咨询与建议

限定检索结果

文献类型

  • 1,602 篇 会议
  • 1,053 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 2,656 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,433 篇 工学
    • 954 篇 计算机科学与技术...
    • 789 篇 软件工程
    • 283 篇 信息与通信工程
    • 221 篇 电气工程
    • 194 篇 电子科学与技术(可...
    • 186 篇 生物工程
    • 156 篇 生物医学工程(可授...
    • 148 篇 控制科学与工程
    • 129 篇 光学工程
    • 122 篇 化学工程与技术
    • 120 篇 材料科学与工程(可...
    • 72 篇 仪器科学与技术
    • 68 篇 机械工程
    • 65 篇 动力工程及工程热...
    • 58 篇 安全科学与工程
  • 994 篇 理学
    • 429 篇 物理学
    • 323 篇 数学
    • 261 篇 生物学
    • 140 篇 化学
    • 133 篇 统计学(可授理学、...
    • 65 篇 系统科学
  • 445 篇 管理学
    • 270 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 189 篇 工商管理
  • 163 篇 医学
    • 133 篇 临床医学
    • 124 篇 基础医学(可授医学...
    • 63 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 87 篇 法学
    • 78 篇 社会学
  • 67 篇 农学
  • 63 篇 经济学
    • 62 篇 应用经济学
  • 49 篇 教育学
  • 10 篇 文学
  • 2 篇 哲学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 64 篇 deep learning
  • 58 篇 training
  • 55 篇 machine learning
  • 51 篇 accuracy
  • 45 篇 computational mo...
  • 42 篇 fuzzy logic
  • 40 篇 computer science
  • 40 篇 sentiment analys...
  • 37 篇 predictive model...
  • 36 篇 support vector m...
  • 36 篇 data models
  • 30 篇 feature extracti...
  • 29 篇 information tech...
  • 27 篇 social networkin...
  • 25 篇 internet of thin...
  • 25 篇 data mining
  • 24 篇 optimization
  • 24 篇 analytical model...
  • 24 篇 students
  • 23 篇 convolutional ne...

机构

  • 74 篇 computer science...
  • 66 篇 bioinformatics a...
  • 58 篇 computer science...
  • 55 篇 computer science...
  • 49 篇 bioinformatics a...
  • 48 篇 computer science...
  • 47 篇 computer science...
  • 35 篇 computer science...
  • 33 篇 school of comput...
  • 33 篇 computer science...
  • 33 篇 bioinformatics a...
  • 31 篇 photonics initia...
  • 31 篇 computer science...
  • 30 篇 department of el...
  • 29 篇 computer science...
  • 28 篇 photonics initia...
  • 28 篇 computer science...
  • 27 篇 department of ph...
  • 26 篇 computer science...
  • 26 篇 applied physics ...

作者

  • 120 篇 bens pardamean
  • 108 篇 pardamean bens
  • 81 篇 gaol ford lumban
  • 64 篇 heryadi yaya
  • 62 篇 warnars harco le...
  • 55 篇 suharjito
  • 49 篇 meyliana
  • 48 篇 lukas
  • 47 篇 yaya heryadi
  • 41 篇 andrea alù
  • 36 篇 girsang abba sug...
  • 36 篇 ford lumban gaol
  • 35 篇 prabowo harjanto
  • 35 篇 alù andrea
  • 34 篇 abba suganda gir...
  • 34 篇 utama ditdit nug...
  • 32 篇 yulyani arifin
  • 32 篇 ditdit nugeraha ...
  • 30 篇 kono junichiro
  • 30 篇 harco leslie hen...

语言

  • 2,256 篇 英文
  • 381 篇 其他
  • 12 篇 中文
  • 5 篇 斯洛文尼亚文
  • 4 篇 日文
  • 2 篇 西班牙文
  • 1 篇 捷克文
  • 1 篇 德文
检索条件"机构=Department of Graduate Program in Computer Science"
2656 条 记 录,以下是2421-2430 订阅
排序:
Integral federated identity management for cloud computing
Integral federated identity management for cloud computing
收藏 引用
2012 5th International Conference on New Technologies, Mobility and Security, NTMS 2012
作者: Stihler, Maicon Santin, Altair Olivo Marcon Jr., Arlindo L. Fraga, Joni Da Silva Graduate Program in Computer Science Pontifical Catholic University of Paraná Curitiba Brazil Department of Systems Automation Federal University of Santa Catarina Florianópolis Brazil
Cloud computing environments may offer different levels of abstraction to its users. Federated identity management, though, does not leverage these abstractions;each user must set up her identity management solution. ... 详细信息
来源: 评论
Feasibility study of using social networks platform for learning support: An example of Facebook
Feasibility study of using social networks platform for lear...
收藏 引用
20th International Conference on computers in Education, ICCE 2012
作者: Chan, Chien-Lung Fu, Wen-Erh Lai, K. Robert Tseng, Shu-Fen Department of Information Management Yuan Ze University Taiwan Department of Computer Science and Engineering Yuan Ze University Taiwan Graduate Program in Social Informatics Yuan Ze University Taiwan
In this study, we explored the students' computer-supported collaborative learning behavior based on the Facebook platform. Sixty two senior college students major in Information Management took Decision Support S... 详细信息
来源: 评论
Finding optimal random boolean networks for reservoir computing
Finding optimal random boolean networks for reservoir comput...
收藏 引用
13th International Conference on the Simulation and Synthesis of Living Systems: Artificial Life 13, ALIFE 2012
作者: Snyder, David Goudarzi, Alireza Teuscher, Christof Department of Computer Science Portland State University Portland OR 97201 United States Systems Science Graduate Program Portland State University Portland OR 97201 United States Department of Electrical and Computer Engineering Portland State University Portland OR 97201 United States
Reservoir Computing (RC) is a computational model in which a trained readout layer interprets the dynamics of a component called a reservoir that is excited by external input stimuli. The reservoir is often constructe... 详细信息
来源: 评论
Hybrid clutter canceler with feedback guided predicative filtering on a heterogeneous parallel processing system
Hybrid clutter canceler with feedback guided predicative fil...
收藏 引用
International Waveform Diversity and Design Conference, WDD 2012
作者: Brinkhus, Jeffrey M. Jezak, Joseph A. Berdanier, Charles Levitan, Steven P. Chiarulli, Donald M. Electical and Computer Engineering University of Pittsburgh United States Computer Engineering Graduate Program University of Pittsburgh United States Electrical Engineering Wright State University United States Computer Science Department University of Pittsburgh United States
In this paper we describe a novel clutter cancellation platform based on a two stage approach that combines a feedback guided predictive front-end hybrid clutter canceller with high performance back-end filtering and ... 详细信息
来源: 评论
Accelerated DSP functions on the CBE for the X-Midas Toolkit
Accelerated DSP functions on the CBE for the X-Midas Toolkit
收藏 引用
International Waveform Diversity and Design Conference, WDD 2012
作者: Jezak, Joseph A. Berdanier, Charles Levitan, Steven P. Chiarulli, Donald M. Computer Engineering Graduate Program University of Pittsburgh United States USAF AFRL/RYMDA Wright Patterson Air Force Base United States Department of Electrical and Computer Engineering University of Pittsburgh United States Department of Computer Science University of Pittsburgh United States
We characterize the impact of the Cell Broadband Engine architecture, on commonly used radar DSP algorithms. We use the capabilities of the CBE to accelerate several key computational kernels including Matrix Multipli... 详细信息
来源: 评论
An object-based bayesian framework for top-down visual attention  26
An object-based bayesian framework for top-down visual atten...
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Borji, Ali Sihite, Dicky N. Itti, Laurent Department of Computer Science University of Southern California 3641 Watt Way Los Angeles CA 90089-2520 United States Departments of Computer Science and Psychology Neuroscience Graduate Program University of Southern California Los Angeles CA United States
We introduce a new task-independent framework to model top-down overt visual attention based on graphical models for probabilistic inference and reasoning. We describe a Dynamic Bayesian Network (DBN) that infers prob... 详细信息
来源: 评论
Forces of Orthodontic Closed Coil Springs Measured using Fiber Bragg Gratings
Forces of Orthodontic Closed Coil Springs Measured using Fib...
收藏 引用
Latin America Optics and Photonics Conference, LAOP 2012
作者: Milczewski, Maura Scandelari Dinisio, Felipe Gonçalves Martelli, Cicero Borges, Paulo César Kalinowski, Hypolito José da Cunha, José Carlos Munhoz Federal University of Technology - Paraná Curitiba80230-901 Brazil Graduate Program on Electrical Engineering and Applied Computer Science Canada Department of Mechanical Engineering Brazilian Dentistry Association Paraná Brazil
The aim of this study is to compare forces generated by three different orthodontic closed coil springs supplied by three companies, optical fiber Bragg gratins are used to evaluate the force of closing of springs. &#... 详细信息
来源: 评论
Induction of metallothionein expression during monocyte to melanoma-associated macrophage differentiation
收藏 引用
Frontiers in Biology 2012年 第4期7卷 359-367页
作者: Yingbin GE Rikka AZUMA Bethsebah GEKONGE Alfonso LOPEZ-CORAL Min XIAO Gao ZHANG Xiaowei XU Luis J. MONTANER Zhi WEI Meenhard HERLYN Tao WANG Russel E. KAUFMAN Molecular and Cellular Oncogenesis Program The Wistar Institute Philadelphia PA 19104 USA Department of Physiology Nanjing Medical University Nanjing 210029 China Undergraduate Program University of Pennsylvania Philadelphia PA 19104 USA Tumor Microenvironment and Metastasis Program The Wistar Institute Philadelphia PA 19104 USA Graduate Program The Catholic University of America Washington DC 20064 USA Department of Pathology and Laboratory Medicine University of Pennsylvania Philadelphia PA 19104 USA Department of Computer Science New Jersey Institute of Technology NJ 07102 USA
Tumor-associated macrophages (TAMs) play a critical role in melanoma growth and metastasis. Infiltration of TAMs correlates with the poor prognosis of melanoma. TAMs are differentiated from monocytes in response to ... 详细信息
来源: 评论
Configurable clutter models for radar simulation
Configurable clutter models for radar simulation
收藏 引用
International Waveform Diversity and Design Conference
作者: Joseph A. Jezak Guy Gadola Charles Berdanier Steven P. Levitan Donald M. Chiarulli Computer Engineering Graduate Program University of Pittsburgh Department of Electrical Engineering Wright State University Department of Electrical and Computer Engineering University of Pittsburgh Department of Computer Science University of Pittsburgh
In this paper we describe an extension to the MATLAB Phased Array Toolkit that adds a configurable clutter object to model clutter signals returned along a specified signal path. The clutter model is based on the Simk... 详细信息
来源: 评论
Anomaly based intrusion detection in wireless networks using Bayesian classifier
Anomaly based intrusion detection in wireless networks using...
收藏 引用
International Workshop on Advanced Computational Intelligence (IWACI)
作者: Myungsook Klassen Ning Yang Computer Science Department California Lutheran University Thousand Oaks CA USA Computer Science Graduate Program California Lutheran University Thousand Oaks CA USA
Ad hoc wireless network with black hole attacks, denial of service attacks and malicious attacks are investigated to study if we can detect harmful activities in a timely manner. A popular simulator NS2 was used to cr... 详细信息
来源: 评论