咨询与建议

限定检索结果

文献类型

  • 5,480 篇 会议
  • 1,041 篇 期刊文献
  • 98 册 图书

馆藏范围

  • 6,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,102 篇 工学
    • 2,748 篇 计算机科学与技术...
    • 2,310 篇 软件工程
    • 964 篇 信息与通信工程
    • 777 篇 控制科学与工程
    • 590 篇 电气工程
    • 554 篇 电子科学与技术(可...
    • 351 篇 生物工程
    • 274 篇 机械工程
    • 274 篇 生物医学工程(可授...
    • 250 篇 光学工程
    • 241 篇 动力工程及工程热...
    • 189 篇 仪器科学与技术
    • 165 篇 化学工程与技术
    • 146 篇 安全科学与工程
    • 140 篇 交通运输工程
    • 123 篇 建筑学
    • 120 篇 材料科学与工程(可...
  • 2,013 篇 理学
    • 1,155 篇 数学
    • 480 篇 物理学
    • 385 篇 生物学
    • 347 篇 统计学(可授理学、...
    • 317 篇 系统科学
    • 157 篇 化学
  • 996 篇 管理学
    • 643 篇 管理科学与工程(可...
    • 415 篇 图书情报与档案管...
    • 391 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 189 篇 法学
    • 152 篇 社会学
  • 138 篇 经济学
    • 137 篇 应用经济学
  • 114 篇 教育学
  • 64 篇 农学
  • 20 篇 文学
  • 17 篇 军事学
  • 6 篇 艺术学

主题

  • 143 篇 accuracy
  • 125 篇 computational mo...
  • 118 篇 machine learning
  • 111 篇 feature extracti...
  • 107 篇 software
  • 106 篇 training
  • 96 篇 software enginee...
  • 95 篇 optimization
  • 88 篇 predictive model...
  • 88 篇 artificial intel...
  • 84 篇 deep learning
  • 76 篇 real-time system...
  • 74 篇 data models
  • 68 篇 computer science
  • 68 篇 computer archite...
  • 62 篇 internet of thin...
  • 62 篇 data mining
  • 61 篇 monitoring
  • 61 篇 mathematical mod...
  • 58 篇 neural networks

机构

  • 56 篇 dept. of systems...
  • 32 篇 dept. of systems...
  • 24 篇 optical sciences...
  • 20 篇 dept. of electri...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 16 篇 dept. of electri...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 15 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of systems...
  • 12 篇 dept. of softwar...
  • 12 篇 networking and i...
  • 12 篇 ieee
  • 12 篇 bcmaterials basq...
  • 12 篇 dept. of compute...

作者

  • 35 篇 wainer gabriel
  • 21 篇 ali raja hashim
  • 21 篇 moss david j.
  • 20 篇 tan mengxi
  • 19 篇 xu xingyuan
  • 18 篇 gabriel wainer
  • 18 篇 usama arshad
  • 18 篇 ku wei-shinn
  • 18 篇 arshad usama
  • 16 篇 zain ul abideen
  • 15 篇 yangquan chen
  • 14 篇 baldwin timothy
  • 13 篇 shabtai asaf
  • 13 篇 ali zeeshan ijaz
  • 13 篇 xi zhang
  • 12 篇 reiner lisa
  • 12 篇 hyunseung choo
  • 12 篇 sakamoto makoto
  • 12 篇 min dong
  • 12 篇 nisar ali

语言

  • 5,846 篇 英文
  • 696 篇 其他
  • 59 篇 中文
  • 9 篇 朝鲜文
  • 8 篇 日文
  • 1 篇 德文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. Software Engineering and Computer Systems"
6619 条 记 录,以下是4221-4230 订阅
排序:
Interference-free energy efficient scheduling in wireless ad hoc networks
Interference-free energy efficient scheduling in wireless ad...
收藏 引用
International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
作者: Levin, Liron Segal, Michael Shpungin, Hanan Dept. of Communication Systems Engineering Ben-Gurion University of the Negev Israel Dept. of Computer Science University of Calgary Canada
This paper studies the problem of interference-free broadcast in wireless ad hoc networks. In particular, we are interested in asymmetric power assignments so that the induced broadcast communication graph is both, en... 详细信息
来源: 评论
Integrated estimation and tracking of performance model parameters with autoregressive trends  11
Integrated estimation and tracking of performance model para...
收藏 引用
Proceedings of the 2nd ACM/SPEC International Conference on Performance engineering
作者: Zheng, Tao Litoiu, Marin Woodside, Murray Dept. of Systems and Computer Engineering Carleton University Ottawa ON Canada Dept. of Information Science York University Toronto ON Canada
Adaptive management of a software service system can take advantage of a performance model which can predict the effect of proposed changes, before they are deployed. As the system varies over time the model parameter... 详细信息
来源: 评论
Studying robot-environment interaction via transparent controllers
Studying robot-environment interaction via transparent contr...
收藏 引用
IEEE 15th International Conference on Advanced Robotics: New Boundaries for Robotics, ICAR 2011
作者: Akanyeti, O. Fiorini, P. Billings, S.A. Dept. of Computer Science University of Verona Italy Dept. of Automatic Control and Systems Engineering University of Sheffield United Kingdom
In this paper we address the question of "Why is it that a mobile robot, programmed in a certain way and placed in some environment to execute a program, behaves in the way it does?". We present three real w... 详细信息
来源: 评论
Card user authentication based on generalized image morphing
Card user authentication based on generalized image morphing
收藏 引用
2011 3rd International Conference on Awareness Science and Technology, iCAST 2011
作者: Zhao, Qiangfu Hsieh, Cheng-Hsiung Dept. of Computer and Information Systems University of Aizu Aizuwakamatsu Fukushima Japan Dept. of Computer Science and Information Engineering Chaoyang University of Technology Taichung Taiwan
Nowadays, "cards" are becoming part of our lives. The cards enable us to obtain different kinds of services conveniently, but may also bring us economic loss if they are used illegally by some malicious thir... 详细信息
来源: 评论
Internet-scale real-time code clone search via multi-level indexing
Internet-scale real-time code clone search via multi-level i...
收藏 引用
18th Working Conference on Reverse engineering, WCRE 2011
作者: Keivanloo, Iman Rilling, Juergen Charland, Philippe Dept. of Computer Science and Software Engineering Concordia University Montreal QC Canada System of Systems Section Defence R and D Canada - Valcartier Quebec QC Canada
Finding lines of code similar to a code fragment across large knowledge bases in fractions of a second is a new branch of code clone research also known as real-time code clone search. Among the requirements real-time... 详细信息
来源: 评论
Event-based Patient Motion Detection and Compensation in Image-Guided Robotics
Event-based Patient Motion Detection and Compensation in Ima...
收藏 引用
IEEE RAS & EMBS International Conference on Biomedical Robotics and Biomechatronics
作者: Tamas Haidegger Peter Kazanzides Balazs Benyo Zoltan Benyo Dept. of Control Engineering and Information Technology Budapest University of Technology and Economics Johns Hopkins University Center for Computer-Integrated Surgical Systems and Technology
We report a generalized approach to deal with patient motion in robotic image-guided surgery, along with in silico and dry laboratory tests on a neurosurgical robot setup. External patient motion events (excluding phy... 详细信息
来源: 评论
Protecting peer-to-peer networks from the denial of service attacks
Protecting peer-to-peer networks from the denial of service ...
收藏 引用
International Conference on Electronic computer Technology
作者: Vadivu, G. Senthil Gomathi, C. Priya, A. Swathy Software Engineering Anna University of Technology Trichirappalli India Dept. of Computer Science and Engineering Anna University of Technology Trichirappalli India
The purpose of this paper is to reduce the Denial of Service (DoS) attacks on peer-to-peer networks by hiding the position of the file and to prove the effectiveness through the fuzzy logic. In general to protect the ... 详细信息
来源: 评论
Genetic regulatory network identification using monotone functions decomposition
Genetic regulatory network identification using monotone fun...
收藏 引用
作者: Julius, A. Agung Belta, Calin Dept. Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute Troy NY United States Dept. Mechanical Engineering Div. Systems Engineering Boston University Boston MA United States
We present a method for identification of gene regulatory network topology using a time series of gene expression data. The underlying assumption in our method is that the functions that describe regulatory relations ... 详细信息
来源: 评论
Online Learning of Concepts and Words Using Multimodal LDA and Hierarchical Pitman-Yor Language Model
Online Learning of Concepts and Words Using Multimodal LDA a...
收藏 引用
IEEE/RSJ International Conference on Intelligent Robotics and systems
作者: Takaya Araki Tomoaki Nakamura Takayuki Nagai Shogo Nagasaka Tadahiro Taniguchi Naoto Iwahashi Dept. of Mechanical Engineering and Intelligent Systems The University of Electro-Communications 1-5-1 Chofugaoka Chofu-shi Tokyo 182-8585 Japan Dept. of Human and Computer Intelligence Ritsumeikan University 1-1-1 Noji Higashi Kusatsu Shiga 525-8577 Japan Institute of Information and Communications Technology 3-5 Hikari-dai Seika-cho Sohraku-gun Kyoto-fu 619-0289 Japan
In this paper, we propose an online algorithm for multimodal categorization based on the autonomously acquired multimodal information and partial words given by human users. For multimodal concept formation, multimoda... 详细信息
来源: 评论
Automatic construction of jump-oriented programming shellcode (on the x86)  11
Automatic construction of jump-oriented programming shellcod...
收藏 引用
6th International Symposium on Information, computer and Communications Security, ASIACCS 2011
作者: Chen, Ping Xing, Xiao Mao, Bing Xie, Li Shen, Xiaobin Yin, Xinchun Dept. of Computer Science and Technology State Key Laboratory for Novel Software Technology Nanjing University China Dept. of Computer Science College of Information Engineering Yangzhou University China
Return-Oriented Programming (ROP) is a technique which leverages the instruction gadgets in existing libraries/executables to construct Turing complete programs. However, ROP attack is usually composed with gadgets wh...
来源: 评论