咨询与建议

限定检索结果

文献类型

  • 1,237 篇 会议
  • 193 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,466 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 932 篇 工学
    • 781 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 生物医学工程(可授...
    • 59 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 dept. of compute...
  • 7 篇 state key labora...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,319 篇 英文
  • 135 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1466 条 记 录,以下是1221-1230 订阅
排序:
LLM: Low latency MAC protocol for wireless sensor networks
LLM: Low latency MAC protocol for wireless sensor networks
收藏 引用
2006 3rd Annual IEEE Communications Society on Sensor and Ad hoc Communications and Networks, Secon 2006
作者: Parmar, Sumeet N. Nandi, Sukumar Chowdhury, Atanu Roy Dept. of Computer Science and Engineering Indian Institute of Technology Guwahati 781 039 India Software Engineering and Technology Labs. Infosys Technologies Ltd. Bangalore 560 100 India
Wireless sensor networks aim at a special kind of ad hoc networks, exposing an energy-constrained distributed computing environment. Proposed protocols have tried to incorporate power management schemas of the likes o... 详细信息
来源: 评论
A software process for time-constrained course projects  06
A software process for time-constrained course projects
收藏 引用
28th International Conference on software engineering 2006, ICSE '06
作者: Paula Filho, Wilson P. Synergia Systems and Software Engineering Laboratory Computer Science Dept. Federal University of Minas Gerais Av. Antônio Carlos 6627 - Belo Horizonte - MG Brazil
Defined software engineering processes help to perform and guide software engineering course projects. However, several difficult issues are involved in designing a software process for this purpose. This design is ev... 详细信息
来源: 评论
Vector prediction approach to handle dynamical optimization problems
收藏 引用
6th International Conference Simulated Evolution and Learning, SEAL 2006
作者: Bojin, Zheng Yuanxiang, Li Ting, Hu College of Computer Science South-Central University for Nationalities Wuhan 430074 China State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China Dept. of Computer Science Memorial University of Newfoundland Nfld. Canada
The Dynamical Optimization Evolutionary Algorithms (DOEAs) have been applied to solve Dynamical Optimization Problems which are very common in real-world applications. But little work focused on the convergent DOEAs. ... 详细信息
来源: 评论
Panel: Authentication in constrained environments
收藏 引用
1st International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005
作者: Burmester, Mike Gligor, Virgil Kranakis, Evangelos Tygar, Doug Zheng, Yuliang De Medeiros, Breno Dept. of Computer Science Florida State University Tallahassee FL 32306 United States Dept. of Electrical and Computer Engineering University of Maryland College Park MD 20742 United States Sch. of Computer Science Carleton University Ont. K1S 5B6 Canada Dept. of Electrical Engineering and Computer Science University of California Berkeley CA 94720-1776 United States Dept. of Software and Information Systems University of North Carolina Charlotte NC 28223 United States
This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES'05 Workshop. These were transcribed from hand-written notes. © Springer-Verlag Berlin Hei... 详细信息
来源: 评论
Security model of service oriented computational grids
Security model of service oriented computational grids
收藏 引用
2006 Annual India Conference, INDICON
作者: Jana, Debasish Chaudhuri, Amritava Bhaumik, Bijan Bihari IEEE IEEE Computer Society Anshin Software Pvt. Ltd. Kolkata India Tata Consultancy Services Ltd. Kolkata India Dept. of Computer Science and Engineering Jadavpur University Kolkata India
Grid infrastructure supports services on demand. Computational grids connected in a service oriented way thus forming virtual enterprises need several security measures to be undertaken. We have worked on several secu... 详细信息
来源: 评论
Ring based wavelet transform with arbitrary supports in wireless sensor networks
Ring based wavelet transform with arbitrary supports in wire...
收藏 引用
14th European Signal Processing Conference, EUSIPCO 2006
作者: Zhou, Siwang Lin, Yaping Liu, Yonghe College of Computer and Communication Hunan University Changsha 410082 China College of Software Hunan University Changsha 410082 China Dept. of Computer Science and Engineering University of Texas at Arlington Arlington TX 76019 United States
In this paper, we propose a general transform for wavelet based data compression in wireless sensor networks. By employing a ring topology, our transform is capable of supporting a broad scope of wavelets rather than ... 详细信息
来源: 评论
Early detection of JML specification errors using ESC/Java2
Early detection of JML specification errors using ESC/Java2
收藏 引用
2006 Conference on Specification and Verification of Component-Based Systems, SAVCBS 2006
作者: Chalin, Patrice Dept. of Computer Science and Software Engineering Dependable Software Research Group Concordia University 1455 de Maisonneuve Blvd. West Montréal Qué. H3G 1M8 Canada
The earlier errors are found, the less costly they are to fix. This also holds true of errors in specifications. While research into Static Program Verification (SPV) in general, and Extended Static Checking (ESC) in ... 详细信息
来源: 评论
Analysis of Fuzzy Clustering Techniques Used for Web Personalization
Analysis of Fuzzy Clustering Techniques Used for Web Persona...
收藏 引用
Conference of the North American Fuzzy Information Processing Society - NAFIPS
作者: Bhushan Shankar Suryavanshi Nematollaah Shiri Sudhir P. Mudur Dept. of Computer Science and Software Engineering Concordia University Montreal Canada
Web personalization aims to provide content and services tailor-made to the needs of individual users usually from the knowledge gained through their (previous) interactions with the site. Typically, an access behavio... 详细信息
来源: 评论
Access control policy management framework based on RBAC in OSGi service platform
Access control policy management framework based on RBAC in ...
收藏 引用
6th IEEE International Conference on computer and Information Technology, CIT 2006
作者: Cho, Eun-Ae Moon, Chang-Joo Park, Dae-Ha Baik, Doo-Kwon Software System Lab. Dept. of Computer Science and Engineering Korea University 1 5-ga Anam-dong Seongbuk-gu Seoul 136-701 Korea Republic of Dept. of Computer Science Konkuk University 322 Danwol-dong Chungcheongbuk-do 380-701 Korea Republic of Dept. of Computer and Information Science Korea Digital University Korea University Anamdong 5-ga 1 Seongbuk-gu Seoul 136-701 Korea Republic of
The OSGi provides a service platform which ensures the interoperability between heterogeneous technologies and various devices in home network environment. Nowadays, user access control is one of the core parts which ... 详细信息
来源: 评论
Both robust computation and mutation operation in dynamic evolutionary algorithm are based on orthogonal design  06
Both robust computation and mutation operation in dynamic ev...
收藏 引用
8th Annual Genetic and Evolutionary Computation Conference 2006
作者: Zeng, Sanyou Wang, Rui Hui, Shi. Chen, Guang De Garis, Hugo Kang, Lishan Ding, Lixin School of Computer Science Research Center for Space Science and Technology China University of GeoSciences 430074 Wuhan Hubei China Brain Builder Group Computer Science Dept. Utah State University Logan UT 84341 United States StateKey Laboratory of Software Engineering Wuhan University 430072Wuhan Hubei China
A robust dynamic evolutionary algorithm (labeled RODEA), where both the robust calculation and mutation operator are based on an orthogonal design, is proposed in this paper. Previous techniques calculate the mean eff... 详细信息
来源: 评论