咨询与建议

限定检索结果

文献类型

  • 1,182 篇 会议
  • 816 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 2,037 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,275 篇 工学
    • 1,026 篇 计算机科学与技术...
    • 843 篇 软件工程
    • 249 篇 信息与通信工程
    • 171 篇 控制科学与工程
    • 164 篇 生物工程
    • 118 篇 电气工程
    • 109 篇 生物医学工程(可授...
    • 71 篇 光学工程
    • 67 篇 机械工程
    • 67 篇 电子科学与技术(可...
    • 54 篇 安全科学与工程
    • 51 篇 网络空间安全
    • 47 篇 交通运输工程
    • 46 篇 仪器科学与技术
    • 46 篇 动力工程及工程热...
  • 595 篇 理学
    • 331 篇 数学
    • 180 篇 生物学
    • 119 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 46 篇 化学
  • 385 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 133 篇 工商管理
  • 118 篇 医学
    • 109 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 54 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 53 篇 经济学
    • 53 篇 应用经济学
  • 52 篇 法学
  • 52 篇 教育学
    • 50 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 6 篇 文学
  • 6 篇 艺术学

主题

  • 80 篇 software enginee...
  • 79 篇 computer science
  • 60 篇 machine learning
  • 46 篇 deep learning
  • 46 篇 computational mo...
  • 44 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 internet of thin...
  • 41 篇 grid computing
  • 41 篇 quality of servi...
  • 39 篇 feature extracti...
  • 38 篇 resource managem...
  • 38 篇 training
  • 33 篇 software
  • 32 篇 computer archite...
  • 30 篇 application soft...
  • 30 篇 security
  • 30 篇 artificial intel...
  • 29 篇 laboratories
  • 28 篇 semantics

机构

  • 123 篇 college of compu...
  • 55 篇 department of co...
  • 35 篇 department of co...
  • 35 篇 state key labora...
  • 29 篇 national enginee...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 22 篇 college of intel...
  • 21 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 state key labora...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 14 篇 department of co...
  • 13 篇 school of inform...
  • 13 篇 department of in...
  • 12 篇 college of compu...
  • 12 篇 school of softwa...

作者

  • 49 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 15 篇 wang xiaofei
  • 13 篇 materwala huned
  • 13 篇 muhammad adnan k...
  • 12 篇 parizi reza m.
  • 12 篇 victor c. m. leu...
  • 12 篇 zander carol
  • 12 篇 tan kay chen
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 niyato dusit
  • 11 篇 lin qiuzhen
  • 11 篇 srivastava gauta...
  • 10 篇 qi lianyong
  • 10 篇 mccartney robert
  • 10 篇 leung victor c. ...

语言

  • 1,784 篇 英文
  • 243 篇 其他
  • 13 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
2037 条 记 录,以下是1431-1440 订阅
排序:
A novel digital pulse processing architecture for nuclear instrumentation
A novel digital pulse processing architecture for nuclear in...
收藏 引用
International Conference on Advancements in Nuclear Instrumentation Measurement Methods and their Applications (ANIMMA)
作者: Y. Moline M. Thevenin G. Corre M. Paindavoine DePaul University University of Utah's School of Computing Department of Computer Science & Engineering Information School University of Washington Carnegie Mellon University's Software Engineering Institute
This paper introduces a specific Multiple Program Multiple Data (MPMD) architecture designed to address the issues of nuclear instrumentation: pulse processing, real-time, multi-channel flexibility, dead-time manageme... 详细信息
来源: 评论
Composite differential evolution with queueing selection for multimodal optimization
Composite differential evolution with queueing selection for...
收藏 引用
Congress on Evolutionary Computation
作者: Yu-Hui Zhang Yue-Jiao Gong Wei-Neng Chen Jun Zhang Engineering Research Center of Supercomputing Engineering Software Ministry of Education Department of Computer Science Sun Yat-sen University School of Advanced Computing Sun Yat-sen University Guangzhou China
The aim of multimodal optimization is to locate multiple optima of a given problem. Evolutionary algorithms (EAs) are one of the most promising candidates for multimodal optimization. However, due to the use of greedy... 详细信息
来源: 评论
Wireshark Window Authentication Based Packet Captureing Scheme to Pervent DDoS Related Security Issues in Cloud Network Nodes
Wireshark Window Authentication Based Packet Captureing Sche...
收藏 引用
2015 6th IEEE International Conference on software engineering and Service science(ICSESS 2015)
作者: Waqar Ali Jun Sang Hamad Naeem Rashid Naeem Ali Raza Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education School of Software Engineering Chongqing University Department of computer science International Islamic University
DoS(Denial of Service) attack forces a cloud network node to handle few unauthorized access that employ unwanted computing cycle. As a result, the cloud node response is slow as usual and resource on cloud network bec... 详细信息
来源: 评论
A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT)
A review on Internet of Things (IoT), Internet of Everything...
收藏 引用
Internet Technologies and Applications (ITA)
作者: Mahdi H. Miraz Maaruf Ali Peter S. Excell Rich Picking Department of Computer Science and Software Engineering Glyndŵr University Wrexham UK Docklands Campus London Computing and Engineering University of East London UK Glyndŵr University Wrexham UK
The current prominence and future promises of the Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) are extensively reviewed and a summary survey report is presented. The analys... 详细信息
来源: 评论
File system-independent block device support for storage class memory
File system-independent block device support for storage cla...
收藏 引用
IEEE Conference on Computer Communications Workshops, INFOCOM Wksps
作者: Yi Wang Tianzheng Wang Zili Shao Duo Liu Jingling Xue College of Computer Science and Software Engineering Shenzhen University Department of Computing The Hong Kong Polytechnic University Department of Computer Science University of Toronto Canada College of Computer Science Chongqing University China School of Computer Science and Engineering University of New South Wales Sydney Australia
Storage class memory (SCM) modules can be placed side-by-side with DRAM on the memory bus, available to memory instructions issued by the CPU. This shift engenders a new “DRAM-SCM” storage architecture and potential... 详细信息
来源: 评论
Fast RFID grouping protocols
Fast RFID grouping protocols
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Jia Liu Bin Xiao Shigang Chen Feng Zhu Lijun Chen State Key Laboratory for Novel Software Technology Nanjing University China Department of Computing Hong Kong Polytechnic University China Department of Computer & Information Science & Engineering University of Florida USA
In RFID systems, the grouping problem is to efficiently group all tags according to a given partition such that tags in the same group will have the same group ID. Unlike previous research on the unicast transmission ... 详细信息
来源: 评论
Is noise always harmful? Visual learning from weakly-related data
Is noise always harmful? Visual learning from weakly-related...
收藏 引用
IEEE International Conference on Orange Technologies (ICOT)
作者: Sheng-hua Zhong Yan Liu Kien A. Hua Songtao Wu College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Computing The Hong Kong Polytechnic University Hong Kong P.R. China Department of Computer Science University of Central Florida Florida USA
Noise exists universally in multimedia data, especially in Internet era. For example, tags from web users are often incomplete, arbitrary, and low relevant with the visual information. Intuitively, noise in the datase... 详细信息
来源: 评论
Active appearance model search using partial least squares regression
Active appearance model search using partial least squares r...
收藏 引用
IEEE Visual Communications and Image Processing (VCIP)
作者: Yongxin Ge Chen Min Martin Jagersand Dan Yang School of Software Engineering Chongqing University Chongqing P. R. China Ministry of Education Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing China Department of Computing Science University of Alberta Edmonton Canada
A novel active appearance model (AAM) search algorithm based on partial least squares (PLS) regression is proposed. PLS models the relationship between independent (texture residuals) and dependent (error in the model... 详细信息
来源: 评论
Tomography is Necessary for Universal Entanglement Detection with Single-Copy Observables
收藏 引用
Physical Review Letters 2016年 第23期116卷 230501-230501页
作者: Dawei Lu Tao Xin Nengkun Yu Zhengfeng Ji Jianxin Chen Guilu Long Jonathan Baugh Xinhua Peng Bei Zeng Raymond Laflamme Institute for Quantum Computing University of Waterloo Waterloo N2L 3G1 Ontario Canada State Key Laboratory of Low-Dimensional Quantum Physics and Department of Physics Tsinghua University Beijing 100084 China Centre for Quantum Computation and Intelligent Systems Faculty of Engineering and Information Technology University of Technology Sydney NSW 2007 Australia Department of Mathematics and Statistics University of Guelph Guelph Ontario N1G 2W1 Canada State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China Joint Center for Quantum Information and Computer Science University of Maryland College Park Maryland 20742 USA Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics University of Science and Technology of China Hefei Anhui 230036 China Canadian Institute for Advanced Research Toronto Ontario M5G 1Z8 Canada Perimeter Institute for Theoretical Physics Waterloo Ontario N2L 2Y5 Canada
Entanglement, one of the central mysteries of quantum mechanics, plays an essential role in numerous tasks of quantum information science. A natural question of both theoretical and experimental importance is whether ... 详细信息
来源: 评论
Reciprocal Social Strategy in Social Repeated Games
Reciprocal Social Strategy in Social Repeated Games
收藏 引用
International Conference on Tools with Artificial Intelligence
作者: Chi-Kong Chan Jianye Hao Ho-fung Leung Department of Computing Hang Seng Management College Shatin Hong Kong School of Software Tianjin University Tianjin China Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin Hong Kong
In an artificial society where agents repeatedly interact with one another, achieving high level of social utility is generally a challenge. This is especially true when the participating agents are self-interested, a... 详细信息
来源: 评论