咨询与建议

限定检索结果

文献类型

  • 1,832 篇 会议
  • 276 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,315 篇 工学
    • 1,056 篇 计算机科学与技术...
    • 895 篇 软件工程
    • 302 篇 信息与通信工程
    • 175 篇 控制科学与工程
    • 136 篇 生物工程
    • 123 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 99 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 59 篇 光学工程
    • 52 篇 安全科学与工程
    • 49 篇 动力工程及工程热...
    • 37 篇 建筑学
    • 37 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 35 篇 仪器科学与技术
  • 577 篇 理学
    • 339 篇 数学
    • 149 篇 生物学
    • 113 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 389 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 83 篇 医学
    • 81 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 62 篇 software
  • 59 篇 software enginee...
  • 59 篇 accuracy
  • 56 篇 machine learning
  • 48 篇 computational mo...
  • 48 篇 feature extracti...
  • 46 篇 training
  • 40 篇 real-time system...
  • 39 篇 deep learning
  • 36 篇 semantics
  • 35 篇 computer science
  • 33 篇 analytical model...
  • 33 篇 artificial intel...
  • 31 篇 computer archite...
  • 30 篇 data mining
  • 30 篇 predictive model...
  • 29 篇 internet of thin...
  • 29 篇 data models
  • 23 篇 scalability
  • 23 篇 support vector m...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 2,054 篇 英文
  • 82 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2150 条 记 录,以下是1621-1630 订阅
排序:
Ballot permutations in Prêt à voter
Ballot permutations in Prêt à voter
收藏 引用
2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2009, Held in Conjunction with the 18th USENIX Security Symposium
作者: Ryan, Peter Y.A. Teague, Vanessa Dept. Computer Science and Communications University of Luxembourg Luxembourg Dept. Computer Science and Software Engineering University of Melbourne Australia
Handling full permutations of the candidate list along with re-encryption mixes is rather difficult in Prêt à Voter but handling cyclic shifts is straightforward. One of the versions of Prêt à Vote... 详细信息
来源: 评论
A Re-examination of Lexical Association Measures
A Re-examination of Lexical Association Measures
收藏 引用
2009 Workshop on Multiword Expressions: Identification, Interpretation, Disambiguation, Applications, MWE 2009
作者: Hoang, Hung Huu Kim, Su Nam Kan, Min-Yen Dept. of Computer Science National University of Singapore Singapore Dept. of Computer Science and Software Engineering University of Melbourne Australia
We review lexical Association Measures (AMs) that have been employed by past work in extracting multiword expressions. Our work contributes to the understanding of these AMs by categorizing them into two groups and su... 详细信息
来源: 评论
Propagating Requirement Change into software High Level Designs towards Resilient software Evolution
Propagating Requirement Change into Software High Level Desi...
收藏 引用
16th Asia-Pacific software engineering Conference
作者: Ibrahim, Noraini Kadir, Wan M. N. Wan Deris, Safaai Software Engineering Dept. Faculty of Computer Science and Information System Universiti Teknologi Malaysia Malaysia
Uncertain and incomplete requirements throughout the whole software life cycle contribute to volatility of the requirements. In a situation where the volatile requirement is changed to satisfy stakeholder needs, all t... 详细信息
来源: 评论
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2010年 第PART 3期6278 LNAI卷 VI页
作者: Setchi, Rossitza Jordanov, Ivan Howlett, Robert J. Jain, Lakhmi C. Cardiff University School of Engineering The Parade Cardiff CF24 3AA United Kingdom University of Portsmouth Dept. of Computer Science and Software Engineering Buckingham Building Lion Terrace Portsmouth PO1 3HE United Kingdom KES International 145-157 St. John Street London EC1V 4PY United Kingdom University of South Australia School of Electrical and Information Engineering Mawson Lakes Campus Adelaide SA 5095 Australia
来源: 评论
A session generalization technique for improved web usage mining
A session generalization technique for improved web usage mi...
收藏 引用
ACM CIKM 2009 Workshop on Web Information and Data Management, WIDM 2009, Co-located with the 18th ACM International Conference on Information and Knowledge Management, CIKM 2009
作者: Hasan, Tahira Mudur, Sudhir P. Shiri, Nematollaah Dept. of Computer Science and Software Engineering Concordia University Montreal QC Canada
Generalization of web sessions is an effective approach used to overcome two major challenges in web usage mining, namely quality and scalability. Given a concept hierarchy, such as a website, generalization replaces ... 详细信息
来源: 评论
Using patterns for faster and scalable rewriting of conjunctive queries
Using patterns for faster and scalable rewriting of conjunct...
收藏 引用
3rd Alberto Mendelzon International Workshop on Foundations of Data Management, AMW 2009
作者: Kiani, Ali Shiri, Nematollaah Dept. of Computer Science and Software Engineering Concordia University Montreal QC Canada
Rewriting of conjunctive queries using views has many applications in database and data *** investigate ways to improve performance of rewriting and propose a new algorithm which has two phases. In the first phase, si... 详细信息
来源: 评论
Query processing and optimization for logic programs with certainty constraints
Query processing and optimization for logic programs with ce...
收藏 引用
22nd International Florida Artificial Intelligence Research Society Conference, FLAIRS-22
作者: Lai, Jinzan Shiri, Nematollaah Dept. of Computer Science and Software Engineering Concordia University Montreal QC Canada
Numerous logic frameworks have been proposed for modeling uncertainty and reasoning with such data. While different in syntax, the approaches of these frameworks have been classified into "annotation based" ... 详细信息
来源: 评论
A framework for goal-Based semantic compensation in agent systems
A framework for goal-Based semantic compensation in agent sy...
收藏 引用
Lecture Notes in computer Science
作者: Unruh, Amy Bailey, James Ramamohanarao, Kotagiri Dept. of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia
This paper describes an approach to improving the robustness of an agent system by augmenting its failure-handling capabilities. The approach is based on the concept of semantic compensation: "cleaning up" f... 详细信息
来源: 评论
Research and practice of web server optimization
Research and practice of web server optimization
收藏 引用
2nd International Symposium on Electronic Commerce and Security, ISECS 2009
作者: Wang, Mingfu Qi, Zhiwen Dept. of Software Engineering Shenzhen Polytechnic Shenzhen China Dept. of Computer Application Shenzhen Polytechnic Shenzhen China
The application and development of Web technology is limited by the integrative performance of web server. Analyzed the principle of web service and the system's overloading, showed the critical parts that influen... 详细信息
来源: 评论
PROS: A peer-to-peer system for location privacy protection on road networks (demo paper)  09
PROS: A peer-to-peer system for location privacy protection ...
收藏 引用
17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2009
作者: Bao, Jie Chen, Haiquan Ku, Wei-Shinn Dept. of Computer Science and Software Engineering Auburn University Auburn AL 36849 United States
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloaked into a spatial region that contains... 详细信息
来源: 评论