咨询与建议

限定检索结果

文献类型

  • 1,860 篇 会议
  • 277 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 2,178 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,354 篇 工学
    • 1,117 篇 计算机科学与技术...
    • 947 篇 软件工程
    • 307 篇 信息与通信工程
    • 186 篇 控制科学与工程
    • 141 篇 生物工程
    • 112 篇 电气工程
    • 98 篇 生物医学工程(可授...
    • 93 篇 电子科学与技术(可...
    • 61 篇 机械工程
    • 59 篇 安全科学与工程
    • 57 篇 光学工程
    • 49 篇 动力工程及工程热...
    • 40 篇 建筑学
    • 40 篇 交通运输工程
    • 37 篇 仪器科学与技术
  • 577 篇 理学
    • 350 篇 数学
    • 153 篇 生物学
    • 106 篇 统计学(可授理学、...
    • 96 篇 物理学
    • 79 篇 系统科学
  • 419 篇 管理学
    • 239 篇 管理科学与工程(可...
    • 206 篇 图书情报与档案管...
    • 131 篇 工商管理
  • 91 篇 医学
    • 82 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 53 篇 药学(可授医学、理...
    • 40 篇 公共卫生与预防医...
  • 84 篇 法学
    • 63 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 46 篇 教育学
    • 46 篇 教育学
  • 28 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 69 篇 software enginee...
  • 69 篇 software
  • 68 篇 accuracy
  • 64 篇 machine learning
  • 50 篇 feature extracti...
  • 49 篇 training
  • 48 篇 computational mo...
  • 44 篇 real-time system...
  • 40 篇 deep learning
  • 37 篇 computer science
  • 37 篇 artificial intel...
  • 36 篇 semantics
  • 34 篇 internet of thin...
  • 34 篇 predictive model...
  • 33 篇 data models
  • 32 篇 data mining
  • 32 篇 analytical model...
  • 26 篇 scalability
  • 26 篇 testing
  • 26 篇 machine learning...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 9 篇 shafiur rahman
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 dong min

语言

  • 1,889 篇 英文
  • 275 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept of Computer Engineering and Software Engineering"
2178 条 记 录,以下是1971-1980 订阅
排序:
A model for extracting keywords of document using term frequency and distribution
收藏 引用
5th International Conference on Computational Linguistics and Intelligent Text Processing, CICLing 2004
作者: Lee, Jae-Woo Baik, Doo-Kwon Software System Lab Dept of Computer Science & Engineering Korea University 1 5-ka Anam-dong SungBuk-ku Seoul136-701 Korea Republic of
In information retrieval systems, it is very important that indexing is defined very well by appropriate terms about documents. In this paper, we propose a simple retrieval model based on terms distribution characteri... 详细信息
来源: 评论
An adaptive security model for heterogeneous networks using MAUT and simple heuristics
An adaptive security model for heterogeneous networks using ...
收藏 引用
International Conference on Computational Science and its Applications, ICCSA 2004
作者: Chae, Jongwoo Mostéfaoui, Ghita Kouadri Chung, Mokdong Dept. of Computer Engineering Pukyong National University 599-1 Daeyeon-3Dong Nam-Gu Busan Korea Republic of Software Engineering Group University of Fribourg Rue Faucigny 2 FribourgCH-1700 Switzerland
In this paper, we present an adaptive security model that aims at securing resources in heterogeneous networks. Traditional security model usually work according to a static decision-making approach. However, we may e... 详细信息
来源: 评论
Performance of optical flow techniques for indoor navigation with a mobile robot
Performance of optical flow techniques for indoor navigation...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: C. McCarthy N. Bames Dept. Computer Science & Software Engineering The University of Melbourne Parkville VIC AUSTRALIA
We present a comparison of four optical flow methods and three spatio-temporal filters for mobile robot navigation in corridor-like environments. Previous comparisons of optical flow methods have evaluated performance... 详细信息
来源: 评论
THEMIS: Threat evaluation metamodel for information systems
THEMIS: Threat evaluation metamodel for information systems
收藏 引用
2nd Symposium on Intelligence and Security Informatics, ISI 2004
作者: Farkas, Csilla Wingfield, Thomas C. Michael, James B. Wijesekera, Duminda Dept. of Computer Science and Engineering USC ColumbiaSC29208 United States The Potomac Institute for Policy Studies ArlingtonVA22203 United States Dept. of Computer Science Naval Postgraduate School MontereyCA93943 United States Dept. of Information and Software Engineering GMU FairfaxVA22030 United States
THEMIS (Threat Evaluation Metamodel for Information Systems) is a description logic-based framework to apply state, federal, and international law to reason about the intent of computer network attacks with respect to... 详细信息
来源: 评论
A complexity measure for Ontology based on UML
A complexity measure for Ontology based on UML
收藏 引用
Proceedings - 10th IEEE International Workshop on Future Trends of Distributed Computing Systems
作者: Kang, Dazhou Xu, Baowen Lu, Jianjiang Chu, William C. Dept. of Comp. Sci. and Engineering Southeast University Nanjing 210096 China Jiangsu Inst. of Software Quality Nanjing 210096 China State Key Laboratory of Software Wuhan University Wuhan 430072 China Department of Computer Science TungHai University Taiwan
UML is a good tool to represent ontologies. When using UML for Ontology development, one of the principal goals is to assure the quality of ontologies. UML class diagrams provide a static modeling capability that is w... 详细信息
来源: 评论
A multiple-view meta-modeling approach for variability management in software product lines
A multiple-view meta-modeling approach for variability manag...
收藏 引用
8th International Conference on software Reuse, ICSR 2004
作者: Gomaa, Hassan Shin, Michael E. Dept. of Information and Software Engineering George Mason University FairfaxVA22030-4444 United States Dept. of Computer Science Texas Tech University Lubbock79409-3104 United States
This paper describes a multiple-view meta-modeling approach for managing variability in software product lines using the Unified Modeling Language notation (UML). A multiple-view meta-model for software product lines ... 详细信息
来源: 评论
Model synchronization for efficient software application maintenance
Model synchronization for efficient software application mai...
收藏 引用
International Conference on software Maintenance (ICSM)
作者: T.C. Lau Tack Tong R. Mckegney K. Kontogiannis I. Ivkovic P. Liew Ying Zhou Qi Zhang Maokeng Hung Centre for Advanced Studies IBM Toronto Software Laboratory Canada Department of Electrical & Computer Engineering University of Waterloo Canada Dept of Electrical & Computer Engineering Queen's University Department of Electrical & Computer Engineering Queen's University Canada
A business software application often has two perspectives: the business flow and operation that the application intends to solve, and the source code and its design and flow upon which the application is built. As on... 详细信息
来源: 评论
Configuring real-time aspects in component middleware
收藏 引用
On the Move to Meaningful Internet Systems 2004: International Conference on Cooperative Information Systems, CoopIS 2004, International Conference on Distributed Objects and Applications, DOA 2004 and International Conference on Ontologies, Databases and Applications of Semantics, ODBASE 2004
作者: Wang, Nanbor Gill, Chris Schmidt, Douglas C. Subramonian, Venkita Tech-X Corp Boulder United States Dept. of Computer Science and Engineering Washington University St. Louis United States Institute for Software Integrated Systems Vanderbilt University Nashville United States
This paper makes two contributions to the study of configuring real-time aspects into quality of service (QoS)-enabled component middleware for distributed real-time and embedded (DRE) systems. First, it compares and ... 详细信息
来源: 评论
A use-case based component identication approach for migrating legacy code into distributed environment
A use-case based component identication approach for migrati...
收藏 引用
19th International Symposium on computer and Information Sciences, ISCIS 2004
作者: Kim, Hyeon Soo Chae, Heung Seok Kim, Chul Hong Dept. of Computer Science and Engineering Chungnam Nat’l Univ. 220 Gung-dong Yuseong-gu Daejeon305-764 Korea Republic of Dept. of Computer Science and Engineering Pusan Nat’l Univ 30 Jangjeon-dong Geumjeong-gu Busan609-735 Korea Republic of Software Engineering Research Team Electronics and Telecommunications Research Institute 161 Gajeong-dong Yuseong-gu Daejeon305-350 Korea Republic of
Due to not only proven stability and reliability but a significant investment and years of accumulated experience and knowledge, legacy systems have supported the core business applications of a number of organization... 详细信息
来源: 评论
Reducing spike train variability: a computational theory of spike-timing dependent plasticity  04
Reducing spike train variability: a computational theory of ...
收藏 引用
Proceedings of the 17th International Conference on Neural Information Processing Systems
作者: Sander M. Bohte Michael C. Mozer Dept. Software Engineering CWI Amsterdam The Netherlands and Dept. of Computer Science University of Colorado Boulder Dept. of Computer Science University of Colorado Boulder
Experimental studies have observed synaptic potentiation when a presynaptic neuron fires shortly before a postsynaptic neuron, and synaptic depression when the presynaptic neuron fires shortly after. The dependence of...
来源: 评论