咨询与建议

限定检索结果

文献类型

  • 1,836 篇 会议
  • 276 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,154 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,311 篇 工学
    • 1,052 篇 计算机科学与技术...
    • 892 篇 软件工程
    • 300 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 136 篇 生物工程
    • 122 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 98 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 59 篇 光学工程
    • 52 篇 安全科学与工程
    • 49 篇 动力工程及工程热...
    • 38 篇 建筑学
    • 37 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 35 篇 仪器科学与技术
  • 576 篇 理学
    • 339 篇 数学
    • 148 篇 生物学
    • 113 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 388 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 82 篇 医学
    • 80 篇 临床医学
    • 76 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 63 篇 software
  • 62 篇 software enginee...
  • 61 篇 accuracy
  • 56 篇 machine learning
  • 49 篇 computational mo...
  • 49 篇 feature extracti...
  • 48 篇 training
  • 40 篇 deep learning
  • 40 篇 real-time system...
  • 36 篇 semantics
  • 35 篇 computer science
  • 34 篇 analytical model...
  • 33 篇 artificial intel...
  • 31 篇 computer archite...
  • 31 篇 predictive model...
  • 30 篇 internet of thin...
  • 30 篇 data mining
  • 30 篇 data models
  • 25 篇 testing
  • 23 篇 scalability

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 1,929 篇 英文
  • 211 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2154 条 记 录,以下是851-860 订阅
排序:
Robust Model Predictive Control for Differential Speed Steering Vehicles
Robust Model Predictive Control for Differential Speed Steer...
收藏 引用
computer Science and Data engineering (CSDE), IEEE Asia-Pacific Conference on
作者: Paul Oke Sing Kiong Nguang Dept. of Electrical Computer and Software Engineering University of Auckland Auckland New Zealand
This paper studies the problem of designing robust model predictive control (RMPC) for four-wheel independently driven electric vehicles (FWIDEV) using differential speed steering. The nonlinear dynamic model of the e... 详细信息
来源: 评论
Improved Weighted Learning Support Vector Machines (SVM) for High Accuracy  2
Improved Weighted Learning Support Vector Machines (SVM) for...
收藏 引用
2nd International Conference on Computational Intelligence and Intelligent Systems, CIIS 2019
作者: Dzulkifli, Syahizul Amri Salleh, Mohd Najib Mohd Talpur, Kashif Hussain Software Engineering Dept. Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Parit Raja Johor Malaysia University of Electronic Science and Technology of China Chengdu Sichuan China
Support Vector machine (SVM) is a linear model designed for classification problem and popular due to a number of their attractive features such as high generalization ability and promising performance. However, the h... 详细信息
来源: 评论
Kin Genomic Data Inference Attacks Through Factor Graph
Kin Genomic Data Inference Attacks Through Factor Graph
收藏 引用
Mobile Ad Hoc and Sensor Systems Workshops (MASSW), International Conference on
作者: Hui Shang Zaobo He Dept. of Computer Science and Software Engineering Miami University Oxford OH USA
The high availability of genome sequencing data and advancement in data mining stimulate the progress of biomedical breakthroughs and the hope of personalized medicine. Meanwhile, the popularity of personalized and co... 详细信息
来源: 评论
Virtual Cluster Head Based PSO and Fuzzy Logic Approach for WSN to Extend Network Lifetime
Virtual Cluster Head Based PSO and Fuzzy Logic Approach for ...
收藏 引用
2020 International Conference on Computing and Information Technology, ICCIT 2020
作者: Manikandan, V. Mavaluru, DInesh Gobinathan, K. Rajanarayanan, S. Jenifer, M. Rohini, R. Lebanese French University Department of Computer Networking Erbil Kurdistan Region Iraq Saudi Electronic University College of Computing and Informatics Department of Information Technology Saudi Arabia Gnanamani Collge of Technology Department of CSE Namakkal India Arba Minch University Dept. of Business Administration and Information System Ethiopia Arba Minch University Arba Minch Institute of Technology Faculty of Computing and Software Engineering Ethiopia Vivekanandha College of Engineering for Women Department of CSE Namakkal India
In recent times, Wireless Sensor Networks (WSNs) are broadly utilized in targeted monitoring applications. Traditional target coverage techniques usually consider that environment is known completely and every target ... 详细信息
来源: 评论
Detecting Sybil Attack In Wireless Sensor Networks Using Machine Learning Algorithms
收藏 引用
IOP Conference Series: Materials Science and engineering 2021年 第1期1042卷
作者: Mandala Mounica R. Vijayasaraswathi R. Vasavi M.Tech Student of Software Engineering Dept. of Computer Science & Engineering VNR Vignana Jyothi Institute of Engineering and Technology Hyderabad Telangana India Assistant Professor Dept. of Computer Science & Engineering VNR Vignana Jyothi Institute Of Engineering and Technology Hyderabad Telangana India
In sensitive areas such as battlefields, a Wireless Sensor Network (WSN) is especially in military and civilian applications and it is of utmost importance to develop security in these networks. In various respects, t...
来源: 评论
Modeling boundary conditions in high-order, nodal, time-domain finite element methods  23
Modeling boundary conditions in high-order, nodal, time-doma...
收藏 引用
23rd International Congress on Acoustics: Integrating 4th EAA Euroregio, ICA 2019
作者: Pind, Finnur Jeong, Cheol-Ho Hesthaven, Jan S. Engsig-Karup, Allan P. Strømann-Andersen, Jakob Henning Larsen Denmark Acoustic Technology Dept. of Electrical Engineering Technical University of Denmark Denmark Chair of Computational Mathematics and Simulation Science École polytechnique fédérale de Lausanne Switzerland Scientific Computing Dept. of Applied Mathematics and Computer Science Technical University of Denmark Denmark
Accurate modeling of boundary conditions is an important aspect in room acoustic simulations. It has been shown that the acoustics of rooms is not only dependent on the frequency characteristic of the complex boundary... 详细信息
来源: 评论
The Influence of Agile Methodology (Scrum) on software Project Management
The Influence of Agile Methodology (Scrum) on Software Proje...
收藏 引用
ACIS International Conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Faisal Hayat Ammar Ur Rehman Khawaja Sarmad Arif Kanwal Wahab Muhammad Abbas Dept. of Computer & Software Engineering National University of Sciences & Technology (NUST) Islamabad Pakistan
software project management has main role in the software industry. It includes different processes and knowledge areas. The triple constraint of the software project like time, cost and scope is directly dependent on... 详细信息
来源: 评论
A two-level stacking model for detecting abnormal users in Wechat activities
A two-level stacking model for detecting abnormal users in W...
收藏 引用
Information Technology and computer Application (ITCA), International Conference on
作者: Jiayuan Ling Gangmin Li Dept. of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool University Suzhou China
Machine learning algorithms are widely employed in plenty of classification or regression problems. While in real business world, it is confronted with huge and disorder data pattern. To recognize different kinds of u... 详细信息
来源: 评论
Towards automated boundary value testing with program derivatives and search
arXiv
收藏 引用
arXiv 2019年
作者: Feldt, Robert Dobslaw, Felix Dept. of Computer Science and Engineering Div. of Software Engineering Chalmers University of Technology Gothenburg Sweden
A natural and often used strategy when testing software is to use input values at boundaries, i.e. where behavior is expected to change the most, an approach often called boundary value testing or analysis (BVA). Even... 详细信息
来源: 评论
Android malware detection using feature selections and random forest  4
Android malware detection using feature selections and rando...
收藏 引用
4th International Conference on software Security and Assurance, ICSSA 2018
作者: Eom, Taehoon Kim, Heesu An, SeongMo Park, Jong Sou Kim, Dong Seong Dept. of Computer Engineering Korea Aerospace University Seoul Korea Republic of Dept. of Computer Science and Software Engineering University of Queensland Australia
Malicious software (Malware) applications in Android ecosystem is one of the critical issues. Manual detection of malware is not cost-effective and cannot keep up with the fast evolution of malware development in Andr... 详细信息
来源: 评论