咨询与建议

限定检索结果

文献类型

  • 1,236 篇 会议
  • 193 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,465 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 934 篇 工学
    • 783 篇 计算机科学与技术...
    • 677 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 生物医学工程(可授...
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 385 篇 理学
    • 230 篇 数学
    • 108 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 48 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 computer archite...
  • 18 篇 quality of servi...
  • 18 篇 predictive model...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,404 篇 英文
  • 49 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1465 条 记 录,以下是1261-1270 订阅
排序:
Momentum particle swarm optimizer
收藏 引用
Journal of Systems engineering and Electronics 2005年 第4期16卷 941-946页
作者: Liu Yu Qin Zheng Wang Xianghua He Xingshi Dept. of Computer Science Xi'an Jiaotong Univ. Xi'an 710049 P. R. China School of Software Tsinghua Univ Beijing 100084 P. R. China Dept. of Mathematics Xi'an Univ. of Engineering Science and Technology Xi'an 710048 P. R. China
The previous particle swarm optimizers lack direct mechanism to prevent particles beyond predefined search space, which results in invalid solutions in some special cases. A momentum factor is introduced into the orig... 详细信息
来源: 评论
Cost-based scheduling of scientific workflow applications on utility grids
Cost-based scheduling of scientific workflow applications on...
收藏 引用
1st International Conference on e-science and Grid Computing, e-science 2005
作者: Yu, Jia Buyya, Rajkumar Tham, Chen Khong Grid Computing and Distributed Systems Laboratory Dept. of Computer Science and Software Engineering University of Melbourne Vic. 3010 Australia Dept. of Electrical and Computer Engineering National University of Singapore 10 Kent Ridge Crescent Singapore 119260 Singapore
over the last few years, Grid technologies have progressed towards a service-oriented paradigm that enables a new way of service provisioning based on utility computing models. Users consume these services based on th... 详细信息
来源: 评论
Panel: Using peer review in teaching computing
Panel: Using peer review in teaching computing
收藏 引用
Proceedings of the Thirty-Sixth SIGCSE Technical Symposium on computer science Education, SIGCSE 2005
作者: Gehringer, Edward F. Chinn, Donald D. Ardis, Mark A. Pérez-Quinones, Manuel A. North Carolina State University Depts. of Computer Science and ECE Raleigh NC 27695-7256 Univ. of Washington at Tacoma Dept. of Computing and Software Systems Tacoma WA 98402 Rose-Hulman Institute of Technology Dept. of Computer Science and Software Engineering Terre Haute IN 47803 Department of Computer Science Virginia Tech Blacksburg VA 24061
For generations, the academic community has relied on peer review as a way of encouraging scholarship and enhancing the knowledge base. Peer review has been widely used in the classroom since at least the 1970s, with ... 详细信息
来源: 评论
Hardware support: A cache lock mechanism without retry
Hardware support: A cache lock mechanism without retry
收藏 引用
6th International Conference on software engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and 1st ACIS International Workshop on Self-Assembling Wireless Networks, SNPD/SAWN 2005
作者: Hong, Chuleui Park, Kyeongmo Song, Yeong-Tae Software School Sangmyung University Seoul Korea Republic of School of Computer Science and Information Engineering Catholic University Korea Republic of Dept. of Computer and Information Science Towson University MD United States
A lock mechanism is essential for synchronization on the multiprocessor systems. The conventional queuing lock has two bus traffics that are the initial and retry of the lock-read This paper proposes the new locking p... 详细信息
来源: 评论
BEHAVIORAL MODELS OVER RINGS MINIMAL REPRESENTATIONS AND APPLICATIONS TO CODING AND SEQUENCES
收藏 引用
IFAC Proceedings Volumes 2005年 第1期38卷 1198-1203页
作者: Margreta Kuijper Xin-Wen Wu Udaya Parampalli Dept. of Electrical and Electronic Engineering Dept. of Computer Science and Software Engineering The University of Melbourne VIC 3010 Australia
In this paper we consider polynomial kernel representations for behaviors. For behaviors over fields it is well-known that minimal representations, i.e. representations with minimal row degrees, are exactly those repr... 详细信息
来源: 评论
Configuration strategies for evolutionary testing
Configuration strategies for evolutionary testing
收藏 引用
29th Annual International computer software and Applications Conference, COMPSAC 2005
作者: Xiaoyuan, Xie Baowen, Xu Changhai, Nie Liang, Shi Lei, Xu Dept. of Computer Science and Engineering Southeast University 210096 Nanjing China Jiangsu Institute of Software Quality 210096 Nanjing China Computer School National University of Defense Technology 410073 Changsha China Key Laboratory of Software Engineering Wuhan University 430072 Wuhan China
Evolutionary Testing (ET) is a kind of efficient method of automatically test case generation, ET uses a kind of meta-heuristic search technique, the Genetic Algorithm, to convert the task of test case generation into... 详细信息
来源: 评论
IT offshore outsourcing: Impact on CS/IS curriculum
IT offshore outsourcing: Impact on CS/IS curriculum
收藏 引用
Proceedings of the Thirty-Sixth SIGCSE Technical Symposium on computer science Education, SIGCSE 2005
作者: Ferguson, Ernest Henderson, Peter B. Huen, Wing Kussmaul, Clifton Dept. of Comp Science/Info Systems Northwest Missouri State University Maryville MO 64468-6001 Dept. of Computer Science and Software Engineering Butler University Indianapolis IN Dept. of Comp Science University of Wisconsin Oshkosh Oshkosh WI 54901-8643 Mathematical Sciences Dept. Muhlenberg College Allentown PA 18104-5586
Almost all major news and professional publications document IT Offshoring & Outsourcing (O&O), which has caused job losses in the US and drops in computer science/information science (CS/IS) enrollment. Publi... 详细信息
来源: 评论
An interactive distributed evolutionary algorithm (IDEA) for design
An interactive distributed evolutionary algorithm (IDEA) for...
收藏 引用
IEEE Systems, Man and Cybernetics Society, Proceedings - 2005 International Conference on Systems, Man and Cybernetics
作者: Dozier, Gerry Carnahan, Brian Seals, Cheryl Kuntz, Lois-Ann Fu, Ser-Geon Dept. of Computer Science and Software Engineering Auburn University Auburn AL 36849-5347 Dept. of Industrial Systems Engineering Auburn University Auburn AL 36849-5347 Dept. of Psychology University of Maine at Machias 9 O'Brien Avenue Machias ME 04654-1397
Evolutionary computation (EC) has been successfully applied to a wide range of design problems. There has also been an abundant amount of work in applying interactive ECs in the design of displays, robot behavior, bit... 详细信息
来源: 评论
Evaluating indirect and direct classification techniques for network intrusion detection
Evaluating indirect and direct classification techniques for...
收藏 引用
作者: Khoshgoftaar, Taghi M. Gao, Kehan Ibrahim, Nawal H. Empirical Software Engineering Laboratory Dept. of Computer Science and Engineering Florida Atlantic University Boca Raton FL 33431 United States Department of Computer Science and Engineering Florida Atlantic University Boca Raton FL United States Math and Computer Science Department Eastern Connecticut State University CT 06226 United States
The network intrusion detection domain has seen increased research that exploit data mining and machine learning techniques and principles. Typically, multi-category classification models are built to classify network... 详细信息
来源: 评论
Client authentication model using duplicated authentication server systems
Client authentication model using duplicated authentication ...
收藏 引用
13th International Conference on AIS 2004
作者: Lee, Jae-Woo Software System Lab. Dept. of Computer Science and Engineering Korea University 1 5-ka Anam-dong SungBuk-ku 136-701 Seoul Korea Republic of
In the Internet and distributed systems, we can always access many application servers for gaining many information or electronic business processing, etc. Despite of those advantages of information technology, there ... 详细信息
来源: 评论