咨询与建议

限定检索结果

文献类型

  • 713 篇 会议
  • 190 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 946 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 572 篇 工学
    • 423 篇 计算机科学与技术...
    • 344 篇 软件工程
    • 126 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 75 篇 生物工程
    • 73 篇 电气工程
    • 67 篇 生物医学工程(可授...
    • 43 篇 光学工程
    • 41 篇 电子科学与技术(可...
    • 31 篇 机械工程
    • 27 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 26 篇 化学工程与技术
    • 22 篇 动力工程及工程热...
    • 19 篇 材料科学与工程(可...
  • 286 篇 理学
    • 156 篇 数学
    • 82 篇 生物学
    • 62 篇 物理学
    • 59 篇 统计学(可授理学、...
    • 43 篇 系统科学
    • 27 篇 化学
  • 148 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 57 篇 工商管理
    • 57 篇 图书情报与档案管...
  • 59 篇 医学
    • 54 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
    • 22 篇 公共卫生与预防医...
  • 32 篇 法学
    • 27 篇 社会学
  • 22 篇 教育学
    • 21 篇 教育学
  • 16 篇 经济学
  • 16 篇 农学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 25 篇 artificial intel...
  • 23 篇 accuracy
  • 19 篇 feature extracti...
  • 18 篇 information stor...
  • 17 篇 computational mo...
  • 16 篇 information syst...
  • 16 篇 computer communi...
  • 16 篇 training
  • 15 篇 internet of thin...
  • 14 篇 software enginee...
  • 14 篇 data mining
  • 13 篇 database managem...
  • 13 篇 predictive model...
  • 13 篇 real-time system...
  • 13 篇 data models
  • 12 篇 computer science
  • 12 篇 servers
  • 12 篇 software
  • 11 篇 covid-19
  • 11 篇 deep learning

机构

  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 systems and netw...
  • 5 篇 computer systems...
  • 5 篇 dept. of compute...
  • 5 篇 school of inform...
  • 5 篇 department of el...
  • 4 篇 division of info...
  • 4 篇 magna design net...
  • 4 篇 dept. informatio...
  • 4 篇 dept. of informa...
  • 4 篇 computer science...
  • 4 篇 school of comput...
  • 4 篇 dept. of compute...
  • 4 篇 department of co...
  • 4 篇 dept. of informa...
  • 4 篇 ntis - new techn...
  • 4 篇 institute for hi...
  • 4 篇 centre for stati...
  • 4 篇 school of inform...

作者

  • 13 篇 fotiadis dimitri...
  • 10 篇 lenc ladislav
  • 9 篇 nikumani choudhu...
  • 8 篇 král pavel
  • 6 篇 segata michele
  • 6 篇 jian-jhih kuo
  • 6 篇 dressler falko
  • 6 篇 sommer christoph
  • 6 篇 cigno renato lo
  • 6 篇 dimitrios i. fot...
  • 5 篇 glocker ben
  • 5 篇 bhattacharya pra...
  • 5 篇 michele segata
  • 5 篇 yu-wen chen
  • 5 篇 albert y. zomaya
  • 5 篇 felner ariel
  • 5 篇 joerer stefan
  • 4 篇 doukas charalamp...
  • 4 篇 bakas spyridon
  • 4 篇 galdran adrian

语言

  • 852 篇 英文
  • 85 篇 其他
  • 4 篇 日文
  • 4 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Dept. of Information Technologies and Systems. Computer Science and Engineering"
946 条 记 录,以下是721-730 订阅
排序:
Software Language engineering: Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2010年 5969 LNCS卷 V-VI页
作者: Van Den Brand, Mark Gaševíc, Dragan Gray, Jeff Dept. of Mathematics and Computer Science Software Engineering and Technology Eindhoven University of Technology Den Dolech 2 5612 AZ Eindhoven Netherlands School of Computing and Information Systems Athabasca University 1 University Drive Athabasca AB T9S 3A3 Canada Department of Computer Science University of Alabama P.O. Box 870290 Tuscaloosa AL United States
来源: 评论
Towards the discovery of data quality attributes for web portals
收藏 引用
9th International Conference on Web engineering, ICWE 2009
作者: Moraga, Carmen Moraga, Ma Ángeles Calero, Coral Caro, Ángélica Dept. Information Technologies and Systems Institite of Information Technologies and Systems University of Castilla-La Mancha Spain Department of Computer Science and Information Technologies University of Bio Bio Chillán Chile
The Internet has become in a place for the exchange and publication of data. Nowadays, Web portals serve as an important means to access information. In this context, the concepts of quality in general and of data qua... 详细信息
来源: 评论
A fuzzy-rough hybrid approach to multi-document extractive summarization
A fuzzy-rough hybrid approach to multi-document extractive s...
收藏 引用
2009 9th International Conference on Hybrid Intelligent systems. HIS 2009
作者: Huang, Hsun-Hui Yang, Horng-Chang Kuo, Yau-Hwang Dept. of Computer Science and Information Engineering National Cheng Kung Univ. Tainan Taiwan Dept. of Management Information Systems Tajen Univ. Pingtung Taiwan Dept. of Computer Science and Information Engineering National Taitung Univ. Taitung Taiwan
To generate a multi-document extractive summary, the measurement of sentence relevance is of vital importance. Earlier work, exploring statistics of textual terms at the word (surface) level, faces the problem that th... 详细信息
来源: 评论
Image copyright protection with forward error correction
收藏 引用
Expert systems.with Applications 2009年 第9期36卷 11888-11894页
作者: Lin, Wei-Hung Horng, Shi-Jinn Kao, Tzong-Wann Chen, Rong-Jian Chen, Yuan-Hsin Lee, Cheng-Ling Terano, Takao Dept. of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei 106 Taiwan Dept. of Electronic Engineering National United University Miao-Li 36003 Taiwan Dept. of Electronic Engineering Technology and Science Institute of Northern Taiwan Taipei Taiwan Department of Electro-Optical Engineering National United University Miao-Li Taiwan Dept. Computational Intelligence and Systems Science Tokyo Institute of Technology Japan
A copyright protection method for digital image with 1/T rate forward error correction (FEC) is proposed in this paper. In this method, the original image is lossless and the watermark is robust to malicious attacks i... 详细信息
来源: 评论
Secure biometric system for accessing home appliances via internet
Secure biometric system for accessing home appliances via in...
收藏 引用
International Conference for Internet Technology and Secured Transactions, ICITST 2009
作者: Mondal, Arpita Roy, Kaushik Bhattacharya, Prabir Dept. of Computer Science and Software Engineering Concordia University Canada Concordia Institute for Information Systems Engineering Concordia University Canada
Alongside multitude of innovations and consequential changes in lifestyle, the ability to access home appliances or security cameras over the Internet has been in demand for some years now. In this paper, we propose a... 详细信息
来源: 评论
Tools to support the design, execution and visualization of instructional designs
收藏 引用
6th International Conference on Cooperative Design, Visualization, and engineering, CDVE 2009
作者: Molina, Ana Isabel Jurado, Francisco De La Cruz, Ignacio Redondo, Miguel Ángel Ortega, Manuel Dept. of Information Technologies and Systems Computer Science and Engineering Faculty Castilla - la Mancha University Paseo de la Universidad 4. Ciudad Real 13071 Spain
Describing CSCL scenarios can be performed in a standard way. To do so, Instructional Design or so called Learning Design (LD) can be used for describing CSCL scenarios by mean of a de facto specification known as IMS... 详细信息
来源: 评论
Adaptive route selection in mobile ad hoc networks
Adaptive route selection in mobile ad hoc networks
收藏 引用
2009 4th International Conference on Communications and Networking in China, CHINACOM 2009
作者: Lin, Yuh-Chung Ke, Chu-Wei Dept. of Management Information Systems Tajen University Pingtung Taiwan Dept. of Computer Science and Engineering National Sun Yat-Sen University Kaohsiung Taiwan
This paper presents an adaptive routing protocol named Adaptive Route Selection in Mobile Ad Hoc Networks (ARSMA). The aim of this work is to improve the delivery ratio and reduce the end-to-end delay. In the route re... 详细信息
来源: 评论
Methodologies for self-organising systems. A SPEM approach
Methodologies for self-organising systems: A SPEM approach
收藏 引用
2009 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, WI-IAT 2009
作者: Puviani, Mariachiara Di Marzo Serugendo, Giovanna Frei, Regina Cabri, Giacomo Dept. of Information Engineering Univ. of Modena and Reggio Emilia Modena Italy Computer Science and Information Systems BBK College London United Kingdom
We define 'SPEM fragments' of five methods for developing self-organising multi-agent systems. Self-organising traffic lights controllers provide an application scenario. © 2009 IEEE.
来源: 评论
A novel secure data hiding scheme using a secret reference matrix
A novel secure data hiding scheme using a secret reference m...
收藏 引用
IIH-MSP 2009 - 2009 5th International Conference on Intelligent information Hiding and Multimedia Signal Processing
作者: Lin, Chi-Nan Chang, Chin-Chen Lee, Wei-Bin Lin, Jason Dept. of Computer Science and Information Engineering National Chung Cheng Univ. Chiayi 62102 Taiwan Dept. of Management Information Systems Central Taiwan Univ. of Sci. and Tech. Taichung 40601 Taiwan Dept. of Information Engineering and Computer Science Feng Chia Univ. Taichung 40724 Taiwan
Steganography is a study to hide secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. In this paper, a novel scheme is proposed... 详细信息
来源: 评论
Conditional proxy re-encryption secure against chosen-ciphertext attack  09
Conditional proxy re-encryption secure against chosen-cipher...
收藏 引用
4th International Symposium on ACM Symposium on information, computer and Communications Security, ASIACCS'09
作者: Weng, Jian Deng, Robert H. Ding, Xuhua Chu, Cheng-Kang Lai, Junzuo School of Information Systems Singapore Management University Singapore 178902 Singapore Dept. of Computer Science Jinan University Guangzhou 510632 China Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications ... 详细信息
来源: 评论