咨询与建议

限定检索结果

文献类型

  • 867 篇 会议
  • 199 篇 期刊文献
  • 49 册 图书

馆藏范围

  • 1,115 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 546 篇 计算机科学与技术...
    • 454 篇 软件工程
    • 163 篇 信息与通信工程
    • 114 篇 控制科学与工程
    • 78 篇 生物工程
    • 77 篇 电气工程
    • 58 篇 生物医学工程(可授...
    • 37 篇 机械工程
    • 36 篇 光学工程
    • 35 篇 电子科学与技术(可...
    • 30 篇 交通运输工程
    • 30 篇 安全科学与工程
    • 29 篇 仪器科学与技术
    • 29 篇 动力工程及工程热...
    • 28 篇 化学工程与技术
  • 310 篇 理学
    • 179 篇 数学
    • 86 篇 生物学
    • 61 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 50 篇 系统科学
    • 29 篇 化学
  • 194 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 80 篇 工商管理
    • 73 篇 图书情报与档案管...
  • 56 篇 医学
    • 52 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
    • 22 篇 公共卫生与预防医...
  • 41 篇 法学
    • 33 篇 社会学
  • 31 篇 教育学
    • 30 篇 教育学
  • 20 篇 经济学
  • 20 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 1 篇 军事学

主题

  • 30 篇 artificial intel...
  • 29 篇 accuracy
  • 27 篇 software
  • 25 篇 software enginee...
  • 23 篇 feature extracti...
  • 22 篇 computational mo...
  • 22 篇 real-time system...
  • 21 篇 information syst...
  • 21 篇 information stor...
  • 19 篇 computer communi...
  • 18 篇 data mining
  • 17 篇 deep learning
  • 16 篇 computer science
  • 16 篇 data models
  • 16 篇 training
  • 15 篇 internet of thin...
  • 15 篇 servers
  • 15 篇 predictive model...
  • 15 篇 cloud computing
  • 14 篇 database managem...

机构

  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 dept. of technol...
  • 8 篇 university of re...
  • 7 篇 dept. of softwar...
  • 7 篇 dept. of compute...
  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 systems and netw...
  • 5 篇 dept. of informa...
  • 5 篇 computer systems...
  • 5 篇 bcmaterials basq...
  • 5 篇 dept. of compute...
  • 5 篇 dept. of informa...
  • 5 篇 dept. of compute...
  • 5 篇 school of inform...
  • 5 篇 dept. of compute...
  • 5 篇 dept. of compute...

作者

  • 11 篇 fotiadis dimitri...
  • 9 篇 nikumani choudhu...
  • 8 篇 ali zeeshan ijaz
  • 8 篇 nisar ali
  • 8 篇 ali raja hashim
  • 8 篇 ali nisar
  • 8 篇 raja hashim ali
  • 7 篇 zain ul abideen
  • 7 篇 usama arshad
  • 7 篇 arshad usama
  • 7 篇 shafiur rahman
  • 7 篇 dimitrios i. fot...
  • 6 篇 segata michele
  • 6 篇 jian-jhih kuo
  • 6 篇 dressler falko
  • 6 篇 sommer christoph
  • 6 篇 bhattacharya pra...
  • 6 篇 cigno renato lo
  • 6 篇 buyya rajkumar
  • 6 篇 ijaz ali zeeshan

语言

  • 1,072 篇 英文
  • 30 篇 其他
  • 6 篇 中文
  • 5 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Dept. of Computer Science and Information and Software Systems Engineering"
1115 条 记 录,以下是821-830 订阅
排序:
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2010年 第PART 3期6278 LNAI卷 VI页
作者: Setchi, Rossitza Jordanov, Ivan Howlett, Robert J. Jain, Lakhmi C. Cardiff University School of Engineering The Parade Cardiff CF24 3AA United Kingdom University of Portsmouth Dept. of Computer Science and Software Engineering Buckingham Building Lion Terrace Portsmouth PO1 3HE United Kingdom KES International 145-157 St. John Street London EC1V 4PY United Kingdom University of South Australia School of Electrical and Information Engineering Mawson Lakes Campus Adelaide SA 5095 Australia
来源: 评论
A fuzzy-rough hybrid approach to multi-document extractive summarization
A fuzzy-rough hybrid approach to multi-document extractive s...
收藏 引用
2009 9th International Conference on Hybrid Intelligent systems, HIS 2009
作者: Huang, Hsun-Hui Yang, Horng-Chang Kuo, Yau-Hwang Dept. of Computer Science and Information Engineering National Cheng Kung Univ. Tainan Taiwan Dept. of Management Information Systems Tajen Univ. Pingtung Taiwan Dept. of Computer Science and Information Engineering National Taitung Univ. Taitung Taiwan
To generate a multi-document extractive summary, the measurement of sentence relevance is of vital importance. Earlier work, exploring statistics of textual terms at the word (surface) level, faces the problem that th... 详细信息
来源: 评论
Image copyright protection with forward error correction
收藏 引用
Expert systems with Applications 2009年 第9期36卷 11888-11894页
作者: Lin, Wei-Hung Horng, Shi-Jinn Kao, Tzong-Wann Chen, Rong-Jian Chen, Yuan-Hsin Lee, Cheng-Ling Terano, Takao Dept. of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei 106 Taiwan Dept. of Electronic Engineering National United University Miao-Li 36003 Taiwan Dept. of Electronic Engineering Technology and Science Institute of Northern Taiwan Taipei Taiwan Department of Electro-Optical Engineering National United University Miao-Li Taiwan Dept. Computational Intelligence and Systems Science Tokyo Institute of Technology Japan
A copyright protection method for digital image with 1/T rate forward error correction (FEC) is proposed in this paper. In this method, the original image is lossless and the watermark is robust to malicious attacks i... 详细信息
来源: 评论
Adaptive route selection in mobile ad hoc networks
Adaptive route selection in mobile ad hoc networks
收藏 引用
2009 4th International Conference on Communications and Networking in China, CHINACOM 2009
作者: Lin, Yuh-Chung Ke, Chu-Wei Dept. of Management Information Systems Tajen University Pingtung Taiwan Dept. of Computer Science and Engineering National Sun Yat-Sen University Kaohsiung Taiwan
This paper presents an adaptive routing protocol named Adaptive Route Selection in Mobile Ad Hoc Networks (ARSMA). The aim of this work is to improve the delivery ratio and reduce the end-to-end delay. In the route re... 详细信息
来源: 评论
Methodologies for self-organising systems: A SPEM approach
Methodologies for self-organising systems: A SPEM approach
收藏 引用
2009 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, WI-IAT 2009
作者: Puviani, Mariachiara Di Marzo Serugendo, Giovanna Frei, Regina Cabri, Giacomo Dept. of Information Engineering Univ. of Modena and Reggio Emilia Modena Italy Computer Science and Information Systems BBK College London United Kingdom
We define 'SPEM fragments' of five methods for developing self-organising multi-agent systems. Self-organising traffic lights controllers provide an application scenario. © 2009 IEEE.
来源: 评论
A novel secure data hiding scheme using a secret reference matrix
A novel secure data hiding scheme using a secret reference m...
收藏 引用
IIH-MSP 2009 - 2009 5th International Conference on Intelligent information Hiding and Multimedia Signal Processing
作者: Lin, Chi-Nan Chang, Chin-Chen Lee, Wei-Bin Lin, Jason Dept. of Computer Science and Information Engineering National Chung Cheng Univ. Chiayi 62102 Taiwan Dept. of Management Information Systems Central Taiwan Univ. of Sci. and Tech. Taichung 40601 Taiwan Dept. of Information Engineering and Computer Science Feng Chia Univ. Taichung 40724 Taiwan
Steganography is a study to hide secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. In this paper, a novel scheme is proposed... 详细信息
来源: 评论
Architectures and Platforms for AMI: Workshop Summary Report
Architectures and Platforms for AMI: Workshop Summary Report
收藏 引用
2nd European Conference on Ambient Intelligence
作者: Farshchian, B. A. Berg, E. Divitini, M. Doolin, K. Pascotto, R. SINTEF ICT Norway Telenor RandI Trondheim Norway Dept. of Information and Computer Science NTNU Norway Telecommunications Software and Systems Group Waterford Institute of Technology Ireland Deutsche Telekom Berlin Germany
The workshop on architectures and platforms was organized at AMIN as a collaborative effort involving 4 projects (ASTRA, DAIDALOS, PERSIST, and Ubicollab). These projects address, in different ways, the challenge of d... 详细信息
来源: 评论
Conditional proxy re-encryption secure against chosen-ciphertext attack  09
Conditional proxy re-encryption secure against chosen-cipher...
收藏 引用
4th International Symposium on ACM Symposium on information, computer and Communications Security, ASIACCS'09
作者: Weng, Jian Deng, Robert H. Ding, Xuhua Chu, Cheng-Kang Lai, Junzuo School of Information Systems Singapore Management University Singapore 178902 Singapore Dept. of Computer Science Jinan University Guangzhou 510632 China Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications ... 详细信息
来源: 评论
Towards the development of an autonomic network management architecture
Towards the development of an autonomic network management a...
收藏 引用
2009 4th International Conference on Communications and Networking in China, CHINACOM 2009
作者: Strassner, John Hong, James Won-Ki Telecommunications Systems and Software Group Waterford Institute of Technology Carriganore County Waterford Ireland Dept. of Computer Science and Engineering Pohang University of Science and Technology Pohang Korea Republic of
The current Internet did not define any inherent management constructs and mechanisms;such concepts were added after networking standards and architectures were constructed. This also influenced network management for... 详细信息
来源: 评论
Fast and effective generation of candidate-sequences for sequential pattern mining
Fast and effective generation of candidate-sequences for seq...
收藏 引用
NCM 2009 - 5th International Joint Conference on Int. Conf. on Networked Computing, Int. Conf. on Advanced information Management and Service, and Int. Conf. on Digital Content, Multimedia Technology and its Applications
作者: Liao, Wei-Cheng Yang, Don-Lin Wu, Jungpin Hung, Ming-Chuan Dept. of Information Engineering and Computer Science Feng Chia University Taichung Taiwan Dept. of Statistics Feng Chia University Taichung Taiwan Dept. of Industrial Engineering and Systems Management Feng Chia University Taichung Taiwan
The existing sequential pattern mining algorithms fall into two categories. One is the candidate-generation-and-test approach such as GSP, and the other is the pattern-growth approach such as PrefixSpan. Both GSP and ... 详细信息
来源: 评论