咨询与建议

限定检索结果

文献类型

  • 2,304 篇 会议
  • 1,794 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 4,134 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,696 篇 工学
    • 1,992 篇 计算机科学与技术...
    • 1,660 篇 软件工程
    • 541 篇 信息与通信工程
    • 337 篇 控制科学与工程
    • 316 篇 生物工程
    • 241 篇 电气工程
    • 228 篇 电子科学与技术(可...
    • 222 篇 光学工程
    • 215 篇 生物医学工程(可授...
    • 206 篇 机械工程
    • 117 篇 化学工程与技术
    • 115 篇 仪器科学与技术
    • 91 篇 材料科学与工程(可...
    • 90 篇 动力工程及工程热...
    • 84 篇 网络空间安全
    • 81 篇 交通运输工程
  • 1,381 篇 理学
    • 684 篇 数学
    • 442 篇 物理学
    • 351 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 145 篇 系统科学
    • 128 篇 化学
  • 815 篇 管理学
    • 504 篇 管理科学与工程(可...
    • 342 篇 图书情报与档案管...
    • 237 篇 工商管理
  • 229 篇 医学
    • 191 篇 临床医学
    • 158 篇 基础医学(可授医学...
    • 90 篇 公共卫生与预防医...
    • 87 篇 药学(可授医学、理...
  • 133 篇 法学
    • 114 篇 社会学
  • 85 篇 教育学
  • 79 篇 经济学
  • 61 篇 农学
  • 23 篇 文学
  • 11 篇 军事学
  • 11 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 110 篇 software enginee...
  • 104 篇 machine learning
  • 100 篇 deep learning
  • 79 篇 information tech...
  • 75 篇 feature extracti...
  • 70 篇 accuracy
  • 69 篇 training
  • 67 篇 computational mo...
  • 63 篇 semantics
  • 63 篇 artificial intel...
  • 61 篇 software
  • 52 篇 data mining
  • 51 篇 cloud computing
  • 47 篇 predictive model...
  • 46 篇 computer science
  • 42 篇 optimization
  • 40 篇 web services
  • 39 篇 security
  • 38 篇 data models
  • 37 篇 internet of thin...

机构

  • 62 篇 faculty of infor...
  • 41 篇 national key lab...
  • 40 篇 faculty of infor...
  • 38 篇 faculty of infor...
  • 36 篇 department of so...
  • 32 篇 national key lab...
  • 31 篇 faculty of elect...
  • 26 篇 school of softwa...
  • 25 篇 faculty of infor...
  • 25 篇 school of inform...
  • 25 篇 faculty of compu...
  • 25 篇 computer vision ...
  • 24 篇 university of ch...
  • 24 篇 state key labora...
  • 23 篇 department of so...
  • 23 篇 state key lab. f...
  • 22 篇 college of compu...
  • 22 篇 security enginee...
  • 21 篇 school of comput...
  • 20 篇 centre for quant...

作者

  • 36 篇 yu mei
  • 35 篇 bieliková mária
  • 29 篇 tao dacheng
  • 26 篇 tran minh-triet
  • 24 篇 tong lu
  • 21 篇 jiang gangyi
  • 19 篇 shao feng
  • 18 篇 umapada pal
  • 18 篇 yoshitaka shibat...
  • 16 篇 hsieh min-hsiu
  • 16 篇 mei yu
  • 15 篇 liu tongliang
  • 15 篇 ismail leila
  • 15 篇 yang jian
  • 15 篇 herawan tutut
  • 15 篇 palaiahnakote sh...
  • 14 篇 muhammad waseem ...
  • 14 篇 jie lu
  • 14 篇 peng zongju
  • 14 篇 pan shirui

语言

  • 3,640 篇 英文
  • 435 篇 其他
  • 63 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Information Technology and Software Engineering Lab"
4134 条 记 录,以下是3711-3720 订阅
排序:
A review on object-oriented metrics as a supporting method to extract object-oriented concepts from student's source code
A review on object-oriented metrics as a supporting method t...
收藏 引用
IASTED International Conference on Advances in Computer Science and engineering, ACSE 2009
作者: Khamis, Norazlina Idris, Sufian Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya 50603 Kuala Lumpur Malaysia Department of Computer Science Universiti Kebangsaan Malaysia Bangi Selangor Malaysia
One of the debatable issues in programming courses for core Computer Science (CS) and information technology (IT) education is on how to improve the assessment so that it will reflect student's programming skills.... 详细信息
来源: 评论
Event based simulator for parallel computing over the wide area network for real time visualization
Event based simulator for parallel computing over the wide a...
收藏 引用
1st International Visual Informatics Conference, IVIC 2009
作者: Sundararajan, Elankovan Harwood, Aaron Kotagiri, Ramamohanarao Satria Prabuwono, Anton Department of Industrial Computing Faculty of Information Sciences and Technology Universiti Kebangsaan Malaysia 43600 Bangi UKM Selangor Malaysia Department of Computer Science and Software Engineering Faculty of Engineering University of Melbourne 111 Barry Street Carlton VIC 3010 Australia
As the computational requirement of applications in computational science continues to grow tremendously, the use of computational resources distributed across the Wide Area Network (WAN) becomes advantageous. However... 详细信息
来源: 评论
Implementing case-based reasoning approach to framework documentation
Implementing case-based reasoning approach to framework docu...
收藏 引用
2009 WRI World Congress on Computer Science and information engineering, CSIE 2009
作者: Hajar, Mat Jani Lee, Sai Peck College of Information Technology Universiti Tenaga Nasional Km. 7 Jalan Kajang-Puchong 43009 Kajang Selangor Darul Ehsan Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology University Malaya 50603 Kuala Lumpur Malaysia
Several approaches are currently used in documenting object-oriented application frameworks. Traditional documentation approaches include tutorials, reference manuals, design patterns, cookbooks, and minimalist. The m... 详细信息
来源: 评论
Towards high-performance network intrusion prevention system on multi-core network services processor
Towards high-performance network intrusion prevention system...
收藏 引用
15th International Conference on Parallel and Distributed Systems, ICPADS '09
作者: Wang, Xiang Qi, Yaxuan Yang, Baohua Xue, Yibo Li, Jun School of Software Engineering University of Science and Technology of China Hefei China Dept. Automation Tsinghua University Beijing China Research Institute of Information Technology Tsinghua University Beijing China Tsinghua National Lab. for Information Science and Technology Beijing China
Network intrusion prevention system (NIPS) becomes more complex due to the rapid growth of network bandwidth and requirement of network security. However existing solutions, either hardware-based or software-based can... 详细信息
来源: 评论
DBS: A bit-level heuristic packet classification algorithm for high speed network
DBS: A bit-level heuristic packet classification algorithm f...
收藏 引用
15th International Conference on Parallel and Distributed Systems, ICPADS '09
作者: Yang, Baohua Wang, Xiang Xue, Yibo Li, Jun Dept. Automation Tsinghua University Beijing China Research Institute of Information Technology Tsinghua University Beijing China Tsinghua National Lab. for Information Science and Technology Beijing China School of Software Engineering University of Science and Technology of China Hefei China
Packet classification is one of the most critical techniques in many network devices such as Firewall, IDS and IPS, etc. In order to meet the performance requirement for high speed Internet (even higher than 10 Gbps),... 详细信息
来源: 评论
Expression-invariant facial identification
Expression-invariant facial identification
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Pohsiang Tsai Tich Phuoc Tran Longbing Cao School of Computing and Communications Faculty of Engineering and Information Technology University of Technology Sydney Australia School of Software Faculty of Engineering and Information Technology University of Technology Sydney Australia
Facial identification has been recognized as most simple and non-intrusive technology that can be applied in many places. However, there are still many unsolved facial identification problems due to different intra-pe... 详细信息
来源: 评论
A decision making model for vendor-buyer inventory systems  1
收藏 引用
12th International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing, RSFDGrC 2009
作者: Wee, Hui-Ming Lu, Jie Zhang, Guangquan Chiao, Huai-En Gao, Ya Lab Faculty of Engineering and Information Technology University of Technology Sydney PO Box 123 NSW 2007 Australia Department of Industrial and Systems Engineering Chung Yuan Christian University Chungli 32023 Taiwan
In a vendor-buyer supply chain, the buyer's economic order quantity and the vendor's optimal number of deliveries are derived either independently or collaboratively. In this paper, we establish a two-stage ve... 详细信息
来源: 评论
Investigating Security Threats in information Systems
Investigating Security Threats in Information Systems
收藏 引用
12th International-Business-information-Management-Association Conference
作者: Samy, Ganthan Narayana Ahmad, Rabiah Ismail, Zuraini Department of Computer Systems and Communications Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia (UTM) Malaysia Centre for Advanced Software Engineering (CASE) Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia (UTM) Malaysia Department of Science College of Science and Technology Universiti Teknologi Malaysia (UTM) Malaysia
information security surveys are important inputs to private, public and government sectors in order to measure current status of information security threats. This paper examines the various types of threats that exi... 详细信息
来源: 评论
Reverse engineering Function Points to Object Points
Reverse engineering Function Points to Object Points
收藏 引用
International Conference on the Applications of Digital information and Web Technologies (ICADIWT)
作者: Ayman A. Issa Mofleh Al-Diabat Software Engineering Department Faculty of Information Technology Philadelphia University Amman Jordan
This paper reports on the development of a novel approach to bridge the relationship between function point (FP) and object point (OP) sizing metrics by reverse engineering FP elements to some corresponding OP element... 详细信息
来源: 评论
Towards Cohesion-based Metrics as Early Quality Indicators of Faulty Classes and Components
Towards Cohesion-based Metrics as Early Quality Indicators o...
收藏 引用
International Symposium on Computing, Communication, and Control(ISCCC 2009)
作者: Chuan Ho Loh Sai Peck Lee Department of Software Engineering Faculty of Computer Science and Information TechnologyUniversity of Malaya
Measuring structural design properties of an object-oriented system is a promising approach towards early quality *** object-oriented systems,cohesion is an important factor of objectoriented design quality.A few rese... 详细信息
来源: 评论