 Pingguang Rd. Neipu Pingtung Taiwan
A behavioral strategy designed for a humanoid robot for the purpose of obstacle avoidance based on four ultrasonic sensors for the learning behavior and performance is proposed and implemented with an autonomous human... 详细信息
来源: 评论
Filtering false data via authentic consensus in vehicle ad hoc networks
收藏 引用
International Journal of Autonomous and Adaptive Communications Systems 2010年 第2期3卷 217-235页
作者: Cao, Zhen Kong, Jiejun Gerla, Mario Chen, Zhong Hu, Jianbin School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China Department of Computer Science University of California Los Angeles CA 90095 United States
Emerging applications in vehicle ad hoc networks (VANETs) not only open tremendous business opportunities and navigation benefits, they also pose formidable research challenges in security provisioning. A critical sec... 详细信息
来源: 评论
Unsupervised Text Pattern Learning Using Minimum Description Length
Unsupervised Text Pattern Learning Using Minimum Description...
收藏 引用
2010 4th International Universal Communication Symposium(第四届国际普遍交流学术研讨会 IUCS 2010)
作者: Ke Wu Jiangsheng Yu Hanpin Wang Fei Cheng Department of Computer Science and Technology School of Electronics Engineering and Computer Science Key Laboratory of High Confidence Software Technologies Ministry of Education Peking University Beijing China Department of Mathematics Beijing Jiaotong University Beijing China
The knowledge of text patterns in a domainspecific corpus is valuable in many natural language processing (NLP) applications such as information extraction, question-answering system, and etc. In this paper, we propos... 详细信息
来源: 评论
Local Methods for Estimating SimRank Score
Local Methods for Estimating SimRank Score
收藏 引用
International Asia-Pacific Web Conference (APWEB)
作者: Xu Jia Hongyan Liu Li Zou Jun He Xiaoyong Du Yuanzhe Cai Ministry of Education Key Laboratories of Data Engineering and Knowledge Engineering China Department of Computer Science Renmin University of China China Department of Management Science and Engineering Tsinghua University China Department of Computer Science University of Texas Arlington TX USA
SimRank is a well known algorithm which conducts link analysis to measure similarity between each pair of nodes (nodepair). But it suffers from high computational cost, limiting its usage in large-scale datasets. More... 详细信息
来源: 评论
Improving Histogram-based Reversible Data Hiding by Tictactoemidlet Predictions
Improving Histogram-based Reversible Data Hiding by Tictacto...
收藏 引用
International Conference on Genetic and Evolutionary Computing (ICGEC)
作者: Cheng-Hsing Yang Fu-Hau Hsu Min-Hao Wu Shiuh-Jeng Wang Department of Computer Science National Ping Tung University of Education Ping Tung Taiwan Department of Computer Science and Information Engineering National Central University Jhongli Taiwan Department of Information Management Central Police University Taoyuan Taiwan
Reversible data hiding has drawn considerable attention in recent years. In this paper, we used the tictactoemidlet predictions to achieve a histogram-based reversible data hiding. The histogram is created by exploiti... 详细信息
来源: 评论
A novel direction-based diurnal mobility model for handoff estimation in cellular networks
A novel direction-based diurnal mobility model for handoff e...
收藏 引用
IEEE India Conference (INDICON)
作者: Samir K Sadhukhan Swarup Mandal Partha Bhaumik Debashis Saha Indian Institute of Management Calcutta India Wipro Technologies Limited Kolkata India Department of Computer Science University of California Davis USA
In real-life scenario where users mostly know their destinations a priori, their movement is not purely random (as assumed in random walk model); rather it is somewhat direction-based and depends on the present locati... 详细信息
来源: 评论
The study of constructivism oriented web-based learning on the performance of technological college students
The study of constructivism oriented web-based learning on t...
收藏 引用
International Conference on computer science and Information Technology (CSIT)
作者: David W. S. Tai Liang-Chu Lai Yang-Chih Hu Yu-Te Wang Jia-Ling Chen College of Management Hung Kuang University Taichung Taiwan Department of Industrial Education and Technology NCUE Changhua Taiwan Department of Computer Science and Information Management HKU Taichung Taiwan
The purpose of this study is to build e-learning system for constructivist programming design course. Base on the e-learning system, researchers carried out experimental teaching and investigated how constructivist pr... 详细信息
来源: 评论
Secret Embedding and Reconstruction for Authentications in Steganography upon Secret Sharing Systems
Secret Embedding and Reconstruction for Authentications in S...
收藏 引用
International Conference on Future Information Technology (FutureTech)
作者: Yu-Ting Chen Cheng-Hsing Yang Shiuh-Jeng Wang Department of Information Management Central Police University Taoyuan Taiwan Department of Computer Science National Ping Tung University of Education Ping Tung Taiwan
In this paper, we propose an enhanced authentication scheme that aims at the detection of stego-image preventing the fake share offers from the share-holder. Inspired by the past one study of Wang et al. scheme, the s... 详细信息
来源: 评论
An iterative auction mechanism for combinatorial exchanges
An iterative auction mechanism for combinatorial exchanges
收藏 引用
IEEE International Conference on Automation science and Engineering (CASE)
作者: Shantanu Biswas Y. Narahari Education & Research Research Laboratory Infosys Technologies Limited Bangalore India Electronic Commerce Laboratory Department of Computer Science and Automation Indian Institute of Science Bangalore India
Combinatorial exchanges are double sided marketplaces with multiple sellers and multiple buyers trading with the help of combinatorial bids. The allocation and other associated problems in such exchanges are known to ... 详细信息
来源: 评论
A grey-fuzzy controller for optimization technique in wireless networks
收藏 引用
World Academy of science, Engineering and Technology 2010年 41卷 1126-1134页
作者: Wang, Yao-Tien Yu, Hsiang-Fu Chiou, Dung Chen Department of Information Management Kainan University Lu jhu Taoyuan County Taiwan Department of Computer Science National Taipei University of Education Taipei Taiwan Department of Information Management Kainan University Lu jhu Taoyuan County Taiwan
In wireless and mobile communications, this progress provides opportunities for introducing new standards and improving existing services. Supporting multimedia traffic with wireless networksquality of service (QoS). ... 详细信息
来源: 评论