咨询与建议

限定检索结果

文献类型

  • 1,237 篇 会议
  • 193 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,466 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 932 篇 工学
    • 781 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 生物医学工程(可授...
    • 59 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 dept. of compute...
  • 7 篇 state key labora...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,319 篇 英文
  • 135 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1466 条 记 录,以下是1091-1100 订阅
排序:
The proper treatment of undefinedness in constraint languages  1
收藏 引用
15th International Conference on Principles and Practice of Constraint Programming, CP 2009
作者: Frisch, Alan M. Stuckey, Peter J. Artificial Intelligence Group Dept. of Computer Science Univ. of York United Kingdom National ICT Australia Dept. of Computer Science and Software Engineering Univ. of Melbourne Australia
Any sufficiently complex finite-domain constraint modelling language has the ability to express undefined values, for example division by zero, or array index out of bounds. This paper gives the first systematic treat... 详细信息
来源: 评论
Self-encryption scheme for data security in mobile devices
Self-encryption scheme for data security in mobile devices
收藏 引用
2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009
作者: Chen, Yu Ku, Wei-Shinn Dept. of Electrical and Computer Engineering SUNY - Binghamton Binghamton NY 13902 United States Dept. of Computer Science and Software Engineering Auburn University Auburn AL 36849 United States
The pervasive use of wireless networks and mobile devices has been changing our living style significantly. Along with great convenience and efficiency, there are new challenges in protecting sensitive and/or private ... 详细信息
来源: 评论
Secure biometric system for accessing home appliances via internet
Secure biometric system for accessing home appliances via in...
收藏 引用
International Conference for Internet Technology and Secured Transactions, ICITST 2009
作者: Mondal, Arpita Roy, Kaushik Bhattacharya, Prabir Dept. of Computer Science and Software Engineering Concordia University Canada Concordia Institute for Information Systems Engineering Concordia University Canada
Alongside multitude of innovations and consequential changes in lifestyle, the ability to access home appliances or security cameras over the Internet has been in demand for some years now. In this paper, we propose a... 详细信息
来源: 评论
Awareness and forgetting of facts and agents
Awareness and forgetting of facts and agents
收藏 引用
Information Processing, Rational Belief Change and Social Interaction 2009
作者: van Ditmarsch, Hans French, Tim Dept. Logic University of Sevilla Sevilla Spain Computer Science and Software Engineering University of Western Australia Perth Australia
We propose various logical semantics for change of awareness. The setting is that of multiple agents that may become aware of facts or other agents, or forget about them. We model these dynamics by quantifying over pr... 详细信息
来源: 评论
Characterizing the Scaling Capacity of Multiple Gateway Access in Wireless Sensor Networks
Characterizing the Scaling Capacity of Multiple Gateway Acce...
收藏 引用
International Conference on Scalable Computing and Communications/8th International Conference on Embedded Computing
作者: Yang, Panlong Dong, Chao Wang, Hai Chen, Guihai Institute of Communication Engineering P.L.A University of Science and Technology State Key Laboratory for Novel Software Technology Dept. of Computer Science Nanjing University China
We study the scaling capacity of wireless sensor networks in case of multiple gateways are presented. In such a heterogeneous network, many gateways are needed to gather data from the sensor nodes in network. Differen... 详细信息
来源: 评论
Experiment to evaluate teaching formal specifications using model checking
Experiment to evaluate teaching formal specifications using ...
收藏 引用
2009 ASEE Annual Conference and Exposition
作者: Salamah, Salamah Roach, Steve Ochoa, Omar Medina, Veronica Gates, Ann Computer and Software Engineering Dept. Embry-Riddle Aeronautical University Daytona Beach United States Computer Science Dept. University of Texas at El Paso. El Paso United States
The difficulty of writing, reading, and understanding formal specifications remains one of the main obstacles in adopting formal verification techniques such as model checking, theorem and runtime verification. In ord... 详细信息
来源: 评论
Issues in pattern mining and their resolutions
Issues in pattern mining and their resolutions
收藏 引用
2009 Canadian Conference on computer science and software engineering, C3S2E '09
作者: Wang, Tongyuan Desai, Bipin C. Dept. of Computer Science and Software Engineering Concordia University Montreal H3G 1M8 Canada
Frequent pattern mining over large database is fundamental to many data mining applications. Various approaches have been proposed for pattern mining with respectable computational performance. However, our study has ... 详细信息
来源: 评论
Fast spectral color image segmentation based on filtering and clustering
Fast spectral color image segmentation based on filtering an...
收藏 引用
MIPPR 2009 - Multispectral Image Acquisition and Processing: 6th International Symposium on Multispectral Image Processing and Pattern Recognition
作者: Xing, Min Li, Hongyu Jia, Jinyuan Parkkinen, Jussi School of Software Engineering Tongji University Shanghai 201804 China Dept. of Computer Science and Statistics University of Joensuu Joensuu 80101 Finland
This paper proposes a fast approach to spectral image segmentation. In the algorithm, two popular techniques are extended and applied to spectral color images: the mean-shift filtering and the kernel-based clustering.... 详细信息
来源: 评论
Origami simulator: A multi-touch experience
Origami simulator: A multi-touch experience
收藏 引用
27th International Conference Extended Abstracts on Human Factors in Computing Systems, CHI 2009
作者: Chang, Samuel Hsiao-Heng Wünsche, Burkhard Stuart, Lachlan Plimmer, Beryl Dept. of Software Engineering University of Auckland Private Bag 92119 Auckland New Zealand Dept. of Computer Science University of Auckland Private Bag 92119 Auckland New Zealand
We present a 3D origami simulator with multi-touch interaction. This is a preliminary exploration of manipulating 3D models with multi-touch. Following a user centered approach, we analyzed how people make paper origa... 详细信息
来源: 评论
Reasoning intra-dependency in commitments for robust scheduling
Reasoning intra-dependency in commitments for robust schedul...
收藏 引用
8th International Joint Conference on Autonomous Agents and Multiagent Systems 2009, AAMAS 2009
作者: Wang, Mingzhong Ramamohanarao, Kotagiri Chen, Jinjun Dept. of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia Faculty of ICT Swinburne University of Technology VIC 3122 Australia
Commitment-modeled protocols enable flexible and robust interactions among agents. However, existing work has focused on features and capabilities of protocols without considering the active role of agents in them. Th... 详细信息
来源: 评论