咨询与建议

限定检索结果

文献类型

  • 1,237 篇 会议
  • 193 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,466 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 932 篇 工学
    • 781 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 生物医学工程(可授...
    • 59 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 dept. of compute...
  • 7 篇 state key labora...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,319 篇 英文
  • 135 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1466 条 记 录,以下是1141-1150 订阅
排序:
Robust scheduling and runtime adaptation of multi-agent plan execution
Robust scheduling and runtime adaptation of multi-agent plan...
收藏 引用
2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2008
作者: Wang, Mingzhong Ramamohanarao, Kotagiri Chen, Jinjun Dept. of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia Faculty of ICT Swinburne University of Technology VIC 3122 Australia
Robustness and reliability with respect to the successful completion of a schedule are crucial requirements for scheduling in multi-agent systems because agent autonomy makes execution environments dynamic and nondete... 详细信息
来源: 评论
Bayes-adaptive POMDPs: A new perspective on the explore-exploit tradeoff in partially observable domains
Bayes-adaptive POMDPs: A new perspective on the explore-expl...
收藏 引用
10th International Symposium on Artificial Intelligence and Mathematics, ISAIM 2008
作者: Pineau, Joelle Ross, Stephane Chaib-Draa, Brahim School of Computer Science McGill University Montreal QC H3A 2A7 Canada Computer Science and Software Engineering Dept. Laval University Québec QC Canada
Bayesian Reinforcement Learning has generated substantial interest recently, as it provides an elegant solution to the exploration-exploitation trade-off in reinforcement learning. However most investigations of Bayes... 详细信息
来源: 评论
Safety assurance for safety-critical embedded systems: Qualification of tools for complex electronic hardware
Safety assurance for safety-critical embedded systems: Quali...
收藏 引用
2008 1st International Conference on Information Technology, IT 2008
作者: Kornecki, Andrew Zalewski, Janusz Dept. of Computer and Software Engineering Embry-Riddle Aeronautical University Daytona Beach FL 32114 United States Dept. of Computer Science Florida Gulf Coast University Ft. Myers FL 33965 United States
In recent decades, multiple application domains emerged that use computational devices embedded in commercial products that are sensitive to safety concerns. They include not only typical areas, such as nuclear techno... 详细信息
来源: 评论
Representing textual requirements as graphical natural language for UML diagram generation
Representing textual requirements as graphical natural langu...
收藏 引用
20th International Conference on software engineering and Knowledge engineering, SEKE 2008
作者: Ilieva, Magda G. Boley, Harold Dept. of Computer Science and Software Engineering Concordia University Montreal Canada Institute for Information Technology National Research Council Canada Fredericton NB Canada
Since the establishment of the Unified Modeling Language (UML) as a standard graphical notation for representing knowledge, new ideas have emerged about tools that can automatically extract knowledge from text and rep... 详细信息
来源: 评论
Bandelet image coding based on SPIHT
Bandelet image coding based on SPIHT
收藏 引用
2nd International Symposium on Information Technologies and Applications in Education, ISITAE 2008
作者: Xie, Guofu Qu, Xiaobo Yan, Jingwen Dept. of Software Engineering Xiamen University Xiamen China Key Laboratory of Computer Science Beijing China Dept. of Communication Engineering Xiamen University Xiamen China Key Laboratory of Intelligent Manufacturing Technology Ministry of Education Shantou China
Bandelet is a new image representation method, which can efficiently indicate the local directions and is adapted to the image geometry. The set partitioning in hierarchical trees (SPIHT) algorithm is an efficient met... 详细信息
来源: 评论
A genetic search strategy based on simulated annealing for web mining
收藏 引用
Journal of Computational Information Systems 2008年 第6期4卷 2641-2650页
作者: Chen, Hao Bian, Naizheng Zou, Beiji AhHwweYU Software School Hunan University Changsha 410082 China School of Information Science and Engineering Central South University Changsha 410083 China Dept. of Computer Science and Technology Huaihua College Huaihua 418008 China Nanyang Technological University 2A-13 Nanyang Avenue Singapore 639798 Singapore
As the web continues to increase in size, the relative coverage of web search engine is decreasing, and search tools that combine the results of multiple search engines are becoming more valuable. We present a genetic... 详细信息
来源: 评论
Combining MDE and UML to reverse engineer web-based legacy systems
Combining MDE and UML to reverse engineer web-based legacy s...
收藏 引用
32nd Annual IEEE International computer software and Applications Conference, COMPSAC 2008
作者: Pu, Jianjun Yang, Hongji Xu, Baowen Xu, Lei Chu, William Cheng-Ng Software Technology Research Laboratory De Montfort University United Kingdom Computing School Southeast University China Dept. of Computer Science and Information Engineering Tunghai University Taiwan
The research in this paper focuses on an approach to reverse engineering web-based legacy systems with the integration of model-driven engineering and UML. Three types of link-based models of web-based legacy systems ... 详细信息
来源: 评论
An empirical study on modularization of object oriented software
An empirical study on modularization of object oriented soft...
收藏 引用
20th International Conference on software engineering and Knowledge engineering, SEKE 2008
作者: Liu, Jing Liu, Bin Tse, Chi K. He, Keqing State Key Laboratory of Software Engineering Wuhan Univ. Hubei China Computer Science Dept. Wuhan Univ. Hubei China Dept. of Electronic and Information Engineering Hong Kong Polytechnic Univ. Hong Kong Hong Kong
Object-oriented programming is supposed to produce better modularized structure than structural programming in that it encourages related state and behavior to be organized together in the form of classes, thus facili... 详细信息
来源: 评论
A fuzzy constraint satisfaction approach to identify and characterize apnea episodes
A fuzzy constraint satisfaction approach to identify and cha...
收藏 引用
2nd International Conference on Bioinformatics and Biomedical engineering, iCBBE 2008
作者: Otero, A. Sorzano, C.O.S. Félix, P. Álvarez, M.R. Zamarrón, C. Dept. of Software and Knowledge Engineering University San Pablo CEU 28668 Madrid Spain Dept. of Electronics and Computer Science University of Santiago de Compostela 15782 Santiago Spain General Hospital of Galicia Pneumology Unit 15782 Santiago Spain
This paper presents an algorithm that permits the identification of apneas - cessations in the sleeping patient's respiratory flow - in the respiratory airflow signal and relates them to the drops in blood oxyhemo... 详细信息
来源: 评论
A distributed Lightweight group rekeying scheme with speedy node revocation for wireless sensor networks
A distributed Lightweight group rekeying scheme with speedy ...
收藏 引用
4th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2008
作者: Zeng, Wei-Ni Lin, Ya-Ping Liu, Yong-He College of Computer and Communication Hunan University Changsha Hunan 410082 China Software College Hunan University Changsha Hunan 410082 China Dept. of Computer Science and Engineering University of Texas at Arlington Arlington TX 76019 United States
In unattended or hostile environment like battlefield, sensor nodes may be compromised. If one node is compromised, group key which is shared by all the group members should be rekeyed in real-time and the compromised... 详细信息
来源: 评论