咨询与建议

限定检索结果

文献类型

  • 1,409 篇 会议
  • 356 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 1,781 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 953 篇 工学
    • 750 篇 计算机科学与技术...
    • 639 篇 软件工程
    • 256 篇 信息与通信工程
    • 145 篇 生物工程
    • 128 篇 控制科学与工程
    • 98 篇 生物医学工程(可授...
    • 88 篇 电气工程
    • 83 篇 光学工程
    • 80 篇 电子科学与技术(可...
    • 49 篇 动力工程及工程热...
    • 49 篇 网络空间安全
    • 47 篇 安全科学与工程
    • 38 篇 机械工程
    • 38 篇 交通运输工程
    • 33 篇 化学工程与技术
  • 505 篇 理学
    • 257 篇 数学
    • 152 篇 生物学
    • 126 篇 物理学
    • 106 篇 统计学(可授理学、...
    • 44 篇 系统科学
    • 31 篇 地球物理学
  • 278 篇 管理学
    • 150 篇 图书情报与档案管...
    • 137 篇 管理科学与工程(可...
    • 89 篇 工商管理
  • 101 篇 医学
    • 80 篇 临床医学
    • 76 篇 基础医学(可授医学...
    • 56 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 66 篇 法学
    • 55 篇 社会学
  • 33 篇 经济学
    • 33 篇 应用经济学
  • 25 篇 农学
  • 13 篇 教育学
  • 8 篇 文学
  • 3 篇 军事学

主题

  • 131 篇 accuracy
  • 74 篇 computational mo...
  • 68 篇 deep learning
  • 65 篇 real-time system...
  • 64 篇 machine learning
  • 58 篇 feature extracti...
  • 56 篇 predictive model...
  • 54 篇 convolutional ne...
  • 51 篇 training
  • 45 篇 data models
  • 43 篇 machine learning...
  • 39 篇 artificial intel...
  • 37 篇 support vector m...
  • 37 篇 analytical model...
  • 35 篇 technological in...
  • 32 篇 security
  • 31 篇 internet of thin...
  • 31 篇 visualization
  • 28 篇 reliability
  • 27 篇 data mining

机构

  • 15 篇 faculty of compu...
  • 15 篇 gik institute of...
  • 15 篇 university of eu...
  • 15 篇 lovely professio...
  • 15 篇 department of ph...
  • 15 篇 dept. of technol...
  • 13 篇 center for data ...
  • 13 篇 bcmaterials basq...
  • 13 篇 dept. of linguis...
  • 11 篇 fermi national a...
  • 11 篇 department of ph...
  • 11 篇 dept. of compute...
  • 11 篇 computer science...
  • 11 篇 kavli institute ...
  • 11 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 10 篇 madrid
  • 10 篇 department of ph...
  • 10 篇 smart data & kno...
  • 9 篇 department of ph...

作者

  • 21 篇 bowman samuel r.
  • 17 篇 ali raja hashim
  • 16 篇 zain ul abideen
  • 15 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 raja hashim ali
  • 13 篇 ashwini kodipall...
  • 13 篇 günnemann stepha...
  • 12 篇 dengel andreas
  • 12 篇 schröder markus
  • 11 篇 gruendl r.a.
  • 11 篇 ali zeeshan ijaz
  • 11 篇 sanchez e.
  • 11 篇 carretero j.
  • 11 篇 kodipalli ashwin...
  • 11 篇 jilek christian
  • 10 篇 miquel r.
  • 10 篇 ravindran balara...
  • 10 篇 gruen d.
  • 10 篇 doel p.

语言

  • 1,613 篇 英文
  • 161 篇 其他
  • 6 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Dept. of Data Science and Computer Applications"
1781 条 记 录,以下是1541-1550 订阅
排序:
Using whole and part-based HOG filters in succession to detect cars in aerial images
Using whole and part-based HOG filters in succession to dete...
收藏 引用
8th International Conference on computer Vision Theory and applications, VISAPP 2013
作者: Madhogaria, Satish Schikora, Marek Koch, Wolfgang Dept. Sensor Data and Information Fusion Fraunhofer FKIE Wachtberg Germany Department of Computer Science Technical University of Munich Munich Germany
Vehicle detection in aerial images plays a key role in surveillance, transportation control and traffic monitoring. It forms an important aspect in the deployment of autonomous Unmanned Aerial System (UAS) in rescue a... 详细信息
来源: 评论
Optimizing interactive performance for desktop-virtualization environment
Optimizing interactive performance for desktop-virtualizatio...
收藏 引用
Joint International Conference on Pervasive Computing and the Networked World, ICPCA/SWS 2012
作者: Wang, Xiaolin Zhang, Binbin Luo, Yingwei Dept. of Computer Science and Technology Peking University Beijing 100871 China Dept. of Computer Science and Engineering Yunnan University Yunnan 650091 China Shenzhen Key Lab. for Cloud Computing Technology and Applications Peking University Shenzhen Graduate School Guangdong 518055 China
Full virtualization is vastly applied in desktop virtualization. Although hardware-assisted virtualization greatly improves the performance, the interactive performance is still a bottleneck for full virtualization. I... 详细信息
来源: 评论
What users care about: A framework for social content alignment
What users care about: A framework for social content alignm...
收藏 引用
23rd International Joint Conference on Artificial Intelligence, IJCAI 2013
作者: Hou, Lei Li, Juanzi Li, Xiaoli Qu, Jiangfeng Guo, Xiaofei Hui, Ou Tang, Jie Dept. of Computer Science and Technology Tsinghua University Tsinghua 100084 China Data Analytics Department Institute for Infocomm Research Singapore 138632 Singapore
With the rapid proliferation of social media, more and more people freely express their opinions (or comments) on news, products, and movies through online services such as forums, discussion groups, and microblogs. T...
来源: 评论
Encrypted traffic and IPsec challenges for intrusion detection system
Encrypted traffic and IPsec challenges for intrusion detecti...
收藏 引用
International Conference on Advances in Computing, ICAdC 2012
作者: Kumar, Manish Hanumanthappa, M. Suresh Kumar, T.V. Dept. of MCA M S Ramaiah Institute of Technology MSRIT Post Bangalore 560 054 India Dept. of Computer Science and Applications Jnana Bharathi Campus Bangalore University Bangalore 560 056 India
Now a day IPsec has now become a standard information security technology throughout the Network and Internet society. It provides confidentiality, authentication, integrity, secure key exchange and protection mechani... 详细信息
来源: 评论
Prediction of customer buying nature from frequent itemsets generation using quinemccluskey method  4
Prediction of customer buying nature from frequent itemsets ...
收藏 引用
IET Chennai 4th International Conference on Sustainable Energy and Intelligent Systems, SEISCON 2013
作者: Krishnamurthy, M. Rajalakshmi, E. Baskaran, R. Kannan, A. Dept. of Computer Science and Engineering KCG College of Technology Chennai Tamil Nadu India Dept. of Master of Computer Applications Sri Venkateswara College of Engineering Pennalur Sriperumbudur602 105 India Department of Computer Science and Engineering Anna University Chennai600 025 India Department of Information Science and Technology Anna University Chennai600 025 India
Finding frequent itemsets is one of the most important fields of data mining and also finding the rules associated with the itemset is another important ground in association rule mining. The process of finding new te... 详细信息
来源: 评论
DWT-Based Multi-Adaptive Image coding for Frame Memory Reduction in LCD Overdrive
DWT-Based Multi-Adaptive Image coding for Frame Memory Reduc...
收藏 引用
2013 IEEE RIVF International Conference on Computing and Communication Technologies: Research, Innovation, and Vision for Future, RIVF 2013
作者: Huu, Tai Nguyen Thi, Hoang-Lan Nguyen Dinh, Chon-Tam Le Dept. of Information Technology Hue Univ. and Hanoi Univ. of Science and Technology Hue Viet Nam Dept. of Data Communications and Computer Networks Hanoi Univ. of Science and Technology Hanoi Viet Nam Department of Electrical and Computer Engineering Sherbrooke University Sherbrooke Canada
In this paper, DWT-Based Multi-Adaptive Image Coding (DBMAIC) is proposed to increase compression performance for Frame Memory Reduction in LCD Overdrive. The DBMAIC development is based on DWT-Based Adaptive Mode Sel... 详细信息
来源: 评论
Scalable intrusion detection systems log analysis using cloud computing infrastructure
Scalable intrusion detection systems log analysis using clou...
收藏 引用
IEEE International Conference on Computational Intelligence and Computing Research
作者: Manish Kumar M. Hanumanthappa Department of Computer Science and Applications Bangalore University Bangalore INDIA Dept. of Computer Science and Applications Bangalore University Bangalore INDIA
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. It identifies unauthorized use, misuse, and abuse of computer systems b... 详细信息
来源: 评论
Cherenkov telescope array data management  34
Cherenkov telescope array data management
收藏 引用
34th International Cosmic Ray Conference, ICRC 2015
作者: Lamanna, G. Antonelli, L.A. Contreras, J.L. Knödlseder, J. Kosack, K. Neyroud, N. Aboudan, A. Arrabito, L. Barbier, C. Bastieri, D. Boisson, C. Brau-Nogué, S. Bregeon, J. Bulgarelli, A. Carosi, A. Costa, A. De Cesare, G. De Los Reyes, R. Fioretti, V. Gallozzi, S. Jacquemier, J. Khelifi, B. Kocot, J. Lombardi, S. Lucarelli, F. Lyard, E. Maier, G. Massimino, P. Osborne, J.P. Perri, M. Rico, J. Sanchez, D.A. Satalecka, K. Siejkowski, H. Stolarczyk, T. Szepieniec, T. Testa, V. Walter, R. Ward, J.E. Zoli, A. LAPP Université de Savoie Mont-Blanc CNRS/IN2P3 Annecy-le-VieuxF-74941 France INAF - Osservatorio Astronomico di Roma Via Frascati 33 Monte Porzio CatoneI-00040 Italy ASI Science Data Center Via del Politecnico s.n.c. RomeI-00133 Italy Grupo de Altas Energías Universidad Complutense de Madrid Spain IRAP 9 avenue du Colonel Roche Toulouse31028 France CEA Saclay - Irfu/SAp - Orme des Merisiers Bât. 709 Gif-sur-Yvette Cedex91191 France INAF/IASF Via Piero Gobetti 101 Bologna40129 Italy LUPM CNRS-IN2P3 Place Eugéne Bataillon - CC 72 Montpellier34095 France Dipartimento di Fisica Universita degli Studi di Padova Italy Observatoire de Paris LUTH CNRS Université Paris Diderot Paris France INAF - Osservatorio Astrofisico di Catania Via S.Sofia 78 Catania95123 Italy Max-Planck-Institut für Kernphysik Saupfercheckweg 1 Heidelberg69117 Germany APC IN2P3/CNRS Université Paris-Diderot Paris France Academic Computer Centre CYFRONET AGH Kraków Poland ISDC University of Geneva Switzerland Deutsches Elektronen-Synchrotron Platanenallee 6 Zeuthen Germany Dept. of Physics and Astronomy University of Leicester LeicesterLE1 7RH United Kingdom 08193 Spain
Very High Energy gamma-ray astronomy with the Cherenkov Telescope Array (CTA) is evolving towards the model of a public observatory. Handling, processing and archiving the large amount of data generated by the CTA ins...
来源: 评论
Upper Bounding Overlaps by Groupings
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent Systems and Computing 2013年 228卷 355-365页
作者: Madrid, Nicolás Barrenechea, Edurne Bustince, Humberto Fernadez, Javier Perfilieva, Irina Institute for Research and Applications of Fuzzy Modeling University of Ostrava 30. dubna 22 Ostrava 1701 03 Czech Republic Dept. Computer Science and Artificial Intelligence Public University of Navarra C/ Arrosadía s/n Pamplona31006 Spain
This paper focuses on determining conditions to ensure that certain overlaps are less than or equal to certain groupings. We also show that the meaning of such conditions is connected with the use of overlaps and grou... 详细信息
来源: 评论
A dominating set based approach to identify effective leader group of social network
A dominating set based approach to identify effective leader...
收藏 引用
19th International Computing and Combinatorics Conference, COCOON 2013
作者: Kim, Donghyun Li, Deying Asgari, Omid Li, Yingshu Tokuta, Alade O. Dept. of Mathematics and Computer Science North Carolina Central University Durham NC 27707 United States Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China Renmin 100872 China Dept. of Computer Science Georgia State University Atlanta GA 30303 United States
Very recently, the study of social networks has received a huge attention since we can learn and understand many hidden properties of our society. This paper investigates the potential of social network analysis to se... 详细信息
来源: 评论