咨询与建议

限定检索结果

文献类型

  • 5,448 篇 会议
  • 1,033 篇 期刊文献
  • 97 册 图书

馆藏范围

  • 6,578 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,078 篇 工学
    • 2,728 篇 计算机科学与技术...
    • 2,300 篇 软件工程
    • 952 篇 信息与通信工程
    • 761 篇 控制科学与工程
    • 586 篇 电气工程
    • 552 篇 电子科学与技术(可...
    • 351 篇 生物工程
    • 274 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 249 篇 光学工程
    • 238 篇 动力工程及工程热...
    • 190 篇 仪器科学与技术
    • 165 篇 化学工程与技术
    • 144 篇 安全科学与工程
    • 137 篇 交通运输工程
    • 123 篇 建筑学
    • 119 篇 材料科学与工程(可...
  • 2,007 篇 理学
    • 1,150 篇 数学
    • 479 篇 物理学
    • 385 篇 生物学
    • 345 篇 统计学(可授理学、...
    • 317 篇 系统科学
    • 157 篇 化学
  • 984 篇 管理学
    • 631 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 389 篇 工商管理
  • 219 篇 医学
    • 198 篇 临床医学
    • 184 篇 基础医学(可授医学...
  • 185 篇 法学
    • 148 篇 社会学
  • 138 篇 经济学
    • 137 篇 应用经济学
  • 111 篇 教育学
  • 64 篇 农学
  • 17 篇 文学
  • 17 篇 军事学
  • 6 篇 艺术学

主题

  • 138 篇 accuracy
  • 123 篇 computational mo...
  • 114 篇 machine learning
  • 110 篇 feature extracti...
  • 106 篇 software
  • 106 篇 training
  • 93 篇 software enginee...
  • 91 篇 optimization
  • 85 篇 predictive model...
  • 84 篇 artificial intel...
  • 82 篇 deep learning
  • 75 篇 real-time system...
  • 72 篇 data models
  • 68 篇 computer science
  • 68 篇 computer archite...
  • 62 篇 data mining
  • 62 篇 mathematical mod...
  • 61 篇 monitoring
  • 60 篇 internet of thin...
  • 58 篇 robustness

机构

  • 56 篇 dept. of systems...
  • 32 篇 dept. of systems...
  • 23 篇 optical sciences...
  • 20 篇 dept. of electri...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 16 篇 dept. of electri...
  • 15 篇 dept. of softwar...
  • 15 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of systems...
  • 12 篇 dept. of softwar...
  • 12 篇 networking and i...
  • 12 篇 ieee
  • 12 篇 bcmaterials basq...
  • 12 篇 dept. of compute...

作者

  • 35 篇 wainer gabriel
  • 21 篇 ali raja hashim
  • 20 篇 tan mengxi
  • 20 篇 moss david j.
  • 19 篇 xu xingyuan
  • 18 篇 gabriel wainer
  • 18 篇 usama arshad
  • 18 篇 ku wei-shinn
  • 18 篇 arshad usama
  • 16 篇 zain ul abideen
  • 15 篇 yangquan chen
  • 14 篇 baldwin timothy
  • 13 篇 shabtai asaf
  • 13 篇 ali zeeshan ijaz
  • 13 篇 xi zhang
  • 12 篇 reiner lisa
  • 12 篇 hyunseung choo
  • 12 篇 sakamoto makoto
  • 12 篇 min dong
  • 12 篇 nisar ali

语言

  • 6,278 篇 英文
  • 223 篇 其他
  • 58 篇 中文
  • 9 篇 朝鲜文
  • 8 篇 日文
  • 1 篇 德文
  • 1 篇 俄文
检索条件"机构=Dept. Software Engineering and Computer Systems"
6578 条 记 录,以下是4681-4690 订阅
排序:
Using patterns for faster and scalable rewriting of conjunctive queries
Using patterns for faster and scalable rewriting of conjunct...
收藏 引用
3rd Alberto Mendelzon International Workshop on Foundations of Data Management, AMW 2009
作者: Kiani, Ali Shiri, Nematollaah Dept. of Computer Science and Software Engineering Concordia University Montreal QC Canada
Rewriting of conjunctive queries using views has many applications in database and data *** investigate ways to improve performance of rewriting and propose a new algorithm which has two phases. In the first phase, si... 详细信息
来源: 评论
Query processing and optimization for logic programs with certainty constraints
Query processing and optimization for logic programs with ce...
收藏 引用
22nd International Florida Artificial Intelligence Research Society Conference, FLAIRS-22
作者: Lai, Jinzan Shiri, Nematollaah Dept. of Computer Science and Software Engineering Concordia University Montreal QC Canada
Numerous logic frameworks have been proposed for modeling uncertainty and reasoning with such data. While different in syntax, the approaches of these frameworks have been classified into "annotation based" ... 详细信息
来源: 评论
A framework for goal-Based semantic compensation in agent systems
A framework for goal-Based semantic compensation in agent sy...
收藏 引用
Lecture Notes in computer Science
作者: Unruh, Amy Bailey, James Ramamohanarao, Kotagiri Dept. of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia
This paper describes an approach to improving the robustness of an agent system by augmenting its failure-handling capabilities. The approach is based on the concept of semantic compensation: "cleaning up" f... 详细信息
来源: 评论
Research and practice of web server optimization
Research and practice of web server optimization
收藏 引用
2nd International Symposium on Electronic Commerce and Security, ISECS 2009
作者: Wang, Mingfu Qi, Zhiwen Dept. of Software Engineering Shenzhen Polytechnic Shenzhen China Dept. of Computer Application Shenzhen Polytechnic Shenzhen China
The application and development of Web technology is limited by the integrative performance of web server. Analyzed the principle of web service and the system's overloading, showed the critical parts that influen... 详细信息
来源: 评论
A reliable - Double edged strategy for HLR mobility database failure detection and recovery in PCS networks
A reliable - Double edged strategy for HLR mobility database...
收藏 引用
2009 International Conference on Networking and Media Convergence, ICNM 2009
作者: Abdelgwad, A.O. Ahmed, D.S. Saleh, A.I. Dept. of Computer Eng. and Systems Faculty of Engineering Mansoura University Egypt
Since the main objective of PCS networks is to provide "anytime- anywhere" cellular service, the existence of lost calls has become the major problem that hardly degrades the performance of such networks. A ... 详细信息
来源: 评论
Demo abstract: Embedded virtual machines for wireless industrial automation
Demo abstract: Embedded virtual machines for wireless indust...
收藏 引用
2009 International Conference on Information Processing in Sensor Networks, IPSN 2009
作者: Mangharam, Rahul Pajic, Miroslav Sastry, Shivakumar Dept. of Electrical and Systems Engineering University of Pennsylvania United States Dept. Electrical and Computer Engineering University of Akron United States
The factory of the future is the Wireless Factory - fully programmable, nimble and adaptive to planned mode changes and unplanned faults. Today automotive assembly lines loose over $22,000 per minute of downtime. The ... 详细信息
来源: 评论
PROS: A peer-to-peer system for location privacy protection on road networks (demo paper)  09
PROS: A peer-to-peer system for location privacy protection ...
收藏 引用
17th ACM SIGSPATIAL International Conference on Advances in Geographic Information systems, ACM SIGSPATIAL GIS 2009
作者: Bao, Jie Chen, Haiquan Ku, Wei-Shinn Dept. of Computer Science and Software Engineering Auburn University Auburn AL 36849 United States
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloaked into a spatial region that contains... 详细信息
来源: 评论
Comparison shopping agents: The essential characteristics and challenges to be met
Comparison shopping agents: The essential characteristics an...
收藏 引用
2009 International Conference on Intelligent Agent and Multi-Agent systems, IAMA 2009
作者: Prasad, R.V.V.S.V. Vallli Kumari, V. Raju, K.V.S.V.N. Dept. of Computer Science and Engineering Bhimavaram Institute of Engineering and Technology Bhimavarram-534243 India Dept. of Computer Science and Systems Engineering College of Engineering Andhra University Visakhapatnam-530003 India
Comparison Shopping Agents are web applications that can help on-line shoppers to find the optimized value for commodities and/or services by parsing product descriptions. Adaption of mobile agent system, which has ca... 详细信息
来源: 评论
Document compaction for efficient query biased snippet generation  1
收藏 引用
31th European Conference on Information Retrieval, ECIR 2009
作者: Tsegay, Yohannes Puglisi, Simon J. Turpin, Andrew Zobel, Justin School of Computer Science and IT RMIT University Melbourne Australia Dept. Computer Science and Software Engineering University of Melbourne Australia
Current web search engines return query-biased snippets for each document they list in a result set. For efficiency, search engines operating on large collections need to cache snippets for common queries, and to cach... 详细信息
来源: 评论
Self-encryption scheme for data security in mobile devices
Self-encryption scheme for data security in mobile devices
收藏 引用
2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009
作者: Chen, Yu Ku, Wei-Shinn Dept. of Electrical and Computer Engineering SUNY - Binghamton Binghamton NY 13902 United States Dept. of Computer Science and Software Engineering Auburn University Auburn AL 36849 United States
The pervasive use of wireless networks and mobile devices has been changing our living style significantly. Along with great convenience and efficiency, there are new challenges in protecting sensitive and/or private ... 详细信息
来源: 评论