咨询与建议

限定检索结果

文献类型

  • 643 篇 会议
  • 85 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 730 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 495 篇 工学
    • 249 篇 计算机科学与技术...
    • 186 篇 软件工程
    • 125 篇 信息与通信工程
    • 93 篇 电子科学与技术(可...
    • 76 篇 机械工程
    • 73 篇 仪器科学与技术
    • 72 篇 控制科学与工程
    • 31 篇 网络空间安全
    • 30 篇 生物工程
    • 25 篇 动力工程及工程热...
    • 24 篇 电气工程
    • 23 篇 生物医学工程(可授...
    • 22 篇 光学工程
    • 18 篇 安全科学与工程
    • 16 篇 化学工程与技术
    • 13 篇 交通运输工程
  • 131 篇 理学
    • 54 篇 数学
    • 31 篇 生物学
    • 30 篇 物理学
    • 29 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 130 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 36 篇 医学
    • 28 篇 临床医学
    • 22 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
    • 14 篇 药学(可授医学、理...
  • 18 篇 法学
    • 18 篇 社会学
  • 14 篇 教育学
    • 13 篇 教育学
  • 12 篇 农学
  • 9 篇 文学
  • 5 篇 经济学
  • 4 篇 军事学
  • 4 篇 艺术学

主题

  • 21 篇 accuracy
  • 20 篇 feature extracti...
  • 18 篇 cloud computing
  • 16 篇 computational mo...
  • 16 篇 real-time system...
  • 14 篇 computer science
  • 14 篇 deep learning
  • 13 篇 convolutional ne...
  • 10 篇 machine learning
  • 9 篇 authentication
  • 9 篇 monitoring
  • 9 篇 security
  • 8 篇 internet of thin...
  • 8 篇 medical services
  • 8 篇 data mining
  • 8 篇 wireless sensor ...
  • 8 篇 artificial intel...
  • 8 篇 data models
  • 8 篇 training
  • 7 篇 support vector m...

机构

  • 5 篇 korea
  • 5 篇 institute of inf...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of mathemat...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of engineer...
  • 4 篇 dept.of informat...
  • 3 篇 graduate school ...
  • 3 篇 dept.of computer...
  • 3 篇 university of hy...
  • 3 篇 school of inform...
  • 3 篇 dept.of computer...
  • 3 篇 dayananda sagar ...
  • 3 篇 hyogo
  • 3 篇 dept.of electron...
  • 3 篇 dept.of computer...
  • 3 篇 dept.of electron...
  • 3 篇 dept of computer...

作者

  • 9 篇 hae-young bae
  • 5 篇 dong-wook lee
  • 5 篇 johan e.carlson
  • 4 篇 fangmin li
  • 4 篇 shinping r.wang
  • 4 篇 yang xiao
  • 4 篇 yonghong li
  • 4 篇 guangzhi qu
  • 4 篇 weijun liu
  • 4 篇 fu-chien kao
  • 4 篇 ling tang
  • 4 篇 shunling chen
  • 4 篇 yun-kai lin
  • 4 篇 chih-chia chen
  • 4 篇 jesper martinsso...
  • 4 篇 kiseon kim
  • 3 篇 ali mohamad abou
  • 3 篇 lara hamawy
  • 3 篇 masakazu morimot...
  • 3 篇 hansen john h.l.

语言

  • 693 篇 英文
  • 25 篇 其他
  • 11 篇 中文
  • 1 篇 日文
检索条件"机构=Dept.of Computer Science& Engineering"
730 条 记 录,以下是491-500 订阅
排序:
A Novel Scheme Of Vertical Handover For IP Multimedia Subsystem
A Novel Scheme Of Vertical Handover For IP Multimedia Subsys...
收藏 引用
The 2nd IEEE International Conference on Advanced computer Control(第二届先进计算机控制国际会议 ICACC 2010)
作者: Yi Jiang Guan-nan Kou Yu-liang Tang Dept.of Computer Science Xiamen University Xiamen FujianChina Dept.of Communication Engineering Xiamen University Xiamen FujianChina
In order to achieve seamless handover for real-time applications in the IP Multimedia Subsystem (IMS) of the next-generation network,a multi-protocol combined handover mechanism is *** this work,we combine SIP (Sessio... 详细信息
来源: 评论
A Novel Scheme of Webpage Information Hiding Based on Attributes
A Novel Scheme of Webpage Information Hiding Based on Attrib...
收藏 引用
2010 IEEE International Conference on Information Theory and Information Security(2010 IEEE 国际信息论与信息安全会议)
作者: Dongsheng Shen Hong Zhao Dept.of Computer Science and Engineering Zhangzhou Normal University Zhangzhou Fujian 363000 China
Webpage based information hiding technology uses a webpage as the cover object. The research of this area has led to several different techniques, which can be broadly classified into embedding invisible characters ba... 详细信息
来源: 评论
Embedded Vision-based Nighttime Driver Assistance System
Embedded Vision-based Nighttime Driver Assistance System
收藏 引用
2010 International Symposium on computer,Communication, Control and Automation
作者: Yen-Lin Chen Chuan-Yen Chiang Dept.of Computer Science and Information Engineering National Taipei Univ.of Tech Department of Computer Science National Chiao Tung University
This study presents an effective method for detecting vehicles in front of the camera-assisted car during nighttime driving and implements it on an embedded *** proposed method detects vehicles based on detecting and ... 详细信息
来源: 评论
A parallelization of interactive physical simulations
A parallelization of interactive physical simulations
收藏 引用
The 2010 International Conference on computer Application and System Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)
作者: Xin Liu Quanyu Wang Dept.of Computer Science and Engineering Beijing Institute of Technology Beijng P.R.China 100089
This paper presents a parallelization method for the computation of interactive physical simulations. In the method, physical simulation tasks are split into multiple sets of tasks using a space partitioning algorithm... 详细信息
来源: 评论
A Study of Face Recognition using the PCA and Error Back-Propagation
A Study of Face Recognition using the PCA and Error Back-Pro...
收藏 引用
2010 Second International Conference on Intelligent Human-Machine Systems and Cybernetics(第二届智能人机系统与控制论国际学术会议 IHMSC 2010)
作者: Jong-Min Kim Myung-A Kang Computer Science and Statistic Graduate School Chosun University GwangJu Korea Dept.of Computer Engineering GwangJu University GwangJu Korea
In this paper the real-time face region was detected by suggesting the rectangular feature-based classifier and the robust detection algorithm that satisfied the efficiency of computation and detection performance... 详细信息
来源: 评论
Adaptive Error Control Mechanism Based on Link Layer Frame Importance Valuation for Wireless Multimedia Sensor Networks
Adaptive Error Control Mechanism Based on Link Layer Frame I...
收藏 引用
The 2nd IEEE International Conference on Advanced computer Control(第二届先进计算机控制国际会议 ICACC 2010)
作者: Yong Jin Kaijian Xia Deguang Le Guangwei Bai School of Computer Science & Engineering Changshu Institute of Technology Changshu China Dept.of Computer Science & Technology Nanjing Univ.of Technology Nanjing China
Wireless multimedia sensor networks (WMSNs) are a new and emerging type of wireless sensor networks (WSNs),which enable applications of multimedia captured through special sensors equipped with cameras or microphones ... 详细信息
来源: 评论
A dynamic path control method applying traffic-prediction-based route pre-prioritization
A dynamic path control method applying traffic-prediction-ba...
收藏 引用
Asia Communications and Photonics Conference and Exhibition(2010亚洲光纤通信与光弹博览会及研讨会 ACP 2010)
作者: Hiroaki Ohno Hiroshi Hasegawa Ken-ichi Sato Dept.Of Electrical Engineering Computer Science Nagoya University Furo-cho Chikusa-ku 464-8603 Japan
We propose a dynamic RWA method for optical path networks that pre-computes route candidates to attain better load-balancing. Numerical experiments elucidate that the proposed method can accommodate 1.3-1.8 times more... 详细信息
来源: 评论
An Empirical Study on Parallel Multi-objective Genetic Algorithms:0/1 Knapsack Problem-A Case Study
An Empirical Study on Parallel Multi-objective Genetic Algor...
收藏 引用
2010 The 3rd International Conference on Computational Intelligence and Industrial Application (PACIIA2010)
作者: B.S.P.Mishra A.K.Addy S.Dehuri S.-B.Cho Dept.of Computer Science and Engineering KIIT UniversityBhubaneswar-751024OrissaINDIA. Soft Computing Laboratory Dept.of Computer Science Yonsei University262 SeongsannoSeodaemun-guSeoul 120-749South Korea. Soft Computing Laboratory Dept.of Computer Science Yonsei University262 SeongsannoSeodaemun-guSeoul 120-749South Korea
Many of the optimization problems in the real world are multi-objective in nature,and NSGA II is commonly used. Frequently,the multi-objective problems present a high complexity,so classical meta-heuristic algorithms ... 详细信息
来源: 评论
Ring Connecting Node Architecture Employing Variable Filter
Ring Connecting Node Architecture Employing Variable Filter
收藏 引用
Asia Communications and Photonics Conference and Exhibition(2010亚洲光纤通信与光弹博览会及研讨会 ACP 2010)
作者: Takaaki Oono Kiyo Ishii Hiroshi Hasegawa Ken-ichi Sato Dept.Of Electrical Engineering and Computer Science Nagoya University Furo-cho Chikusa-ku Nagoya 464-8603 Japan
We propose a simple node architecture that is used to concatenate two ROADM rings. The proposed architecture employs variable filters that can effectively handle classified node input signals to realize the desired ro... 详细信息
来源: 评论
Computation of Renameable Horn Backdoors for Quantified Boolean Formulas
Computation of Renameable Horn Backdoors for Quantified Bool...
收藏 引用
The 2010 2nd International Conference on Future computer and Communication(第二届未来计算机与通信国际会议 ICFCC 2010)
作者: Jun-Cheng Yang Shu-Xia Li Jin-Yan Wang Dept.of Computer Engineering Henan Polytechnic Institute Nanyang 473009 China School of Computer Science Northeast Normal University Changchun 130117 China
Backdoor sets of SAT problem can quickly decide the satisfiability of real-world SAT instances, and the QBF problem is the generalization of SAT problem, so backdoor sets of QBF are crucial to its solution. We propose... 详细信息
来源: 评论