咨询与建议

限定检索结果

文献类型

  • 1,237 篇 会议
  • 194 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,467 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 932 篇 工学
    • 781 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 生物医学工程(可授...
    • 59 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,320 篇 英文
  • 135 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1467 条 记 录,以下是851-860 订阅
排序:
An RFID and particle filter-based indoor spatial query evaluation system
An RFID and particle filter-based indoor spatial query evalu...
收藏 引用
16th International Conference on Extending Database Technology, EDBT 2013
作者: Yu, Jiao Ku, Wei-Shinn Sun, Min-Te Lu, Hua Dept. of Computer Science and Software Engineering Auburn University United States Dept. of Computer Science and Information Engineering National Central University Taiwan Dept. of Computer Science Aalborg University Denmark
People spend a significant amount of time in indoor spaces (e.g., office buildings, subway systems, etc.) in their daily lives. Therefore, it is important to develop efficient indoor spatial query algorithms for suppo... 详细信息
来源: 评论
Towards a framework for adaptive resource provisioning in large-scale distributed agent-based simulation
Towards a framework for adaptive resource provisioning in la...
收藏 引用
Lecture Notes in computer science
作者: Hanai, Masatoshi Suzumura, Toyotaro Ventresque, Anthony Shudo, Kazuyuki Tokyo Institute of Technology Dept. of Mathematical and Computing Sciences 2-12-1 Ookayama MeguroTokyo152-8552 Japan School of Computer Science and Informatics University College Dublin Ireland Lero The Irish Software Engineering Research Centre Damastown Industrial Estate Mulhuddart Dublin 15 Ireland Smarter Cities Technology Centre IBM Research Damastown Industrial Estate Mulhuddart Dublin 15 Ireland
Large scale distributed agent-based simulations run on several computing units (e.g., virtual machines in the Cloud, nodes in a supercomputer). Classically, these systems try to (re-)load-balance the nodes as overload... 详细信息
来源: 评论
Heterogeneous Community-Based Routing in Opportunistic Mobile Social Networks
Heterogeneous Community-Based Routing in Opportunistic Mobil...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Yunshen Wang Jie Wu Mingjun Xiao Daqiang Zhang Dept of Computer Science Kettering University Flint MI USA Dept. of Computer and Info. Sciences Temple University Philadelphia PA USA School of Computer Science and Tech. University of Science and Tech. of China Hefei P. R. China School of Software Engineering Tongji University Shanghai P. R. China
With the recent technical advances and popularization of smartphones, which are able to store, display, and transmit various types of media content, message forwarding in opportunistic mobile social networks has becom... 详细信息
来源: 评论
Scalable security analysis in hierarchical attack representation model using centrality measures
Scalable security analysis in hierarchical attack representa...
收藏 引用
2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, DSN-W 2013
作者: Hong, Jin B. Kim, Dong Seong Computer Science and Software Engineering Dept. University of Canterbury Christchurch New Zealand
Network security can be analysed using attack representation models (ARMs) (e.g., Attack Graphs (AGs) and Attack Trees (ATs)). One can analyse the network security by computing all possible attack scenarios, but it su... 详细信息
来源: 评论
Challenges in flexible safety-critical software development - An industrial qualitative survey
收藏 引用
14th International Conference on Product-Focused software Process Improvement, PROFES 2013
作者: Pedersen Notander, Jesper Höst, Martin Runeson, Per Software Engineering Research Group Dept. of Computer Science Lund University Sweden
Context. Development of safety-critical systems is mostly governed by process-heavy paradigms, while increasing demands on flexibility and agility also reach this domain. Objectives. We wanted to explore in more detai... 详细信息
来源: 评论
PEP-side caching: An insider threat port
PEP-side caching: An insider threat port
收藏 引用
2013 IEEE 14th International Conference on Information Reuse and Integration, IEEE IRI 2013
作者: Yaseen, Qussai Althebyan, Qutaibah Jararweh, Yaser Dept. of Computer Science Yarmouk University Irbid Jordan Dept. of Software Engineering Jordan University of Science and Technology Irbid Jordan Dept. of Computer Science Jordan University of Science and Technology Irbid Jordan
PEP-side caching is used in request-response access control mechanisms to increase the availability and reduce the processing overhead on PDP. Nonetheless, this paper shows that using this approach may open an insider... 详细信息
来源: 评论
A spatial keyword evaluation framework for network-based spatial queries  13
A spatial keyword evaluation framework for network-based spa...
收藏 引用
21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2013
作者: Zhang, Ji Ku, Wei-Shinn Jiang, Xunfei Qin, Xiao Dept. of Computer Science and Software Engineering Auburn University Auburn AL 36849 United States
An increasing number of spatial keyword query techniques that return qualified objects based on a comprehensive consideration of spatial and keyword constraints have been presented in the literature. Due to the comple... 详细信息
来源: 评论
A dependency-sharing tool for global software engineering
A dependency-sharing tool for global software engineering
收藏 引用
2nd International Conference on Design, User Experience, and Usability: Web, Mobile, and Product Design, DUXU 2013, Held as Part of 15th International Conference on Human-computer Interaction, HCI International 2013
作者: Lee, Douglas Milewski, Allen E. Rosca, Daniela Dept. of Computer Science and Software Engineering Monmouth University West Long Branch NJ United States
This project explores the design of a tool to facilitate a common task that software engineers find difficult - the identification and management of dependencies between the many heterogeneous entities created in the ... 详细信息
来源: 评论
Cloud computing in electric vehicles charging control and dispatch optimization
Cloud computing in electric vehicles charging control and di...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Dan Wu Bo Liu Zhijian Chen Wenyan Xie Xiang Huang Shuwei Pei Bin Sheng Donghan Feng Information Center China Southern Power Grid Co. Ltd. Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Network & Information Branch Guangdong Electric Power Design Institute Guangzhou China Chinese Academy of Sciences Institute of Software Beijing China Dept. of Electrical Engineering Shanghai Jiao Tong University Shanghai China
Charging of large-scale electric vehicles will have a significant impact on the grid so that their charging schedule needs to be optimized. The traditional centralized scheduling method requires high performance in in... 详细信息
来源: 评论
Efficient geometric re-ranking for mobile visual search
Efficient geometric re-ranking for mobile visual search
收藏 引用
11th Asian Conference on computer Vision, ACCV 2012
作者: Luo, Junwu Lang, Bo State Key Laboratory of Software Development Environment Dept. of Computer Science and Engineering Beihang University Beijing China
The state-of-the-art mobile visual search approaches are based on the bag-of-visual-word (BoW). As BoW representation ignores geometric relationship among the local features, a full geometric constraint like RANSAC is... 详细信息
来源: 评论