咨询与建议

限定检索结果

文献类型

  • 1,237 篇 会议
  • 193 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,466 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 932 篇 工学
    • 781 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 生物医学工程(可授...
    • 59 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 dept. of compute...
  • 7 篇 state key labora...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,319 篇 英文
  • 135 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1466 条 记 录,以下是1101-1110 订阅
排序:
Towards the development of an autonomic network management architecture
Towards the development of an autonomic network management a...
收藏 引用
2009 4th International Conference on Communications and Networking in China, CHINACOM 2009
作者: Strassner, John Hong, James Won-Ki Telecommunications Systems and Software Group Waterford Institute of Technology Carriganore County Waterford Ireland Dept. of Computer Science and Engineering Pohang University of Science and Technology Pohang Korea Republic of
The current Internet did not define any inherent management constructs and mechanisms;such concepts were added after networking standards and architectures were constructed. This also influenced network management for... 详细信息
来源: 评论
Integrating visual and semantic contexts for topic network generation and word sense disambiguation  09
Integrating visual and semantic contexts for topic network g...
收藏 引用
ACM International Conference on Image and Video Retrieval, CIVR 2009
作者: Fan, Jianping Luo, Hangzai Shen, Yi Yang, Chunlei Dept. of Computer Science UNC-Charlotte Charlotte NC 28223 United States Software Engineering Institute East China Normal University Shanghai 200062 China
To support more effective searches in large-scale weakly-tagged image collections, we have developed a novel algorithm to integrate both the visual similarity contexts between the images and the semantic similarity co... 详细信息
来源: 评论
Facial caricature generation using a quadratic deformation model
Facial caricature generation using a quadratic deformation m...
收藏 引用
International Conference on Advances in computer Entertainment Technology, ACE 2009
作者: Obaid, M. Lond, D. Mukundan, R. Billinghurst, M. HITLab. New Zealand University of Canterbury Christchurch New Zealand Computer Science and Software Engineering Dept. University of Canterbury New Zealand Dept. of Mathematics and Statistics University of Canterbury New Zealand
In this paper we propose a novel approach for generating expressive caricatures from an input image. The novelty of this work comes from combining an Active Appearance Model facial feature extraction system with a qua... 详细信息
来源: 评论
Semi-Supervised learning using label mean  09
Semi-Supervised learning using label mean
收藏 引用
26th Annual International Conference on Machine Learning, ICML'09
作者: Yu-Feng, Li Kwok, James T. Zhi-Hua, Zhou National Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Dept. Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Hong Kong Hong Kong
Semi-Supervised Support Vector Machines(S3VMs) typically directly estimate the label assignments for the unlabeled instances. This is often inefficient even with recent advances in the efficient training of the (super... 详细信息
来源: 评论
Semi-supervised learning using label mean
Semi-supervised learning using label mean
收藏 引用
26th International Conference On Machine Learning, ICML 2009
作者: Li, Yu-Feng Kwok, James T. Zhou, Zhi-Hua National Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Dept. Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Hong Kong Hong Kong
Semi-Supervised Support Vector Machines (S3VMs) typically directly estimate the label assignments for the unlabeled instances. This is often inefficient even with recent advances in the efficient training of the (supe... 详细信息
来源: 评论
Face image modeling by multilinear subspace analysis with missing values  09
Face image modeling by multilinear subspace analysis with mi...
收藏 引用
17th ACM International Conference on Multimedia, MM'09, with Co-located Workshops and Symposiums
作者: Geng, Xin Smith-Miles, Kate Zhou, Zhi-Hua Wang, Liang School of Mathematical Sciences Monash University VIC 3800 Australia School of Computer Science and Engineering Southeast University Nanjing 210096 China National Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Dept. of Computer Science and Software Eng. University of Melbourne VIC 3010 Australia
The main difficulty in face image modeling is to decompose those semantic factors contributing to the formation of the face images, such as identity, illumination and pose. One promising way is to organize the face im... 详细信息
来源: 评论
LITSEEK: Public health Literature Search by metadata enhancement with External Knowledge bases
LITSEEK: Public health Literature Search by metadata enhance...
收藏 引用
3rd ACM International Workshop on Data and Text Mining in Bioinformatics, DTMBIO'09, Co-located with the 18th ACM International Conference on Information and Knowledge Management, CIKM 2009
作者: Prabhu, Priyanka Sharad Navathe, Shamkant B. Tyler, Stephen Dasigi, Venu Narkhede, Neha Palanisamy, Balaji College of Computing Georgia Institute of Technology Atlanta GA 30332-0280 United States Dept. of Computer Science and Software Engineering Southern Polytechnic State University Marietta GA 30060-2855 United States
Biomedical literature is an important source of information in any researcher's investigation of genes, risk factors, diseases and drugs. Often the information searched by public health researchers is distributed ... 详细信息
来源: 评论
Asymmetric group key agreement
Asymmetric group key agreement
收藏 引用
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009
作者: Qianhong, Wu Yi, Mu Susilo, Willy Bo, Qin Domingo-Ferrer, Josep Universitat Rovira i Virgili Dept. of Comp. Eng. and Maths UNESCO Department of Data Privacy Tarragona Catalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing School of Computer Wuhan University China Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Australia Dept. of Maths School of Science Xi'an University of Technology China
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish a confiDential channel among group m... 详细信息
来源: 评论
Reasoning Intra-Dependency in Commitments for Robust Scheduling  09
Reasoning Intra-Dependency in Commitments for Robust Schedul...
收藏 引用
International Conference on Autonomous Agents and Multiagent Systems
作者: Mingzhong Wang Kotagiri Ramamohanarao Jinjun Chen Dept. of Computer Science and Software Engineering The University of Melbourne Faculty of ICT Swinburne University of Technology
Commitment-modeled protocols enable flexible and robust interactions among agents. However, existing work has focused on features and capabilities of protocols without considering the active role of agents in them. Th... 详细信息
来源: 评论
A New Method to Generate Attack Graphs
A New Method to Generate Attack Graphs
收藏 引用
2009 Third IEEE International Conference on Secure Integration and Reliability Improvement SSIRI 2009(第三届IEEE安全软件集成及可信性改进国际会议)
作者: Anming Xie Guodong Chen Yonggang Wang Zhong Chen Jianbin Hu Institute of Software School of Electronics Engineering and Computer Science Peking University Be Dept. Of Electronic Engineering The First Aeronautical College of Air Force China Institute of Software School of Electronics Engineering and Computer Science Peking University Be Institute of Software School of Electronics Engineering and Computer Science Peking University Be Institute of Software School of Electronics Engineering and Computer Science Peking University Be
To address the scalability problem in attack graphs generation, we propose a novel method to generate attack graphs automatically. Our approach constructs a two-tier attack graph framework, which includes a host acces... 详细信息
来源: 评论