咨询与建议

限定检索结果

文献类型

  • 1,855 篇 会议
  • 279 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,332 篇 工学
    • 1,069 篇 计算机科学与技术...
    • 903 篇 软件工程
    • 307 篇 信息与通信工程
    • 182 篇 控制科学与工程
    • 138 篇 生物工程
    • 130 篇 电气工程
    • 117 篇 电子科学与技术(可...
    • 102 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 60 篇 机械工程
    • 53 篇 安全科学与工程
    • 48 篇 动力工程及工程热...
    • 38 篇 建筑学
    • 36 篇 仪器科学与技术
    • 36 篇 化学工程与技术
    • 36 篇 交通运输工程
  • 580 篇 理学
    • 341 篇 数学
    • 149 篇 生物学
    • 115 篇 物理学
    • 98 篇 统计学(可授理学、...
    • 72 篇 系统科学
  • 392 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 134 篇 工商管理
  • 87 篇 医学
    • 84 篇 临床医学
    • 78 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 41 篇 教育学
    • 41 篇 教育学
  • 27 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 63 篇 software enginee...
  • 63 篇 software
  • 62 篇 accuracy
  • 58 篇 machine learning
  • 50 篇 computational mo...
  • 50 篇 feature extracti...
  • 48 篇 training
  • 44 篇 deep learning
  • 41 篇 real-time system...
  • 36 篇 semantics
  • 35 篇 computer science
  • 34 篇 analytical model...
  • 33 篇 artificial intel...
  • 32 篇 predictive model...
  • 31 篇 computer archite...
  • 30 篇 internet of thin...
  • 30 篇 data mining
  • 30 篇 data models
  • 25 篇 testing
  • 23 篇 reliability

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 9 篇 rahman shafiur
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 nisar ali

语言

  • 1,993 篇 英文
  • 169 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2176 条 记 录,以下是1731-1740 订阅
An empirical study on modularization of object oriented software
An empirical study on modularization of object oriented soft...
收藏 引用
20th International Conference on software engineering and Knowledge engineering, SEKE 2008
作者: Liu, Jing Liu, Bin Tse, Chi K. He, Keqing State Key Laboratory of Software Engineering Wuhan Univ. Hubei China Computer Science Dept. Wuhan Univ. Hubei China Dept. of Electronic and Information Engineering Hong Kong Polytechnic Univ. Hong Kong Hong Kong
Object-oriented programming is supposed to produce better modularized structure than structural programming in that it encourages related state and behavior to be organized together in the form of classes, thus facili... 详细信息
来源: 评论
Combining MDE and UML to reverse engineer web-based legacy systems
Combining MDE and UML to reverse engineer web-based legacy s...
收藏 引用
32nd Annual IEEE International computer software and Applications Conference, COMPSAC 2008
作者: Pu, Jianjun Yang, Hongji Xu, Baowen Xu, Lei Chu, William Cheng-Ng Software Technology Research Laboratory De Montfort University United Kingdom Computing School Southeast University China Dept. of Computer Science and Information Engineering Tunghai University Taiwan
The research in this paper focuses on an approach to reverse engineering web-based legacy systems with the integration of model-driven engineering and UML. Three types of link-based models of web-based legacy systems ... 详细信息
来源: 评论
A hierarchical abstraction model for software engineering
A hierarchical abstraction model for software engineering
收藏 引用
2nd Workshop on The Role of Abstraction in software engineering, ROA'08
作者: Wang, Yingxu Theoretical and Empirical Software Engineering Research Centre Dept. of Electrical and Computer Engineering Schulich Schools of Engineering 2500 University Drive NW Calgary AB T2N 1N4 Canada
Abstraction is a basic foundation and a powerful means in science and engineering, such as philosophy, mathematics, cognitive informatics, computing, and software engineering, because any complex inference process is ... 详细信息
来源: 评论
A fuzzy constraint satisfaction approach to identify and characterize apnea episodes
A fuzzy constraint satisfaction approach to identify and cha...
收藏 引用
2nd International Conference on Bioinformatics and Biomedical engineering, iCBBE 2008
作者: Otero, A. Sorzano, C.O.S. Félix, P. Álvarez, M.R. Zamarrón, C. Dept. of Software and Knowledge Engineering University San Pablo CEU 28668 Madrid Spain Dept. of Electronics and Computer Science University of Santiago de Compostela 15782 Santiago Spain General Hospital of Galicia Pneumology Unit 15782 Santiago Spain
This paper presents an algorithm that permits the identification of apneas - cessations in the sleeping patient's respiratory flow - in the respiratory airflow signal and relates them to the drops in blood oxyhemo... 详细信息
来源: 评论
A distributed Lightweight group rekeying scheme with speedy node revocation for wireless sensor networks
A distributed Lightweight group rekeying scheme with speedy ...
收藏 引用
4th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2008
作者: Zeng, Wei-Ni Lin, Ya-Ping Liu, Yong-He College of Computer and Communication Hunan University Changsha Hunan 410082 China Software College Hunan University Changsha Hunan 410082 China Dept. of Computer Science and Engineering University of Texas at Arlington Arlington TX 76019 United States
In unattended or hostile environment like battlefield, sensor nodes may be compromised. If one node is compromised, group key which is shared by all the group members should be rekeyed in real-time and the compromised... 详细信息
来源: 评论
A genetic search strategy based on simulated annealing for web mining
收藏 引用
Journal of Computational Information Systems 2008年 第6期4卷 2641-2650页
作者: Chen, Hao Bian, Naizheng Zou, Beiji AhHwweYU Software School Hunan University Changsha 410082 China School of Information Science and Engineering Central South University Changsha 410083 China Dept. of Computer Science and Technology Huaihua College Huaihua 418008 China Nanyang Technological University 2A-13 Nanyang Avenue Singapore 639798 Singapore
As the web continues to increase in size, the relative coverage of web search engine is decreasing, and search tools that combine the results of multiple search engines are becoming more valuable. We present a genetic... 详细信息
来源: 评论
Study on adaptive intrusion detection engine based on gene expression programming rules
Study on adaptive intrusion detection engine based on gene e...
收藏 引用
International Conference on computer Science and software engineering, CSSE 2008
作者: Wan, Tang Yang, Xi-Min Yang, Cao So, Won-Ho School of Electronic Information Wuhan Univ. Wuhan 430070 China State Key Laboratory Software Engineering Wuhan 430070 China Dept. of Computer Science South-Central Univ. for Nationalities Wuhan 430074 China Dept. of Computer Education Sunchon National Univ. Sunchon 540-742 Korea Republic of
High false alarm rate and time-space cost of rule extraction and detection limit the application of machine learning in real Intrusion Detection System (IDS), and IDS cannot satisfy most system performance requirement... 详细信息
来源: 评论
Efficient and Locality-aware Resource Management in Wide-area Distributed Systems
Efficient and Locality-aware Resource Management in Wide-are...
收藏 引用
International Conference on Networking, Architecture, and Storage (NAS)
作者: Haiying Shen Yingwu Zhu Wing-Ning Li Department of Computer Science and Engineering University of Arkansas Fayetteville AR USA Dept. of Computer Science and Engineering University of Arkansas Fayetteville AR Dept. of Computer Science & Software Engineering Seattle University Seattle WA
Wide-area distributed systems such as data sharing, computational grids, and multimedia are increasingly being deployed in a large-scale, heterogeneous and dynamic distributed environment with geographically scattered... 详细信息
来源: 评论
An efficient syntactic web service composition algorithm based on the planning graph model
An efficient syntactic web service composition algorithm bas...
收藏 引用
IEEE International Conference on Web Services, ICWS 2008
作者: Zheng, Xianrong Yan, Yuhong Faculty of Computer Science University of New Brunswick Fredericton NB E3B 5A3 Canada Dept. Computer Science and Software Engineering Concordia University Montreal QC H3G 1M8 Canada
In this paper, we have studied a common Web service composition problem, the syntactic matching problem, where the output parameters of a Web service can be used as the input parameters of another Web service. Many au... 详细信息
来源: 评论
Knowledge discovery in Chinese medicine
Knowledge discovery in Chinese medicine
收藏 引用
2008 C3S2E Conference, C3S2E'08
作者: Wang, Tongyuan Desai, Bipin C. Zheng, Huzhan Qiao, Yanjiang Dept. of Computer Science and Software Engineering Concordia University Montreal H3G 1M8 Canada Faculty of Chinese Pharmacy Beijing University of Chinese Medicine Caoyang District Wangjing Beijing China
Our motivation for knowledge discovery in Chinese medicine is two folds: innovate and verify effective data mining technology in realistic applications;and update Chinese medical informatics. This paper focuses on the... 详细信息
来源: 评论