咨询与建议

限定检索结果

文献类型

  • 2,304 篇 会议
  • 1,807 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 4,148 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,698 篇 工学
    • 1,993 篇 计算机科学与技术...
    • 1,660 篇 软件工程
    • 541 篇 信息与通信工程
    • 337 篇 控制科学与工程
    • 316 篇 生物工程
    • 241 篇 电气工程
    • 228 篇 电子科学与技术(可...
    • 223 篇 光学工程
    • 215 篇 生物医学工程(可授...
    • 207 篇 机械工程
    • 117 篇 化学工程与技术
    • 115 篇 仪器科学与技术
    • 91 篇 材料科学与工程(可...
    • 90 篇 动力工程及工程热...
    • 84 篇 网络空间安全
    • 81 篇 交通运输工程
  • 1,380 篇 理学
    • 684 篇 数学
    • 442 篇 物理学
    • 351 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 145 篇 系统科学
    • 128 篇 化学
  • 815 篇 管理学
    • 504 篇 管理科学与工程(可...
    • 342 篇 图书情报与档案管...
    • 237 篇 工商管理
  • 231 篇 医学
    • 193 篇 临床医学
    • 159 篇 基础医学(可授医学...
    • 90 篇 公共卫生与预防医...
    • 87 篇 药学(可授医学、理...
  • 133 篇 法学
    • 114 篇 社会学
  • 85 篇 教育学
  • 79 篇 经济学
  • 61 篇 农学
  • 23 篇 文学
  • 11 篇 军事学
  • 11 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 110 篇 software enginee...
  • 105 篇 machine learning
  • 101 篇 deep learning
  • 79 篇 information tech...
  • 75 篇 feature extracti...
  • 70 篇 accuracy
  • 69 篇 training
  • 67 篇 computational mo...
  • 65 篇 artificial intel...
  • 63 篇 semantics
  • 61 篇 software
  • 52 篇 data mining
  • 51 篇 cloud computing
  • 47 篇 predictive model...
  • 46 篇 computer science
  • 43 篇 optimization
  • 40 篇 web services
  • 39 篇 security
  • 38 篇 data models
  • 37 篇 internet of thin...

机构

  • 62 篇 faculty of infor...
  • 41 篇 faculty of infor...
  • 41 篇 national key lab...
  • 39 篇 faculty of infor...
  • 36 篇 department of so...
  • 32 篇 national key lab...
  • 31 篇 faculty of elect...
  • 26 篇 school of softwa...
  • 25 篇 school of inform...
  • 25 篇 faculty of compu...
  • 24 篇 faculty of infor...
  • 24 篇 university of ch...
  • 24 篇 state key labora...
  • 24 篇 computer vision ...
  • 23 篇 department of so...
  • 22 篇 college of compu...
  • 22 篇 state key lab. f...
  • 21 篇 security enginee...
  • 20 篇 department of el...
  • 20 篇 centre for quant...

作者

  • 37 篇 yu mei
  • 35 篇 bieliková mária
  • 29 篇 tao dacheng
  • 26 篇 tran minh-triet
  • 24 篇 tong lu
  • 21 篇 jiang gangyi
  • 19 篇 shao feng
  • 18 篇 umapada pal
  • 18 篇 yoshitaka shibat...
  • 16 篇 hsieh min-hsiu
  • 16 篇 mei yu
  • 15 篇 peng zongju
  • 15 篇 liu tongliang
  • 15 篇 yang jian
  • 15 篇 herawan tutut
  • 15 篇 palaiahnakote sh...
  • 14 篇 muhammad waseem ...
  • 14 篇 jie lu
  • 14 篇 pan shirui
  • 14 篇 yin baocai

语言

  • 3,654 篇 英文
  • 435 篇 其他
  • 63 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Information Technology and Software Engineering Lab"
4148 条 记 录,以下是3591-3600 订阅
排序:
Kernel Dimensionality Reduction evaluation on various dimensions of effective subspaces for cancer patient survival analysis
Kernel Dimensionality Reduction evaluation on various dimens...
收藏 引用
International Conference on information Science, Signal Processing and Their Applications
作者: Chin, Y.S. Wasito, Ito Mohd Hashim, S.Z. Department of Software Engineering Faculty of Computer Science and Information Systems University Technology Malaysia Skudai Johor Bahru Malaysia Faculty of Computer Science University of Indonesia Jakarta Indonesia
In this research, we have extended the use of Kernel Dimensionality Reduction (KDR) in the context of semi supervised learning in particular for micro-array DNA clustering application. We have proposed a new model cal... 详细信息
来源: 评论
Communication issues in parallel Conjugate Gradient method using a star-based network
Communication issues in parallel Conjugate Gradient method u...
收藏 引用
IEEE Conference on Open Systems
作者: Ismail, Leila Faculty of Information Technology Computer Science and Software Engineering UAE University P.O. Box 17551 Al-Ain United Arab Emirates
Conjugate Gradient (CG) method is an iterative linear solver which is used by many scientific and engineering applications to solve a linear system of algebraic equations. CG generates a heavy load of computation and ... 详细信息
来源: 评论
Content-based news recommendation  1
收藏 引用
作者: Kompan, Michal Bieliková, Mária Institute of Informatics and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology Ilkovičova 3 842 16 Bratislava 4 Slovakia
The information overloading is one of the serious problems nowadays. We can see it in various domains including business. Especially news represent area where information overload currently prevents effective informat... 详细信息
来源: 评论
Compressing string data in a database by using q-grams
Compressing string data in a database by using q-grams
收藏 引用
2010 2nd International Conference on Computer engineering and technology, ICCET 2010
作者: Danesh, Amir Seyed Ahy, Abdollatif Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya 50603 Kuala Lumpur Malaysia Department of Computer Science and Engineering University of Guilan-Iran Iran
String data is ubiquitous, and its management has a particular importance. Managing string data, especially in databases is really prominent, for we see a large amount of this kind of data in usual databases and this ... 详细信息
来源: 评论
Assessment of NER solutions against the first and second CALBC Silver Standard Corpus
收藏 引用
Journal of Biomedical Semantics 2011年 第5期2卷 1-12页
作者: Rebholz-Schuhmann, Dietrich Yepes, Antonio Jimeno Li, Chen Kafkas, Senay Lewin, Ian Kang, Ning Corbett, Peter Milward, David Buyko, Ekaterina Beisswanger, Elena Hornbostel, Kerstin Kouznetsov, Alexandre Witte, René Laurila, Jonas B Baker, Christopher JO Kuo, Cheng-Ju Clematide, Simone Rinaldi, Fabio Farkas, Richárd Móra, György Hara, Kazuo Furlong, Laura I Rautschka, Michael Neves, Mariana Lara Pascual-Montano, Alberto Wei, Qi Collier, Nigel Chowdhury, Md Faisal Mahbub Lavelli, Alberto Berlanga, Rafael Morante, Roser Van Asch, Vincent Daelemans, Walter Marina, José Luís van Mulligen, Erik Kors, Jan Hahn, Udo European Bioinformatics Institute EMBL Outstation Hinxton Cambridge CB10 1SD United Kingdom Erasmus University Medical Center Dept. of Medical Informatics Rotterdam Netherlands St. John's Innovation Centre Linguamatics Ltd Cambridge United Kingdom Friedrich-Schiller-Universität Language and Information Engineering (JULIE) Lab Jena Germany University of New Brunswick Dept. of Computer Science and Applied Statistics Canada Concordia University Dept. of Computer Science and Software Engineering Montreal Canada Academia Sinica Institute of Information Science Taipei 115 Taiwan University of Zürich Switzerland Hungarian Academy of Sciences Research Group on Artificial Intelligence Hungary Nara Institute of Science and Technology Nara Japan IMIM (Hospital del Mar Research Institute) Universitat Pompeu Fabra Research Programme on Biomedical Informatics (GRIB) Barcelona Spain National Center for Biotechnology-CSIC Madrid Spain National Institute of Informatics Tokyo Japan Fondazione Bruno Kessler Trento Italy Universitat Jaume I Spain University of Antwerp CLiPS Belgium Complutense University of Madrid Spain
Background: Competitions in text mining have been used to measure the performance of automatic text processing solutions against a manually annotated gold standard corpus (GSC). The preparation of the GSC is time-cons... 详细信息
来源: 评论
An extension to data-flow-oriented formal specification language for specifying concurrent software systems
An extension to data-flow-oriented formal specification lang...
收藏 引用
10th International Conference on Quality software, QSIC 2010
作者: Chen, Yuting Liu, Shaoying Wang, Linzhang School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai 200240 China Faculty of Computer and Information Sciences Hosei University Tokyo Japan State Key Lab. for Novel Software Technology Nanjing University China
Data-flow-oriented formal specification languages, such as SOFL, bridge formal methods to industrial applications, allowing software developers to effectively use formal methods in developing practical software system... 详细信息
来源: 评论
On Well-Formedness Rules for UML Use Case Diagram
收藏 引用
International Conference on Web information Systems and Mining
作者: Ibrahim, Noraini Ibrahim, Rosziati Saringat, Mohd Zainuri Mansor, Dzahar Herawan, Tutut Department of Software Engineering Faculty of Information Technology and Multimedia Universiti Tun Hussein Onn Malaysia Microsoft Malaysia Department of Mathematics Eduction Universitas Ahmad Dahlan Yogyakarta 55166 Indonesia
A software model is a widely used technique to specify software. A UML model may contain different diagrams and a diagram is built from different elements. Each element is restraint to certain constraint or well-forme... 详细信息
来源: 评论
Research on camera controlling driving simulator
Research on camera controlling driving simulator
收藏 引用
International Conference on information engineering and Computer Science
作者: Liu, Youquan Cui, Yu Xiao, Jie Wu, Enhua School of Information Engineering Chang'an University Xi'an China Institute of Software Chinese Academy of Sciences Beijing China Faculty of Science and Technology University of Macau China
This paper presents a vehicle driving simulator system with a traffic oriented visual modeler and a novel humancomputer interaction way. Especially, the driving is based on mixed reality technology which is equipped w... 详细信息
来源: 评论
WIFI-based indoor positioning system
WIFI-based indoor positioning system
收藏 引用
2nd International Conference on Computer and Network technology, ICCNT 2010
作者: Lashkari, Arash Habibi Parhizkar, Behrang Ngan, Mike Ng Ah Kuala Lumpur Malaysia Faculty of Information Communication and Technology LIMKOKWING University of Creative Technology CYBERJAYA Selangor Malaysia Department of Software Engineering with Multimedia LIMKOKWING University of Creative Technology CYBERJAYA Selangor Malaysia
The easy access and availability of wireless technologies and mobile computing and internet have lead to new opportunities in developing mobile applications which purpose is to make people's life more easier. Nowa... 详细信息
来源: 评论
Interpretative key management (IKM), A novel framework
Interpretative key management (IKM), A novel framework
收藏 引用
2nd International Conference on Computer Research and Development, ICCRD 2010
作者: Chaeikar, Saman Shojae Razak, Shukor Abd Honarbakhsh, Shohreh Zeidanloo, Hossein Rouhani Zamani, Mazdak Jaryani, Farhang Centre for Advanced Software Engineering University Technology Malaysia 54100 Kuala Lumpur Malaysia Faculty of Computer Science and Information System University Technology Malaysia 54100 Kuala Lumpur Malaysia
Nowadays, we use cryptography keys to secure our communications. One of the common ways for securing data exchanging is via the use of symmetric keys to encipher transmitted data over network. Today's practices fo... 详细信息
来源: 评论