咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 85 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 238 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 161 篇 工学
    • 122 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 24 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 电气工程
    • 11 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 化学工程与技术
    • 7 篇 机械工程
    • 6 篇 土木工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 网络空间安全
    • 4 篇 动力工程及工程热...
  • 107 篇 理学
    • 71 篇 数学
    • 19 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 16 篇 生物学
    • 10 篇 物理学
    • 6 篇 化学
  • 37 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 17 篇 工商管理
    • 11 篇 图书情报与档案管...
  • 13 篇 医学
    • 11 篇 临床医学
    • 10 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
    • 5 篇 公共卫生与预防医...
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 教育学
    • 5 篇 教育学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 8 篇 artificial intel...
  • 5 篇 support vector m...
  • 4 篇 computer science
  • 4 篇 reliability
  • 4 篇 neural networks
  • 4 篇 monitoring
  • 4 篇 decision making
  • 4 篇 dipper throated ...
  • 4 篇 artificial neura...
  • 3 篇 grey wolf optimi...
  • 3 篇 computer archite...
  • 3 篇 computational in...
  • 3 篇 optimization
  • 3 篇 decision trees
  • 3 篇 middleware
  • 3 篇 functional progr...
  • 2 篇 covid-19
  • 2 篇 fuzzy logic
  • 2 篇 intrusion detect...
  • 2 篇 software systems

机构

  • 16 篇 department of sy...
  • 10 篇 department of ap...
  • 7 篇 department of ma...
  • 6 篇 programming meth...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 computer techniq...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 department of ap...
  • 3 篇 department of ap...
  • 3 篇 zuse institute b...
  • 3 篇 university of tw...
  • 3 篇 rwth aachen univ...
  • 3 篇 programming meth...

作者

  • 9 篇 maiti manoranjan
  • 8 篇 mostafa abotaleb
  • 8 篇 pal madhumangal
  • 8 篇 abdelhameed ibra...
  • 7 篇 abotaleb mostafa
  • 5 篇 pal anita
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 de meuter wolfga...
  • 5 篇 doaa sami khafag...
  • 4 篇 choe km
  • 4 篇 bergstra j.a.
  • 4 篇 hayek ali
  • 4 篇 dybjer peter
  • 4 篇 van cutsem tom
  • 4 篇 anita pal
  • 4 篇 el-kenawy el-say...
  • 4 篇 d'hondt theo
  • 4 篇 madhumangal pal
  • 3 篇 sarkar biswajit

语言

  • 232 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Technology and Computer Programming"
238 条 记 录,以下是1-10 订阅
排序:
A fault-tolerant scheduling strategy through proactive and clustering techniques for scientific workflows in cloud computing
收藏 引用
Soft Computing 2025年 第2期29卷 755-781页
作者: Farhood, Suha Mubdir Khorsand, Reihaneh Hussein, Nashwan Jasim Ramezanpour, Mohammadreza Branch Islamic Azad University Isfahan Iran Department of Programming Collage of Information Technology University of Babylon Hillah Iraq Department of Computer Engineering Mobarakeh Branch Islamic Azad University Mobarakeh Isfahan Iran
Cloud computing offers solutions for various scientific and business applications. Large-scale scientific applications, which are organized as scientific workflows, are carried out using cloud computing. However, the ... 详细信息
来源: 评论
Educational Research Trends of the Use of Gaze Learning Data Through Topic Modeling and Scientometric Analysis  1st
Educational Research Trends of the Use of Gaze Learning D...
收藏 引用
1st International workshop on AI for Research, AI4Research 2024 and 4th International workshop on Democracy and AI, DemocrAI 2024, held in conjunction with 33rd International Joint Conference on Artificial Intelligence, IJCAI 2024
作者: Lee, Jungmin Shin, Huigon Yoo, YoungJoon Choi, Jongwon Kim, Mi Song Department of Advanced Imaging GSAIM Chung-Ang University Seoul Korea Republic of Computer Programming and Analysis School of Information Technology Fanshawe College London Canada Department of Artificial Intelligence Chung-Ang University Seoul Korea Republic of Curriculum Studies Western University London Canada
Multimodal learning analytics have become increasingly important in enabling a deeper understanding of teaching and learning in educational research. However, in comparison to other multimodal learning data, there is ... 详细信息
来源: 评论
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext
收藏 引用
Frontiers of computer Science 2025年 第2期19卷 133-135页
作者: Lejun ZHANG Bo ZHANG Ran GUO Zhujun WANG Guopeng WANG Jing QIU Shen SU Yuan LIU Guangxia XU Zhihong TIAN Sergey GATAULLIN Cyberspace Institute Advanced Technology Guangzhou UniversityGuangzhou 510006China Research and Development Center for E-Learning Ministry of EducationBeijing 100039China College of Information Engineering Yangzhou UniversityYangzhou 225009China School Math and Computer Science Quanzhou Normal UniversityQuanzhou 362000China Pazhou Lab Guangzhou 510330China School of Physics and Materials Science Guangzhou UniversityGuangzhou 510006China Central Economic and Mathematics Institute Russian Academy of SciencesMoscow 117418Russia Industrial Programming Department MIREA-Russian Technological UniversityMoscow 119454Russia
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods ... 详细信息
来源: 评论
EXCEPTION HANDLING - EXPECTING THE UNEXPECTED
收藏 引用
computer LANGUAGES 1994年 第2期20卷 69-87页
作者: DREW, SJ GOUGH, KJ Programming Languages and Systems Group Computer Science Department Queensland University of Technology Queensland Australia 4000
Since the mid-1970s, and with the development of each new programming paradigm there has been an increasing interest in exceptions and the benefits of exception handling. With the move towards programming for ever mor... 详细信息
来源: 评论
Fail-safety techniques and their extensions to concurrent systems
收藏 引用
computer LANGUAGES 1996年 第4期22卷 193-203页
作者: Drew, SJ Programming Languages and Systems Group Computer Science Department Queensland University of Technology Sydney Queensland Australia 4000
Fail-safety is a system attribute which ensures that a program either completes its execution satisfying its post-conditions in the normal manner or signals its failure to do so to its operating environment. Such an a... 详细信息
来源: 评论
PRECEDENCES IN SPECIFICATIONS AND IMPLEMENTATIONS OF programming-LANGUAGES
收藏 引用
THEORETICAL computer SCIENCE 1995年 第1期142卷 3-26页
作者: AASA, A Department of Computer Sciences Programming Methodology Group Chalmers University of Technology S-412 96 G?teborg Sweden
Although precedences are often used to resolve ambiguities in programming language descriptions, there has been no parser-independent definition of languages which are generated by grammars with precedence rules. This...
来源: 评论
Prediction and graph visualization of cyber attacks using graph attention networks
收藏 引用
computers & Security 2025年 157卷
作者: Mucahit Soylu Resul Das Inonu University Department of Organized Industrial Zone Vocational School Computer Programming Malatya Turkiye Firat University Faculty of Technology Department of Software Engineering 23119 Elazig Turkiye
This study proposes a hybrid approach for visualizing cyberattacks by combining the deep learning-based GAT model with JavaScript-based graph visualization tools. The model processes large, heterogeneous data from the...
来源: 评论
Deleting Outliers in Robust Regression with Mixed Integer programming
收藏 引用
Acta Mathematicae Applicatae Sinica 2005年 第2期21卷 323-334页
作者: Georgios Zioutas Antonios Avramidis Division of Computational Methods and Computer Programming General Department Faculty of Technology Aristotle University of Thessaloniki 541 24 Thessaloniki GreeceDivision of Computational Methods and Computer Programming General Department Faculty of Technology Aristotle University of Thessaloniki 541 24 Thessaloniki Greece
In robust regression we often have to decide how many are the unusualobservations, which should be removed from the sample in order to obtain better fitting for the restof the observations. Generally, we use the basic... 详细信息
来源: 评论
FAMILIES OF SOLUTIONS OF NONLINEAR PSEUDO-BOOLEAN RELATIONS
收藏 引用
INTERNATIONAL JOURNAL OF computer MATHEMATICS 1994年 第3-4期54卷 175-184页
作者: SYNEFAKI, AI [a]Faculty of Technology-General Department University of Thessaloniki Faculty of Technology Div. Computational Methods and Computer Programming Thessaloniki 540 06 Greece Fax: [b]University of Macedonia Thessaloniki
In this paper we develop an algorithm in order to solve pseudo-Boolean nonlinear equations and inequalities. The solutions to these problems are given in the form of set families. The objective of the proposed algorit... 详细信息
来源: 评论
AmbientOriented programming in AmbientTalk: Combining mobile hardware with simplicity and expressiveness
AmbientOriented Programming in AmbientTalk: Combining mobile...
收藏 引用
OOPSLA'05 - 20th Annual ACM Conference on Object-Oriented programming, Systems, Languages, and Applications
作者: Dedecker, Jessie Cutsem, Tom Van Mostinckx, Stijn De Meuter, Wolfgang D Hond, Theo Programming Technology Laboratory Department of Computer Science Vrije Universiteit Brussel Belgium
A new field in distributed computing, called Ambient Intelligence, has emerged as a consequence of the increasing availability of wireless devices and the mobile networks they induce. Developing software for such mobi... 详细信息
来源: 评论