咨询与建议

限定检索结果

文献类型

  • 867 篇 会议
  • 199 篇 期刊文献
  • 49 册 图书

馆藏范围

  • 1,115 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 546 篇 计算机科学与技术...
    • 454 篇 软件工程
    • 163 篇 信息与通信工程
    • 114 篇 控制科学与工程
    • 78 篇 生物工程
    • 77 篇 电气工程
    • 58 篇 生物医学工程(可授...
    • 37 篇 机械工程
    • 36 篇 光学工程
    • 35 篇 电子科学与技术(可...
    • 30 篇 交通运输工程
    • 30 篇 安全科学与工程
    • 29 篇 仪器科学与技术
    • 29 篇 动力工程及工程热...
    • 28 篇 化学工程与技术
  • 310 篇 理学
    • 179 篇 数学
    • 86 篇 生物学
    • 61 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 50 篇 系统科学
    • 29 篇 化学
  • 194 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 80 篇 工商管理
    • 73 篇 图书情报与档案管...
  • 56 篇 医学
    • 52 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
    • 22 篇 公共卫生与预防医...
  • 41 篇 法学
    • 33 篇 社会学
  • 31 篇 教育学
    • 30 篇 教育学
  • 20 篇 经济学
  • 20 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 1 篇 军事学

主题

  • 30 篇 artificial intel...
  • 29 篇 accuracy
  • 27 篇 software
  • 25 篇 software enginee...
  • 23 篇 feature extracti...
  • 22 篇 computational mo...
  • 22 篇 real-time system...
  • 21 篇 information syst...
  • 21 篇 information stor...
  • 19 篇 computer communi...
  • 18 篇 data mining
  • 17 篇 deep learning
  • 16 篇 computer science
  • 16 篇 data models
  • 16 篇 training
  • 15 篇 internet of thin...
  • 15 篇 servers
  • 15 篇 predictive model...
  • 15 篇 cloud computing
  • 14 篇 database managem...

机构

  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 dept. of technol...
  • 8 篇 university of re...
  • 7 篇 dept. of softwar...
  • 7 篇 dept. of compute...
  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 systems and netw...
  • 5 篇 dept. of informa...
  • 5 篇 computer systems...
  • 5 篇 bcmaterials basq...
  • 5 篇 dept. of compute...
  • 5 篇 dept. of informa...
  • 5 篇 dept. of compute...
  • 5 篇 school of inform...
  • 5 篇 dept. of compute...
  • 5 篇 dept. of compute...

作者

  • 11 篇 fotiadis dimitri...
  • 9 篇 nikumani choudhu...
  • 8 篇 ali zeeshan ijaz
  • 8 篇 nisar ali
  • 8 篇 ali raja hashim
  • 8 篇 ali nisar
  • 8 篇 raja hashim ali
  • 7 篇 zain ul abideen
  • 7 篇 usama arshad
  • 7 篇 arshad usama
  • 7 篇 shafiur rahman
  • 7 篇 dimitrios i. fot...
  • 6 篇 segata michele
  • 6 篇 jian-jhih kuo
  • 6 篇 dressler falko
  • 6 篇 sommer christoph
  • 6 篇 bhattacharya pra...
  • 6 篇 cigno renato lo
  • 6 篇 buyya rajkumar
  • 6 篇 ijaz ali zeeshan

语言

  • 1,072 篇 英文
  • 30 篇 其他
  • 6 篇 中文
  • 5 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Dept. of Computer Science and Information and Software Systems Engineering"
1115 条 记 录,以下是881-890 订阅
排序:
Digital speed control of multi-inertia resonant system using real time simulator
Digital speed control of multi-inertia resonant system using...
收藏 引用
International Conference on Electrical Machines and systems
作者: Ikeda, Hidehiro Hanamoto, Tsuyoshi Tsuji, Teruo Dept. of Electrical Electronics and Computer Engineering Nishi-Nippon Institute of Technology Japan Graduate School of Life Science and Systems Engineering Kyushu Institute of Technology Japan Dept. of Information and Systems Engineering Fukuoka Institute of Technology Japan
In this paper, a robust vibration suppression control method for a multi-inertia (a three-inertia and a four-inertia) system by a digital modified-IPD controller is proposed. The controller consists of integral, propo... 详细信息
来源: 评论
Tight bounds for a stochastic resource allocation algorithm using marginal revenue
Tight bounds for a stochastic resource allocation algorithm ...
收藏 引用
2007 AAAI Spring Symposium
作者: Plamondon, Pierrick Chaib-draa, Brahim Benaskeur, Abder Rezak Laval University Computer Science and Software Engineering Dept. Decision Support Systems Section Defence R and D Canada - Valcartier
This paper contributes to solve effectively stochastic resource allocation problems known to be NP-Complete. To address this complex resource management problem, previous works on pruning the action space of real-time... 详细信息
来源: 评论
Exploiting automatically inferred constraint-models for building identification in satellite imagery  07
Exploiting automatically inferred constraint-models for buil...
收藏 引用
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
作者: Michalowski, Martin Knoblock, Craig A. Bayer, Ken Choueiry, Berthe Y. Information Sciences Institute Dept. of Computer Science University of Southern California United States Constraint Systems Laboratory Dept. of Computer Science and Engineering University of Nebraska-Lincoln United States
The building identification (BID) problem is based on a process that uses publicly available information to automatically assign addresses to buildings in satellite imagery. In previous work, we have shown the advanta... 详细信息
来源: 评论
Estimating the required code inspection team size
Estimating the required code inspection team size
收藏 引用
IEEE International Conference on software - science, Technology and engineering, SwSTE'07
作者: Kantorowitz, E. Kuflik, T. Raginsky, A. Computer Science Dept. Technion Ort Braude College Management Information Systems Dept. University of Haifa Faculty of Industrial Engineering and Management Technion
Code inspection is considered an efficient method for detecting faults in software code documents. The number of faults not detected by inspection should be small. Several methods have been suggested for estimating th... 详细信息
来源: 评论
First year students' impressions of pair programming in CS1  07
First year students' impressions of pair programming in CS1
收藏 引用
3rd International Computing Education Research Workshop, ICER'07
作者: Simon, Beth Hanks, Brian Computer Science and Engineering Dept. University of California San Diego San Diego CA 92093-0404 Computer Science Information Systems Dept. Fort Lewis College Durango CO 81301
Pair programming, as part of the Agile Development process, has noted benefits in professional software development scenarios. These successes have led to a rise in use of pair programming in educational settings, par... 详细信息
来源: 评论
Automated software product line engineering and product derivation
Automated software product line engineering and product deri...
收藏 引用
40th Annual Hawaii International Conference on System sciences 2007, HICSS'07
作者: Gomaa, Hassan Shin, Michael E. Dept. of Information and Software Engineering George Mason University Fairfax VA 22030-4444 Dept. of Computer Science Texas Tech. University Lubbock TX 79409-3104
This paper describes a prototype automated software product line engineering environment, in which a multiple view model of the product line architecture and components are developed and stored in a product line repos... 详细信息
来源: 评论
Improvements in SCADA and DCS systems security
Improvements in SCADA and DCS systems security
收藏 引用
22nd International Conference on computers and Their Applications 2007, CATA 2007
作者: Graham, James H. Mostafa, Mostafa S. Arazi, Benjamin Tantawy, Ashraf Hieb, Jeffrey Ralston, Patricia Patel, Sandip C. Computer Engineering and Computer Science Dept. Intelligent Systems Research Laboratory University of Louisville Louisville KY 40292 United States Dept. of Computer Science Western Kentucky University Bowling Green KY United States Dept. of Chemical Engineering University of Louisville Louisville KY United States Dept. of Information Science and Systems Morgan State University Baltimore MD United States
Supervisory control and data acquisition (SCADA) systems monitor, regulate, gather information from, and control the computer field units that control much of our industrial and utility infrastructure. Distributed Con... 详细信息
来源: 评论
A proposal of service system development framework with multi-agents
A proposal of service system development framework with mult...
收藏 引用
2007 International Conference on Parallel Processing Workshops, ICPPW 2007
作者: Sawamoto, Jun Tilwaldi, Dilmurat Okawa, Tsutomu Tsuji, Hidekazu Koizumi, Hisao Faculty of Software and Information Science Iwate Prefectural University Dept. of Computers and Systems Engineering Graduate School Tokyo Denki University Information Technology Center Mitsubishi Electric Corporation Dept. of Information Media Technology School of Information Technology and Electronics Tokai University
The research and development results of agent technology are awaited as the software solution with autonomy and social ability, which can provide the way to realize social activities on the Internet. However, the curr... 详细信息
来源: 评论
Privacy-preserving two-party K-means clustering via secure approximation
Privacy-preserving two-party K-means clustering via secure a...
收藏 引用
21st International Conference on Advanced information Networking and ApplicationsWorkshops/Symposia, AINAW'07
作者: Su, Chunhua Bao, Feng Zhou, Jianying Takagi, Tsuyoshi Sakurai, Kouichi Dept. of Computer Science and Communication Engineering Kyushu University Japan Systems and Security Department Institute for Infocomm. Research Singapore Singapore School of Systems Information Science Future University-Hakodate Japan
K-means clustering is a powerful and frequently used technique in data mining. However, privacy breaching is a serious problem if the k-means clustering is used without any security treatment, while privacy is a real ... 详细信息
来源: 评论
Extending reusable asset specification to improve software reuse
Proceedings of the ACM Symposium on Applied Computing
收藏 引用
Proceedings of the ACM Symposium on Applied Computing 2007年 1473-1478页
作者: Park, Soojin Park, Sooyong Sugumaran, Vijayan Software Engineering Lab. Dept. of Computer Science Sogang University 1 Shinsoo-Dong Mapo-Ku Seoul 121-742 Korea Republic of Decision and Information Sciences School of Business Administration Oakland University Rochester MI 48309 United States
Even though many approaches for reuse have been introduced, software engineers are still hesitating to reuse existing software components. Two problems are the root cause of this situation. One is the difficulty in kn... 详细信息
来源: 评论