咨询与建议

限定检索结果

文献类型

  • 6,166 篇 会议
  • 955 篇 期刊文献
  • 54 册 图书

馆藏范围

  • 7,175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,425 篇 工学
    • 3,434 篇 计算机科学与技术...
    • 2,896 篇 软件工程
    • 1,199 篇 信息与通信工程
    • 665 篇 控制科学与工程
    • 489 篇 生物工程
    • 483 篇 电气工程
    • 454 篇 电子科学与技术(可...
    • 384 篇 生物医学工程(可授...
    • 304 篇 光学工程
    • 266 篇 机械工程
    • 205 篇 动力工程及工程热...
    • 191 篇 仪器科学与技术
    • 188 篇 化学工程与技术
    • 186 篇 安全科学与工程
    • 174 篇 交通运输工程
    • 139 篇 建筑学
  • 2,184 篇 理学
    • 1,190 篇 数学
    • 568 篇 物理学
    • 523 篇 生物学
    • 376 篇 统计学(可授理学、...
    • 277 篇 系统科学
    • 180 篇 化学
  • 1,230 篇 管理学
    • 749 篇 管理科学与工程(可...
    • 545 篇 图书情报与档案管...
    • 394 篇 工商管理
  • 331 篇 医学
    • 288 篇 临床医学
    • 273 篇 基础医学(可授医学...
    • 168 篇 药学(可授医学、理...
    • 164 篇 公共卫生与预防医...
  • 213 篇 法学
    • 154 篇 社会学
  • 137 篇 教育学
  • 129 篇 经济学
  • 119 篇 农学
  • 32 篇 文学
  • 15 篇 军事学
  • 5 篇 艺术学

主题

  • 248 篇 accuracy
  • 198 篇 feature extracti...
  • 157 篇 deep learning
  • 147 篇 computational mo...
  • 137 篇 machine learning
  • 123 篇 training
  • 117 篇 predictive model...
  • 114 篇 real-time system...
  • 113 篇 support vector m...
  • 111 篇 internet of thin...
  • 104 篇 cloud computing
  • 98 篇 visualization
  • 88 篇 data mining
  • 88 篇 security
  • 84 篇 software
  • 83 篇 semantics
  • 83 篇 artificial intel...
  • 81 篇 neural networks
  • 80 篇 optimization
  • 80 篇 monitoring

机构

  • 52 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 25 篇 dept. of informa...
  • 23 篇 dept. of compute...
  • 22 篇 school of automa...
  • 20 篇 university of th...
  • 18 篇 school of comput...
  • 17 篇 institute of inf...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of informa...
  • 14 篇 dept. of compute...
  • 14 篇 school of comput...
  • 14 篇 dept. of informa...
  • 14 篇 research center ...
  • 14 篇 dept. of compute...
  • 13 篇 dept. of compute...
  • 13 篇 tsinghua nationa...
  • 13 篇 dept. of informa...
  • 13 篇 dept. of compute...
  • 13 篇 chitkara univers...

作者

  • 22 篇 huang minlie
  • 20 篇 yen-lin chen
  • 18 篇 xiaojiang du
  • 17 篇 chen yen-lin
  • 14 篇 guru prasad m.s.
  • 14 篇 jiwani nasmin
  • 14 篇 nasmin jiwani
  • 14 篇 chang chih-hung
  • 14 篇 fotiadis dimitri...
  • 13 篇 horng shi-jinn
  • 13 篇 mohammad s. obai...
  • 12 篇 hossain shahriar
  • 12 篇 lorenzo bruzzone
  • 12 篇 sudip misra
  • 12 篇 lee trong-yen
  • 11 篇 nikumani choudhu...
  • 11 篇 ketan gupta
  • 11 篇 jian-jhih kuo
  • 11 篇 sanjaikanth e va...
  • 11 篇 lu chih-wei

语言

  • 6,794 篇 英文
  • 274 篇 其他
  • 70 篇 中文
  • 30 篇 日文
  • 7 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Information Technology and Graphics"
7175 条 记 录,以下是4911-4920 订阅
排序:
Active security in multiparty computation over black-box groups
Active security in multiparty computation over black-box gro...
收藏 引用
8th International Conference on Security and Cryptography for Networks, SCN 2012
作者: Desmedt, Yvo Pieprzyk, Josef Steinfeld, Ron Dept. of Computer Science University College London United Kingdom Dept. of Computing Macquarie University North Ryde NSW Australia Clayton School of Information Technology Monash University Clayton VIC Australia
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but i... 详细信息
来源: 评论
SLA - Driven dynamic resource allocation on clouds
SLA - Driven dynamic resource allocation on clouds
收藏 引用
International Conference on Advanced Computing, Networking and Security, ADCONS 2011
作者: Siddesh, G.M. Srinivasa, K.G. Dept. of Information Science and Engineering M. S. Ramaiah Institute of Technology Bangalore India JNTU Hyderabad India Dept. of Computer Science and Engineering M. S. Ramaiah Institute of Technology Bangalore India
With advent of gaining popularity in cloud computing, there is an increase in demand of resources among the heterogeneous workload types on cloud. Resource management is a key challenging problem that is faced by the ... 详细信息
来源: 评论
Location based recommender systems: Architecture, trends and research areas
Location based recommender systems: Architecture, trends and...
收藏 引用
IET International Conference on Wireless Communications and Applications, ICWCA 2012
作者: Tiwari, Sunita Kaushik, Saroj Tiwari, Shivendra Jagwani, Priti Computer Science and Engg. Dept. Krishna Engg. College Ghaziabad UP India Dept. of Computer Science and Engg. IIT Delhi Hauz Khas New Delhi 110016 India Dept. of Information Technology IIT Delhi Hauz Khas New Delhi 110016 India
The growths of internet, Global Positioning System (GPS) and wireless telecommunication technologies have opened new avenues in potential area of mobile computing called Location Based Services (LBS). Recommendation o... 详细信息
来源: 评论
Rule extraction from micro-blog using inductive logic programming
Rule extraction from micro-blog using inductive logic progra...
收藏 引用
2012 Spring World Congress on Engineering and technology, SCET 2012
作者: Chikara, Noriaki Koshimura, Miyuki Fujita, Hiroshi Hasegawa, Ryuzo Dept. of Computer Science and Electronic Engineering Tokuyama College of Technology Shunan Japan Faculty of Information Science and Electrical Engineering Kyushu University Fukuoka Japan
information recommender system attempts to present information that is likely to be useful for the user. Some information recommender systems recommend persons which users are likely to follow in Twitter. Showing reco... 详细信息
来源: 评论
Image domain ontology inference mechanism with heterogeneous features
Image domain ontology inference mechanism with heterogeneous...
收藏 引用
2012 International Conference on computer Science and Electronics Engineering, ICCSEE 2012
作者: Wang, Yuan Shi, Hui-Kun Cai, Biao Dept. of Computer and Information Engineering Huainan Normal University Huainan 232001 China College of Network Education Chengdu University of Technology Chengdu 610059 China
One of the main challenges in content-based or semantic image retrieval is still to bridge the gap between low-level features and semantic information. In this paper, A two-phase hybrid knowledge base inference mechan... 详细信息
来源: 评论
Lattice based tools for cryptanalysis in various applications
Lattice based tools for cryptanalysis in various application...
收藏 引用
2nd International Conference on computer Science and information technology, CCSIT 2012
作者: Santosh Kumar, R. Narasimham, C. Pallam Setty, S. Department of Information Technology MVGR College of Engg. Vizianagaram India Department of Information Technology VR Siddhartha Engineering College Vijayawada-7 India Dept. of Computer Science and Systems Engineering Andhra University Vishakhapatnam India
Lattice reduction is a powerful concept for solving diverse problems involving point lattices. Lattice reduction has been successfully utilizing in Number Theory, Linear algebra and Cryptology. Not only the existence ... 详细信息
来源: 评论
Feeling Awareness in Interactive Differential Evolution Based Facial Image Generation
Feeling Awareness in Interactive Differential Evolution Base...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Qiangfu Zhao Cheng-Hsiung Hsieh Dept. of Computer and Information Systems The University of Aizu Dept. of Computer Science and Information Engineering Chaoyang University of Technology
In our earlier studies, we have proposed an image morphing based steganography. The basic idea is to embed a secrete image into a stego image through morphing. The stego image is a morphed image obtained from the secr... 详细信息
来源: 评论
CMUNE: A clustering using mutual nearest neighbors algorithm
CMUNE: A clustering using mutual nearest neighbors algorithm
收藏 引用
2012 11th International Conference on information Science, Signal Processing and their Applications, ISSPA 2012
作者: Abbas, Mohamed A. Shoukry, Amin A. College of Computing and Information Technology Arab Academy for Science and Technology Egypt Computer Science and Engineering Dept. Egypt-Japan University of Science and Technology New Borg-El-Arab City Alexandria Egypt
A novel clustering algorithm CMune is presented for the purpose of finding clusters of arbitrary shapes, sizes and densities in high dimensional feature spaces. It can be considered as a variation of the Shared Neares... 详细信息
来源: 评论
Software synthesis of middleware for heterogeneous embedded systems
Software synthesis of middleware for heterogeneous embedded ...
收藏 引用
2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012
作者: Fan, Yang-Hsin Wu, Jan-Ou Wang, San-Fu Dept. of Computer Science and Information Eng. National Taitung University Taitung City Taiwan Dept. of Electronic Eng. De Lin Institute of Technology Tu-Cheng Taipei City Taiwan Dept. of Electronic Eng. Ming Chi University of Technology Taipei City Taiwan
Heterogeneous embedded systems are much more diverse in hardware architectures than ever before for processors and peripherals. On the other hand, software deployments are also varied such as service-oriented architec... 详细信息
来源: 评论
Discussion of New Padding Method in DES Encryption
Discussion of New Padding Method in DES Encryption
收藏 引用
Conference on computer Science and Software Engineering(CSSE 2012)
作者: Liu Chengxia Computer Science and Technology Dept. Beijing Information and Technology University
DES is a kind of block cipher and before DES encryption the plain text be divided into the same-size blocks. But sometimes the plain text can't be divided into the exactly size. So padding step is needed to pad th... 详细信息
来源: 评论