咨询与建议

限定检索结果

文献类型

  • 1,832 篇 会议
  • 276 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,315 篇 工学
    • 1,056 篇 计算机科学与技术...
    • 895 篇 软件工程
    • 302 篇 信息与通信工程
    • 175 篇 控制科学与工程
    • 136 篇 生物工程
    • 123 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 99 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 59 篇 光学工程
    • 52 篇 安全科学与工程
    • 49 篇 动力工程及工程热...
    • 37 篇 建筑学
    • 37 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 35 篇 仪器科学与技术
  • 577 篇 理学
    • 339 篇 数学
    • 149 篇 生物学
    • 113 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 389 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 83 篇 医学
    • 81 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 62 篇 software
  • 59 篇 software enginee...
  • 59 篇 accuracy
  • 56 篇 machine learning
  • 48 篇 computational mo...
  • 48 篇 feature extracti...
  • 46 篇 training
  • 40 篇 real-time system...
  • 39 篇 deep learning
  • 36 篇 semantics
  • 35 篇 computer science
  • 33 篇 analytical model...
  • 33 篇 artificial intel...
  • 31 篇 computer archite...
  • 30 篇 data mining
  • 30 篇 predictive model...
  • 29 篇 internet of thin...
  • 29 篇 data models
  • 23 篇 scalability
  • 23 篇 support vector m...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 2,054 篇 英文
  • 82 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2150 条 记 录,以下是1791-1800 订阅
排序:
An evaluation of negative selection algorithm with constraint-based detectors  44
An evaluation of negative selection algorithm with constrain...
收藏 引用
44th Annual ACM Southeast Conference, ACMSE 2006
作者: Hou, Haiyu Dozier, Gerry Applied Computational Intelligence Lab. Dept. Computer Science and Software Engineering Auburn University
The Negative Selection Algorithm is an immunology-inspired algorithm for anomaly detection application. This algorithm has been implemented with different pattern representations and various matching rules and success... 详细信息
来源: 评论
An efficient predictive admission control policy for heterogenous wireless bandwidth allocation in next generation mobile networks
An efficient predictive admission control policy for heterog...
收藏 引用
2006 International Wireless Communications and Mobile Computing Conference, IWCMC 2006
作者: Ali, Racha Ben Pierre, Samuel Mobile Computing and Networking Research Laboratory Dept. of Computer Engineering Ecole Polytechnique Montreal Montreal QC Canada
Next generation mobile networks (NGMN) are expected to integrate several heterogenous wireless technologies in order to provide high system capacity and cost effective global service coverage. In this paper we propose... 详细信息
来源: 评论
Classifying noisy data streams
收藏 引用
3rd International Conference on Fuzzy Systems and Knowledge Discovery
作者: Wang, Yong Li, Zhanhuai Zhang, Yang Dept. Computer Science and Software Northwestern Polytechnical University China School of Information Engineering Northwest A and F University China
The two main challenges associated with mining data streams are concept drifting and data noise. Current algorithms mainly depend on the robust of the base classifier or learning ensembles, and have no active mechanis... 详细信息
来源: 评论
Empirically driven SE research: State of the art and required maturity
Empirically driven SE research: State of the art and require...
收藏 引用
28th International Conference on software engineering 2006, ICSE '06
作者: Basili, Victor Elbaum, Sebastian Computer Science Dept. University of Maryland Fraunhofer Center for Experimental Software Eng. College Park MD Computer Science and Engineering Dept. University of Nebraska Lincoln NE
software engineering researchers are increasingly relying on the empirical approach to advance the state of the art. The level of empirical rigor and evidence required to guide software engineering research, however, ... 详细信息
来源: 评论
A new P2P-like architecture for large scale end to end network measurement
A new P2P-like architecture for large scale end to end netwo...
收藏 引用
International Conference on Networking, International Conference on Systems andInternational Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06
作者: Dawei, Xu Depei, Qian Zhongzhi, Luan Mi, Tang Tao, Liu Dept. of Computer Science and Engineering Xi'an Jiaotong University Sino-German Joint Software Institute Beihang University
Deploying probes easily and dynamically is very important to the success of end to end measurement systems. A P2P-like dynamic probe deployment mechanism for large scale end to end network measurement is proposed in t... 详细信息
来源: 评论
Profiling self-propagating worms via behavioral footprinting
Profiling self-propagating worms via behavioral footprinting
收藏 引用
4th ACM Workshop on Recurring Malcode, WORM'06. Co-located with the 13th ACM Conference on computer and Communications Security, CCS'06
作者: Jiang, Xuxian Xu, Dongyan Dept. of Information and Software Engineering George Mason University Fairfax VA 22030 CERIAS Dept. of Computer Science Purdue University West Lafayette IN 47907
This paper proposes behavioral footprinting, a new dimension of worm profiling based on worm infection sessions. A worm's infection session contains a number of steps (e.g., for probing, exploitation, and replicat... 详细信息
来源: 评论
ARCATS - A Scalable Compositional Analysis Tool Suite
ARCATS - A Scalable Compositional Analysis Tool Suite
收藏 引用
2006 ACM Symposium on Applied Computing
作者: Cheng, Yung-Pin Cheng, Yu-Ru Wang, Hong-Yi Software Engineering Lab. Dept. Information and Computer Education National Taiwan Normal University Taipei City Taiwan
Automatic verification techniques, which analyze all processes at once, typically do not scale well for large, complex concurrent software systems because of the theoretic barrier - PSPACE complexity in worst case. In... 详细信息
来源: 评论
DRM enabled P2P architecture
DRM enabled P2P architecture
收藏 引用
8th International Conference Advanced Communication Technology, ICACT 2006
作者: Sung, Jae-Youn Jeong, Jeong-Yeon Yoon, Ki-Song UST Computer and Software Engineering Dept. Korea Republic of ETRI Digital Contents Distribution Research Team Korea Republic of
Recently, P2P (Peer to Peer) systems, direct file sharing systems among the peers, are one of the most attractive file sharing system. P2P architectures have high scalability and high performance due to the fact that ... 详细信息
来源: 评论
Using decision trees to predict the certification result of a build  06
Using decision trees to predict the certification result of ...
收藏 引用
21st IEEE/ACM International Conference on Automated software engineering, ASE 2006
作者: Hassan, Ahmed E. Ken, Zhang Dept. of Electrical and Computer Engineering University of Victoria Vic. Canada Toronto Software Lab. IBM Canada Toronto Canada
Large teams of practitioners (developers, testers, etc.) usually work in parallel on the same code base. A major concern when working in parallel is the introduction of integration bugs in the latest shared code. Thes... 详细信息
来源: 评论
Design and implementation of Linux-based application which supports CDMA and WiBro network
Design and implementation of Linux-based application which s...
收藏 引用
8th International Conference Advanced Communication Technology, ICACT 2006
作者: Kim, Dohyung Yun, Minhong Kim, Sunja Lee, Cheol-Hoon Embedded S/W Research Division Electronics and Telecommunications Research Institute Dept. of Computer Engineering System Software Lab. Chungnam National University
This paper describes the design and implementations of the first application service based on embedded Linux;Mobile Teller which uses WiBro network for data communications and CDMA network for voice communications. Wh... 详细信息
来源: 评论