咨询与建议

限定检索结果

文献类型

  • 1,836 篇 会议
  • 275 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,311 篇 工学
    • 1,052 篇 计算机科学与技术...
    • 892 篇 软件工程
    • 300 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 136 篇 生物工程
    • 122 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 98 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 59 篇 光学工程
    • 52 篇 安全科学与工程
    • 49 篇 动力工程及工程热...
    • 38 篇 建筑学
    • 37 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 35 篇 仪器科学与技术
  • 576 篇 理学
    • 339 篇 数学
    • 148 篇 生物学
    • 113 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 388 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 82 篇 医学
    • 80 篇 临床医学
    • 76 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 63 篇 software
  • 62 篇 software enginee...
  • 61 篇 accuracy
  • 56 篇 machine learning
  • 49 篇 computational mo...
  • 49 篇 feature extracti...
  • 48 篇 training
  • 40 篇 deep learning
  • 40 篇 real-time system...
  • 36 篇 semantics
  • 35 篇 computer science
  • 34 篇 analytical model...
  • 33 篇 artificial intel...
  • 31 篇 computer archite...
  • 31 篇 predictive model...
  • 30 篇 internet of thin...
  • 30 篇 data mining
  • 30 篇 data models
  • 25 篇 testing
  • 23 篇 scalability

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 10 篇 an beongku
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 1,928 篇 英文
  • 211 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2153 条 记 录,以下是861-870 订阅
排序:
MoCoP: Towards a Model Clone Portal
MoCoP: Towards a Model Clone Portal
收藏 引用
International Workshop on Modeling in software engineering (MISE)
作者: Önder Babur Matthew Stephan Dept. of Mathematics & Computer Science Eindhoven University of Technology Eindhoven The Netherlands Dept. of Computer Science & Software Engineering Miami University Oxford Ohio USA
Widespread and mature practice of model-driven engineering is leading to a growing number of modeling artifacts and challenges in their management. Model clone detection (MCD) is an important approach for managing and... 详细信息
来源: 评论
Pre-trained image processing transformer
arXiv
收藏 引用
arXiv 2020年
作者: Chen, Hanting Wang, Yunhe Guo, Tianyu Xu, Chang Deng, Yiping Liu, Zhenhua Ma, Siwei Xu, Chunjing Xu, Chao Gao, Wen Dept. of Machine Intelligence Peking University China Noah's Ark Lab Huawei Technologies School of Computer Science Faculty of Engineering The University of Sydney Australia Central Software Institution Huawei Technologies Institute of Digital Media School of Electronic Engineering and Computer Science Peking University China Peng Cheng Laboratory
As the computing power of modern hardware is increasing strongly, pre-trained deep learning models (e.g., BERT, GPT-3) learned on large-scale datasets have shown their effectiveness over conventional methods. The big ... 详细信息
来源: 评论
An IoT and blockchain-based multi-sensory in-home quality of life framework for cancer patients  15
An IoT and blockchain-based multi-sensory in-home quality of...
收藏 引用
15th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2019
作者: Rahman, Md. Abdur Rashid, Mamunur Barnes, Stuart Shamim Hossain, M. Hassanain, Elham Guizani, Mohsen Cyber Security and Forensic Computing Department University of Prince Mugrin Madinah Saudi Arabia Research Centre King's College London United Kingdom Department of Software Engineering King Saud University Riyadh11543 Saudi Arabia Dept. of Electrical and Computer Engineering University of Idaho MoscowID83844-1023 United States Dept. of Computer Science Umm Al-Qura University Makkah Saudi Arabia
Once a subject is diagnosed with cancer, a patient goes through a series of diagnosis and tests, referred to as after cancer treatment. Due to the nature of the treatment and side effects on regular lifestyles, mainta... 详细信息
来源: 评论
Safety and Security Analysis of Control Chains in SCADA Using the NFR Approach
收藏 引用
IFAC-PapersOnLine 2018年 第6期51卷 214-219页
作者: Subramanian, Nary Zalewski, Janusz Dept. of Computer Science University of Texas at Tyler TylerTX75799 United States Dept. of Software Engineering Florida Gulf Coast University Fort MyersFL33965 United States
The objective of this research is to shed light on the applicability of the Non-Functional Requirements (NFR) Approach to the concept of control chains for the combined analysis of safety and security of SCADA systems... 详细信息
来源: 评论
Network2Vec: Learning Node Representation Based on Space Mapping in Networks
Network2Vec: Learning Node Representation Based on Space Map...
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Zhenhua Huang Zhenyu Wang Rui Zhang Yangyang Zhao Xiaohui Xie Sharad Mehrotra School of Software Engineering South China University of Technology Dept. of Computer Science University of California Irvine
Complex networks represented as node adjacency matrices constrains the application of machine learning and parallel algorithms. To address this limitation, network embedding (i.e., graph representation) has been inten... 详细信息
来源: 评论
Dual Convolutional Neural Network for Image Steganalysis
Dual Convolutional Neural Network for Image Steganalysis
收藏 引用
IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB)
作者: Jaeyoung Kim Sanghoon Kang Hanhoon Park Jong-Il Park Dept. of Electronic Engineering Pukyong National University Busan Republic of Korea Dept. of Computer Software Hanyang University Seoul Republic of Korea
In this paper, we propose a new steganalytic method that uses dual convolutional neural network (CNN) of which each has different inputs. To construct the dual CNN structure, two pairs of the preprocessing filters and...
来源: 评论
An efficient adaptive online neural spikes detection and classification engine based on Bayesian inference  6
An efficient adaptive online neural spikes detection and cla...
收藏 引用
6th International Conference on Systems and Informatics, ICSAI 2019
作者: Li, Nan Sawan, Mohamad Wang, Lei College of Computer Science National University of Defense Technology Changsha China Polystim Neurotech. Lab Polytechnique Montreal Electrical Engineering Dept. Montreal Canada School of Engineering Westlake University Hangzhou310024 China Institute of Advanced Study Westlake Institute for Advanced Study Hangzhou310024 China
A new method, called Bayesian inference-based template matching (BIBTM) method, is proposed in this article, which is designed to detect and classify neural spikes from real neural signals. Through this spike detectio... 详细信息
来源: 评论
Disruptive IoT-Based Healthcare Insurance Business Model
Disruptive IoT-Based Healthcare Insurance Business Model
收藏 引用
IEEE International Conference on Computational Science and engineering, CSE
作者: Maryam Al Thawadi Farag Sallabi Mamoun Awad Khaled Shuaib Dept. of Information Systems and Security UAE University Al Ain UAE Dept. of Computer and Network Engineering UAE University Al Ain UAE Dept. of Computer Science and Software Engineering UAE University Al Ain UAE
Information revolution and technology growth have made a considerable contribution to restraining the cost expansion and empowering the customer. They disrupted most business models in different industries. The custom... 详细信息
来源: 评论
A Machine Learning Approach for Power Gating the FPGA Routing Network
A Machine Learning Approach for Power Gating the FPGA Routin...
收藏 引用
IEEE International Conference on Field-Programmable Technology (FPT)
作者: Zeinab Seifoori Hossein Asadi Mirjana Stojilović Dept. of Computer Engineering Sharif University of Technology Tehran Iran Ecole Polytechnique Federale de Lausanne Lausanne Switzerland
Power gating is a common approach for reducing circuit static power consumption. In FPGAs, resources that dominate static power consumption lie in the routing network. Researchers have proposed several heuristics for ...
来源: 评论
Path Planning for Multiple Mobile Robots in Smart Warehouse
Path Planning for Multiple Mobile Robots in Smart Warehouse
收藏 引用
International Conference on Control, Mechatronics and Automation (ICCMA)
作者: Ali Bolu Ömer Korçak Tekhnelogos Software Co. Ltd. Istanbul Turkey Computer Engineering Marmara University Dept. of Computer Engineering Marmara University Istanbul Turkey
Warehouse operations need high labor force and physical space. Currently, companies with huge warehouses are investing on autonomous robots to save time and energy, and to prevent human-based errors. One of the most i...
来源: 评论