咨询与建议

限定检索结果

文献类型

  • 5,143 篇 会议
  • 817 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 6,005 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,696 篇 工学
    • 2,306 篇 计算机科学与技术...
    • 1,911 篇 软件工程
    • 1,086 篇 信息与通信工程
    • 761 篇 电子科学与技术(可...
    • 746 篇 电气工程
    • 589 篇 控制科学与工程
    • 342 篇 生物工程
    • 341 篇 生物医学工程(可授...
    • 322 篇 光学工程
    • 286 篇 动力工程及工程热...
    • 234 篇 仪器科学与技术
    • 232 篇 机械工程
    • 204 篇 化学工程与技术
    • 137 篇 交通运输工程
    • 135 篇 材料科学与工程(可...
    • 127 篇 安全科学与工程
    • 100 篇 建筑学
  • 1,937 篇 理学
    • 952 篇 数学
    • 706 篇 物理学
    • 385 篇 生物学
    • 300 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 205 篇 化学
  • 798 篇 管理学
    • 492 篇 管理科学与工程(可...
    • 341 篇 图书情报与档案管...
    • 255 篇 工商管理
  • 289 篇 医学
    • 254 篇 临床医学
    • 234 篇 基础医学(可授医学...
    • 158 篇 药学(可授医学、理...
  • 128 篇 法学
    • 105 篇 社会学
  • 91 篇 经济学
  • 63 篇 农学
  • 57 篇 教育学
  • 20 篇 文学
  • 12 篇 军事学
  • 5 篇 艺术学

主题

  • 149 篇 accuracy
  • 139 篇 feature extracti...
  • 119 篇 real-time system...
  • 110 篇 computational mo...
  • 106 篇 deep learning
  • 106 篇 training
  • 83 篇 predictive model...
  • 79 篇 machine learning
  • 74 篇 support vector m...
  • 74 篇 optimization
  • 71 篇 internet of thin...
  • 64 篇 computer archite...
  • 62 篇 bandwidth
  • 62 篇 data models
  • 61 篇 reliability
  • 61 篇 monitoring
  • 60 篇 switches
  • 58 篇 quality of servi...
  • 58 篇 wireless sensor ...
  • 57 篇 resource managem...

机构

  • 41 篇 dept. of electro...
  • 37 篇 dept. of compute...
  • 35 篇 dept. of electro...
  • 32 篇 dept. of compute...
  • 26 篇 graphic era hill...
  • 25 篇 graphic era deem...
  • 22 篇 graphic era deem...
  • 19 篇 dept. of compute...
  • 19 篇 computer enginee...
  • 16 篇 ieee
  • 14 篇 dept. of compute...
  • 13 篇 computer enginee...
  • 13 篇 lovely professio...
  • 12 篇 politeknik elekt...
  • 11 篇 national institu...
  • 11 篇 dept. of compute...
  • 10 篇 dept. of informa...
  • 10 篇 dept. of electro...
  • 10 篇 dept. of electro...
  • 9 篇 school of comput...

作者

  • 32 篇 deepak upadhyay
  • 31 篇 mridul gupta
  • 28 篇 upadhyay deepak
  • 26 篇 kim sang-wook
  • 24 篇 abhay upadhyay
  • 22 篇 upadhyay abhay
  • 22 篇 kunj bihari shar...
  • 22 篇 gupta mridul
  • 22 篇 bouras christos
  • 19 篇 christos bouras
  • 18 篇 sharma kunj biha...
  • 17 篇 kostas berberidi...
  • 17 篇 an beongku
  • 16 篇 mesaritakis char...
  • 15 篇 amit konar
  • 12 篇 bogris adonis
  • 11 篇 sarigiannidis pa...
  • 11 篇 choo hyunseung
  • 11 篇 dewantara bima s...
  • 10 篇 bona m.

语言

  • 5,679 篇 英文
  • 222 篇 其他
  • 80 篇 中文
  • 19 篇 朝鲜文
  • 7 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of Informatics and Computer Engineering Electronics Engineering"
6005 条 记 录,以下是4981-4990 订阅
排序:
The tangible tele-meeting system for effective remote human communication
The tangible tele-meeting system for effective remote human ...
收藏 引用
39th International Symposium on Robotics, ISR 2008
作者: Lee, Hyun-Jin Jeong, Mun-Ho You, Bum-Jae Korea Institute of Science and Technology Center for Cognitive Robotics Research Hawolgok-Dong Seoul 136-791 Korea Republic of Hanyang University Dept. of Electronics and Computer Engineering Seoul Korea Republic of
The virtual reality technology publishes many results, for example video game, 3D virtual movie, interface of computer and virtual meeting. However, the virtual reality has some restrictions that user neither can touc... 详细信息
来源: 评论
Linguistic Analysis of Spontaneous Children Speech  1
Linguistic Analysis of Spontaneous Children Speech
收藏 引用
1st Workshop on Child, computer and Interaction, WOCCI 2008
作者: Farantouri, Vassiliki Potamianos, Alexandros Narayanan, Shrikanth Dept. of Electronics and Computer Engineering Tech. Univ. of Crete Chania73100 Greece Speech Analysis and Interpretation Lab Univ. of Southern California CA90089 United States
In this paper, we investigate the duration, lexical and linguistic properties of children's spontaneous speech for children ages 8 to 14 interacting with animated characters in a computer game. Age and gender tren... 详细信息
来源: 评论
Communication in wireless networks with directional antennas  08
Communication in wireless networks with directional antennas
收藏 引用
20th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA'08
作者: Caragiannis, Loannis Kaklamanis, Christos Kranakis, Evangelos Krizanc, Danny Wiese, Andreas RACTI Dept. of Computer Engineering and Informatics University of Patras 26500 Rio Greece School of Computer Science Carleton University Ottawa ON Canada Department of Mathematics and Computer Science Wesleyan University Middletown CT 06459 United States Institut fur Mathematik Technische Universitat Berlin Berlin Germany
We study the problem of maintaining connectivity in a wireless network where the network nodes are equipped with directional antennas. Nodes correspond to points on the plane and each uses a directional antenna modele... 详细信息
来源: 评论
On extremal binary doubly-even self-dual codes of length 88
On extremal binary doubly-even self-dual codes of length 88
收藏 引用
International Symposium on Information Theory and Its Applications, ISITA
作者: Radinka Yorgova Nuray At Department of Informatics University of Bergen Norway Dept. of Electrical and Electronics Engineering Anadolu University Turkey
In this note 35 new extremal binary self-dual doubly-even codes of length 88 are presented. Their inequivalence is established by invariants. Moreover, a construction of a binary self-dual [88; 44; 16] code, having an... 详细信息
来源: 评论
Tracking a maneuvering target with a non-holonomic agent using artificial potentials and sliding mode control
Tracking a maneuvering target with a non-holonomic agent usi...
收藏 引用
2008 Mediterranean Conference on Control and Automation, MED'08
作者: Köksal, M. Ilter Gazi, Veysel Baris, Fidan Ordóñez, Raúl Dept. of Electrical and Electronics Engineering TOBB University of Economics and Technology Sögütözü Cad. No: 43 06560 Ankara Turkey National ICT Australia Ltd. Australian National University Research School of Information Sciences and Engineering Canberra Australia University of Dayton Dept. Electrical and Computer Engineering 300 College Park Dayton OH 45469-0232 United States
In this article we consider tracking a maneuvering target with a non-holonomic agent. The target and the agent move in 2-dimensional space. The task is to capture/intercept the moving target using a continuous time co... 详细信息
来源: 评论
Dedicated protection scheme with availability guarantee
Dedicated protection scheme with availability guarantee
收藏 引用
NETWORKS International Telecommunications Network Strategy and Planning Symposium
作者: J. Tapolcai P. Babarczi Pin-Han Ho Dept. of Telecommunications and Media Informatics Budapest University of Technology and Economics Hungary Dept. of Electrical and Computer Engineering University of Waterloo Canada
In this paper, a novel approach for availability evaluation is presented. In order to precisely capture the features of practical network operation and improve the accuracy in the availability evaluation, the dependen... 详细信息
来源: 评论
Comparative performance evaluation of MAC protocols in ad hoc networks with bandwidth partitioning
Comparative performance evaluation of MAC protocols in ad ho...
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Mariam Kaynia Geir E. Oien Nihar Jindal David Gesbert Dept. of Electronics and Telecommunications Norwegian University of Science and Technology Norway Department of Electrical and Computer Engineering University of Minnesota USA Dept. of Electrical and Computer Engineering University of Minnesota USA
This paper considers the performance of the MAC protocols ALOHA and CSMA in wireless ad hoc networks, where the total system bandwidth may be divided into smaller subbands. In the network model used, the arrival of us... 详细信息
来源: 评论
A network for copyright management and control of private information
A network for copyright management and control of private in...
收藏 引用
2008 International Symposium on Applications and the Internet, SAINT 2008
作者: Kinoshita, Hirotsugu Morizumi, Tetsuya Kanagawa University Faculty of Engineering Dept. of Electronics and Informatics Frontiers Yokohama 221-8686 Japan Toyo Networks and System Integration Co. Ltd. Engineering Department Customer System Business Division 1-1 Koyato2-chome Samukawa-machi Koza-gun Kanagawa 253-0198 Japan
Because of a distribution of copyrighted contents and private information on IT enable networks, copyright management and control of private information for the distribution became serious problems. In this paper, we ... 详细信息
来源: 评论
Efficient Polling MAC Scheduler for IEEE 802.11 WLAN
Efficient Polling MAC Scheduler for IEEE 802.11 WLAN
收藏 引用
International Conference on Information Networking
作者: Jaeyeon Kim Youngmin Moon Taekon Kim Hyungkeun Lee Hyukjoon Lee Electronics and information Engineering Korea University Seoul Korea Dept. of Computer Engineering Kwangwoon University Seoul Korea Dept. of Computer Engineering Kwangwoon University Seoul Korea. hklee@kw.ac.kr
Although the Distributed Coordination Function is the fundamental access protocol of IEEE 802.11, it cannot meet the quality of service (QoS) requirements in general. So, the Point Coordinate Function is provided to s... 详细信息
来源: 评论
Global synchronization on the circle
收藏 引用
IFAC Proceedings Volumes 2008年 第2期41卷 9045-9050页
作者: Alain Sarlette S. Emre Tuna Vincent D. Blondel Rodolphe Sepulchre Dept. of Electrical Engineering and Computer Science Université de Liège B-4000 Liège Belgium Dept. of Electrical and Electronics Engineering Middle East Technical University 06531 Ankara Turkey Dept. of Mathematical Engineering Université catholique de Louvain B-1348 Louvain-la-Neuve Belgium
The convexity arguments used in the consensus literature to prove synchronization in vector spaces can be applied to the circle only when all agents are initially located on a semicircle. Existing strategies for (almo... 详细信息
来源: 评论