咨询与建议

限定检索结果

文献类型

  • 1,237 篇 会议
  • 194 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,467 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 932 篇 工学
    • 781 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 生物医学工程(可授...
    • 59 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,320 篇 英文
  • 135 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1467 条 记 录,以下是951-960 订阅
排序:
Stabilization of Interactive Differential Evolution for Generating Natural Facial Images
Stabilization of Interactive Differential Evolution for Gene...
收藏 引用
International Conference on Awareness science and Technology
作者: Dylan Kessler Qiangfu Zhao Dept. of Computer Science and Software Engineering Rose-Hulman Institute of Technology Terre Haute Indiana United States Dept. of Computer and Information Systems The University of Aizu Aizuwakamatsu Fukushima Japan
In today's society, information security and hiding is a key mechanism to protecting one's identity. Image morphing can hide a secret image in a morphed image using a second, reference image. One of the primar... 详细信息
来源: 评论
Defect detection in woven fabric using weighted morphology
Defect detection in woven fabric using weighted morphology
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: S. Priya T. Ashok kumar Varghese Paul Dept. of computer Sc. & Engg: Govt. Model Engineering College Ernakulam Kerala India Dept. of Electronics & Com. Engg: College of Engineering Cherthala Alappuzha Kerala India TocH Institute of Science& Technology Kerala India
This paper aims at investigating a novel solution to the problem of defect detection from the images of woven fabric. Automated visual inspection systems are an attractive alternative to human visual inspection in the... 详细信息
来源: 评论
Selective opening chosen ciphertext security directly from the DDH assumption
Selective opening chosen ciphertext security directly from t...
收藏 引用
6th International Conference on Network and System Security, NSS 2012
作者: Liu, Shengli Zhang, Fangguo Chen, Kefei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t... 详细信息
来源: 评论
Machine-driven Code Inspection to Reduce Restated Information
Machine-driven Code Inspection to Reduce Restated Informatio...
收藏 引用
2012 International Conference on Artificial Intelligence and Soft Computing(ICAISC 2012)
作者: Tomas Cerny Vaclav Chalupa Lukas Rychtecky Tomas Linhart Czech Technical University dept. Computer Science and Engineering FEE Charles Square 13 Prague 2 Czech Republic Czech Technical University dept. Software Engineering FIT Thakurova 9 Prague 6 Czech Republic
Production level software applications consist of thousands lines of source code. Although, the "main information" is captured by a small amount of code, it must be restated and extended on multiple places a... 详细信息
来源: 评论
Free Roll Decay Modeling of a Trimaran Based on Least Square Support Vector Machine
Free Roll Decay Modeling of a Trimaran Based on Least Square...
收藏 引用
OCEANS Conference
作者: Jinlong Li Songlin Yang Shuo Pang National Key Lab of AUV Technology Harbin Engineering University School of Naval Architecture and Ocean Engineering Jiangsu University of Science and Technology Dept. of Electrical Computer Software Systems Engineering Embry-Riddle Aeronautical University
A trimaran is a multihulled boat consisting of a main hull and two smaller outrigger hulls, attached to the main hull with lateral struts. There have been many studies highlighting that a trimaran takes many advantage... 详细信息
来源: 评论
Do data dependencies in source code complement call dependencies for understanding requirements traceability?
Do data dependencies in source code complement call dependen...
收藏 引用
International Conference on software Maintenance (ICSM)
作者: Hongyu Kuang Patrick Mäder Hao Hu Achraf Ghabi LiGuo Huang Lv Jian Alexander Egyed State Key Lab for Novel Software Technology Nanjing University Nanjing Jiangsu China Institute of Systems Engineering and Automation Johannes Kepler University Linz Austria Dept. of Computer Science and Engineering Southern Methodist University Dallas TX USA
It is common practice for requirements traceability research to consider method call dependencies within the source code (e.g., fan-in/fan-out analyses). However, current approaches largely ignore the role of data. Th... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed Computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
VPDSL: A DSL for software in the Loop Simulations Covering Material Flow
VPDSL: A DSL for Software in the Loop Simulations Covering M...
收藏 引用
IEEE International Conference on engineering of Complex computer Systems
作者: Istvan Nagy Loek Cleophas Mark van den Br Luc Engelen Liviu Raulea Ernest Xavier Lobo Mithun ASML Veldhoven AH Netherlands Technische Universiteit Eindhoven Eindhoven Noord-Brabant NL Eindhoven University of Technology Software Engineering & Technology Group Dept. of Math. and Computer Science Eindhoven MB Netherlands ASML Veldhoven Netherlands
We present an approach to model hardware configurations of complex manufacturing systems such as ASML's lithography machines. These hardware configurations consist of actuator and sensor elements which are control... 详细信息
来源: 评论
A novel fall activity recognition method for wireless sensor networks
收藏 引用
International Journal of u- and e- Service, science and Technology 2012年 第4期5卷 1-14页
作者: Wang, Jin Zhang, Zhongqi Zheng, Yuhui Wu, Menglin Kim, Jeong-Uk School of computer and software Nanjing University of information science and technology Nanjing 210044 China College of Electronics and Information Engineering Nanjing University of Technology Nanjing 211816 China Dept. of Energy Grid Sangmyung University Seoul 110-743 Korea Republic of
Healthcare targeted for home activity is playing an important role in our daily lives as the number of elderly person is increasing sharply. Researches pointed out that one third of 65-and-over aged person fall per-ye... 详细信息
来源: 评论
Data, health, and algorithmics: Computational challenges for biomedicine  11
Data, health, and algorithmics: Computational challenges for...
收藏 引用
20th ACM Conference on Information and Knowledge Management, CIKM'11
作者: Zobel, Justin Dept. of Computer Science and Software Engineering NICTA University of Melbourne Australia
In the decade following the completion of the Human Genome Project in 2000, the cost of sequencing DNA fell by a factor of around a million, and continues to fall. Applications of sequencing in health include precise ... 详细信息
来源: 评论