咨询与建议

限定检索结果

文献类型

  • 867 篇 会议
  • 199 篇 期刊文献
  • 49 册 图书

馆藏范围

  • 1,115 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 546 篇 计算机科学与技术...
    • 454 篇 软件工程
    • 163 篇 信息与通信工程
    • 114 篇 控制科学与工程
    • 78 篇 生物工程
    • 77 篇 电气工程
    • 58 篇 生物医学工程(可授...
    • 37 篇 机械工程
    • 36 篇 光学工程
    • 35 篇 电子科学与技术(可...
    • 30 篇 交通运输工程
    • 30 篇 安全科学与工程
    • 29 篇 仪器科学与技术
    • 29 篇 动力工程及工程热...
    • 28 篇 化学工程与技术
  • 310 篇 理学
    • 179 篇 数学
    • 86 篇 生物学
    • 61 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 50 篇 系统科学
    • 29 篇 化学
  • 194 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 80 篇 工商管理
    • 73 篇 图书情报与档案管...
  • 56 篇 医学
    • 52 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
    • 22 篇 公共卫生与预防医...
  • 41 篇 法学
    • 33 篇 社会学
  • 31 篇 教育学
    • 30 篇 教育学
  • 20 篇 经济学
  • 20 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 1 篇 军事学

主题

  • 30 篇 artificial intel...
  • 29 篇 accuracy
  • 27 篇 software
  • 25 篇 software enginee...
  • 23 篇 feature extracti...
  • 22 篇 computational mo...
  • 22 篇 real-time system...
  • 21 篇 information syst...
  • 21 篇 information stor...
  • 19 篇 computer communi...
  • 18 篇 data mining
  • 17 篇 deep learning
  • 16 篇 computer science
  • 16 篇 data models
  • 16 篇 training
  • 15 篇 internet of thin...
  • 15 篇 servers
  • 15 篇 predictive model...
  • 15 篇 cloud computing
  • 14 篇 database managem...

机构

  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 dept. of technol...
  • 8 篇 university of re...
  • 7 篇 dept. of softwar...
  • 7 篇 dept. of compute...
  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 systems and netw...
  • 5 篇 dept. of informa...
  • 5 篇 computer systems...
  • 5 篇 bcmaterials basq...
  • 5 篇 dept. of compute...
  • 5 篇 dept. of informa...
  • 5 篇 dept. of compute...
  • 5 篇 school of inform...
  • 5 篇 dept. of compute...
  • 5 篇 dept. of compute...

作者

  • 11 篇 fotiadis dimitri...
  • 9 篇 nikumani choudhu...
  • 8 篇 ali zeeshan ijaz
  • 8 篇 nisar ali
  • 8 篇 ali raja hashim
  • 8 篇 ali nisar
  • 8 篇 raja hashim ali
  • 7 篇 zain ul abideen
  • 7 篇 usama arshad
  • 7 篇 arshad usama
  • 7 篇 shafiur rahman
  • 7 篇 dimitrios i. fot...
  • 6 篇 segata michele
  • 6 篇 jian-jhih kuo
  • 6 篇 dressler falko
  • 6 篇 sommer christoph
  • 6 篇 bhattacharya pra...
  • 6 篇 cigno renato lo
  • 6 篇 buyya rajkumar
  • 6 篇 ijaz ali zeeshan

语言

  • 1,072 篇 英文
  • 30 篇 其他
  • 6 篇 中文
  • 5 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Dept. of Computer Science and Information and Software Systems Engineering"
1115 条 记 录,以下是511-520 订阅
排序:
Mobility Vector based Neighbour Selection in Mobile WSN with Multichannel MAC
Mobility Vector based Neighbour Selection in Mobile WSN with...
收藏 引用
International Conference on Communication systems and Networks
作者: V. Sreejith Prateek Khandelwal K. R. Anupama Lucy J. Gudino Dept. of Computer Science and Information Systems BITS-Pilani K K Birla Dept. of Electrical Electronics and Instrumentation Engineering BITS-Pilani K K Birla
Scenarios where the sensor nodes themselves are mobile, introduces a new dimension of problems in sensor network. This paper presents a mobility vector based neighbour selection for a mixed deployment of mobile and st... 详细信息
来源: 评论
Securing vehicular ad-hoc networks from data falsification attacks
Securing vehicular ad-hoc networks from data falsification a...
收藏 引用
IEEE Region 10 International Conference TENCON
作者: Danda B. Rawat Bhed Bahadur Bista Gongjun Yan Dept. of Electrical Engineering & Computer Science Howard University Washington DC USA Faculty of Software & Information Science Iwate Prefectural University Iwate Ken Japan Department of Information/Computer Science University of Southern Indiana Evansville IN USA
Data falsification attack is one of the main security issues in vehicular ad-hoc networks (VANETs) where vehicles rely on information received from other peers/vehicles. In this paper, we propose a method to detect da... 详细信息
来源: 评论
Extraction of human action elements with transition network of partial time series data modeled by Hidden Markov Model
Extraction of human action elements with transition network ...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Kae Doki Akihiro Torii Suguru Mototani Yuki Funabora Shinji Doki Kohjiro Hashimoto Dept. of Electrical Engineering Aichi Institute of Technology Aichi Japan Dept. of Electrical Engineering and Computer Science Nagoya University Aichi Japan Dept. of Control and Information Systems Engineering National Institute of Technology Kumamoto Japan
The authors have researched on a method of human action modeling to realize systems such as to support human human operations or watch persons to prevent various kinds of accidents. In order to recognize or support va... 详细信息
来源: 评论
Enhancement of PRoPHET routing in Delay Tolerant Networks from an energy prospective
Enhancement of PRoPHET routing in Delay Tolerant Networks fr...
收藏 引用
IEEE Region 10 International Conference TENCON
作者: Bhed Bahadur Bista Danda B. Rawat Faculty of Software and Information Science Iwate Prefectural University Takizawa City Iwate Japan Dept. of Electrical Engineering & Computer Science Howard University Washington DC USA
In a Delay Tolerant Network (DTN), nodes are intermittently connected. In order to deliver message from one node to another, message is copied and forwarded to another node when the connection between the nodes is est... 详细信息
来源: 评论
Neural Incremental Attribute Learning Based on Principal Component Analysis
Neural Incremental Attribute Learning Based on Principal Com...
收藏 引用
2016 IEEE International Conference on Big Data Analysis
作者: Ting Wang Wei Zhou Xiaoyan Zhu Fangzhou Liu Sheng-Uei Guan State Key Laboratory of Intelligent Technology and Systems Tsinghua University Wuxi Research Institute of Applied Technologies Tsinghua University Dept. of Computer Science University of Liverpool Dept. of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool University
Feature Extraction(FE) based on Principal Component Analysis(PCA) can effectively improve classification results by reducing the interference among features. However, such a good method has not been employed in previo... 详细信息
来源: 评论
An Intraoperative Glucose Control Benchmark for Formal Verification
收藏 引用
IFAC-PapersOnLine 2015年 第27期48卷 211-217页
作者: Chen, Sanjian O'Kelly, Matthew Weimer, James Sokolsky, Oleg Lee, Insup Dept. of Computer and Information Science University of Pennsylvania Philadelphia United States Dept. of Electrical and Systems Engineering University of Pennsylvania Philadelphia United States
Diabetes associated complications are affecting an increasingly large population of hospitalized patients. Since glucose physiology is significantly impacted by patient-specific parameters, it is critical to verify th... 详细信息
来源: 评论
Reusing software Libraries Using Semantic Graphs
Reusing Software Libraries Using Semantic Graphs
收藏 引用
IEEE International Conference on information Reuse and Integration (IRI)
作者: Awny Alnusair Majdi Rawashdeh Mohammed F. Alhamid M. Anwar Hossain Ghulam Muhammad Dept. of Informatics and Computer Science Indiana University Kokomo Kokomo IN USA Dept. of Management Information System Princess Sumaya University for Technology Amman Jordan Dept. of Software Engineering King Saud University Riyadh Saudi Arabia Dept. of Computer Engineering King Saud University Riyadh Saudi Arabia
This paper describes a two-part system that helps developers understand how to search and reuse complex software libraries. First, we present an approach for automatic retrieval of software components in reuse librari... 详细信息
来源: 评论
An Analysis of Onion-Based Anonymous Routing for Delay Tolerant Networks
An Analysis of Onion-Based Anonymous Routing for Delay Toler...
收藏 引用
International Conference on Distributed Computing systems
作者: Kazuya Sakai Min-Te Sun Wei-Shinn Ku Jie Wu Faisal S. Alanazi Dept. of Info. and Commun. Systems Tokyo Metropolitan University Hino Tokyo Japan Department of Computer Science and Information Engineering National Central University Taoyuan 320 Taiwan Department of Computer Science and Software Engineering Auburn University Auburn Alabama Department of Computer and Information Sciences Temple University Philadelphia PA Department of Electrical and Computer Engineering The Ohio State University Columbus Ohio
Delay tolerant network (DTN) routing provides a communication primitive in intermittently disconnected networks, such as battlefield communications and human-contact networks. In these applications, the anonymity pres... 详细信息
来源: 评论
Personalized online search for fashion products
Personalized online search for fashion products
收藏 引用
2015 systems and information engineering Design Symposium, SIEDS 2015
作者: Gray, Chester Beattie, Meghan Belay, Helena Hill, Sarah Lerch, Nicolette Dept. of Systems and Information Engineering and Dept. of Computer Science University of Virginia United States
In this paper we develop a methodology for personalizing online search for fashion products. Most search functions on fashion retail sites currently rely on objective data, such as colors or brands, to filter their pr... 详细信息
来源: 评论
Analysis and Detection of Anomalous Network Traffic
Analysis and Detection of Anomalous Network Traffic
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Hae-Duck J. Jeong Hyeonggeun Kim WonHwi Ahn Jung-Hee Oh Dawoon Lee Sang-Kug Ye Jongsuk R. Lee Dept. of Computer Software Korean Bible University Seoul South Korea Division of LBS Solution SK MNS Seoul South Korea Dept. of Computational Science & Engineering Korea Institutue of Science and Technology Information Daejeon South Korea
Rapid development of information and communications networks and the widespread distribution of smartphones have contributed to the steady increase in Internet utilization. This increase in Internet consumption has re... 详细信息
来源: 评论