咨询与建议

限定检索结果

文献类型

  • 6,061 篇 会议
  • 907 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 7,040 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,442 篇 工学
    • 3,471 篇 计算机科学与技术...
    • 2,909 篇 软件工程
    • 1,320 篇 信息与通信工程
    • 670 篇 控制科学与工程
    • 478 篇 生物工程
    • 436 篇 电气工程
    • 433 篇 电子科学与技术(可...
    • 329 篇 生物医学工程(可授...
    • 305 篇 光学工程
    • 271 篇 机械工程
    • 233 篇 仪器科学与技术
    • 211 篇 动力工程及工程热...
    • 170 篇 化学工程与技术
    • 160 篇 安全科学与工程
    • 159 篇 交通运输工程
    • 132 篇 建筑学
  • 2,120 篇 理学
    • 1,193 篇 数学
    • 537 篇 物理学
    • 496 篇 生物学
    • 376 篇 统计学(可授理学、...
    • 242 篇 系统科学
    • 163 篇 化学
  • 1,165 篇 管理学
    • 698 篇 管理科学与工程(可...
    • 516 篇 图书情报与档案管...
    • 357 篇 工商管理
  • 294 篇 医学
    • 256 篇 临床医学
    • 234 篇 基础医学(可授医学...
    • 141 篇 公共卫生与预防医...
    • 141 篇 药学(可授医学、理...
  • 200 篇 法学
    • 149 篇 社会学
  • 145 篇 农学
  • 117 篇 教育学
  • 109 篇 经济学
  • 25 篇 文学
  • 16 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 197 篇 accuracy
  • 190 篇 feature extracti...
  • 154 篇 computational mo...
  • 145 篇 training
  • 115 篇 computer science
  • 114 篇 deep learning
  • 111 篇 real-time system...
  • 105 篇 data mining
  • 101 篇 support vector m...
  • 95 篇 servers
  • 94 篇 predictive model...
  • 93 篇 machine learning
  • 86 篇 artificial intel...
  • 84 篇 data models
  • 83 篇 cloud computing
  • 82 篇 internet of thin...
  • 81 篇 protocols
  • 79 篇 semantics
  • 78 篇 computer archite...
  • 78 篇 quality of servi...

机构

  • 115 篇 dept. of compute...
  • 85 篇 dept. of informa...
  • 76 篇 institute of inf...
  • 60 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 41 篇 dept. of compute...
  • 37 篇 dept. of compute...
  • 33 篇 dept. of compute...
  • 28 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 22 篇 school of automa...
  • 22 篇 dept. of compute...
  • 21 篇 graduate institu...
  • 20 篇 dept. of compute...
  • 20 篇 dept. of compute...
  • 19 篇 dept. of informa...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...

作者

  • 46 篇 lorenzo bruzzone
  • 25 篇 li kuan-ching
  • 22 篇 jian-jhih kuo
  • 20 篇 libertario demi
  • 20 篇 yen-lin chen
  • 19 篇 ren-hung hwang
  • 18 篇 mei-hui wang
  • 18 篇 chen yen-lin
  • 18 篇 luca turchet
  • 16 篇 francesca bovolo
  • 16 篇 chang-shing lee
  • 16 篇 hwang ren-hung
  • 15 篇 kwon soonhak
  • 15 篇 jia-ching wang
  • 15 篇 hung yi-ping
  • 14 篇 lee yue-shi
  • 14 篇 bae hae-young
  • 13 篇 horng shi-jinn
  • 13 篇 watabe hirokazu
  • 13 篇 wu eric hsiao-ku...

语言

  • 6,730 篇 英文
  • 225 篇 其他
  • 60 篇 中文
  • 19 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Science& Information Engineering"
7040 条 记 录,以下是4721-4730 订阅
排序:
RuleGrowth: Mining sequential rules common to several sequences by pattern-growth  11
RuleGrowth: Mining sequential rules common to several sequen...
收藏 引用
Proceedings of the 2011 ACM Symposium on Applied Computing
作者: Fournier-Viger, Philippe Nkambou, Roger Tseng, Vincent Shin-Mu Dept. of Computer Science and Information Engineering National Cheng Kung University Tainan Taiwan Dept. of Computer Science Univ. of Quebec in Montreal Montréal QC Canada
Mining sequential rules from large databases is an important topic in data mining fields with wide applications. Most of the relevant studies focused on finding sequential rules appearing in a single sequence of event... 详细信息
来源: 评论
Low complexity underwater image enhancement based on dark channel prior
Low complexity underwater image enhancement based on dark ch...
收藏 引用
2011 2nd International Conference on Innovations in Bio-inspired Computing and Applications, IBICA 2011
作者: Yang, Hung-Yu Chen, Pei-Yin Huang, Chien-Chuan Zhuang, Ya-Zhu Shiau, Yeu-Horng Dept. of Computer Science and Information Engineering National Cheng Kung University Tainan Taiwan Dept. of Electrical Engineering National Yunlin University of Science and Technology Yunlin Taiwan
Blurred underwater image is always an annoying problem in the oceanic engineering. In this paper, we propose an efficient and low complexity underwater image enhancement method based on dark channel prior. Our method ... 详细信息
来源: 评论
Automatic construction of jump-oriented programming shellcode (on the x86)  11
Automatic construction of jump-oriented programming shellcod...
收藏 引用
6th International Symposium on information, computer and Communications Security, ASIACCS 2011
作者: Chen, Ping Xing, Xiao Mao, Bing Xie, Li Shen, Xiaobin Yin, Xinchun Dept. of Computer Science and Technology State Key Laboratory for Novel Software Technology Nanjing University China Dept. of Computer Science College of Information Engineering Yangzhou University China
Return-Oriented Programming (ROP) is a technique which leverages the instruction gadgets in existing libraries/executables to construct Turing complete programs. However, ROP attack is usually composed with gadgets wh...
来源: 评论
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2012年 7248 LNCS卷 VI-XI页
作者: Di Chio, Cecilia Agapitos, Alexandros Cagnoni, Stefano Cotta, Carlos De Vega, F. Fernández Di Caro, Gianni Drechsler, Rolf Ekárt, Anikó Esparcia-Alcázar, Anna I. Farooq, Muddassar Langdon, William B. Merelo-Guervós, Juan-J. Preuss, Mike Richter, Hendrik Silva, Sara Simões, Anabela Squillero, Giovanni Tarantino, Ernesto Tettamanzi, Andrea G.B. Togelius, Julian Urqhart, Neil Uyar, A. Şima Yannakakis, Georgios N. University College Dublin Ireland Dept. of Computer Engineering University of Parma Italy Dept. Lenguajes Y Ciencias de la Computación University of Málaga Spain University of Extremadura Spain Lugano Switzerland Cyber-Physical Systems DFKI Bremen Germany Computer Science Aston University Birmingham United Kingdom S2 Grupo Spain National University of Computer and Emerging Sciences Islamabad Pakistan University College London United Kingdom Departamento de Arquitectura Y Tecnología de Computadores Universidad de Granada Spain TU Dortmund University Germany Faculty of Electrical Engineering and Information Technology HTWK Leipzig University of Applied Sciences Germany INESC-ID Lisboa Portugal Coimbra Institute of Engineering Coimbra Polytechnic Coimbra Portugal Politecnico di Torino Italy Institute for High Performance Computing and Networking Italy Università degli Studi di Milano Italy Center for Computer Games Research IT University of Copenhagen Denmark Centre for Emergent Computing Edinburgh Napier University United Kingdom Dept. of Computer Engineering Istanbul Technical University Turkey
来源: 评论
Access control of cloud computing using rapid face and fingerprint identification
Access control of cloud computing using rapid face and finge...
收藏 引用
2011 2nd International Conference on Innovations in Bio-inspired Computing and Applications, IBICA 2011
作者: Chang, Bao Rong Tsai, Hsiu-Fen Chen, Chi-Ming Huang, Chien-Feng Dept. of Computer Science and Information Engineering National University of Kaohsiung Taiwan Dept. of Marketing Management Sue-Te University Taiwan
In this paper,a fast access control applied to Hadoop cloud computing using the fingerprint identiication and face recognition is *** study employed a way of low-capacity Linux embedded platform linked to Hadoop via E... 详细信息
来源: 评论
Access security on cloud computing implemented in Hadoop system
Access security on cloud computing implemented in Hadoop sys...
收藏 引用
5th International Conference on Genetic and Evolutionary Computing, ICGEC2011
作者: Chang, Bao Rong Tsai, Hsiu Fen Lin, Zih-Yao Chen, Chi-Ming Dept. of Computer Science and Information Engineering National University of Kaohsiung Taiwan Dept. of Marketing Management Sue-Te University Taiwan
In this paper, we introduce a Hadoop cloud computing together with access security by using the fingerprint identification and face recognition. Hadoop cloud computing is connected to serve plenty of mobile devices or... 详细信息
来源: 评论
Anytime algorithms for GPU architectures
Anytime algorithms for GPU architectures
收藏 引用
2011 32nd IEEE Real-Time Systems Symposium, RTSS 2011
作者: Mangharam, Rahul Saba, Aminreza Abrahimi Dept. of Computer and Information Science University of Pennsylvania United States Dept. of Electrical and Systems Engineering University of Pennsylvania United States
Most algorithms are run-to-completion and provide one answer upon completion and no answer if interrupted before completion. On the other hand, anytime algorithms have a monotonic increasing utility with the length of... 详细信息
来源: 评论
The design of a video-based OSGi-compliant remote home network control system
The design of a video-based OSGi-compliant remote home netwo...
收藏 引用
IEEE International Conference on Ubi-media Computing
作者: Chiu, Chuan-Feng Huang, Chun-Hong Hsu, Steen J. Jan, Sen-Ren Department of Information Management Minghsin University of Science and Technology Taiwan Dept. of Computer Information and Network Engineering Lunghwa University of Science and Technology Taiwan
With the population of networking infrastructure in home area, we can realize Smart Home nowadays. Automation, zero-configuration and easy to use are the major requirements of Smart Home. In this paper, we propose a d... 详细信息
来源: 评论
Fuzzy graph-theoretical clustering approach on spatial relationship constrain
Fuzzy graph-theoretical clustering approach on spatial relat...
收藏 引用
International Conference on Intelligence science and information engineering (ISIE)
作者: Liu, Suolan Wang, Jianguo Wang, Hongyuan School of Information Science and Engineering Changzhou University Changzhou China Computer Science Dept. Tangshan College Tangshan China
In the process of segmentation the traditional graph-theoretical clustering method is sensitive to noise and fuzzy edges,thus false segmentation result is appeared. Further, the large computational complexity also aff... 详细信息
来源: 评论
Change impact analysis for object-oriented programs evolved to aspect-oriented programs  11
Change impact analysis for object-oriented programs evolved ...
收藏 引用
Proceedings of the 2011 ACM Symposium on Applied Computing
作者: Liu, Chien-Hung Chen, Shu-Ling Jhu, Wei-Lun Dept. of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan Dept. of Management and Information Technology Southern Taiwan University Tainan Taiwan
When object-oriented programs evolve to aspect-oriented programs (AOP), the behavior of the evolved programs can become complex and hard to understand because the aspects woven into object-oriented programs can change... 详细信息
来源: 评论