咨询与建议

限定检索结果

文献类型

  • 1,178 篇 会议
  • 831 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 2,048 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,284 篇 工学
    • 1,036 篇 计算机科学与技术...
    • 843 篇 软件工程
    • 251 篇 信息与通信工程
    • 179 篇 控制科学与工程
    • 165 篇 生物工程
    • 123 篇 电气工程
    • 107 篇 生物医学工程(可授...
    • 70 篇 光学工程
    • 68 篇 机械工程
    • 66 篇 电子科学与技术(可...
    • 54 篇 安全科学与工程
    • 52 篇 网络空间安全
    • 48 篇 交通运输工程
    • 46 篇 动力工程及工程热...
    • 45 篇 仪器科学与技术
  • 594 篇 理学
    • 331 篇 数学
    • 180 篇 生物学
    • 118 篇 物理学
    • 92 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 46 篇 化学
  • 390 篇 管理学
    • 267 篇 管理科学与工程(可...
    • 140 篇 图书情报与档案管...
    • 135 篇 工商管理
  • 118 篇 医学
    • 109 篇 临床医学
    • 99 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 53 篇 公共卫生与预防医...
  • 54 篇 经济学
    • 53 篇 应用经济学
  • 53 篇 法学
  • 52 篇 教育学
    • 50 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 文学
  • 6 篇 艺术学

主题

  • 80 篇 software enginee...
  • 79 篇 computer science
  • 61 篇 machine learning
  • 49 篇 deep learning
  • 47 篇 computational mo...
  • 43 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 internet of thin...
  • 42 篇 quality of servi...
  • 41 篇 grid computing
  • 41 篇 training
  • 38 篇 resource managem...
  • 38 篇 feature extracti...
  • 33 篇 software
  • 32 篇 computer archite...
  • 31 篇 artificial intel...
  • 30 篇 application soft...
  • 29 篇 laboratories
  • 29 篇 semantics
  • 29 篇 data models

机构

  • 126 篇 college of compu...
  • 57 篇 department of co...
  • 35 篇 state key labora...
  • 34 篇 department of co...
  • 32 篇 national enginee...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 22 篇 college of intel...
  • 20 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 department of co...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 department of in...
  • 14 篇 school of comput...
  • 14 篇 college of compu...
  • 13 篇 school of inform...
  • 13 篇 department of in...
  • 12 篇 college of compu...
  • 12 篇 school of softwa...

作者

  • 49 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 15 篇 wang xiaofei
  • 14 篇 muhammad adnan k...
  • 13 篇 parizi reza m.
  • 13 篇 tan kay chen
  • 13 篇 materwala huned
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 niyato dusit
  • 10 篇 qi lianyong
  • 10 篇 mccartney robert
  • 10 篇 leung victor c. ...

语言

  • 1,900 篇 英文
  • 137 篇 其他
  • 11 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
2048 条 记 录,以下是1611-1620 订阅
排序:
AI@NICTA
AI@NICTA
收藏 引用
作者: Barnes, Nick Baumgartner, Peter Caetano, Tiberio Durrant-Whyte, Hugh Klein, Gerwin Sanderson, Penelope Sattar, Abdul Stuckey, Peter Thiebaux, Sylvie Van Hentenryck, Pascal Walsh, Toby NICTA Australia Software Systems Research Group NICTA Australia Machine Learning Research Group NICTA Australia Trustworthy Systems Project NICTA Australia University of Queensland Australia Institute for Integrated and Intelligent Systems Griffith University Australia Department of Computing and Information Systems University of Melbourne Australia School of Computer Science Australian National University Australia Melbourne School of Engineering Australia
National Information and Communications Technology Australia (NICTA) is the largest ICT research center in Australia, having been established 10 years ago in 2002. It has five laboratories in four Australian capital c... 详细信息
来源: 评论
Bias analyses of spontaneous facial expression database
Bias analyses of spontaneous facial expression database
收藏 引用
International Conference on Pattern Recognition
作者: Zhaoyu Wang Shangfei Wang Yachen Zhu Qiang Ji Key Laboratory of Computing and Communicating Software of Anhui Province School of Computer Science and Technology University of Science and Technology of China Hefei Anhui China Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute Troy NY USA
In this paper, cross-corpora evaluations are used to analyze the bias of spontaneous facial expression databases. Local binary pattern, Gabor, eigenface and fisherface features are extracted and applied to the four sp... 详细信息
来源: 评论
Detecting Approximate Periodic Patterns  1st
Detecting Approximate Periodic Patterns
收藏 引用
1st Mediterranean Conference on Algorithms, MedAlg 2012
作者: Amir, Amihood Apostolico, Alberto Eisenberg, Estrella Landau, Gad M. Levy, Avivit Lewenstein, Noa Department of Computer Science Bar-Ilan University Ramat-Gan52900 Israel Department of Computer Science Johns Hopkins University BaltimoreMD21218 United States College of Computing Georgia Institute of Technology 801 Atlantic Drive AtlantaGA30318 United States Dipartimento di Ingegneria dell’ Informazione Università diPadova Via Gradenigo 6/A Padova35131 Italy Department of Computer Science University of Haifa Mount Carmel Haifa31905 Israel Department of Computer Science and Engineering Polytechnic Institute of New York University 6 Metrotech Center BrooklynNY11201 United States Department of Software Engineering Shenkar College 12 Anna Frank Ramat-Gan Israel CRI Haifa University Mount Carmel Haifa31905 Israel Netanya College Netanya Israel
Given ɛ ∈ [0, 1), the ɛ-Relative Error Periodic Pattern Problem (REPP) is the following: INPUT: An n-long sequence S of numbers si ∈ N in increasing order. OUTPUT: The longest ɛ-relative error periodic pattern, i.e.... 详细信息
来源: 评论
Asymptotic throughput for large-scale wireless networks with general node density
收藏 引用
Wireless Networks 2012年 第5期19卷 559-575页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Yunhao Liu Department of Computer Science Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China The Tsinghua National Laboratory for Information Science and Technology (TNLIST) Department of Computer Science and Engineering Tongji University Shanghai China The Department of Computer Science Illinois Institute of Technology Chicago USA The TNLIST and School of Software Tsinghua University Beijing China CSE The Hong Kong University of Science and Technology Kowloon Hong Kong
We study the asymptotic throughput for a large-scale wireless ad hoc network consisting of n nodes under the generalized physical model. We directly compute the throughput of multicast sessions to unify the unicast an...
来源: 评论
Function Substitution: Towards Constraint Solving in software Testing
Function Substitution: Towards Constraint Solving in Softwar...
收藏 引用
International Conference on Quality software
作者: Xin Feng Simon Marr Tony O'Callaghan Zhi Quan Zhou Jacques Carette Division of Science and Technology BNU-HKBU United International College Zhuhai China Marine Robotics Research Centre University of Limerick Limerick Ireland Interaction Design Centre University of Limerick Limerick Ireland School of Computer Science and Software Engineering University of Wollongong Wollongong Australia Department of Computing and Software McMaster University Hamilton Canada
Constraint solving is a fundamental tenet of most test case generation strategies. However, conventional constraint solving methods were not designed in consideration of that aspect of test case generation. It has led... 详细信息
来源: 评论
Locating malicious nodes for data aggregation in wireless networks
Locating malicious nodes for data aggregation in wireless ne...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Xiaohua Xu Qian Wang Jiannong Cao Peng-Jun Wan Kui Ren Yuanfang Chen Department of Computer Science Illinois Institute of Technology Chicago IL USA Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago IL USA Department of Computing Hong Kong Polytechnic University Hong Kong China School of Software Dalian University of Technology China
Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable security defect. Some malicious nodes ma... 详细信息
来源: 评论
Model-driven tenant development for PaaS-based SaaS
Model-driven tenant development for PaaS-based SaaS
收藏 引用
IEEE International Conference on Cloud computing Technology and science (CloudCom)
作者: Wei-Tek Tsai Wu Li Babak Esmaeili Wenjun Wu Department of Computer Science and Technology INLIST Tsinghua University Beijing China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ USA State Key Laboratory of Software Development Environment Beihang University Beijing China
This paper proposes key SaaS (software-as-a-Service) design strategies for those SaaS systems that run on top of a commercial PaaS (Platform-as-a-Service) system such as GAE (Google App Engine)[1]. Specifically, this ... 详细信息
来源: 评论
Digital art: Evaluation, appreciation, critique (invited SIG)
Digital art: Evaluation, appreciation, critique (invited SIG...
收藏 引用
30th ACM Conference on Human Factors in computing Systems, CHI 2012
作者: England, David Fantauzzacoffin, Jill Bryan-Kinns, Nick Latulipe, Celine Candy, Linda Sheridan, Jennifer School of Computing and Maths Liverpool John Moores University Liverpool United Kingdom Department of Digital Media Georgia Institute of Technology Atlanta GA United States School of Electronic Engineering and Computer Science Queen Mary University of London London. E1 4N United Kingdom Department of Software and Information Systems University of North Carolina at Charlotte Charlotte NC United States Creativity and Cognition Studios University of Technology Sydney NSW Australia BigDog Interactive Ltd. London United Kingdom
This SIG examines the vexed question of evaluation of Digital Art and how lessons on evaluation can be exchanged between the arts and mainstream HCI. We start by looking at critiques of standard approaches to evaluati... 详细信息
来源: 评论
Productive information system oriented trust chain scheme
收藏 引用
Telkomnika 2012年 第5期10卷 1093-1100页
作者: Tian, Li-Ye Shen, Chang-Xiang Department of Electronic and Information Engineering Naval Aeronautical and Astronautical University China Beijing Key Laboratory of Trusted Computing College of Computer Science and Technology Beijing University of Technology China State Key Laboratory of Information Security Chinese Academy of Sciences Institute of Software China
Productive information system has high-level security requirements, but Trusted computing Group's solution of trust chain isn't competent. After analysis and comparison of two different trust transfer ways, a ... 详细信息
来源: 评论
Brain Computer Interface by use of Electro-encephalograms from Right Frontal Area
Brain Computer Interface by use of Electro-encephalograms fr...
收藏 引用
International Conference on Soft computing and Intelligent Systems
作者: Takahiro Yamanoi Toshimasa Yamazaki Michio Sugeno Hisashi Toyoshima Shin-ichi Ohnishi Elie Sanchez Division of Life Science and Technology Hokkai-Gakuen University Department of Bioscience and Bioinformatics Kyushu Institute of Technology European Center for Soft Computing Edificio Cientifico Tecnologico Japan Technical Software Division of Electronics and Information Engineering Hokkai-Gakuen University MIF Faculty of Medicine The University of Mediterranean
In order to develop a brain computer interface (BCI), some of the present authors have investigated the brain activity during human recognition of characters and symbols representing directional meaning. They have rec... 详细信息
来源: 评论