咨询与建议

限定检索结果

文献类型

  • 883 篇 期刊文献
  • 841 篇 会议
  • 11 册 图书

馆藏范围

  • 1,735 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,171 篇 工学
    • 853 篇 计算机科学与技术...
    • 691 篇 软件工程
    • 199 篇 信息与通信工程
    • 145 篇 控制科学与工程
    • 138 篇 生物工程
    • 125 篇 电气工程
    • 108 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 97 篇 电子科学与技术(可...
    • 72 篇 机械工程
    • 69 篇 化学工程与技术
    • 61 篇 材料科学与工程(可...
    • 51 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 40 篇 仪器科学与技术
    • 37 篇 建筑学
    • 36 篇 交通运输工程
  • 623 篇 理学
    • 328 篇 数学
    • 187 篇 物理学
    • 158 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 68 篇 化学
    • 56 篇 系统科学
  • 306 篇 管理学
    • 195 篇 管理科学与工程(可...
    • 121 篇 图书情报与档案管...
    • 101 篇 工商管理
  • 119 篇 医学
    • 103 篇 临床医学
    • 82 篇 基础医学(可授医学...
    • 50 篇 公共卫生与预防医...
    • 43 篇 药学(可授医学、理...
  • 51 篇 法学
  • 31 篇 经济学
  • 25 篇 教育学
  • 19 篇 农学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 文学

主题

  • 77 篇 computer science
  • 67 篇 software enginee...
  • 43 篇 deep learning
  • 35 篇 semantics
  • 29 篇 machine learning
  • 27 篇 feature extracti...
  • 25 篇 internet of thin...
  • 25 篇 accuracy
  • 23 篇 computational mo...
  • 20 篇 application soft...
  • 20 篇 software testing
  • 20 篇 training
  • 19 篇 software systems
  • 19 篇 quality of servi...
  • 19 篇 optimization
  • 18 篇 programming
  • 18 篇 security
  • 18 篇 clustering algor...
  • 18 篇 software
  • 18 篇 federated learni...

机构

  • 33 篇 renewable and su...
  • 27 篇 college of compu...
  • 26 篇 school of comput...
  • 26 篇 department of co...
  • 18 篇 national enginee...
  • 18 篇 center for soft ...
  • 17 篇 department of ph...
  • 17 篇 department of co...
  • 17 篇 national enginee...
  • 14 篇 school of comput...
  • 13 篇 renewable and su...
  • 13 篇 university of ch...
  • 13 篇 state key labora...
  • 12 篇 department of co...
  • 12 篇 collaborative in...
  • 12 篇 shanghai key lab...
  • 11 篇 school of softwa...
  • 11 篇 department of co...
  • 11 篇 school of inform...
  • 10 篇 applied science ...

作者

  • 35 篇 smalyukh ivan i.
  • 23 篇 ismail leila
  • 17 篇 du bo
  • 16 篇 ivan i. smalyukh
  • 12 篇 zhao hai
  • 12 篇 li zuchao
  • 12 篇 shen linlin
  • 12 篇 materwala huned
  • 11 篇 das ashok kumar
  • 11 篇 mahmood khalid
  • 11 篇 xu xiaolong
  • 10 篇 heidari arash
  • 10 篇 ashish ghosh
  • 10 篇 susmita ghosh
  • 10 篇 leung victor c.m...
  • 9 篇 wang yasha
  • 9 篇 shamshad salman
  • 9 篇 leila ismail
  • 9 篇 yao yao
  • 8 篇 seifedine kadry

语言

  • 1,515 篇 英文
  • 206 篇 其他
  • 14 篇 中文
  • 1 篇 日文
检索条件"机构=Department of Software Engineering and Computer Science Soft Center"
1735 条 记 录,以下是1451-1460 订阅
排序:
ITIS: Intelligent Traffic Information Service in ShanghaiGrid
ITIS: Intelligent Traffic Information Service in ShanghaiGri...
收藏 引用
ChinaGrid Annual Conference (ChinaGrid)
作者: Xu Li Junwei Wu Xinhua Lin Ying Li Minglu Li Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China Computer Software Technology Shanghai Development Center China
Intelligent traffic information service (ITIS) is a typically grid application in ShanghaiGrid to achieve effective traffic management. Several issues and challenges needed to be explored in ITIS, such as resource sha... 详细信息
来源: 评论
Development of autonomous flight control system for small size unmanned helicopter sky-explorer
收藏 引用
Hangkong Xuebao/Acta Aeronautica et Astronautica Sinica 2008年 第SUPPL.期29卷 170-177页
作者: Wang, Geng Sheng, Huanye Lu, Tiansheng Wang, Dong Hu, Fei Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai 200240 China Engineering Training Center Shanghai Jiaotong University Shanghai 200240 China School of Software Shanghai Jiaotong University Shanghai 200240 China
An autonomous flight control system for small size unmanned helicopter Sky-explorer based on dynamics model at Shanghai Jiaotong University is presented. At first, a mathematical model for small size helicopter based ... 详细信息
来源: 评论
Panel discussion: What makes good research in modeling and simulation: Sustaining the growth and vitality of the m&s discipline
Panel discussion: What makes good research in modeling and s...
收藏 引用
2008 Winter Simulation Conference, WSC 2008
作者: Yilmaz, Levent Davis, Paul Fishwick, Paul A. Xiaolin, Hu. Miller, John A. Hybinette, Maria Ören, Tuncer I. Reynolds, Paul Sarjoughian, Hessam Tolk, Andreas Computer Science and Software Engineering 3116 Shelby Center Auburn University Auburn AL 36849 United States RAND 1776 Main Street Santa Monica CA 90407 United States Computer and Information Science and Engineering 332 Bldg. CSE University of Florida Gainesville FL 32611 United States Department of Computer Science 34 Peachtree Street United States Georgia State University Atlanta GA 30302 United States Department of Computer Science 415 Boyd Graduate Studies Research Center University of Georgia Athens GA 30602 United States School of Information Technology and Engineering 3116 Shelby Center University of Ottawa Ottawa ON K1N 6N5 Canada Department of Computer Science 1214 Olsson Hall University of Virginia Charlottesville VA 22904 United States Computer Science and Engineering Arizona State University Tempe AZ 85281 United States Engineering Management and Systems Engineering 241 Kaufman Hall Old Dominion University Norfolk VA 23529 United States
The aim of this panel session is to promote discussion on emergent challenges and the need for advancements in the theory, methodology, applications, education in M&S. The changing landscape in science and enginee... 详细信息
来源: 评论
Fully Secure Identity Based Proxy Re-Encryption Schemes in the Standard Model
Fully Secure Identity Based Proxy Re-Encryption Schemes in t...
收藏 引用
International Conference on computer science and Information Technology (CSIT)
作者: Xiaoming Hu Xu Chen Shangteng Huang Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China Shanghai Software Development Center Dresser Machine Limited Shanghai China
A proxy re-encryption scheme allows the proxy to transform ciphertext computed under one public key into the different ciphertext that can be decrypted by using another public key. Recently, many identity-based proxy ... 详细信息
来源: 评论
Design of Adaptive Model Predictive Controller for Wireless Sensor Networks
Design of Adaptive Model Predictive Controller for Wireless ...
收藏 引用
International Symposiums on Information Processing (ISIP)
作者: Chen Yi Chen Li Li Rong Gao Ge National Engineering Research Center of Multimedia Software Wuhan University of China China Department of Computer science Central China Normal University Wuhan China
In wireless sensor networks, the network state beacon exchange rate is vital to determine the quality of service (QoS) performance of network state. It is important to schedule this parameter adaptively due to the dyn... 详细信息
来源: 评论
Metadata Management Based on Set-Top Box in Digital Broadcasting Environments
Metadata Management Based on Set-Top Box in Digital Broadcas...
收藏 引用
International Conference on computer science and software engineering
作者: Jong-Hyun Park Soon-Jong Kang Ji-Hoon Kang Software Research Center Chungnam National University Daejeon South Korea Department of Computer Science and Engineering Chungnam National University Daejeon South Korea
Digital broadcasting as new generation broadcasting offers a new opportunity for interactive services. For variety services of broadcasting, the broadcasting metadata becomes increasingly important and one of the meta... 详细信息
来源: 评论
Aggregation Pheromone Density Based Classification
Aggregation Pheromone Density Based Classification
收藏 引用
International Conference on Information Technology (ICIT)
作者: Anindya Halder Susmita Ghosh Ashish Ghosh Center for Soft Computing Research Indian Statistical Institute Kolkata India Department of Computer Science & Engineering Jadavpur University Kolkata India Machine Intelligence Unit andCenter for Soft Computing Research Indian Statistical Institute Kolkata India
Social insects like ants, bees deposit pheromone (a type of chemical) in order to communicate between the members of their community. Pheromone, that causes clumping behavior in a species and brings individuals into a... 详细信息
来源: 评论
CESVM:centered Hyperellipsoidal Support Vector Machine Based Anomaly Detection
CESVM:Centered Hyperellipsoidal Support Vector Machine Based...
收藏 引用
2008 IEEE International Conference on Communications(ICC 2008)
作者: Sutharshan Rajasegarar Christopher Leckie Marimuthu Palaniswami ARC Special Research Center for Ultra-Broadband Information Networks (CUBIN) Department of Electrical and Electronic Engineering NICTA Victoria Research Laboratory Department of Computer Science and Software Engineering The University of MelbourneAustralia
A challenge in using machine learning for tasks such as network intrusion detection and fault diagnosis is the difficulty in obtaining clean data for training in order to model the normal behavior of the *** anomaly d... 详细信息
来源: 评论
Automatic Digest Generation by Extracting Important Scenes from the Content of Presentations
Automatic Digest Generation by Extracting Important Scenes f...
收藏 引用
International Workshop on Database and Expert Systems Applications
作者: Hieu Hanh Le Thitiporn Lertrusdachakul Tetsutaro Watanabe Haruo Yokota Department of Computer Science Tokyo Institute of Technology Japan Department of Computer Science Graduate School of Information and Engineering Tokyo Institute of Technology Japan Application Lab Ricoh Company Ltd Application Laboratory Software R&D Group Ricoh Company Limited Japan Department of Computer Science Tokyo Institute of Technology Global Scientific Information and Computing Center Tokyo Institute of Technology
Recently, combining a video recording of a presentation along with the digital slides used in it has become popular in e-learning and presentation of archives. For users of the archives, it is useful to preview a dige... 详细信息
来源: 评论
An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks
An Analytical Model for Broadcasting by Self Pruning in Wire...
收藏 引用
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC
作者: Yu Huang Bo Liu Xianping Tao Jiannong Cao Beihong Jin Nanjing University Nanjing Jiangsu CN Department of Computer Science and Technology Nanjing University Nanjing China Internet and Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Hong Kong China Technology Center of Software Engineering Institute of Software of Chinese Academy of Sciences Beijing China
The broadcast operation is a fundamental service in wireless ad hoc networks. The naive flooding mechanism may trigger a great number of data retransmissions at the same time and congest the networks, resulting in the... 详细信息
来源: 评论