咨询与建议

限定检索结果

文献类型

  • 2,599 篇 期刊文献
  • 1,955 篇 会议
  • 45 册 图书

馆藏范围

  • 4,599 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,011 篇 工学
    • 2,021 篇 计算机科学与技术...
    • 1,647 篇 软件工程
    • 824 篇 信息与通信工程
    • 489 篇 电气工程
    • 437 篇 电子科学与技术(可...
    • 419 篇 生物工程
    • 404 篇 控制科学与工程
    • 379 篇 光学工程
    • 327 篇 生物医学工程(可授...
    • 162 篇 化学工程与技术
    • 153 篇 机械工程
    • 143 篇 动力工程及工程热...
    • 137 篇 仪器科学与技术
    • 135 篇 材料科学与工程(可...
    • 104 篇 交通运输工程
    • 95 篇 安全科学与工程
  • 1,920 篇 理学
    • 899 篇 数学
    • 701 篇 物理学
    • 486 篇 生物学
    • 363 篇 统计学(可授理学、...
    • 199 篇 系统科学
    • 187 篇 化学
  • 729 篇 管理学
    • 479 篇 管理科学与工程(可...
    • 273 篇 图书情报与档案管...
    • 245 篇 工商管理
  • 326 篇 医学
    • 269 篇 临床医学
    • 242 篇 基础医学(可授医学...
    • 143 篇 公共卫生与预防医...
    • 132 篇 药学(可授医学、理...
  • 124 篇 法学
    • 108 篇 社会学
  • 72 篇 经济学
  • 64 篇 农学
  • 49 篇 教育学
  • 11 篇 文学
  • 9 篇 军事学
  • 2 篇 艺术学

主题

  • 129 篇 deep learning
  • 125 篇 machine learning
  • 120 篇 accuracy
  • 96 篇 internet of thin...
  • 96 篇 real-time system...
  • 91 篇 training
  • 86 篇 feature extracti...
  • 85 篇 computational mo...
  • 76 篇 artificial intel...
  • 75 篇 optimization
  • 62 篇 predictive model...
  • 61 篇 convolutional ne...
  • 59 篇 data models
  • 55 篇 reinforcement le...
  • 51 篇 semantics
  • 50 篇 support vector m...
  • 48 篇 federated learni...
  • 45 篇 monitoring
  • 45 篇 security
  • 44 篇 cloud computing

机构

  • 183 篇 department of el...
  • 95 篇 college of compu...
  • 58 篇 the department o...
  • 50 篇 school of scienc...
  • 43 篇 nanyang technolo...
  • 37 篇 shenzhen researc...
  • 34 篇 college of compu...
  • 33 篇 department of ph...
  • 33 篇 faculty of scien...
  • 33 篇 departamento de ...
  • 33 篇 department for p...
  • 33 篇 department of ph...
  • 33 篇 dipartimento di ...
  • 33 篇 yerevan physics ...
  • 32 篇 lehrstuhl für ex...
  • 32 篇 west university ...
  • 32 篇 department of el...
  • 32 篇 graduate school ...
  • 32 篇 institute of phy...
  • 31 篇 department of mo...

作者

  • 140 篇 niyato dusit
  • 102 篇 zhang rui
  • 43 篇 li haizhou
  • 41 篇 zhu lipeng
  • 34 篇 han zhu
  • 32 篇 sun geng
  • 31 篇 chen mingzhe
  • 26 篇 m. klein
  • 25 篇 f. buehrer
  • 25 篇 m. khader
  • 25 篇 a. t. law
  • 25 篇 c. alexa
  • 25 篇 j. d. mansour
  • 25 篇 j. m. izen
  • 25 篇 s. veneziano
  • 25 篇 d. di valentino
  • 25 篇 g. bella
  • 25 篇 j. strandberg
  • 25 篇 d. calvet
  • 25 篇 c. amelung

语言

  • 4,038 篇 英文
  • 543 篇 其他
  • 19 篇 中文
  • 2 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Electrical and Computer Engineering and Institute for Data Science and Computing"
4599 条 记 录,以下是4071-4080 订阅
排序:
FERA 2015 - second Facial Expression Recognition and Analysis challenge
FERA 2015 - second Facial Expression Recognition and Analysi...
收藏 引用
International Conference on Automatic Face and Gesture Recognition
作者: Michel F. Valstar Timur Almaev Jeffrey M. Girard Gary McKeown Marc Mehu Lijun Yin Maja Pantic Jeffrey F. Cohn School of Computer Science University of Nottingham UK Department of Psychology University of Pittsburgh Pittsburgh USA School of Psychology Queen's University Belfast Belfast UK Department of Psychology Webster University Private Vienna Vienna AT Department of Computer Science Binghamton University Binghamton USA Department of Computing Imperial College London London UK Electrical Engineering University of Twente The Netherlands Robotics Institute Carnegie Mellon University Pittsburgh USA
Despite efforts towards evaluation standards in facial expression analysis (e.g. FERA 2011), there is a need for up-to-date standardised evaluation procedures, focusing in particular on current challenges in the field... 详细信息
来源: 评论
Two-Level Stable Matching-Based Selection in MOEA/D
Two-Level Stable Matching-Based Selection in MOEA/D
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Mengyuan Wu Sam Kwong Qingfu Zhang Ke Li Ran Wang Bo Liu Department of Computer Science City University of Hong Kong Hong Kong SAR Department of Computing Glyndwr University Wrexham U.K. Department of Electrical and Computer Engineering Michigan State University East Lansing MI USA Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen China City University of Hong Kong Shenzhen Research Institute Shenzhen China
Stable matching-based selection models the selection process in MOEA/D as a stable marriage problem. By finding a stable matching between the sub problems and solutions, the solutions are assigned to sub problems to b... 详细信息
来源: 评论
Incorporation of Ordinal Optimization into Learning Automata for High Learning Efficiency
Incorporation of Ordinal Optimization into Learning Automata...
收藏 引用
IEEE International Conference on Automation science and engineering
作者: JunQi Zhang Cheng Wang Di Zang MengChu Zhou Department of Computer Science and Technology the Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Department of Electrical and Computer Engineering New Jersey Institute of Technology
Learning automata (LA) represent important leaning mechanisms with applications in automated system design, biological system modeling, computer vision, and transportation. They play the critical roles in modeling a p... 详细信息
来源: 评论
A New Multi-Service Token Bucket-Shaping Scheme Based on 802.11e
A New Multi-Service Token Bucket-Shaping Scheme Based on 802...
收藏 引用
International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)
作者: Yunyi Zhang Shuru Liu Ran Zhang Wei Wei Houbing Song Wei Li Xiumei Fan College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China School of Computer Science and Engineering Xi'an University of technology State Key Laboratory for Strength and Vibration of Mechanical Structures of Xi’ an Jiaotong University Xi'an China Department of Electrical and Computer Engineering West Virginia University Institute of Technology West Virginia USA The Centre for Distributed and High Performance Computing School of Information Technologies The University of Sydney Sydney Australia School of Automation and Information Engineering Xi'an University of Technology Xi'an China
With the development of information technology, the demand for video transmission in wireless networks rapidly increases. The traditional traffic shaping algorithms cannot fully (or adequately) meet the demand for hig... 详细信息
来源: 评论
Sequential and adaptive sampling for matrix completion in network monitoring systems
Sequential and adaptive sampling for matrix completion in ne...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Kun Xie Lele Wang Xin Wang Gaogang Xie Guangxing Zhang Dongliang Xie Jigang Wen College of Computer Science and Electronics Engineering Hunan University Changsha China State Key Lab of Networking & Switching Tech. Beijing Univ. of Posts and Telecomm. China Department of Electrical and Computer Engineering State University of New York at Stony Brook USA Institute of Computing Technology Chinese Academy of Sciences Beijing China DNSLAB China Internet Network Information Center Beijing China
End-to-end network monitoring is essential to ensure transmission quality for Internet applications. However, in large-scale networks, full-mesh measurement of network performance between all transmission pairs is inf... 详细信息
来源: 评论
Effect of source tampering in the security of quantum cryptography
收藏 引用
Physical Review A 2015年 第2期92卷 022304-022304页
作者: Shi-Hai Sun Feihu Xu Mu-Sheng Jiang Xiang-Chun Ma Hoi-Kwong Lo Lin-Mei Liang College of Science National University of Defense Technology Changsha 410073 China Center for Quantum Information and Quantum Control Department of Electrical and Computer Engineering and Department of Physics University of Toronto Toronto Ontario M5S 3G4 Canada Research Laboratory of Electronics Massachusetts Institute of Technology 77 Massachusetts Avenue Cambridge Massachusetts 02139 USA State Key Laboratory of High Performance Computing National University of Defense Technology Changsha 410073 China
The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum key distribution (MDI-QKD), the source becomes the only regio... 详细信息
来源: 评论
Experimental quantum key distribution with source flaws
收藏 引用
Physical Review A 2015年 第3期92卷 032305-032305页
作者: Feihu Xu Kejin Wei Shihan Sajeed Sarah Kaiser Shihai Sun Zhiyuan Tang Li Qian Vadim Makarov Hoi-Kwong Lo Centre for Quantum Information and Quantum Control (CQIQC) Department of Electrical & Computer Engineering and Department of Physics University of Toronto Toronto Ontario M5S 3G4 Canada School of Science and State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing 100876 China Institute for Quantum Computing (IQC) University of Waterloo Waterloo Ontario N2L 3G1 Canada Department of Electrical and Computer Engineering University of Waterloo Waterloo Ontario N2L 3G1 Canada Department of Physics and Astronomy University of Waterloo Waterloo Ontario N2L 3G1 Canada College of Science National University of Defense Technology Changsha 410073 China
Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed t... 详细信息
来源: 评论
Current-aware scheduling for flash storage devices  20
Current-aware scheduling for flash storage devices
收藏 引用
20th IEEE International Conference on Embedded and Real-Time computing Systems and Applications, RTCSA 2014
作者: Huang, Tzu-Jung Ho, Chien-Chung Huang, Po-Chun Chang, Yuan-Hao Chang, Che-Wei Kuo, Tei-Wei Department of Computer Science and Information Engineering National Taiwan University Taipei106 Taiwan Department of Computer Science Engineering and Innovation Center for Big Data and Digital Convergence Yuan Ze University Taoyuan320 Taiwan Institute of Information Science Academia Sinica Taipei115 Taiwan Department of Computer Science and Information Engineering School of Electrical and Computer Engineering Chang Gung University Taoyuan320 Taiwan
As NAND flash memory has become a major choice of storage media in diversified computing environments, the performance issue of flash memory has been extensively addressed in many excellent designs. Among them, an eff... 详细信息
来源: 评论
An efficient age-invariant face recognition
An efficient age-invariant face recognition
收藏 引用
International Conference on Software Intelligence Technologies and Applications and International Conference on Frontiers of Internet of Things, 2014
作者: Tandon, Ankit Gupta, Phalguni Department of Computer Science and Engineering Indian Institute of Technology Kanpur Kanpur208016 India Aditya Nigam School of Computing and Electrical Engineering Indian Institute of Technology Mandi Mandi H.P175005 India
This paper proposes an efficient face recognition system which is invariant to aging. It makes use of the periocular region of an individual. Local Binary Patterns are used to extract these local features from the enh... 详细信息
来源: 评论
Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch
收藏 引用
Physical Review A 2015年 第6期91卷 062301-062301页
作者: Shihan Sajeed Poompong Chaiwongkhot Jean-Philippe Bourgoin Thomas Jennewein Norbert Lütkenhaus Vadim Makarov Institute for Quantum Computing University of Waterloo Waterloo Ontario N2L 3G1 Canada Department of Electrical and Computer Engineering University of Waterloo Waterloo Ontario N2L 3G1 Canada Department of Physics and Astronomy University of Waterloo Waterloo Ontario N2L 3G1 Canada Quantum Information Science Program Canadian Institute for Advanced Research Toronto Ontario M5G 1Z8 Canada
In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control the spatial m... 详细信息
来源: 评论