咨询与建议

限定检索结果

文献类型

  • 1,237 篇 会议
  • 194 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,467 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 932 篇 工学
    • 781 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 生物医学工程(可授...
    • 59 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,320 篇 英文
  • 135 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1467 条 记 录,以下是1211-1220 订阅
排序:
Classifying noisy data streams
收藏 引用
3rd International Conference on Fuzzy Systems and Knowledge Discovery
作者: Wang, Yong Li, Zhanhuai Zhang, Yang Dept. Computer Science and Software Northwestern Polytechnical University China School of Information Engineering Northwest A and F University China
The two main challenges associated with mining data streams are concept drifting and data noise. Current algorithms mainly depend on the robust of the base classifier or learning ensembles, and have no active mechanis... 详细信息
来源: 评论
Uncontrollable privacy - The right that every attacker desires
Uncontrollable privacy - The right that every attacker desir...
收藏 引用
4th Australian Information Security Management Conference, AISM
作者: Antoniou, Giannakis Gritzalis, Stefanos Dept. of Computer Science and Software Engineering University of Melbourne Australia Dept. of Information and Communication Systems Engineering University of the Aegean Samos 83200 Greece
The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs... 详细信息
来源: 评论
Network Forensics and Privacy Enhancing Technologies "living" together in harmony
Network Forensics and Privacy Enhancing Technologies "living...
收藏 引用
4th Australian Information Security Management Conference, AISM
作者: Antoniou, Giannakis Gritzalis, Stefanos Dept. of Computer Science and Software Engineering University of Melbourne Australia Dept. of Information and Communication Systems Engineering University of the Aegean Samos 83200 Greece
Privacy Enhancing Technology (PET) is the technology responsible to hide the identification of Internet users, whereas network forensics is a technology responsible to reveal the identification of Internet users who p... 详细信息
来源: 评论
Empirically driven SE research: State of the art and required maturity
Empirically driven SE research: State of the art and require...
收藏 引用
28th International Conference on software engineering 2006, ICSE '06
作者: Basili, Victor Elbaum, Sebastian Computer Science Dept. University of Maryland Fraunhofer Center for Experimental Software Eng. College Park MD Computer Science and Engineering Dept. University of Nebraska Lincoln NE
software engineering researchers are increasingly relying on the empirical approach to advance the state of the art. The level of empirical rigor and evidence required to guide software engineering research, however, ... 详细信息
来源: 评论
A new P2P-like architecture for large scale end to end network measurement
A new P2P-like architecture for large scale end to end netwo...
收藏 引用
International Conference on Networking, International Conference on Systems andInternational Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06
作者: Dawei, Xu Depei, Qian Zhongzhi, Luan Mi, Tang Tao, Liu Dept. of Computer Science and Engineering Xi'an Jiaotong University Sino-German Joint Software Institute Beihang University
Deploying probes easily and dynamically is very important to the success of end to end measurement systems. A P2P-like dynamic probe deployment mechanism for large scale end to end network measurement is proposed in t... 详细信息
来源: 评论
Profiling self-propagating worms via behavioral footprinting
Profiling self-propagating worms via behavioral footprinting
收藏 引用
4th ACM Workshop on Recurring Malcode, WORM'06. Co-located with the 13th ACM Conference on computer and Communications Security, CCS'06
作者: Jiang, Xuxian Xu, Dongyan Dept. of Information and Software Engineering George Mason University Fairfax VA 22030 CERIAS Dept. of Computer Science Purdue University West Lafayette IN 47907
This paper proposes behavioral footprinting, a new dimension of worm profiling based on worm infection sessions. A worm's infection session contains a number of steps (e.g., for probing, exploitation, and replicat... 详细信息
来源: 评论
Image inpainting and segmentation using hierarchical level set method
Image inpainting and segmentation using hierarchical level s...
收藏 引用
3rd Canadian Conference on computer and Robot Vision, CRV 2006
作者: Du, Xiaojun Cho, Dongwook Bui, Tien D. Dept. Computer Science and Software Engineering Concordia University Montreal Que. H4V 2H8 Canada
Image inpainting is an artistic procedure to recover a damaged painting or picture. In this paper, we propose a novel approach for image inpainting. In this approach, the Mumford-Shah (MS) model and the level set meth... 详细信息
来源: 评论
The consistent data replication service for distributed computing environments
The consistent data replication service for distributed comp...
收藏 引用
16th International Symposium on Methodologies for Intelligent Systems, ISMIS 2006
作者: No, Jaechun Chang, Won Park Sung, Soon Park Dept. of Computer Software College of Electronics and Information Engineering Sejong University Seoul Korea Republic of Intelligent IT System Research Center Korea Electronics Technology Institute Bundang-gu Seongnam-si Korea Republic of Dept. of Computer Science and Engineering College of Science and Engineering Anyang University Anyang Korea Republic of
This paper describes a data replication service for large-scale, data intensive applications whose results can be shared among geographically distributed scientists. We introduce two kinds of data replication techniqu... 详细信息
来源: 评论
A predictive approach to achieving consistency in cooperative caching in MANET
A predictive approach to achieving consistency in cooperativ...
收藏 引用
1st International Conference on Scalable Information Systems, InfoScale '06
作者: Huang, Yu Cao, Jiannong Jin, Beihong Dept. of Computer Science Univ. of Science and Technology of China Hefei China Internet and Mobile Computing Lab. Dept. of Computing Hong Kong Polytechnic Univ. Kawloon Hong Kong Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing China
Cooperative caching is a very important technique for efficient data dissemination and sharing in mobile ad hoc networks (MANETs). Many applications have requirements on the consistency of the content cached on differ... 详细信息
来源: 评论
Active sketch for finding primary structures in images
收藏 引用
7th International Conference on Intelligent Data engineering and Automated Learning, IDEAL 2006
作者: Shulin, Yang Cunlu, Xu Qin, Lei Dept. of Computer Science and Engineering Fudan Univ. 200433 China School of Information Science and Engineering Lanzhou Univ. 730000 China School of Mathematics Physics and Software Engineering Lanzhou Jiaotong Univ. 730070 China
The vision system of human beings is very sensitive to lines. Sketches composed of line drawings provide a useful representation for image structures, which can be used for recognition and which is capable of serving ... 详细信息
来源: 评论