咨询与建议

限定检索结果

文献类型

  • 1,237 篇 会议
  • 194 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,467 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 932 篇 工学
    • 781 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 生物医学工程(可授...
    • 59 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,320 篇 英文
  • 135 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1467 条 记 录,以下是891-900 订阅
排序:
On Change Detection of XML Schemas
On Change Detection of XML Schemas
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Abdullah Baqasah Eric Pardede Irena Holubova Wenny Rahayu Department of Computer Science and Computer Engineering La Trobe University Melbourne Australia Dept. of Software Eng. Charles Univ. Prague Prague Czech Republic Department of Software Engineering Charles University Prague Czech Republic
Change detection of XML data has emerged as an important research issue in the last decade, however the majority of change detection algorithms focuses on XML documents rather than schemas. This is because documents t... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论
Composing workflow activities on the basis of data-flow structures
Composing workflow activities on the basis of data-flow stru...
收藏 引用
11th International Conference on Business Process Management, BPM 2013
作者: Van Der Aa, Han Reijers, Hajo A. Vanderfeesten, Irene Dept. of Mathematics and Computer Science Eindhoven University of Technology PO Box 513 5600MB Eindhoven Netherlands Perceptive Software Piet Joubertstraat 4 7315AV Apeldoorn Netherlands School of Industrial Engineering Eindhoven University of Technology PO Box 513 5600MB Eindhoven Netherlands
The proper composition of activities is important for the efficient execution of a workflow process. In this paper, an approach is presented that utilizes the data-flow underlying a workflow process to determine the i... 详细信息
来源: 评论
Learning Automata Based Sentiment Analysis for recommender system on cloud
Learning Automata Based Sentiment Analysis for recommender s...
收藏 引用
International Conference on computer, Information and Telecommunication Systems (CITS)
作者: P. Venkata Krishna Sudip Misra Dheeraj Joshi Mohammad S. Obaidat School of Computing Science and Engineering VIT University Vellore India School of Information Tech Indian Institute of Technology Kharagpur India Dept. of Computer Science & Software Engineering Monmouth University NJ USA
The development of personalized recommendation systems has been an interesting research topic after the rapid evolution in social networking sites. In this paper, we propose a recommendation system using Learning auto... 详细信息
来源: 评论
A Comparative Study on Differential Evolution with Other Heuristic Methods for Continuous Optimization
A Comparative Study on Differential Evolution with Other Heu...
收藏 引用
Mediterranean Conference on Control & Automation
作者: Guido Maione Antonio Punzi Kang Li Dept. of Electrical and Information Engineering Technical University of Bari ISS Innovative Software Services GmbH School of Electronics Electrical Engineering and Computer Science Queen's University of Belfast
In this paper, we describe an optimization method based on differential evolution (DE). It shows good convergence properties with few parameters. However, the appropriate selection of the parameters is a difficult tas... 详细信息
来源: 评论
Visualization of movie features in collaborative filtering
Visualization of movie features in collaborative filtering
收藏 引用
12th IEEE International Conference on Intelligent software Methodologies, Tools and Techniques, SoMeT 2013
作者: Nemeth, Bottyan Takacs, Gabor Pilaszy, Istvan Tikk, Domonkos Gravity Research and Development Zrt. Bálint M. u. 64. Gyor Hungary Dept. of Mathematics and Computer Science Széchenyi István University Egyetem tér 1. Gyor Hungary Óbuda University Software Engineering Institute Bécsi út 96/b Budapest Hungary
In this paper we will describe a modification of the matrix factorization (MF) algorithm which allows visualizing the user and item characteristics. When applying MF for collaborative filtering, we get a model that re... 详细信息
来源: 评论
A hybrid mobility model based on social, cultural and language diversity
A hybrid mobility model based on social, cultural and langua...
收藏 引用
International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
作者: Lutful Karim Qusay H. Mahmoud School of Information & Communications Technology Seneca College of Applied Arts and Science Toronto ON Canada Dept. Electrical Computer and Software Engineering University of Ontario Institute of Technology Oshawa ON Canada
Human Mobility Models (HMMs) have become increasingly relevant in different application domains including networks designed for data dissemination protocols. Most existing HMMs consider the temporal and spatial featur... 详细信息
来源: 评论
Of Massive Static Analysis Data
Of Massive Static Analysis Data
收藏 引用
IEEE International Conference on software Security and Reliability Companion
作者: Aurelien Delaitre Vadim Okun Elizabeth Fong Dept. of Computer Science and Electrical Engineering West Virginia University Morgantown WV 26506 USA Software and Systems Division IT Laboratory National Institute of Standards and Technology Gaithersburg MD 20899 USA
The software Assurance Metrics and Tool Evaluation (SAMATE) project at the National Institute of Standards and Technology (NIST) has organized four Static Analysis Tool Expositions (SATE). SATE is designed to advance ... 详细信息
来源: 评论
Performance Evaluation of Stack-Protocols, Encapsulation Methods and Video Codecs for Live Video Streaming
Performance Evaluation of Stack-Protocols, Encapsulation Met...
收藏 引用
International Conference of Information and Communication Technology
作者: Afaq Iqbal Fahim Arif Nasru Minallah Dept. Computer Software Engineering Military College of Signals National University of Science and Technology Dept. Computer System Engineering University of Engineering and Technology
There are diverse factors involved in the transmission of live video over internet. These factors have direct impact on the quality of the transmitted video. The underlying protocol, encapsulation method and the choic... 详细信息
来源: 评论
Measurement of Business Rules Specified as Reusable Components: Exploratory Study of Its Impact on the Functional Size of software Projects
Measurement of Business Rules Specified as Reusable Componen...
收藏 引用
Joint Conference of the Int'l Workshop on and International Conference on software Process and Product Measurement software Measurement
作者: Sylvie Trudel Alain Abran Computer Science Department Université du Québec à Montréal Montréal Canada Dept. of Software Engineering and Information Technologies École de Technologie Supéricurc Montréal Canada
When reusable software elements are defined in the requirements phase, this raises a number of issues for the measurement of their functional size, when a reusable element implements a business rule or a business sub ... 详细信息
来源: 评论