咨询与建议

限定检索结果

文献类型

  • 713 篇 会议
  • 191 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 947 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 572 篇 工学
    • 423 篇 计算机科学与技术...
    • 344 篇 软件工程
    • 126 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 75 篇 生物工程
    • 73 篇 电气工程
    • 67 篇 生物医学工程(可授...
    • 43 篇 光学工程
    • 41 篇 电子科学与技术(可...
    • 31 篇 机械工程
    • 27 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 26 篇 化学工程与技术
    • 22 篇 动力工程及工程热...
    • 19 篇 材料科学与工程(可...
  • 286 篇 理学
    • 156 篇 数学
    • 82 篇 生物学
    • 62 篇 物理学
    • 59 篇 统计学(可授理学、...
    • 43 篇 系统科学
    • 27 篇 化学
  • 148 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 57 篇 工商管理
    • 57 篇 图书情报与档案管...
  • 59 篇 医学
    • 54 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
    • 22 篇 公共卫生与预防医...
  • 32 篇 法学
    • 27 篇 社会学
  • 22 篇 教育学
    • 21 篇 教育学
  • 16 篇 经济学
  • 16 篇 农学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 25 篇 artificial intel...
  • 23 篇 accuracy
  • 19 篇 feature extracti...
  • 18 篇 information stor...
  • 17 篇 computational mo...
  • 16 篇 information syst...
  • 16 篇 computer communi...
  • 16 篇 training
  • 15 篇 internet of thin...
  • 14 篇 software enginee...
  • 14 篇 data mining
  • 13 篇 database managem...
  • 13 篇 predictive model...
  • 13 篇 real-time system...
  • 13 篇 data models
  • 12 篇 computer science
  • 12 篇 servers
  • 12 篇 software
  • 11 篇 covid-19
  • 11 篇 deep learning

机构

  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 systems and netw...
  • 5 篇 computer systems...
  • 5 篇 dept. of compute...
  • 5 篇 school of inform...
  • 5 篇 department of el...
  • 4 篇 division of info...
  • 4 篇 magna design net...
  • 4 篇 dept. informatio...
  • 4 篇 dept. of informa...
  • 4 篇 computer science...
  • 4 篇 school of comput...
  • 4 篇 dept. of compute...
  • 4 篇 department of co...
  • 4 篇 dept. of informa...
  • 4 篇 ntis - new techn...
  • 4 篇 institute for hi...
  • 4 篇 centre for stati...
  • 4 篇 school of inform...

作者

  • 13 篇 fotiadis dimitri...
  • 10 篇 lenc ladislav
  • 9 篇 nikumani choudhu...
  • 8 篇 král pavel
  • 6 篇 segata michele
  • 6 篇 jian-jhih kuo
  • 6 篇 dressler falko
  • 6 篇 sommer christoph
  • 6 篇 cigno renato lo
  • 5 篇 glocker ben
  • 5 篇 bhattacharya pra...
  • 5 篇 michele segata
  • 5 篇 yu-wen chen
  • 5 篇 albert y. zomaya
  • 5 篇 felner ariel
  • 5 篇 dimitrios i. fot...
  • 5 篇 joerer stefan
  • 4 篇 doukas charalamp...
  • 4 篇 bakas spyridon
  • 4 篇 galdran adrian

语言

  • 853 篇 英文
  • 85 篇 其他
  • 4 篇 日文
  • 4 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Dept. of Information Technologies and Systems. Computer Science and Engineering"
947 条 记 录,以下是471-480 订阅
排序:
COMPRESSED SENSING SUPER RESOLUTION OF COLOR IMAGES
COMPRESSED SENSING SUPER RESOLUTION OF COLOR IMAGES
收藏 引用
European Signal Processing Conference
作者: Wael Saafin Miguel Vega Rafael Molina Aggelos K. Katsaggelos Dept. of Computer Science and Artificial Intellegence University of Granada Granada Spain Dept. of Languages and Information Systems University of Granada Granada Spain Dept. of Electrical Engineering and Computer Science Northwestern University Evanston USA
In this work we estimate Super Resolution (SR) images from a sequence of true color Compressed Sensing (CS) observations. The red, green, blue (RGB) channels are sensed separately using a measurement matrix that can b... 详细信息
来源: 评论
Design of an enhanced authentication protocol and its verification using AVISPA
Design of an enhanced authentication protocol and its verifi...
收藏 引用
International Conference on Recent Advances in information Technology (RAIT)
作者: Ruhul Amin SK Hafizul Islam Arijit Karati G. P. Biswas Dept. of Computer Science and Engineering Indian School of Mines Dhanbad India Department of Computer Science and Information Systems Birla Institute of Technology and Science Pilani Rajasthan India
In the password based authenticated protocol, protecting off-line guessing attack is quite intricate owing to its low entropy property. In order to withstand it, three-factor (e.g., biometric, smartcard and password) ... 详细信息
来源: 评论
Multiple influence maximization in social networks  10
Multiple influence maximization in social networks
收藏 引用
10th International Conference on Ubiquitous information Management and Communication, IMCOM 2016
作者: Sun, Honglin Gao, Xiaofeng Chen, Guihai Gu, Jian Wang, Yongjian Shanghai Key Lab. of Scalable Computing and Systems Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Key Laboratory of Information Network Security of Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Influence Maximization, a technique of social analysis to help marketers select a small group of users to promote their products with the goal of maximizing their influence spread, has been studied for a long time. Ho... 详细信息
来源: 评论
Review on requirements modeling and analysis for self-adaptive systems. A ten-year perspective
arXiv
收藏 引用
arXiv 2017年
作者: Yang, Zhuoqun Lib, Zhi Jin, Zhi Zhang, He Institute of Mathematics Academy of Mathematics and Systems Science Chinese Academy of Sciences Haidian Dstr. Beijing100190 China Software Engineering Dept. College of Computer Science and Information Technology Guangxi Normal University Guilin Guangxi541004 China Peking University Haidian Dstr. Beijing100871 China State Key Laboratory of Novel Software Technology Software Institute Nanjing University Hankou Road Nanjing Jiangsu210093 China
Context: Over the last decade, software researchers and engineers have developed a vast body of methodologies and technologies in requirements engineering for self-adaptive systems. Although existing studies have expl... 详细信息
来源: 评论
An empirical study of security of VoIP system
An empirical study of security of VoIP system
收藏 引用
science and information Conference (SAI)
作者: Ahmad Ghafarian Seyed Amin Hosseini Seno Maria Dehghani Dept. of Computer Science and Information Systems University of North Georgia Dahlonega GA USA Department of Computer Engineering Ferdowsi University of Mashhad Mashhad Iran
As VoIP (Voice-over-IP) Services are becoming more popular, various types of attacks against them are increasing. The main protocol that is used in VoIP is SIP. SIP is subject to various types of attacks including Den... 详细信息
来源: 评论
Mobility Vector based Neighbour Selection in Mobile WSN with Multichannel MAC
Mobility Vector based Neighbour Selection in Mobile WSN with...
收藏 引用
International Conference on Communication systems.and Networks
作者: V. Sreejith Prateek Khandelwal K. R. Anupama Lucy J. Gudino Dept. of Computer Science and Information Systems BITS-Pilani K K Birla Dept. of Electrical Electronics and Instrumentation Engineering BITS-Pilani K K Birla
Scenarios where the sensor nodes themselves are mobile, introduces a new dimension of problems in sensor network. This paper presents a mobility vector based neighbour selection for a mixed deployment of mobile and st... 详细信息
来源: 评论
Extraction of human action elements with transition network of partial time series data modeled by Hidden Markov Model
Extraction of human action elements with transition network ...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Kae Doki Akihiro Torii Suguru Mototani Yuki Funabora Shinji Doki Kohjiro Hashimoto Dept. of Electrical Engineering Aichi Institute of Technology Aichi Japan Dept. of Electrical Engineering and Computer Science Nagoya University Aichi Japan Dept. of Control and Information Systems Engineering National Institute of Technology Kumamoto Japan
The authors have researched on a method of human action modeling to realize systems.such as to support human human operations or watch persons to prevent various kinds of accidents. In order to recognize or support va... 详细信息
来源: 评论
Algorithms for determining semantic relations of formal concepts by cognitive machine learning based on concept algebra
Algorithms for determining semantic relations of formal conc...
收藏 引用
IEEE International Conference on Cognitive Informatics
作者: Mehrdad Valipour Yingxu Wang Omar A. Zatarain Marina L. Gavrilova Denotational Mathematics Software Science and Cognitive Systems Dept. of Electrical and Computer Engineering University of Calgary Calgary Alberta Canada Information Systems Lab Packard Dept. of Electrical Engineering Stanford University Stanford CA USA
It is recognized that the semantic space of knowledge is a hierarchical concept network. This paper presents theories and algorithms of hierarchical concept classification by quantitative semantic relations via machin... 详细信息
来源: 评论
An Intraoperative Glucose Control Benchmark for Formal Verification
收藏 引用
IFAC-PapersOnLine 2015年 第27期48卷 211-217页
作者: Chen, Sanjian O'Kelly, Matthew Weimer, James Sokolsky, Oleg Lee, Insup Dept. of Computer and Information Science University of Pennsylvania Philadelphia United States Dept. of Electrical and Systems Engineering University of Pennsylvania Philadelphia United States
Diabetes associated complications are affecting an increasingly large population of hospitalized patients. Since glucose physiology is significantly impacted by patient-specific parameters, it is critical to verify th... 详细信息
来源: 评论
Neural Incremental Attribute Learning Based on Principal Component Analysis
Neural Incremental Attribute Learning Based on Principal Com...
收藏 引用
2016 IEEE International Conference on Big Data Analysis
作者: Ting Wang Wei Zhou Xiaoyan Zhu Fangzhou Liu Sheng-Uei Guan State Key Laboratory of Intelligent Technology and Systems Tsinghua University Wuxi Research Institute of Applied Technologies Tsinghua University Dept. of Computer Science University of Liverpool Dept. of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool University
Feature Extraction(FE) based on Principal Component Analysis(PCA) can effectively improve classification results by reducing the interference among features. However, such a good method has not been employed in previo... 详细信息
来源: 评论