咨询与建议

限定检索结果

文献类型

  • 713 篇 会议
  • 191 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 947 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 572 篇 工学
    • 423 篇 计算机科学与技术...
    • 344 篇 软件工程
    • 126 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 75 篇 生物工程
    • 73 篇 电气工程
    • 67 篇 生物医学工程(可授...
    • 43 篇 光学工程
    • 41 篇 电子科学与技术(可...
    • 31 篇 机械工程
    • 27 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 26 篇 化学工程与技术
    • 22 篇 动力工程及工程热...
    • 19 篇 材料科学与工程(可...
  • 286 篇 理学
    • 156 篇 数学
    • 82 篇 生物学
    • 62 篇 物理学
    • 59 篇 统计学(可授理学、...
    • 43 篇 系统科学
    • 27 篇 化学
  • 148 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 57 篇 工商管理
    • 57 篇 图书情报与档案管...
  • 59 篇 医学
    • 54 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
    • 22 篇 公共卫生与预防医...
  • 32 篇 法学
    • 27 篇 社会学
  • 22 篇 教育学
    • 21 篇 教育学
  • 16 篇 经济学
  • 16 篇 农学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 25 篇 artificial intel...
  • 23 篇 accuracy
  • 19 篇 feature extracti...
  • 18 篇 information stor...
  • 17 篇 computational mo...
  • 16 篇 information syst...
  • 16 篇 computer communi...
  • 16 篇 training
  • 15 篇 internet of thin...
  • 14 篇 software enginee...
  • 14 篇 data mining
  • 13 篇 database managem...
  • 13 篇 predictive model...
  • 13 篇 real-time system...
  • 13 篇 data models
  • 12 篇 computer science
  • 12 篇 servers
  • 12 篇 software
  • 11 篇 covid-19
  • 11 篇 deep learning

机构

  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 systems and netw...
  • 5 篇 computer systems...
  • 5 篇 dept. of compute...
  • 5 篇 school of inform...
  • 5 篇 department of el...
  • 4 篇 division of info...
  • 4 篇 magna design net...
  • 4 篇 dept. informatio...
  • 4 篇 dept. of informa...
  • 4 篇 computer science...
  • 4 篇 school of comput...
  • 4 篇 dept. of compute...
  • 4 篇 department of co...
  • 4 篇 dept. of informa...
  • 4 篇 ntis - new techn...
  • 4 篇 institute for hi...
  • 4 篇 centre for stati...
  • 4 篇 school of inform...

作者

  • 13 篇 fotiadis dimitri...
  • 10 篇 lenc ladislav
  • 9 篇 nikumani choudhu...
  • 8 篇 král pavel
  • 6 篇 segata michele
  • 6 篇 jian-jhih kuo
  • 6 篇 dressler falko
  • 6 篇 sommer christoph
  • 6 篇 cigno renato lo
  • 5 篇 glocker ben
  • 5 篇 bhattacharya pra...
  • 5 篇 michele segata
  • 5 篇 yu-wen chen
  • 5 篇 albert y. zomaya
  • 5 篇 felner ariel
  • 5 篇 dimitrios i. fot...
  • 5 篇 joerer stefan
  • 4 篇 doukas charalamp...
  • 4 篇 bakas spyridon
  • 4 篇 galdran adrian

语言

  • 853 篇 英文
  • 85 篇 其他
  • 4 篇 日文
  • 4 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Dept. of Information Technologies and Systems. Computer Science and Engineering"
947 条 记 录,以下是681-690 订阅
排序:
Broadening the education of software engineers - some lessons and pointers
Broadening the education of software engineers - some lesson...
收藏 引用
2010 IEEE Transforming engineering Education: Creating Interdisciplinary Skills for Complex Global Environments
作者: Griffin, Joe Ryan, Kevin Dept. of Computer Science and Information Systems University of Limerick Limerick Ireland Lero - The Irish Software Engineering Research Centre Department of Computer Science and Information Systems University of Limerick Ireland
Professional Issues in Software engineering (PISE) has been taught as part of the computer systems.undergraduate degree programme at the University of Limerick using a multi-institutional collaborative pedagogy. PISE ... 详细信息
来源: 评论
An efficient algorithm for finding the control point of 3rd order bezier curve
An efficient algorithm for finding the control point of 3rd ...
收藏 引用
2010 International Forum on Strategic Technology, IFOST 2010
作者: Khan, Md. Ibrahim Chowdhury, Alok Kumar Chowdhury, Sujan Deb, Kaushik Dept. of Computer Science and Engineering Chittagong University of Engineering and Technology Chittagong Bangladesh Dept. of Computer Science and Engineering Premier University Chittagong Bangladesh Dept. of EE and Information Systems University of Ulsan Ulsan Korea Republic of
This paper represents a modified algorithm to recover the control points of 3rd order Bezier curves more efficiently. It uses the two stage approximation learning algorithm with some modifications. In this regards, at... 详细信息
来源: 评论
A new non-expansion visual cryptography scheme with high quality of recovered image
A new non-expansion visual cryptography scheme with high qua...
收藏 引用
Institution of engineering and Technology International Conference on Frontier Computing : Theory, technologies and Applications
作者: Lin, T.H. Shiao, N.S. Chen, H.H. Tsai, C.S. Dept. of Computer Science and Information Engineering National Chin-Yi University of Technology Taiwan Dept. of Management Information Systems National Chung Hsing University Taiwan
In the traditional visual cryptography scheme, a secret pixel will be encoded into a block, causing the size of recovered image is larger than the original one. Thus, later studies attempt to improve these shortcoming... 详细信息
来源: 评论
Automatic evaluation of topic coherence
Automatic evaluation of topic coherence
收藏 引用
"2010 Human Language technologies Conference ofthe North American Chapter of the Association for Computational Linguistics, NAACL HLT 2010"
作者: Newman, David Lau, Jey Han Grieser, Karl Baldwin, Timothy NICTA Victoria Research Laboratory Australia Dept. of Computer Science University of California Irvine United States Dept. of Computer Science and Software Engineering University of Melbourne Australia Dept. of Information Systems University of Melbourne Australia
This paper introduces the novel task of topic coherence evaluation, whereby a set of words, as generated by a topic model, is rated for coherence or interpretability. We apply a range of topic scoring models to the ev... 详细信息
来源: 评论
A safe system with safe logistics support for Chittagong port
A safe system with safe logistics support for Chittagong por...
收藏 引用
2010 13th International Conference on computer and information Technology, ICCIT 2010
作者: Uddin, Md. Kafil Hossen, Muhammad Kamal College of Computer Science and Information Systems Najran University Najran-1988 Saudi Arabia Dept. of Computer Science and Engineering Chittagong Univ. of Engineering and Technology Chittagong-4349 Bangladesh
This paper presents a prototype implementation of an intelligent system called safe system that monitors container security in the port logistics. Logistics supports in the port require safe container status. The main... 详细信息
来源: 评论
CapaCon: Access control mechanism for inter-device communications through TCP connections  10
CapaCon: Access control mechanism for inter-device communica...
收藏 引用
25th Annual ACM Symposium on Applied Computing, SAC 2010
作者: Mabuchi, Mitsuhiro Shinjo, Yasushi Hasebe, Koji Sato, Akira Kato, Kazuhiko Dept. of Computer Science University of Tsukuba Tsukuba Ibaraki Japan Graduate School of Systems and Information Engineering University of Tsukuba Tsukuba Ibaraki Japan
We present CapaCon, an access control mechanism for interdevice communications through TCP connections. CapaCon provides capability-based access control for a system composed of devices. Using CapaCon, an administrato... 详细信息
来源: 评论
Semi unsupervised M-FISH chromosome image classification
Semi unsupervised M-FISH chromosome image classification
收藏 引用
10th International Conference on information Technology and Applications in Biomedicine: Emerging technologies for Patient Specific Healthcare, ITAB 2010
作者: Karvelis, Petros Likas, Aristidis Fotiadis, Dimitrios I. Dept. of Computer Science University of Ioannina Ioannina GR 45110 Greece Unit of Medical Technology and Intelligent Information Systems Dept. of Materials Science and Engineering University of Ioannina Ioannina GR 45110 Greece
M-FISH (Multiplex Fluorescent In Situ Hybridization) is a multichannel chromosome imaging technique that allows the color discrimination of human chromosomes. Although M-FISH facilitates the visual detection of chromo... 详细信息
来源: 评论
Agent-oriented middleware for InfoStation-based mLearning intelligent systems
Agent-oriented middleware for InfoStation-based mLearning in...
收藏 引用
2010 IEEE International Conference on Intelligent systems. IS 2010
作者: Stoyanov, Stanimir Ganchev, Ivan Popchev, Ivan O'Droma, MǍirtín Valkanova, Veselina Dept. of Computer Systems Plovdiv University Paisij Hilendarski Bulgaria Telecommunications Research Centre University of Limerick Ireland Institute of Information Technologies Bulgarian Academy of Science Bulgaria
An agent-oriented middleware supporting context-aware and adaptable mLearning service provision within an InfoStation-based University network is presented. The InfoStation's middleware architecture facilitating t... 详细信息
来源: 评论
Implementing a mobile campus using MLE moodle
Implementing a mobile campus using MLE moodle
收藏 引用
5th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2010
作者: Xhafa, Fatos Caballe, Santi Rustarazo, Isaac Barolli, Leonard Dept. of Languages and Informatics Systems Technical University of Catalonia Spain Dept. of Computer Science Multimedia and Telecommunication Open University of Catalonia Spain Dept. of Information and Communication Engineering Fukuoka Institute of Technology Japan
Mobile learning is considered the next step of online learning by incorporating mobility as a key requirement. Indeed, the current wide spread of mobile devices and wireless technologies brings an enormous potential t... 详细信息
来源: 评论
Using bi-clustering algorithm for analyzing online users activity in a virtual campus
Using bi-clustering algorithm for analyzing online users act...
收藏 引用
2nd International Conference on Intelligent Networking and Collaborative systems. INCOS 2010
作者: Xhafa, Fatos Caballé, Santi Barolli, Leonard Molina, Alberto Miho, Rozeta Dept. of Languages and Informatics Systems Technical University of Catalonia Spain Dept. of Computer Sci. Multimedia and Telecommunication Open University of Catalonia Spain Dept. of Information and Communication Engineering Fukuoka Institute of Technology Fukuoka Japan Faculty of Information Technologies Technical University of Tirana Albania
Data mining algorithms have been proved to be useful for the processing of large data sets in order to extract relevant information and knowledge. Such algorithms are also important for analyzing data collected from t... 详细信息
来源: 评论