咨询与建议

限定检索结果

文献类型

  • 5,448 篇 会议
  • 1,033 篇 期刊文献
  • 97 册 图书

馆藏范围

  • 6,578 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,078 篇 工学
    • 2,728 篇 计算机科学与技术...
    • 2,300 篇 软件工程
    • 952 篇 信息与通信工程
    • 761 篇 控制科学与工程
    • 586 篇 电气工程
    • 552 篇 电子科学与技术(可...
    • 351 篇 生物工程
    • 274 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 249 篇 光学工程
    • 238 篇 动力工程及工程热...
    • 190 篇 仪器科学与技术
    • 165 篇 化学工程与技术
    • 144 篇 安全科学与工程
    • 137 篇 交通运输工程
    • 123 篇 建筑学
    • 119 篇 材料科学与工程(可...
  • 2,007 篇 理学
    • 1,150 篇 数学
    • 479 篇 物理学
    • 385 篇 生物学
    • 345 篇 统计学(可授理学、...
    • 317 篇 系统科学
    • 157 篇 化学
  • 984 篇 管理学
    • 631 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 389 篇 工商管理
  • 219 篇 医学
    • 198 篇 临床医学
    • 184 篇 基础医学(可授医学...
  • 185 篇 法学
    • 148 篇 社会学
  • 138 篇 经济学
    • 137 篇 应用经济学
  • 111 篇 教育学
  • 64 篇 农学
  • 17 篇 文学
  • 17 篇 军事学
  • 6 篇 艺术学

主题

  • 138 篇 accuracy
  • 123 篇 computational mo...
  • 114 篇 machine learning
  • 110 篇 feature extracti...
  • 106 篇 software
  • 106 篇 training
  • 93 篇 software enginee...
  • 91 篇 optimization
  • 85 篇 predictive model...
  • 84 篇 artificial intel...
  • 82 篇 deep learning
  • 75 篇 real-time system...
  • 72 篇 data models
  • 68 篇 computer science
  • 68 篇 computer archite...
  • 62 篇 data mining
  • 62 篇 mathematical mod...
  • 61 篇 monitoring
  • 60 篇 internet of thin...
  • 58 篇 robustness

机构

  • 56 篇 dept. of systems...
  • 32 篇 dept. of systems...
  • 23 篇 optical sciences...
  • 20 篇 dept. of electri...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 16 篇 dept. of electri...
  • 15 篇 dept. of softwar...
  • 15 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of systems...
  • 12 篇 dept. of softwar...
  • 12 篇 networking and i...
  • 12 篇 ieee
  • 12 篇 bcmaterials basq...
  • 12 篇 dept. of compute...

作者

  • 35 篇 wainer gabriel
  • 21 篇 ali raja hashim
  • 20 篇 tan mengxi
  • 20 篇 moss david j.
  • 19 篇 xu xingyuan
  • 18 篇 gabriel wainer
  • 18 篇 usama arshad
  • 18 篇 ku wei-shinn
  • 18 篇 arshad usama
  • 16 篇 zain ul abideen
  • 15 篇 yangquan chen
  • 14 篇 baldwin timothy
  • 13 篇 shabtai asaf
  • 13 篇 ali zeeshan ijaz
  • 13 篇 xi zhang
  • 12 篇 reiner lisa
  • 12 篇 hyunseung choo
  • 12 篇 sakamoto makoto
  • 12 篇 min dong
  • 12 篇 nisar ali

语言

  • 6,278 篇 英文
  • 223 篇 其他
  • 58 篇 中文
  • 9 篇 朝鲜文
  • 8 篇 日文
  • 1 篇 德文
  • 1 篇 俄文
检索条件"机构=Dept. Software Engineering and Computer Systems"
6578 条 记 录,以下是4671-4680 订阅
排序:
Secure biometric system for accessing home appliances via internet
Secure biometric system for accessing home appliances via in...
收藏 引用
International Conference for Internet Technology and Secured Transactions, ICITST 2009
作者: Mondal, Arpita Roy, Kaushik Bhattacharya, Prabir Dept. of Computer Science and Software Engineering Concordia University Canada Concordia Institute for Information Systems Engineering Concordia University Canada
Alongside multitude of innovations and consequential changes in lifestyle, the ability to access home appliances or security cameras over the Internet has been in demand for some years now. In this paper, we propose a... 详细信息
来源: 评论
Novel Design of Interactive Caption and Recognition Postures within the Wearable and Non-Vision System over Wireless Sensor Network
Novel Design of Interactive Caption and Recognition Postures...
收藏 引用
International Conference on Complex, Intelligent and software Intensive systems, CISIS
作者: W.T. Huang Chao-Nan Hung Chiu-Ching Tuan Chin-Hsing Chen Yuan-Jen Chang You-Yin Chen Department of Computer Science and Information Engineering Minghsin University of Science and Technology Taiwan R.O.C. Department of Graduate Institute of Computer and Communication Engineering National Taipei University of Technology Taiwan Department of Management Information Systems Central Taiwan University of Science and Technology Taiwan Dept. of Electr. & Control Eng. Nat. Chiao Tung Univ. Hsinchu Taiwan
In this study, we design and present the novel wearable system with the interactive posture caption and recognition functions based on the non-vision over the ZigBee wireless sensor network (ZigBee-WSN). There are two... 详细信息
来源: 评论
Ballot permutations in Prêt à voter
Ballot permutations in Prêt à voter
收藏 引用
2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2009, Held in Conjunction with the 18th USENIX Security Symposium
作者: Ryan, Peter Y.A. Teague, Vanessa Dept. Computer Science and Communications University of Luxembourg Luxembourg Dept. Computer Science and Software Engineering University of Melbourne Australia
Handling full permutations of the candidate list along with re-encryption mixes is rather difficult in Prêt à Voter but handling cyclic shifts is straightforward. One of the versions of Prêt à Vote... 详细信息
来源: 评论
A Re-examination of Lexical Association Measures
A Re-examination of Lexical Association Measures
收藏 引用
2009 Workshop on Multiword Expressions: Identification, Interpretation, Disambiguation, Applications, MWE 2009
作者: Hoang, Hung Huu Kim, Su Nam Kan, Min-Yen Dept. of Computer Science National University of Singapore Singapore Dept. of Computer Science and Software Engineering University of Melbourne Australia
We review lexical Association Measures (AMs) that have been employed by past work in extracting multiword expressions. Our work contributes to the understanding of these AMs by categorizing them into two groups and su... 详细信息
来源: 评论
Propagating Requirement Change into software High Level Designs towards Resilient software Evolution
Propagating Requirement Change into Software High Level Desi...
收藏 引用
16th Asia-Pacific software engineering Conference
作者: Ibrahim, Noraini Kadir, Wan M. N. Wan Deris, Safaai Software Engineering Dept. Faculty of Computer Science and Information System Universiti Teknologi Malaysia Malaysia
Uncertain and incomplete requirements throughout the whole software life cycle contribute to volatility of the requirements. In a situation where the volatile requirement is changed to satisfy stakeholder needs, all t... 详细信息
来源: 评论
Portable Executable Automatic Protection using Dynamic Infection and Code Redirection
Portable Executable Automatic Protection using Dynamic Infec...
收藏 引用
International Conference on computer engineering and systems
作者: AbdelHameed, Mohab U. Sobh, Mohamed A. Eldin, Ayman M. Bahaa Softlock Company Computer and Systems Engineering Dept. Ain Shams University Egypt
This paper describes an automated technique for protecting portable executable files used in Windows NT Platform. The proposed technique mainly works on Portable Executable format for 32-bit applications. The paper de... 详细信息
来源: 评论
A rough set based approach to detect plagiarism
A rough set based approach to detect plagiarism
收藏 引用
2009 IEEE Region 10 Conference, TENCON 2009
作者: Bhavani, M. Thammi Reddy, K. Shashi, M. Dept. of Computer Science and Engineering VIIT Visakhapatnam India Dept. of Computer Science and Systems Engineering Andhra University Visakhapatnam India
Plagiarism is the practice of claiming, or implying, original authorship or incorporating material from someone else's written or creative work, in whole or in part, into one's own without adequate acknowledge... 详细信息
来源: 评论
computer aided design of the earthing installations for the substations
Computer aided design of the earthing installations for the ...
收藏 引用
International Symposium on Electrical and Electronics engineering (ISEEE)
作者: Marian I. Duţă Silvia-Maria M. Diga Denisa Gh. Ruşinaru Maria D. Brojboiu Daniela N. Popescu National Institute of Standards and Technology Boulder CO USA Department of Signals and Systems Chalmers University of Technology Göteborg Sweden Dept. of Electronics Eng. National Chiao Tung Univ. Hsinchu Taiwan Electronics Department GET/ENST-Bretagne France Institute for Telecommunications Research University of South Australia Mawson Lakes SA Australia Dept. of Electrical and Computer Engineering National Univ. of Singapore Singapore
In this paper, the authors present a complex calculation algorithm for dimensioning the earthing installation of a substation. There are also presented the own conception calculation program developed in the Visual Ba...
来源: 评论
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2010年 第PART 3期6278 LNAI卷 VI页
作者: Setchi, Rossitza Jordanov, Ivan Howlett, Robert J. Jain, Lakhmi C. Cardiff University School of Engineering The Parade Cardiff CF24 3AA United Kingdom University of Portsmouth Dept. of Computer Science and Software Engineering Buckingham Building Lion Terrace Portsmouth PO1 3HE United Kingdom KES International 145-157 St. John Street London EC1V 4PY United Kingdom University of South Australia School of Electrical and Information Engineering Mawson Lakes Campus Adelaide SA 5095 Australia
来源: 评论
A session generalization technique for improved web usage mining
A session generalization technique for improved web usage mi...
收藏 引用
ACM CIKM 2009 Workshop on Web Information and Data Management, WIDM 2009, Co-located with the 18th ACM International Conference on Information and Knowledge Management, CIKM 2009
作者: Hasan, Tahira Mudur, Sudhir P. Shiri, Nematollaah Dept. of Computer Science and Software Engineering Concordia University Montreal QC Canada
Generalization of web sessions is an effective approach used to overcome two major challenges in web usage mining, namely quality and scalability. Given a concept hierarchy, such as a website, generalization replaces ... 详细信息
来源: 评论