咨询与建议

限定检索结果

文献类型

  • 6,216 篇 会议
  • 943 篇 期刊文献
  • 55 册 图书

馆藏范围

  • 7,214 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,453 篇 工学
    • 3,462 篇 计算机科学与技术...
    • 2,907 篇 软件工程
    • 1,221 篇 信息与通信工程
    • 684 篇 控制科学与工程
    • 491 篇 电气工程
    • 488 篇 生物工程
    • 460 篇 电子科学与技术(可...
    • 385 篇 生物医学工程(可授...
    • 307 篇 光学工程
    • 269 篇 机械工程
    • 212 篇 动力工程及工程热...
    • 195 篇 安全科学与工程
    • 193 篇 仪器科学与技术
    • 188 篇 化学工程与技术
    • 181 篇 交通运输工程
    • 140 篇 建筑学
  • 2,192 篇 理学
    • 1,196 篇 数学
    • 568 篇 物理学
    • 522 篇 生物学
    • 382 篇 统计学(可授理学、...
    • 277 篇 系统科学
    • 184 篇 化学
  • 1,252 篇 管理学
    • 772 篇 管理科学与工程(可...
    • 554 篇 图书情报与档案管...
    • 396 篇 工商管理
  • 337 篇 医学
    • 289 篇 临床医学
    • 274 篇 基础医学(可授医学...
    • 171 篇 公共卫生与预防医...
    • 168 篇 药学(可授医学、理...
  • 217 篇 法学
    • 159 篇 社会学
  • 140 篇 教育学
  • 128 篇 经济学
  • 119 篇 农学
  • 35 篇 文学
  • 15 篇 军事学
  • 5 篇 艺术学

主题

  • 250 篇 accuracy
  • 203 篇 feature extracti...
  • 162 篇 deep learning
  • 148 篇 computational mo...
  • 144 篇 machine learning
  • 124 篇 training
  • 117 篇 predictive model...
  • 115 篇 support vector m...
  • 115 篇 real-time system...
  • 112 篇 internet of thin...
  • 106 篇 cloud computing
  • 98 篇 visualization
  • 90 篇 security
  • 89 篇 data mining
  • 85 篇 software
  • 83 篇 semantics
  • 82 篇 neural networks
  • 82 篇 optimization
  • 82 篇 artificial intel...
  • 80 篇 monitoring

机构

  • 52 篇 dept. of compute...
  • 27 篇 dept. of informa...
  • 26 篇 dept. of compute...
  • 23 篇 dept. of compute...
  • 22 篇 school of automa...
  • 21 篇 university of th...
  • 18 篇 school of comput...
  • 17 篇 institute of inf...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of informa...
  • 15 篇 dept. of compute...
  • 14 篇 school of comput...
  • 14 篇 dept. of informa...
  • 14 篇 research center ...
  • 14 篇 dept. of compute...
  • 13 篇 dept. of compute...
  • 13 篇 tsinghua nationa...
  • 13 篇 dept. of informa...
  • 13 篇 dept. of compute...
  • 13 篇 chitkara univers...

作者

  • 22 篇 huang minlie
  • 20 篇 yen-lin chen
  • 18 篇 xiaojiang du
  • 17 篇 chen yen-lin
  • 16 篇 nasmin jiwani
  • 14 篇 guru prasad m.s.
  • 14 篇 jiwani nasmin
  • 14 篇 chang chih-hung
  • 14 篇 fotiadis dimitri...
  • 13 篇 horng shi-jinn
  • 13 篇 mohammad s. obai...
  • 12 篇 ketan gupta
  • 12 篇 hossain shahriar
  • 12 篇 lorenzo bruzzone
  • 12 篇 sudip misra
  • 12 篇 lee trong-yen
  • 11 篇 nikumani choudhu...
  • 11 篇 jian-jhih kuo
  • 11 篇 sanjaikanth e va...
  • 11 篇 abdul sajid moha...

语言

  • 6,094 篇 英文
  • 1,021 篇 其他
  • 62 篇 中文
  • 30 篇 日文
  • 7 篇 朝鲜文
  • 6 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Information Technology and Graphics"
7214 条 记 录,以下是4921-4930 订阅
排序:
Binary SIFT: Towards efficient feature matching verification for image search  12
Binary SIFT: Towards efficient feature matching verification...
收藏 引用
4th International Conference on Internet Multimedia Computing and Service, ICIMCS 2012
作者: Zhou, Wengang Li, Houqiang Wang, Meng Lu, Yijuan Tian, Qi Dept. of Computer Science University of Texas at San Antonio Texas TX 78249 United States Dept. of EEIS University of Science and Technology of China Hefei 230027 China School of Computer and Information Hefei University of Technology 230009 China Dept. of Computer Science Texas State University Texas TX 78666 United States
Recently, great advance has been made in large-scale contentbased image search. Most state-of-the-art approaches are based on the Bag-of-Visual-Words model with local features, such as SIFT. Visual matching between im... 详细信息
来源: 评论
An expert advisory system for ISO 9001 based QMS of manufacturing environment
An expert advisory system for ISO 9001 based QMS of manufact...
收藏 引用
2012 International Conference on Communication, information and Computing technology, ICCICT 2012
作者: Bewoor, Anand K. Bewoor, Laxmi A. Pawar, Maruti S. Mechanical Engineering Dept. Vishwakarma Institute of Information Technology University of Pune Pune India Computer Engineering Dept. Vishwakarma Institute of Information Technology University of Pune Pune India B.M.I.T. Solapur University India
The ISO 9001 quality management system has been widely accepted and adapted as a national standard by most industrial countries. Despite its high popularity and the urgent demand from customers to implement ISO 9001, ... 详细信息
来源: 评论
Advanced high-adaptive image coding for frame memory reduction in LCD overdrive
Advanced high-adaptive image coding for frame memory reducti...
收藏 引用
2012 9th IEEE RIVF International Conference on Computing and Communication Technologies, Research, Innovation, and Vision for the Future, RIVF 2012
作者: Huu, Tai Nguyen Thi, Hoang-Lan Nguyen Dept. of Information Technology Hue Univ. Hanoi Univ. of Science and Technology Hue Viet Nam Dept. of Data Communications and Computer Networks Hanoi Univ. of Science and Technology Hanoi Viet Nam
In this paper, Advanced High-Adaptive Image Coding (AHAIC) is proposed to increase compression performance for Frame Memory Reduction in LCD Overdrive. The AHAIC contains a new technique to improve the quality of deco... 详细信息
来源: 评论
Multi-sensor multi-target tracking for infrastructure protection
Multi-sensor multi-target tracking for infrastructure protec...
收藏 引用
2012 European Intelligence and Security Informatics Conference, EISIC 2012
作者: Moreno, M.V. Pinana-Diaz, C. Toledo-Moreno, R. Zamora, M.A. Skarmeta, A. Dept. of Information and Communications Engineering Computer Science Faculty University of Murcia 30071 Murcia Spain Dept. of Electronics and Computer Technology School of Telecommunication Engineering Technical University of Cartagena 30202 Cartagena Murcia Spain
This paper presents a solution to the problem of intruder detection applied to control the access to safety-critical infrastructures. The system under consideration exploits the measurements of a radar and some Unatte... 详细信息
来源: 评论
A novel method for crowd density estimations
A novel method for crowd density estimations
收藏 引用
IET International Conference on information Science and Control Engineering 2012, ICISCE 2012
作者: Yang, Haiyan Zhao, Hua-An College of Information and Communication Guilin University of Electronic Technology China Dept. of Computer Science and Electrical Engineering Kumamoto University Japan
Crowd density estimation is important in crowd analysis;this paper proposes a new approach used for crowd density estimation. First, background is removed by using a combination of optical flow and background subtract... 详细信息
来源: 评论
A network based vulnerability scanner for detecting SQLI attacks in web applications
A network based vulnerability scanner for detecting SQLI att...
收藏 引用
2012 1st International Conference on Recent Advances in information technology, RAIT-2012
作者: Kumar Singh, Avinash Roy, Sangita Robotics and Artificial Intelligence Laboratory Indian Institute of Information Technology Allahabad India Dept. of Computer Science and Engineering Indian Institute of Technology Patna India
Today is the world of information era, where information is available on just our single click. Web applications are playing a magnificent role in this, every organizations are mapping their business from a room to th... 详细信息
来源: 评论
Finding forensic information on creating a folder in $LogFile of NTFS
收藏 引用
3rd International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011
作者: Cho, Gyu-Sang Rogers, Marcus K. Dept. of Computer Information Warfare Dongyang Univ. 1 Gyochon Youngju Kyoungbuk 750-711 Korea Republic of Dept. of Computer and Information Technology Purdue Univ 401 N Grant St. W. Lafayette IN 47907 United States
The NTFS journaling file($LogFile) is used to keep the file system clean in the event of a system crash or power failure. The log records operate on files or folders and leaves large amounts of information in the $Log... 详细信息
来源: 评论
Improving performance for video stream in wireless networks
Improving performance for video stream in wireless networks
收藏 引用
2012 International Conference on computer Science and Service System, CSSS 2012
作者: Li, Ming Wu, Yanling School of Electronic and Engineering Dongguan University of Technology Dongguan China Dept. of Computer and Science Information City College of Dongguan University of Technology Dongguan China
Wireless multimedia communications such as Video Transfer over Radio Interface (VToRI) is widely acknowledged as one of the key, emerging applications for wireless networks. They are becoming popular and are major rev... 详细信息
来源: 评论
Fast robustness estimation in large social graphs: Communities and anomaly detection
Fast robustness estimation in large social graphs: Communiti...
收藏 引用
12th SIAM International Conference on Data Mining, SDM 2012
作者: Malliaros, Fragkiskos D. Megalooikonomou, Vasileios Faloutsos, Christos Dept. of Computer Engineering and Informatics University of Patras Rio Greece Dept. of Computer Engineering and Informatics Center for Information Science and Technology University of Patras Rio PA Greece School of Computer Science Carnegie Mellon University PA United States
Given a large social graph, like a scientific collaboration network, what can we say about its robustness? Can we estimate a robustness index for a graph quickly? If the graph evolves over time, how these properties c... 详细信息
来源: 评论
An open design privacy-enhancing platform supporting location-based applications  12
An open design privacy-enhancing platform supporting locatio...
收藏 引用
6th International Conference on Ubiquitous information Management and Communication, ICUIMC'12
作者: Dang, Tran Khanh Ngo, Chan Nam Phan, Trong Nhan Ngo, Nguyen Nhat Minh Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology Viet Nam Dept. of Information Engineering and Computer Science University of Trento Italy
The world of location-based services (LBS) has been becoming more diversifying and amazing with its rapid growth in recent years. Moreover, the development has spread to many aspects in all walks of life and got power... 详细信息
来源: 评论