咨询与建议

限定检索结果

文献类型

  • 1,237 篇 会议
  • 194 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,467 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 932 篇 工学
    • 781 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 生物医学工程(可授...
    • 59 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,320 篇 英文
  • 135 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1467 条 记 录,以下是1081-1090 订阅
排序:
A Re-examination of Lexical Association Measures
A Re-examination of Lexical Association Measures
收藏 引用
2009 Workshop on Multiword Expressions: Identification, Interpretation, Disambiguation, Applications, MWE 2009
作者: Hoang, Hung Huu Kim, Su Nam Kan, Min-Yen Dept. of Computer Science National University of Singapore Singapore Dept. of Computer Science and Software Engineering University of Melbourne Australia
We review lexical Association Measures (AMs) that have been employed by past work in extracting multiword expressions. Our work contributes to the understanding of these AMs by categorizing them into two groups and su... 详细信息
来源: 评论
Ballot permutations in Prêt à voter
Ballot permutations in Prêt à voter
收藏 引用
2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2009, Held in Conjunction with the 18th USENIX Security Symposium
作者: Ryan, Peter Y.A. Teague, Vanessa Dept. Computer Science and Communications University of Luxembourg Luxembourg Dept. Computer Science and Software Engineering University of Melbourne Australia
Handling full permutations of the candidate list along with re-encryption mixes is rather difficult in Prêt à Voter but handling cyclic shifts is straightforward. One of the versions of Prêt à Vote... 详细信息
来源: 评论
Propagating Requirement Change into software High Level Designs towards Resilient software Evolution
Propagating Requirement Change into Software High Level Desi...
收藏 引用
16th Asia-Pacific software engineering Conference
作者: Ibrahim, Noraini Kadir, Wan M. N. Wan Deris, Safaai Software Engineering Dept. Faculty of Computer Science and Information System Universiti Teknologi Malaysia Malaysia
Uncertain and incomplete requirements throughout the whole software life cycle contribute to volatility of the requirements. In a situation where the volatile requirement is changed to satisfy stakeholder needs, all t... 详细信息
来源: 评论
A session generalization technique for improved web usage mining
A session generalization technique for improved web usage mi...
收藏 引用
ACM CIKM 2009 Workshop on Web Information and Data Management, WIDM 2009, Co-located with the 18th ACM International Conference on Information and Knowledge Management, CIKM 2009
作者: Hasan, Tahira Mudur, Sudhir P. Shiri, Nematollaah Dept. of Computer Science and Software Engineering Concordia University Montreal QC Canada
Generalization of web sessions is an effective approach used to overcome two major challenges in web usage mining, namely quality and scalability. Given a concept hierarchy, such as a website, generalization replaces ... 详细信息
来源: 评论
Query processing and optimization for logic programs with certainty constraints
Query processing and optimization for logic programs with ce...
收藏 引用
22nd International Florida Artificial Intelligence Research Society Conference, FLAIRS-22
作者: Lai, Jinzan Shiri, Nematollaah Dept. of Computer Science and Software Engineering Concordia University Montreal QC Canada
Numerous logic frameworks have been proposed for modeling uncertainty and reasoning with such data. While different in syntax, the approaches of these frameworks have been classified into "annotation based" ... 详细信息
来源: 评论
Using patterns for faster and scalable rewriting of conjunctive queries
Using patterns for faster and scalable rewriting of conjunct...
收藏 引用
3rd Alberto Mendelzon International Workshop on Foundations of Data Management, AMW 2009
作者: Kiani, Ali Shiri, Nematollaah Dept. of Computer Science and Software Engineering Concordia University Montreal QC Canada
Rewriting of conjunctive queries using views has many applications in database and data *** investigate ways to improve performance of rewriting and propose a new algorithm which has two phases. In the first phase, si... 详细信息
来源: 评论
A framework for goal-Based semantic compensation in agent systems
A framework for goal-Based semantic compensation in agent sy...
收藏 引用
Lecture Notes in computer science
作者: Unruh, Amy Bailey, James Ramamohanarao, Kotagiri Dept. of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia
This paper describes an approach to improving the robustness of an agent system by augmenting its failure-handling capabilities. The approach is based on the concept of semantic compensation: "cleaning up" f... 详细信息
来源: 评论
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2010年 第PART 3期6278 LNAI卷 VI页
作者: Setchi, Rossitza Jordanov, Ivan Howlett, Robert J. Jain, Lakhmi C. Cardiff University School of Engineering The Parade Cardiff CF24 3AA United Kingdom University of Portsmouth Dept. of Computer Science and Software Engineering Buckingham Building Lion Terrace Portsmouth PO1 3HE United Kingdom KES International 145-157 St. John Street London EC1V 4PY United Kingdom University of South Australia School of Electrical and Information Engineering Mawson Lakes Campus Adelaide SA 5095 Australia
来源: 评论
Document compaction for efficient query biased snippet generation  1
收藏 引用
31th European Conference on Information Retrieval, ECIR 2009
作者: Tsegay, Yohannes Puglisi, Simon J. Turpin, Andrew Zobel, Justin School of Computer Science and IT RMIT University Melbourne Australia Dept. Computer Science and Software Engineering University of Melbourne Australia
Current web search engines return query-biased snippets for each document they list in a result set. For efficiency, search engines operating on large collections need to cache snippets for common queries, and to cach... 详细信息
来源: 评论
PROS: A peer-to-peer system for location privacy protection on road networks (demo paper)  09
PROS: A peer-to-peer system for location privacy protection ...
收藏 引用
17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2009
作者: Bao, Jie Chen, Haiquan Ku, Wei-Shinn Dept. of Computer Science and Software Engineering Auburn University Auburn AL 36849 United States
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloaked into a spatial region that contains... 详细信息
来源: 评论