咨询与建议

限定检索结果

文献类型

  • 713 篇 会议
  • 190 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 946 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 572 篇 工学
    • 423 篇 计算机科学与技术...
    • 344 篇 软件工程
    • 126 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 75 篇 生物工程
    • 73 篇 电气工程
    • 67 篇 生物医学工程(可授...
    • 43 篇 光学工程
    • 41 篇 电子科学与技术(可...
    • 31 篇 机械工程
    • 27 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 26 篇 化学工程与技术
    • 22 篇 动力工程及工程热...
    • 19 篇 材料科学与工程(可...
  • 286 篇 理学
    • 156 篇 数学
    • 82 篇 生物学
    • 62 篇 物理学
    • 59 篇 统计学(可授理学、...
    • 43 篇 系统科学
    • 27 篇 化学
  • 148 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 57 篇 工商管理
    • 57 篇 图书情报与档案管...
  • 59 篇 医学
    • 54 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
    • 22 篇 公共卫生与预防医...
  • 32 篇 法学
    • 27 篇 社会学
  • 22 篇 教育学
    • 21 篇 教育学
  • 16 篇 经济学
  • 16 篇 农学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 25 篇 artificial intel...
  • 23 篇 accuracy
  • 19 篇 feature extracti...
  • 18 篇 information stor...
  • 17 篇 computational mo...
  • 16 篇 information syst...
  • 16 篇 computer communi...
  • 16 篇 training
  • 15 篇 internet of thin...
  • 14 篇 software enginee...
  • 14 篇 data mining
  • 13 篇 database managem...
  • 13 篇 predictive model...
  • 13 篇 real-time system...
  • 13 篇 data models
  • 12 篇 computer science
  • 12 篇 servers
  • 12 篇 software
  • 11 篇 covid-19
  • 11 篇 deep learning

机构

  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 systems and netw...
  • 5 篇 computer systems...
  • 5 篇 dept. of compute...
  • 5 篇 school of inform...
  • 5 篇 department of el...
  • 4 篇 division of info...
  • 4 篇 magna design net...
  • 4 篇 dept. informatio...
  • 4 篇 dept. of informa...
  • 4 篇 computer science...
  • 4 篇 school of comput...
  • 4 篇 dept. of compute...
  • 4 篇 department of co...
  • 4 篇 dept. of informa...
  • 4 篇 ntis - new techn...
  • 4 篇 institute for hi...
  • 4 篇 centre for stati...
  • 4 篇 school of inform...

作者

  • 13 篇 fotiadis dimitri...
  • 10 篇 lenc ladislav
  • 9 篇 nikumani choudhu...
  • 8 篇 král pavel
  • 6 篇 segata michele
  • 6 篇 jian-jhih kuo
  • 6 篇 dressler falko
  • 6 篇 sommer christoph
  • 6 篇 cigno renato lo
  • 6 篇 dimitrios i. fot...
  • 5 篇 glocker ben
  • 5 篇 bhattacharya pra...
  • 5 篇 michele segata
  • 5 篇 yu-wen chen
  • 5 篇 albert y. zomaya
  • 5 篇 felner ariel
  • 5 篇 joerer stefan
  • 4 篇 doukas charalamp...
  • 4 篇 bakas spyridon
  • 4 篇 galdran adrian

语言

  • 852 篇 英文
  • 85 篇 其他
  • 4 篇 日文
  • 4 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Dept. of Information Technologies and Systems. Computer Science and Engineering"
946 条 记 录,以下是801-810 订阅
排序:
Interaction comparison between traditional classroom and cyber classroom using transactional distance
Interaction comparison between traditional classroom and cyb...
收藏 引用
6th International Conference on Advanced Learning technologies, ICALT 2006
作者: Chen, Nian-Shing Kinshuk Hsieh, Sheng-Wen Yang, Stephen J. H. Department of Information Management National Sun Yat-sen University Taiwan Department of Information Systems Massey University New Zealand Dept. of Computer Science and Information Engineering National Central University Taiwan
Blended learning (BL) is a hybrid of classroom learning and online learning that includes the conveniences of online courses without the complete loss of face-to-face (F2F) contact. Advancements in communication techn... 详细信息
来源: 评论
Towards better understanding of agile values in global software development
Towards better understanding of agile values in global softw...
收藏 引用
11th International Workshop on Exploring Modeling Methods for systems.Analysis and Design, EMMSAD 2006 - Held in Conjunction with the 18th Conference on Advanced information systems. CAiSE 2006
作者: Ågerfalk, Pär J. Lero - The Irish Software Engineering Research Centre Dept. of Computer Science and Information Systems University of Limerick Ireland Örebro University SE-701 82 Örebro Sweden
Globally distributed software development (GSD) and agile methods are two current and important trends in software and systems.engineering. While agile methods seem to cope well with increasingly changing business env... 详细信息
来源: 评论
Efficient learning algorithms for agents mining time-changing data streams
Efficient learning algorithms for agents mining time-changin...
收藏 引用
CIMCA 2006: International Conference on Computational Intelligence for Modelling, Control and Automation, Jointly with IAWTIC 2006: International Conference on Intelligent Agents Web technologies and International Commerce
作者: Cohen, Lior Avrahami, Gil Last, Mark Kandel, Abraham Department of Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva 84105 Israel Dept. of Computer Science and Engineering University of South Florida Tampa FL 33620 United States
Many continuously recorded data streams are generated by non-stationary processes, which may change over time, in some cases even drastically. Some adaptive learning agents deal with time-changing data streams by gene... 详细信息
来源: 评论
Securing UML information flow using flowUML
Securing UML information flow using flowUML
收藏 引用
作者: Alghathbar, Khaled Farkas, Csilla Wijesekera, Duminda Information Systems Department College of Computer and Information Sciences King Saud University P.O. Box 51178 Riyadh 11543 Saudi Arabia Information Security Laboratory Dept. of Computer Science and Engineering University of South Carolina Columbia SC 29208 Dept. of Information and Software Engineering CSIS George Mason University Fairfax VA 22030 Faculty of Information Systems Kind Saud University Riyadh Saudi Arabia Department of Computer Science and Engineering University of South Carolina Columbia Department of Information and Software Engineering George Mason University Fairfax VA George Mason University
FlowUML is a logic-based system to validate information flow policies at the requirements specification phase of UML based designs. It uses Horn clauses to specify information flow polices that can be checked against ... 详细信息
来源: 评论
Panel: Authentication in constrained environments
收藏 引用
1st International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005
作者: Burmester, Mike Gligor, Virgil Kranakis, Evangelos Tygar, Doug Zheng, Yuliang De Medeiros, Breno Dept. of Computer Science Florida State University Tallahassee FL 32306 United States Dept. of Electrical and Computer Engineering University of Maryland College Park MD 20742 United States Sch. of Computer Science Carleton University Ont. K1S 5B6 Canada Dept. of Electrical Engineering and Computer Science University of California Berkeley CA 94720-1776 United States Dept. of Software and Information Systems University of North Carolina Charlotte NC 28223 United States
This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES'05 Workshop. These were transcribed from hand-written notes. © Springer-Verlag Berlin Hei... 详细信息
来源: 评论
A low-power multithreaded processor for software defined radio
A low-power multithreaded processor for software defined rad...
收藏 引用
作者: Schulte, Michael Glossner, John Jinturkar, Sanjay Moudgill, Mayan Mamidi, Suman Vassiliadis, Stamatis University of Wisconsin Dept. of ECE 1415 Engineering Drive Madison WI 53706 United States Sandbridge Technologies 1 North Lexington Ave. White Plains NY 10512 United States Delft University of Technology Electrical Engineering Mathematics and Computer Science Department Delft Netherlands University of Wisconsin Madison Madison Embedded Systems and Architectures Group IEEE IEEE Computer Society Sandbridge Technologies Sandbridge Systems Software and Communications Software Groups Department of Electrical and Computer Engineering University OfWisconsin Madison Netherlands ACM
Embedded digital signal processors for software defined radio have stringent design constraints including high computational bandwidth, low power consumption, and low interrupt latency. Furthermore, due to rapidly evo... 详细信息
来源: 评论
GMSP: a generalized multi-hop security protocol for heterogeneous multi-hop wireless network
GMSP: a generalized multi-hop security protocol for heteroge...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Bin Xie A. Kumar S. Srinivasan D.P. Agrawal Computer Engineering and Computer Science Dept. University of Louisville Louisville KY Computer Information Systems Dept. University of Louisville Louisville KY Department of ECECS University of Cincinnati Cincinnati OH
Multi-hop cellular networks offer attractive benefits for the next generation of wireless communication by integrating ad hoc relaying to cellular networks. However, most of the existing architectures and protocols fo... 详细信息
来源: 评论
T-ANT: A nature-inspired data gathering protocol for wireless sensor networks
收藏 引用
Journal of Communications 2006年 第2期1卷 22-29页
作者: Selvakennedy, S. Sinnappan, S. Shang, Yi School of Information Technologies University of Sydney NSW 2006 Australia School of Economics and Information Systems University of Wollongong Wollongong NSW 2522 Australia Dept. of Computer Science University of Missouri-Columbia Columbia MO 65211 United States
There are many difficult challenges ahead in the design of an energy-efficient communication stack for wireless sensor networks. Due to the severe sensor node constraints, protocols have to be simple yet scalable. To ... 详细信息
来源: 评论
Common metrics for human-robot interaction
Common metrics for human-robot interaction
收藏 引用
HRI 2006: 2006 ACM Conference on Human-Robot Interaction
作者: Steinfeld, Aaron Fong, Terrence Kaber, David Lewis, Michael Scholtz, Jean Schultz, Alan Goodrich, Michael Robotics Institute Carnegie Mellon University Pittsburgh PA United States Intelligent Systems Division NASA Ames Research Center Moffett Field CA United States Dept. of Industrial Engineering North Carolina State University Raleigh NC United States Sch. of Information Science University of Pittsburgh Pittsburgh PA United States Information Access Div. NIST Gaithersburg MD United States Intelligent Systems Section US Naval Research Lab. Washington DC United States Computer Science Dept. Brigham Young University Provo UT United States
This paper describes an effort to identify common metrics for task-oriented human-robot interaction (HRI). We begin by discussing the need for a toolkit of HRI metrics. We then describe the framework of our work and i... 详细信息
来源: 评论
Proximity based access control in smart-emergency departments
Proximity based access control in smart-emergency department...
收藏 引用
IEEE Annual Conference on Pervasive Computing and Communications Workshops (PerCom)
作者: S.K.S. Gupta T. Mukheriee K. Venkatasubramanian T.B. Taylor Dept. of Computer Science and Engineering Arizona State University Tempe Arizona USA Arizona State University Tempe AZ US MediServe Information Systems Tempe Arizona USA
In this paper, we propose a proximity based automated access control (PBAC) model for smart-ED environments which improves the existing ED work-flow by automating mundane administrative procedure for secure informatio... 详细信息
来源: 评论