咨询与建议

限定检索结果

文献类型

  • 6,477 篇 会议
  • 1,026 篇 期刊文献
  • 60 册 图书

馆藏范围

  • 7,563 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,714 篇 工学
    • 3,581 篇 计算机科学与技术...
    • 3,015 篇 软件工程
    • 1,249 篇 信息与通信工程
    • 713 篇 控制科学与工程
    • 523 篇 电气工程
    • 500 篇 电子科学与技术(可...
    • 498 篇 生物工程
    • 403 篇 生物医学工程(可授...
    • 330 篇 光学工程
    • 280 篇 机械工程
    • 277 篇 仪器科学与技术
    • 237 篇 动力工程及工程热...
    • 204 篇 安全科学与工程
    • 199 篇 化学工程与技术
    • 186 篇 交通运输工程
    • 164 篇 建筑学
  • 2,368 篇 理学
    • 1,260 篇 数学
    • 635 篇 物理学
    • 537 篇 生物学
    • 405 篇 统计学(可授理学、...
    • 294 篇 系统科学
    • 225 篇 化学
  • 1,299 篇 管理学
    • 801 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 410 篇 工商管理
  • 353 篇 医学
    • 305 篇 临床医学
    • 288 篇 基础医学(可授医学...
    • 181 篇 药学(可授医学、理...
    • 172 篇 公共卫生与预防医...
  • 219 篇 法学
    • 161 篇 社会学
  • 140 篇 教育学
  • 137 篇 经济学
  • 120 篇 农学
  • 35 篇 文学
  • 15 篇 军事学
  • 8 篇 艺术学

主题

  • 248 篇 accuracy
  • 209 篇 feature extracti...
  • 163 篇 deep learning
  • 153 篇 computational mo...
  • 146 篇 machine learning
  • 128 篇 training
  • 119 篇 predictive model...
  • 118 篇 support vector m...
  • 117 篇 internet of thin...
  • 116 篇 real-time system...
  • 106 篇 cloud computing
  • 95 篇 visualization
  • 94 篇 security
  • 90 篇 data mining
  • 88 篇 optimization
  • 88 篇 software
  • 86 篇 artificial intel...
  • 85 篇 computer archite...
  • 84 篇 semantics
  • 83 篇 neural networks

机构

  • 87 篇 université de st...
  • 87 篇 nikhef national ...
  • 86 篇 ncsr demokritos ...
  • 85 篇 institut univers...
  • 85 篇 tno technical sc...
  • 83 篇 north-west unive...
  • 83 篇 university würzb...
  • 83 篇 university of jo...
  • 83 篇 infn sezione di ...
  • 82 篇 infn sezione di ...
  • 82 篇 national centre ...
  • 81 篇 infn sezione di ...
  • 80 篇 university moham...
  • 80 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 69 篇 western sydney u...
  • 66 篇 università di ca...
  • 62 篇 university of am...
  • 58 篇 university moham...
  • 57 篇 università la sa...

作者

  • 95 篇 ardid m.
  • 94 篇 díaz a.f.
  • 94 篇 coleiro a.
  • 94 篇 enzenhöfer a.
  • 94 篇 celli s.
  • 93 篇 ferrara g.
  • 93 篇 boumaaza j.
  • 92 篇 kalekin o.
  • 91 篇 dornic d.
  • 90 篇 brunner j.
  • 89 篇 calvo d.
  • 88 篇 di palma i.
  • 87 篇 bendahman m.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 83 篇 gozzini s.r.
  • 83 篇 carretero v.
  • 82 篇 dallier r.
  • 81 篇 chen a.
  • 80 篇 anguita m.

语言

  • 6,358 篇 英文
  • 1,090 篇 其他
  • 67 篇 中文
  • 41 篇 日文
  • 7 篇 朝鲜文
  • 6 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Architecture and Information Technology"
7563 条 记 录,以下是4991-5000 订阅
排序:
A Teleoperation System Utilizing Saliency-Based Visual Attention
A Teleoperation System Utilizing Saliency-Based Visual Atten...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Wei-Chung Teng Yi-Ching Kuo Rayi Yanu Tara Dept. of Computer Science & Information Engineering National Taiwan University of Science and Technology Taipei City Taiwan
We present a teleoperation system which supports foveated multi-resolution, wide field of view visual feedback. In the proposed system, a saliency-based visual attention system is implemented to simulate human visual ... 详细信息
来源: 评论
Frequent Pattern Based User Behavior Anomaly Detection for Cloud System
Frequent Pattern Based User Behavior Anomaly Detection for C...
收藏 引用
International Conference on Technologies and Applications of Artificial Intelligence (TAAI)
作者: Chien-Yi Chiu Chi-Tien Yeh Yuh-Jye Lee Dept. of Computer Science and Information Engineering National Taiwan Univ. of Science and Technology Taipei Taiwan
Cloud Computing is a hot topic in the global IT industry, which is considered as the main part of the network and computing service provider in recent years. Some security issues will be more threatening in cloud comp... 详细信息
来源: 评论
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2013年 8147 LNCS卷 VI页
作者: Zhang, Lixin Chapman, Barbara Hsu, Ching-Hsien Li, Xiaoming Shi, Xuanhua Institute of Computing Technology China University of Houston United States Chung Hua University Dept. of Computer Science and Information Engineering Hsinchu Taiwan University of Delaware Dept. of Electrical and Computer Engineering Newark DE United States Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China
来源: 评论
Influence of selective pressure on quality of solutions and speed of evolutionary MasterMind
Influence of selective pressure on quality of solutions and ...
收藏 引用
IEEE Symposium on Foundations of Computational Intelligence
作者: JJ Merelo A.M. Mora Nuria Rico C. Cotta Dept. Computer Architecture and Technology + CITIC University of Granada Departamento de Estadística e Investigación Operativa University of Granada Dept. of Computer Sciences and Languages University of Málaga
Mastermind is a puzzle in which a hidden code of length ? and made with k colors has to be discovered via making guesses of the code and receiving hints that express the distance from the guess to the code, in terms o... 详细信息
来源: 评论
Modelling and Performance Analysis of Different Access Schemes in Two-tier Wireless Networks
Modelling and Performance Analysis of Different Access Schem...
收藏 引用
IEEE Global Communications Conference
作者: Xiaohu Ge Jorge Martinez-Bauset Vicente Casares-Giner Bin Yang Junliang Ye Min Chen Dept. Electronics & Information Engineering Huazhong University of Science & Technology Dept. de Comunicaciones Universitat Politecnica de Valencia School of Computer Science & Technology Huazhong University of Science & Technology
We develop a teletraffic model to evaluate the performance of two typical access schemes in two-tier wireless networks. Two of the main performance parameters are the blocking probability and carried traffic. Numerica... 详细信息
来源: 评论
Serious games in a European policy context  1
收藏 引用
4th International Conference on Serious Games Development and Applications, SGDA 2013
作者: Mayer, Igor Riedel, Johann C. K. H. Hauge, Jannicke Baalsrud Bellotti, Francesco De Gloria, Alessandro Ott, Michela Petersen, Sobah Abbas Faculty of Technology Policy and Management TU Delft Netherlands Nottingham University Business School United Kingdom Bremen Institute for Production and Logistics Germany DITEN University of Genoa Italy CNR-ITD Genoa Italy Dept. of Computer and Information Science Norwegian University of Science and Technology Norway
The authors analyze the policy discourse on the utility of games for society at the level of the European Union, and for five EU countries, the Netherlands, the United Kingdom, Germany, Italy and Norway. The ongoing s... 详细信息
来源: 评论
A Model-Based Behavioral Fuzzing Approach for Network Service
A Model-Based Behavioral Fuzzing Approach for Network Servic...
收藏 引用
International Conference on Instrumentation, Measurement, computer, Communication and Control (IMCCC)
作者: Jiajie Wang Tao Guo Puhan Zhang Qixue Xiao China Information Technology Security Evaluation Center Beijing China Dept. of Computer Science and Technology Tsinghua University Beijing China
Network services face various security challenges such as targeted attacks exploiting security vulnerabilities. Fuzz testing plays an important role in security testing of network service. However, current fuzzing app... 详细信息
来源: 评论
CAVIAR-Based Vortex Core Region Detection
CAVIAR-Based Vortex Core Region Detection
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Li Zhang Raghu Machiraju David Thompson Dept. of Information Qilu University Of Technology PRC Dept. of Computer Science and Engineering The Ohio State University USA Dept. of Aerospace Engineering Mississippi State University USA
This paper presents a novel algorithm to enhance the robustness of vortex core detection that automatically learns to build a strong compound classifier based on a locally weighted combination of weak detectors and th... 详细信息
来源: 评论
Workload utilization dissemination on grid resources for simulation environment
Workload utilization dissemination on grid resources for sim...
收藏 引用
International Conference on Research and Innovation in information Systems (ICRIIS)
作者: Bakri Yahaya Rohaya Latip Azizol Hj Abdullah Mohamed Othman Dept. of Communication Technology Network Fac. of Computer Science Information Technology Universiti Putra Malaysia Selangor UPM Malaysia
This paper discusses the workload utilization dissemination for grid computing. The CPU is a well-known resource item and it is an integral part in most literatures while other RI's may include memory, network and... 详细信息
来源: 评论
An energy-saving office lighting control system linked to employee's entry/exist
An energy-saving office lighting control system linked to em...
收藏 引用
IEEE Global Conference on Consumer Electronics (GCCE)
作者: Yosuke Kaneko Masahito Matsushita Shinji Kitagami Ryozo Kiyohara Mitsubishi Electric Corporation Information Technology R&D Center Kanagawa Japan Dept. of Information and Computer Sciences Kanagawa Institute of Technology Atsugi Japan
For conserving energy in the lighting of office buildings, we developed an lighting energy-saving control system by coordinating the access control system and the lighting control system. Our system controls the light... 详细信息
来源: 评论