咨询与建议

限定检索结果

文献类型

  • 1,409 篇 会议
  • 356 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 1,781 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 953 篇 工学
    • 750 篇 计算机科学与技术...
    • 639 篇 软件工程
    • 256 篇 信息与通信工程
    • 145 篇 生物工程
    • 128 篇 控制科学与工程
    • 98 篇 生物医学工程(可授...
    • 88 篇 电气工程
    • 83 篇 光学工程
    • 80 篇 电子科学与技术(可...
    • 49 篇 动力工程及工程热...
    • 49 篇 网络空间安全
    • 47 篇 安全科学与工程
    • 38 篇 机械工程
    • 38 篇 交通运输工程
    • 33 篇 化学工程与技术
  • 505 篇 理学
    • 257 篇 数学
    • 152 篇 生物学
    • 126 篇 物理学
    • 106 篇 统计学(可授理学、...
    • 44 篇 系统科学
    • 31 篇 地球物理学
  • 278 篇 管理学
    • 150 篇 图书情报与档案管...
    • 137 篇 管理科学与工程(可...
    • 89 篇 工商管理
  • 101 篇 医学
    • 80 篇 临床医学
    • 76 篇 基础医学(可授医学...
    • 56 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 66 篇 法学
    • 55 篇 社会学
  • 33 篇 经济学
    • 33 篇 应用经济学
  • 25 篇 农学
  • 13 篇 教育学
  • 8 篇 文学
  • 3 篇 军事学

主题

  • 131 篇 accuracy
  • 74 篇 computational mo...
  • 68 篇 deep learning
  • 65 篇 real-time system...
  • 64 篇 machine learning
  • 58 篇 feature extracti...
  • 56 篇 predictive model...
  • 54 篇 convolutional ne...
  • 51 篇 training
  • 45 篇 data models
  • 43 篇 machine learning...
  • 39 篇 artificial intel...
  • 37 篇 support vector m...
  • 37 篇 analytical model...
  • 35 篇 technological in...
  • 32 篇 security
  • 31 篇 internet of thin...
  • 31 篇 visualization
  • 28 篇 reliability
  • 27 篇 data mining

机构

  • 15 篇 faculty of compu...
  • 15 篇 gik institute of...
  • 15 篇 university of eu...
  • 15 篇 lovely professio...
  • 15 篇 department of ph...
  • 15 篇 dept. of technol...
  • 13 篇 center for data ...
  • 13 篇 bcmaterials basq...
  • 13 篇 dept. of linguis...
  • 11 篇 fermi national a...
  • 11 篇 department of ph...
  • 11 篇 dept. of compute...
  • 11 篇 computer science...
  • 11 篇 kavli institute ...
  • 11 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 10 篇 madrid
  • 10 篇 department of ph...
  • 10 篇 smart data & kno...
  • 9 篇 department of ph...

作者

  • 21 篇 bowman samuel r.
  • 17 篇 ali raja hashim
  • 16 篇 zain ul abideen
  • 15 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 raja hashim ali
  • 13 篇 ashwini kodipall...
  • 13 篇 günnemann stepha...
  • 12 篇 dengel andreas
  • 12 篇 schröder markus
  • 11 篇 gruendl r.a.
  • 11 篇 ali zeeshan ijaz
  • 11 篇 sanchez e.
  • 11 篇 carretero j.
  • 11 篇 kodipalli ashwin...
  • 11 篇 jilek christian
  • 10 篇 miquel r.
  • 10 篇 ravindran balara...
  • 10 篇 gruen d.
  • 10 篇 doel p.

语言

  • 1,613 篇 英文
  • 161 篇 其他
  • 6 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Dept. of Data Science and Computer Applications"
1781 条 记 录,以下是1601-1610 订阅
排序:
Preprocessing of Gurmukhi Strokes in Online Handwriting Recognition
Preprocessing of Gurmukhi Strokes in Online Handwriting Reco...
收藏 引用
2012 2nd International Conference on Power and Energy Systems(ICPES 2012)
作者: Nainsi Gupta1 Mayank Gupta Rahul Agrawa M.Tech Student Dept. of Computer Science and Engineering M.Tech Student School of Mathematics and Computer and Applications Thapar University
The pen-based devices are not so common in India and one reason for that is the absence of localized applications. Developing an online handwriting recognition system for Gurmukhi scripts for such devices would play a... 详细信息
来源: 评论
Innovative e-commerce project observations
Innovative e-commerce project observations
收藏 引用
1st International Conference on Advances in Engineering, science and Management, ICAESM-2012
作者: Ramya, R. Anandanatarajan, R. Arul Selvan, G. Dept. of Computer Applications Bharathiyar College of Engineering and Technology Karaikal India Dr.M.G.R. Educational and Research Institute Chennai India Department of Electronics and Instrumentation Engineering Pondicherry Engineering College Puducherry India Department of Computer Science and Engineering EGS Pillay Engineering College Nagapattinam Tamil Nadu India
In this paper, we outline observations made during projects in the field of innovative e-commerce information systems. Our first group of observations concentrates on the exploration of an innovative e-commerce idea. ... 详细信息
来源: 评论
Performance analysis of partitioning mobile web services
Performance analysis of partitioning mobile web services
收藏 引用
International Conference on Emerging Trends in science, Engineering and Technology (INCOSET)
作者: P. Sathya R. Gobi E. Kirubakaran Dept. of Computer Applications J.J College of Engg. & Tech Trichy Dept. of Computer Science & Engg Bharathidasan University Trichy Outsourcing Department Bharat Heavy Electricals Limited Trichy
It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. The market capture of mobile web services also has increased significantly,...
来源: 评论
ACO variants in solving Mobile Ad hoc Network routing
ACO variants in solving Mobile Ad hoc Network routing
收藏 引用
International Conference on Emerging applications of Information Technology (EAIT)
作者: Debasmita Mukherjee Sriyankar Acharyya Dept. of Computer Applications Techno India EM4/1 Sector-V Salt Lake Kolkata India Dept. of Computer Science and Engineering West Bengal University of Technology Kolkata India
Mobile Ad hoc Network (MANET) is one of the most upcoming technologies in the field of wireless communication. As there is no predefined network configuration in MANET, routing, therefore, is much more difficult compa... 详细信息
来源: 评论
An Artificial Bee Colony Algorithm Based Efficient Prediction Model for Stock Market Indices
An Artificial Bee Colony Algorithm Based Efficient Predictio...
收藏 引用
World Congress on Information and Communication Technologies
作者: Minakhi Rout Usha Manasi Mohapatra Babita Majhi Rosalin Mahapatra Dept. of Computer Science & Engineering Institute of Technical Education & Research Siksha O Anusandhan (Deemed to be) University Dept. of Computer Applications Institute of Technical Education & Research Siksha O Anusandhan (Deemed to be) University Dept. of Computer Science & IT G. G. Vishwavidyalaya (Central University) Dept. of Computer Science & Engineering Institute of Technical Education & Research Siksha 'O' Anusandhan (Deemed to be) University
The ABC algorithm is a new meta-heuristic approach, having the advantages of memory, multi-characters, local search, and a solution improvement mechanism. It can be used to identify a high quality optimal solution and... 详细信息
来源: 评论
A quantitative evaluation of techniques for detection of abnormal change events in blogs.  12
A quantitative evaluation of techniques for detection of abn...
收藏 引用
12th ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL '12
作者: Bogen II, Paul L. Furuta, Richard Shipman, Frank Intelligent Computing Research Team Computational Data Analytics Group Oak Ridge National Laboratory Oak Ridge TN United States Center for the Study of Digital Libraries Dept. of Computer Science and Engineering Texas A and M University College Station TX 77843 United States
While most digital collections have limited forms of change - primarily creation and deletion of additional resources - there exists a class of digital collections that undergoes additional kinds of change. These coll... 详细信息
来源: 评论
Sniper: A social relationship based defence for network coordinate systems
Sniper: A social relationship based defence for network coor...
收藏 引用
International Conference on Automatic Control and Artificial Intelligence, ACAI 2012
作者: Zheng, Qiuchen Zhao, Xiaohan Jiang, Minghu Deng, Beixing Lab of New Generation Network Technologies and Applications Dept. of Electronic Engineering Tsinghua University Beijing 100084 China Dept. of Computer Science University of California Santa Barbara United States Lab of Computational Linguistics School of Humanities and Social Sciences Tsinghua University China
Network Coordinate Systems (NCS) allow accurate latency estimation with low measurement overhead. However, NCS are vulnerable to attacks, which makes security issue a crucial concern in their large-scale deployment. T... 详细信息
来源: 评论
Refounding software engineering: The Semat initiative (Invited presentation)
Refounding software engineering: The Semat initiative (Invit...
收藏 引用
34th International Conference on Software Engineering, ICSE 2012
作者: Kajko-Mattsson, Mira Striewe, Michael Goedicke, Michael Jacobson, Ivar Spence, Ian Huang, Shihong McMahon, Paul MacIsaac, Bruce Elvesæter, Brian Berre, Arne J. Seymour, Ed ICT/KTH Royal Institute of Technology Stockholm Sweden University of Duisburg-Essen Essen Germany Ivar Jacobson Int'l. United Kingdom Dept. of Computer and Electrical Engineering and Computer Science Florida Atlantic University Boca Raton FL United States PEM Systems Binghamton NY United States RMC Method Content IBM San Jose CA United States SINTEF Oslo Norway Business and Applications Services Fujitsu 22 Baker Street London W1U 3BW United Kingdom
The new software engineering initiative, Semat, is in the process of developing a kernel for software engineering that stands on a solid theoretical basis. So far, it has suggested a set of kernel elements for softwar... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed Computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
MCDM based trust model for secure routing in wireless mesh networks
MCDM based trust model for secure routing in wireless mesh n...
收藏 引用
2011 World Congress on Information and Communication Technologies, WICT 2011
作者: Konwar, Shantanu Paul, Amrita Bose Nandi, Sukumar Biswas, Santosh Department of Computer Applications AEC Guwahati India Dept. of Computer Science and Engineering IIT Guwahati India
Wireless Mesh Networks (WMNs) do not rely on any centralized administration and they are built by the connection of various static and mobile entities (i.e. nodes). The cooperation and coordination between these netwo... 详细信息
来源: 评论