咨询与建议

限定检索结果

文献类型

  • 1,832 篇 会议
  • 275 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,149 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,314 篇 工学
    • 1,054 篇 计算机科学与技术...
    • 894 篇 软件工程
    • 300 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 136 篇 生物工程
    • 123 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 99 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 59 篇 光学工程
    • 52 篇 安全科学与工程
    • 49 篇 动力工程及工程热...
    • 38 篇 建筑学
    • 37 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 35 篇 仪器科学与技术
  • 577 篇 理学
    • 339 篇 数学
    • 149 篇 生物学
    • 113 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 388 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 83 篇 医学
    • 81 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 62 篇 software
  • 59 篇 software enginee...
  • 59 篇 accuracy
  • 56 篇 machine learning
  • 48 篇 computational mo...
  • 48 篇 feature extracti...
  • 46 篇 training
  • 40 篇 real-time system...
  • 39 篇 deep learning
  • 36 篇 semantics
  • 35 篇 computer science
  • 33 篇 analytical model...
  • 33 篇 artificial intel...
  • 31 篇 computer archite...
  • 30 篇 data mining
  • 30 篇 predictive model...
  • 29 篇 internet of thin...
  • 29 篇 data models
  • 23 篇 scalability
  • 23 篇 support vector m...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 2,053 篇 英文
  • 82 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2149 条 记 录,以下是1651-1660 订阅
排序:
Background generation using mean-shift and fast marching method
Background generation using mean-shift and fast marching met...
收藏 引用
2009 2nd International Conference on computer Science and Its Applications, CSA 2009
作者: Cho, Sang-Hyun Kang, Hang-Bong Yoo, Jang-Hee Dept. of Computer Engineering Catholic University of Korea Bucheon Korea Republic of Dept. of Digital Media Catholic University of Korea Bucheon Korea Republic of Software and Contents Research Laboratory Electronics and Telecommunications Research Institute Daejeon Korea Republic of
Background generation is very important for accurate object tracking in the video surveillance system. Traditional background generation techniques cause some problems when there have been non-moving objects for a lon... 详细信息
来源: 评论
Face image modeling by multilinear subspace analysis with missing values  09
Face image modeling by multilinear subspace analysis with mi...
收藏 引用
17th ACM International Conference on Multimedia, MM'09, with Co-located Workshops and Symposiums
作者: Geng, Xin Smith-Miles, Kate Zhou, Zhi-Hua Wang, Liang School of Mathematical Sciences Monash University VIC 3800 Australia School of Computer Science and Engineering Southeast University Nanjing 210096 China National Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Dept. of Computer Science and Software Eng. University of Melbourne VIC 3010 Australia
The main difficulty in face image modeling is to decompose those semantic factors contributing to the formation of the face images, such as identity, illumination and pose. One promising way is to organize the face im... 详细信息
来源: 评论
LITSEEK: Public health Literature Search by metadata enhancement with External Knowledge bases
LITSEEK: Public health Literature Search by metadata enhance...
收藏 引用
3rd ACM International Workshop on Data and Text Mining in Bioinformatics, DTMBIO'09, Co-located with the 18th ACM International Conference on Information and Knowledge Management, CIKM 2009
作者: Prabhu, Priyanka Sharad Navathe, Shamkant B. Tyler, Stephen Dasigi, Venu Narkhede, Neha Palanisamy, Balaji College of Computing Georgia Institute of Technology Atlanta GA 30332-0280 United States Dept. of Computer Science and Software Engineering Southern Polytechnic State University Marietta GA 30060-2855 United States
Biomedical literature is an important source of information in any researcher's investigation of genes, risk factors, diseases and drugs. Often the information searched by public health researchers is distributed ... 详细信息
来源: 评论
Semi-Supervised learning using label mean  09
Semi-Supervised learning using label mean
收藏 引用
26th Annual International Conference on Machine Learning, ICML'09
作者: Yu-Feng, Li Kwok, James T. Zhi-Hua, Zhou National Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Dept. Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Hong Kong Hong Kong
Semi-Supervised Support Vector Machines(S3VMs) typically directly estimate the label assignments for the unlabeled instances. This is often inefficient even with recent advances in the efficient training of the (super... 详细信息
来源: 评论
Semi-supervised learning using label mean
Semi-supervised learning using label mean
收藏 引用
26th International Conference On Machine Learning, ICML 2009
作者: Li, Yu-Feng Kwok, James T. Zhou, Zhi-Hua National Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Dept. Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Hong Kong Hong Kong
Semi-Supervised Support Vector Machines (S3VMs) typically directly estimate the label assignments for the unlabeled instances. This is often inefficient even with recent advances in the efficient training of the (supe... 详细信息
来源: 评论
Reasoning Intra-Dependency in Commitments for Robust Scheduling  09
Reasoning Intra-Dependency in Commitments for Robust Schedul...
收藏 引用
International Conference on Autonomous Agents and Multiagent Systems
作者: Mingzhong Wang Kotagiri Ramamohanarao Jinjun Chen Dept. of Computer Science and Software Engineering The University of Melbourne Faculty of ICT Swinburne University of Technology
Commitment-modeled protocols enable flexible and robust interactions among agents. However, existing work has focused on features and capabilities of protocols without considering the active role of agents in them. Th... 详细信息
来源: 评论
Asymmetric group key agreement
Asymmetric group key agreement
收藏 引用
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009
作者: Qianhong, Wu Yi, Mu Susilo, Willy Bo, Qin Domingo-Ferrer, Josep Universitat Rovira i Virgili Dept. of Comp. Eng. and Maths UNESCO Department of Data Privacy Tarragona Catalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing School of Computer Wuhan University China Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Australia Dept. of Maths School of Science Xi'an University of Technology China
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish a confiDential channel among group m... 详细信息
来源: 评论
A mobile decision support web 2.0 service to improve the customers satisfaction in their m-commerce experiences
Frontiers in Artificial Intelligence and Applications
收藏 引用
Frontiers in Artificial Intelligence and Applications 2009年 第1期201卷 137-146页
作者: Pérez, I.J. Alonso, S. Cabrerizo, F.J. Herrera-Viedma, E. Dept. of Computer Science and Artificial Intelligence University of Granada 18071 Granada Spain Dept. of Software Engineering University of Granada 18071 Granada Spain 28040 Madrid Spain
The aim of this paper is to present a new mobile decision support web service applied to improve the customer satisfaction in decision making situations related with m-commerce. The application is included as a new mo... 详细信息
来源: 评论
Registration of multimodality medical image using ordinary procrustes analysis and maximum likelihood framework
Registration of multimodality medical image using ordinary p...
收藏 引用
Medical Imaging 2009: Biomedical Applications in Molecular, Structural, and Functional Imaging
作者: Cho, Wanhyun Park, Jonghyun Kim, Sunwor Lee, Myungeun Park, Soonyoung Lim, Junsik Lee, Gueesang Le, Huy Phat Kim, Soohyung Jeongd, Changbu Division of Mathematics and Statistics Chonnam National University S. Korea Korea Republic of School of Electronics and Computer Engineering Chonnam National University S. Korea Korea Republic of Dept. of Electronics Engineering Mokpo National University S. Korea Korea Republic of Dept. of Internet Software Honam University S. Korea Korea Republic of
We propose a new registration method that can do the alignment of two medical images using simultaneously the ordinary Procrustes analysis as well as a maximum likelihood framework with the EM algorithm. In an initial... 详细信息
来源: 评论
A New Method to Generate Attack Graphs
A New Method to Generate Attack Graphs
收藏 引用
2009 Third IEEE International Conference on Secure Integration and Reliability Improvement SSIRI 2009(第三届IEEE安全软件集成及可信性改进国际会议)
作者: Anming Xie Guodong Chen Yonggang Wang Zhong Chen Jianbin Hu Institute of Software School of Electronics Engineering and Computer Science Peking University Be Dept. Of Electronic Engineering The First Aeronautical College of Air Force China Institute of Software School of Electronics Engineering and Computer Science Peking University Be Institute of Software School of Electronics Engineering and Computer Science Peking University Be Institute of Software School of Electronics Engineering and Computer Science Peking University Be
To address the scalability problem in attack graphs generation, we propose a novel method to generate attack graphs automatically. Our approach constructs a two-tier attack graph framework, which includes a host acces... 详细信息
来源: 评论