咨询与建议

限定检索结果

文献类型

  • 1,832 篇 会议
  • 276 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,315 篇 工学
    • 1,056 篇 计算机科学与技术...
    • 895 篇 软件工程
    • 302 篇 信息与通信工程
    • 175 篇 控制科学与工程
    • 136 篇 生物工程
    • 123 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 99 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 59 篇 光学工程
    • 52 篇 安全科学与工程
    • 49 篇 动力工程及工程热...
    • 37 篇 建筑学
    • 37 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 35 篇 仪器科学与技术
  • 577 篇 理学
    • 339 篇 数学
    • 149 篇 生物学
    • 113 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 389 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 83 篇 医学
    • 81 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 62 篇 software
  • 59 篇 software enginee...
  • 59 篇 accuracy
  • 56 篇 machine learning
  • 48 篇 computational mo...
  • 48 篇 feature extracti...
  • 46 篇 training
  • 40 篇 real-time system...
  • 39 篇 deep learning
  • 36 篇 semantics
  • 35 篇 computer science
  • 33 篇 analytical model...
  • 33 篇 artificial intel...
  • 31 篇 computer archite...
  • 30 篇 data mining
  • 30 篇 predictive model...
  • 29 篇 internet of thin...
  • 29 篇 data models
  • 23 篇 scalability
  • 23 篇 support vector m...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 2,054 篇 英文
  • 82 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2150 条 记 录,以下是1701-1710 订阅
排序:
Robust scheduling and runtime adaptation of multi-agent plan execution
Robust scheduling and runtime adaptation of multi-agent plan...
收藏 引用
2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2008
作者: Wang, Mingzhong Ramamohanarao, Kotagiri Chen, Jinjun Dept. of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia Faculty of ICT Swinburne University of Technology VIC 3122 Australia
Robustness and reliability with respect to the successful completion of a schedule are crucial requirements for scheduling in multi-agent systems because agent autonomy makes execution environments dynamic and nondete... 详细信息
来源: 评论
Representing textual requirements as graphical natural language for UML diagram generation
Representing textual requirements as graphical natural langu...
收藏 引用
20th International Conference on software engineering and Knowledge engineering, SEKE 2008
作者: Ilieva, Magda G. Boley, Harold Dept. of Computer Science and Software Engineering Concordia University Montreal Canada Institute for Information Technology National Research Council Canada Fredericton NB Canada
Since the establishment of the Unified Modeling Language (UML) as a standard graphical notation for representing knowledge, new ideas have emerged about tools that can automatically extract knowledge from text and rep... 详细信息
来源: 评论
Bandelet image coding based on SPIHT
Bandelet image coding based on SPIHT
收藏 引用
2nd International Symposium on Information Technologies and Applications in Education, ISITAE 2008
作者: Xie, Guofu Qu, Xiaobo Yan, Jingwen Dept. of Software Engineering Xiamen University Xiamen China Key Laboratory of Computer Science Beijing China Dept. of Communication Engineering Xiamen University Xiamen China Key Laboratory of Intelligent Manufacturing Technology Ministry of Education Shantou China
Bandelet is a new image representation method, which can efficiently indicate the local directions and is adapted to the image geometry. The set partitioning in hierarchical trees (SPIHT) algorithm is an efficient met... 详细信息
来源: 评论
Adaptive distributed mechanism against flooding network attacks based on machine learning
Adaptive distributed mechanism against flooding network atta...
收藏 引用
1st ACM Workshop on AISec, AISec'08, Co-located with the 15th ACM computer and Communications Security Conference, CCS'08
作者: Berral, Josep L. Poggi, Nicolas Alonso, Javier Gavaldà, Ricard Torres, Jordi Parashar, Manish Computer Architecture Deptartment Technical University of Catalonia Spain Computer Architecture Deptartment Technical University of Catalonia Spain Deptartment of Software Technical University of Catalonia Spain Dept. of Electrical and Computer Engineering Rutgers University United States
Adaptive techniques based on machine learning and data mining are gaining relevance in self-management and self-defense for networks and distributed systems. In this paper, we focus on early detection and stopping of ... 详细信息
来源: 评论
Bayes-adaptive POMDPs: A new perspective on the explore-exploit tradeoff in partially observable domains
Bayes-adaptive POMDPs: A new perspective on the explore-expl...
收藏 引用
10th International Symposium on Artificial Intelligence and Mathematics, ISAIM 2008
作者: Pineau, Joelle Ross, Stephane Chaib-Draa, Brahim School of Computer Science McGill University Montreal QC H3A 2A7 Canada Computer Science and Software Engineering Dept. Laval University Québec QC Canada
Bayesian Reinforcement Learning has generated substantial interest recently, as it provides an elegant solution to the exploration-exploitation trade-off in reinforcement learning. However most investigations of Bayes... 详细信息
来源: 评论
An empirical study on modularization of object oriented software
An empirical study on modularization of object oriented soft...
收藏 引用
20th International Conference on software engineering and Knowledge engineering, SEKE 2008
作者: Liu, Jing Liu, Bin Tse, Chi K. He, Keqing State Key Laboratory of Software Engineering Wuhan Univ. Hubei China Computer Science Dept. Wuhan Univ. Hubei China Dept. of Electronic and Information Engineering Hong Kong Polytechnic Univ. Hong Kong Hong Kong
Object-oriented programming is supposed to produce better modularized structure than structural programming in that it encourages related state and behavior to be organized together in the form of classes, thus facili... 详细信息
来源: 评论
Combining MDE and UML to reverse engineer web-based legacy systems
Combining MDE and UML to reverse engineer web-based legacy s...
收藏 引用
32nd Annual IEEE International computer software and Applications Conference, COMPSAC 2008
作者: Pu, Jianjun Yang, Hongji Xu, Baowen Xu, Lei Chu, William Cheng-Ng Software Technology Research Laboratory De Montfort University United Kingdom Computing School Southeast University China Dept. of Computer Science and Information Engineering Tunghai University Taiwan
The research in this paper focuses on an approach to reverse engineering web-based legacy systems with the integration of model-driven engineering and UML. Three types of link-based models of web-based legacy systems ... 详细信息
来源: 评论
A hierarchical abstraction model for software engineering
A hierarchical abstraction model for software engineering
收藏 引用
2nd Workshop on The Role of Abstraction in software engineering, ROA'08
作者: Wang, Yingxu Theoretical and Empirical Software Engineering Research Centre Dept. of Electrical and Computer Engineering Schulich Schools of Engineering 2500 University Drive NW Calgary AB T2N 1N4 Canada
Abstraction is a basic foundation and a powerful means in science and engineering, such as philosophy, mathematics, cognitive informatics, computing, and software engineering, because any complex inference process is ... 详细信息
来源: 评论
A fuzzy constraint satisfaction approach to identify and characterize apnea episodes
A fuzzy constraint satisfaction approach to identify and cha...
收藏 引用
2nd International Conference on Bioinformatics and Biomedical engineering, iCBBE 2008
作者: Otero, A. Sorzano, C.O.S. Félix, P. Álvarez, M.R. Zamarrón, C. Dept. of Software and Knowledge Engineering University San Pablo CEU 28668 Madrid Spain Dept. of Electronics and Computer Science University of Santiago de Compostela 15782 Santiago Spain General Hospital of Galicia Pneumology Unit 15782 Santiago Spain
This paper presents an algorithm that permits the identification of apneas - cessations in the sleeping patient's respiratory flow - in the respiratory airflow signal and relates them to the drops in blood oxyhemo... 详细信息
来源: 评论
A distributed Lightweight group rekeying scheme with speedy node revocation for wireless sensor networks
A distributed Lightweight group rekeying scheme with speedy ...
收藏 引用
4th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2008
作者: Zeng, Wei-Ni Lin, Ya-Ping Liu, Yong-He College of Computer and Communication Hunan University Changsha Hunan 410082 China Software College Hunan University Changsha Hunan 410082 China Dept. of Computer Science and Engineering University of Texas at Arlington Arlington TX 76019 United States
In unattended or hostile environment like battlefield, sensor nodes may be compromised. If one node is compromised, group key which is shared by all the group members should be rekeyed in real-time and the compromised... 详细信息
来源: 评论