咨询与建议

限定检索结果

文献类型

  • 6,061 篇 会议
  • 907 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 7,040 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,442 篇 工学
    • 3,471 篇 计算机科学与技术...
    • 2,909 篇 软件工程
    • 1,320 篇 信息与通信工程
    • 670 篇 控制科学与工程
    • 478 篇 生物工程
    • 436 篇 电气工程
    • 433 篇 电子科学与技术(可...
    • 329 篇 生物医学工程(可授...
    • 305 篇 光学工程
    • 271 篇 机械工程
    • 233 篇 仪器科学与技术
    • 211 篇 动力工程及工程热...
    • 170 篇 化学工程与技术
    • 160 篇 安全科学与工程
    • 159 篇 交通运输工程
    • 132 篇 建筑学
  • 2,120 篇 理学
    • 1,193 篇 数学
    • 537 篇 物理学
    • 496 篇 生物学
    • 376 篇 统计学(可授理学、...
    • 242 篇 系统科学
    • 163 篇 化学
  • 1,165 篇 管理学
    • 698 篇 管理科学与工程(可...
    • 516 篇 图书情报与档案管...
    • 357 篇 工商管理
  • 294 篇 医学
    • 256 篇 临床医学
    • 234 篇 基础医学(可授医学...
    • 141 篇 公共卫生与预防医...
    • 141 篇 药学(可授医学、理...
  • 200 篇 法学
    • 149 篇 社会学
  • 145 篇 农学
  • 117 篇 教育学
  • 109 篇 经济学
  • 25 篇 文学
  • 16 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 197 篇 accuracy
  • 190 篇 feature extracti...
  • 154 篇 computational mo...
  • 145 篇 training
  • 115 篇 computer science
  • 114 篇 deep learning
  • 111 篇 real-time system...
  • 105 篇 data mining
  • 101 篇 support vector m...
  • 95 篇 servers
  • 94 篇 predictive model...
  • 93 篇 machine learning
  • 86 篇 artificial intel...
  • 84 篇 data models
  • 83 篇 cloud computing
  • 82 篇 internet of thin...
  • 81 篇 protocols
  • 79 篇 semantics
  • 78 篇 computer archite...
  • 78 篇 quality of servi...

机构

  • 115 篇 dept. of compute...
  • 85 篇 dept. of informa...
  • 76 篇 institute of inf...
  • 60 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 41 篇 dept. of compute...
  • 37 篇 dept. of compute...
  • 33 篇 dept. of compute...
  • 28 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 22 篇 school of automa...
  • 22 篇 dept. of compute...
  • 21 篇 graduate institu...
  • 20 篇 dept. of compute...
  • 20 篇 dept. of compute...
  • 19 篇 dept. of informa...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...

作者

  • 46 篇 lorenzo bruzzone
  • 25 篇 li kuan-ching
  • 22 篇 jian-jhih kuo
  • 20 篇 libertario demi
  • 20 篇 yen-lin chen
  • 19 篇 ren-hung hwang
  • 18 篇 mei-hui wang
  • 18 篇 chen yen-lin
  • 18 篇 luca turchet
  • 16 篇 francesca bovolo
  • 16 篇 chang-shing lee
  • 16 篇 hwang ren-hung
  • 15 篇 kwon soonhak
  • 15 篇 jia-ching wang
  • 15 篇 hung yi-ping
  • 14 篇 lee yue-shi
  • 14 篇 bae hae-young
  • 13 篇 horng shi-jinn
  • 13 篇 watabe hirokazu
  • 13 篇 wu eric hsiao-ku...

语言

  • 6,730 篇 英文
  • 225 篇 其他
  • 60 篇 中文
  • 19 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Science& Information Engineering"
7040 条 记 录,以下是4691-4700 订阅
排序:
XML-based reusable component repository for embedded software
XML-based reusable component repository for embedded softwar...
收藏 引用
35th Annual IEEE International computer Software and Applications Conference Workshops, COMPSACW 2011
作者: Chang, Chih-Hung Lu, Chih-Wei Chu, William C. Yang, Chao-Tung Hsiung, Pao-Ann Hsueh, Nien-Lin Koong, Chorng-Shiuh Shao, Kuei-Kai Dept. of Information Management Hsiuping Institute of Technology Taichung Taiwan Dept. of Computer Science Tunghai University Taichung Taiwan Dept. of Computer Science and Information Engineering National Chung Cheng University Chia-Yi Taiwan Dept. of Information Engineering and Computer Science Feng Chia University Taichung Taiwan Dept. of Computer and Information Science Taichung University Taichung City Taiwan Service Systems Technology Center Industrial Technology Research Institute Hsinchu Taiwan
In the development stage of the embedded system, the market demand and system development trend will be influence by the Time to Market. Reliable and fast system deployment is not easy to implement. Reduced price and ... 详细信息
来源: 评论
A robust anti-tamper protection scheme
A robust anti-tamper protection scheme
收藏 引用
2011 6th International Conference on Availability, Reliability and Security, ARES 2011
作者: Tsang, Hing-Chung Lee, Moon-Chuen Pun, Chi-Man Dept. of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong Dept. of Computer and Information Science University of Macau Macau China
This paper proposes a robust antitamper protection scheme to protect any critical regions of a program from being modified, using possibly a large number of lightweight protection units, called protectors, installed a... 详细信息
来源: 评论
Advanced statistical and adaptive threshold techniques for moving object detection and segmentation
Advanced statistical and adaptive threshold techniques for m...
收藏 引用
International Conference on Digital Signal Processing
作者: Christodoulou, Lakis Kasparis, Takis Marques, Oge Cyprus University of Technology Dept. of Electrical Engineering and Information Technology Cyprus Florida Atlantic University Dept. of Computer and Electrical Engineering and Computer Science United States
The current research project proposes advanced statistical and adaptive threshold techniques for video object detection and segmentation. We present new statistical adaptive threshold techniques to show the advantages... 详细信息
来源: 评论
Bus FTTH networks
Bus FTTH networks
收藏 引用
作者: Chiou, R.N. Dept. of Computer Science Information Engineering Southern Taiwan University Taiwan
The considerable concern about the high constructing and maintaining costs is the bottleneck of rapid and world-wide fiber-to-the-home (FTTH) deployment. However, it is also important to maintain high communicative pe... 详细信息
来源: 评论
A review of image analysis techniques for gene spot identification in cDNA Microarray images
A review of image analysis techniques for gene spot identifi...
收藏 引用
作者: Karim, Rezaul Khaliluzzaman, Md. Mahmud, Sohel Dept. of Computer Science and Engineering University of Chittagong Chittagong Bangladesh Dept. of Computer Science and Engineering University of Information Technology and Sciences Chittagong Bangladesh Dept. of Computer Science and Engineering Shah Jalal University of Science and Technology Sylhet Bangladesh
This paper reports about the latest instrumentation technique of Gene Expression using DNA Microarray. DNA Microarray Image Analysis is a new and exciting computing paradigm with biological background. It involves the... 详细信息
来源: 评论
Extending the Lifetime of M2M Wireless Networks through Cooperation
Extending the Lifetime of M2M Wireless Networks through Coop...
收藏 引用
IEEE International Conference on Communications
作者: G. Botter J. Alonso-Zarate L. Alonso F. Granelli C. Verikoukis Dept. of Information Engineering and Computer Science University of Trento Centre Tecnologic de Telecomunicacions de Catalunya (CTTC) Dept. of Signal Theory and Communications Universitat Politecnica de Catalunya (UPC)
In this paper we show how a cooperative Medium Access Control (MAC) protocol can help extend the lifetime of Machine to Machine (M2M) networks. A comparison between non-cooperative Automatic Repeat reQuest (ARQ) schem... 详细信息
来源: 评论
SBAD: Sequence based attack detection via sequence comparison
SBAD: Sequence based attack detection via sequence compariso...
收藏 引用
Lecture Notes in computer science
作者: Mao, Ching-Hao Pao, Hsing-Kuo Faloutsos, Christos Lee, Hahn-Ming Dept. of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei Taiwan Dept. of Computer Science Carnegie Mellon University Pittsburgh United States Institute of Information Science Academia Sinica Taipei Taiwan
Given a stream of time-stamped events, like alerts in a network monitoring setting, how can we isolate a sequence of alerts that form a network attack? We propose a Sequence Based Attack Detection (SBAD) method, which... 详细信息
来源: 评论
D* lite based real-time multi-agent path planning in dynamic environments
D* lite based real-time multi-agent path planning in dynamic...
收藏 引用
2nd International Conference on Computational Intelligence, Modelling and Simulation 2011, CIMSim 2011
作者: Al-Mutib, Khalid Alsulaiman, Mansour Emaduddin, Muhammad Ramdane, Hedjar Mattar, Ebrahim Dept. of Computer Engineering College of Computer Science and Information King Saud University Riyadh Saudi Arabia Electrical and Electronics Engineering Dept. College of Engineering University of Bahrain Bahrain
D* based navigation algorithms provide robust and real-time means of achieving path planning in dynamic environments. Author of this paper introduces a notion of predictable time-based obstacles. The algorithm propose... 详细信息
来源: 评论
Quantization-and prediction-based image authentication and recovery
Quantization-and prediction-based image authentication and r...
收藏 引用
5th International Conference on Genetic and Evolutionary Computing, ICGEC2011
作者: Wu, Wen-Chuan Hsieh, Yi-Pei Dept. of Computer Science and Information Engineering Aletheia University Taipei 25103 Taiwan Dept. of Information Engineering and Informatics Tzu Chi College of Technology Hualien 970 Taiwan
This paper proposed an image authentication technique based on a data compression and prediction mechanism in order to verify if a digital image was tampered with over the network. For image blocks, first is to produc... 详细信息
来源: 评论
Case study of efficient parallel memory access programming for the embedded heterogeneous multicore DSP architecture ePUMA
Case study of efficient parallel memory access programming f...
收藏 引用
5th International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2011
作者: Hansson, Erik Sohl, Joar Kessler, Christoph Liu, Dake Dept. of Computer and Information Science Linköpings Universitet Sweden Dept. of Electrical Engineering Linköpings Universitet Sweden
We consider the challenges in writing efficient code for ePUMA, a novel domain-specific heterogeneous multicore architecture with SIMD DSP slave cores, multi-banked on-chip vector register files for parallel access an... 详细信息
来源: 评论