咨询与建议

限定检索结果

文献类型

  • 2,300 篇 会议
  • 1,783 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 4,120 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,698 篇 工学
    • 1,993 篇 计算机科学与技术...
    • 1,657 篇 软件工程
    • 537 篇 信息与通信工程
    • 339 篇 控制科学与工程
    • 316 篇 生物工程
    • 241 篇 电气工程
    • 226 篇 光学工程
    • 226 篇 电子科学与技术(可...
    • 216 篇 生物医学工程(可授...
    • 209 篇 机械工程
    • 118 篇 化学工程与技术
    • 114 篇 仪器科学与技术
    • 92 篇 材料科学与工程(可...
    • 89 篇 动力工程及工程热...
    • 83 篇 网络空间安全
    • 82 篇 交通运输工程
  • 1,383 篇 理学
    • 684 篇 数学
    • 440 篇 物理学
    • 354 篇 生物学
    • 213 篇 统计学(可授理学、...
    • 146 篇 系统科学
    • 129 篇 化学
  • 817 篇 管理学
    • 505 篇 管理科学与工程(可...
    • 343 篇 图书情报与档案管...
    • 239 篇 工商管理
  • 233 篇 医学
    • 194 篇 临床医学
    • 161 篇 基础医学(可授医学...
    • 91 篇 公共卫生与预防医...
    • 87 篇 药学(可授医学、理...
  • 134 篇 法学
    • 115 篇 社会学
  • 85 篇 教育学
  • 79 篇 经济学
  • 64 篇 农学
  • 23 篇 文学
  • 11 篇 军事学
  • 11 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 109 篇 software enginee...
  • 105 篇 machine learning
  • 101 篇 deep learning
  • 79 篇 information tech...
  • 74 篇 feature extracti...
  • 68 篇 accuracy
  • 68 篇 training
  • 65 篇 computational mo...
  • 63 篇 semantics
  • 62 篇 artificial intel...
  • 61 篇 software
  • 51 篇 data mining
  • 49 篇 cloud computing
  • 47 篇 predictive model...
  • 46 篇 computer science
  • 42 篇 optimization
  • 40 篇 web services
  • 38 篇 security
  • 37 篇 testing
  • 36 篇 quality of servi...

机构

  • 63 篇 faculty of infor...
  • 41 篇 faculty of infor...
  • 41 篇 national key lab...
  • 36 篇 department of so...
  • 33 篇 faculty of infor...
  • 31 篇 faculty of elect...
  • 27 篇 national key lab...
  • 25 篇 school of softwa...
  • 25 篇 school of inform...
  • 25 篇 faculty of compu...
  • 24 篇 faculty of infor...
  • 24 篇 university of ch...
  • 24 篇 state key labora...
  • 24 篇 computer vision ...
  • 23 篇 department of so...
  • 22 篇 college of compu...
  • 21 篇 centre for quant...
  • 21 篇 security enginee...
  • 20 篇 state key lab. f...
  • 20 篇 school of comput...

作者

  • 35 篇 bieliková mária
  • 29 篇 tao dacheng
  • 27 篇 yu mei
  • 26 篇 tran minh-triet
  • 24 篇 tong lu
  • 21 篇 jiang gangyi
  • 18 篇 umapada pal
  • 18 篇 yoshitaka shibat...
  • 16 篇 hsieh min-hsiu
  • 15 篇 mei yu
  • 15 篇 peng zongju
  • 15 篇 liu tongliang
  • 15 篇 yang jian
  • 15 篇 herawan tutut
  • 15 篇 palaiahnakote sh...
  • 14 篇 muhammad waseem ...
  • 14 篇 jie lu
  • 14 篇 pan shirui
  • 14 篇 yin baocai
  • 14 篇 ismail leila

语言

  • 3,874 篇 英文
  • 198 篇 其他
  • 48 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 日文
检索条件"机构=Faculty of Information Technology and Software Engineering Lab"
4120 条 记 录,以下是3771-3780 订阅
排序:
Global Asymptotical Stabilization of Morse-Smale Systems Using Weak Control-Lyapunov Functions
收藏 引用
SICE Journal of Control, Measurement, and System Integration 2009年 第1期2卷 43-49页
作者: Gou Nishida Takayuki Tsuzuki Hisakazu Nakamura Yuh Yamashita RIKEN-TRI Collaboration Center for Human-Interactive Robot Research Center Advanced Science Institute RIKEN Department of Electronic and Control Systems Engineering Interdisciplinary Faculty of Science and Engineering Shimane University Systems and Control Lab. Graduate School of Information Science Nara Institute of Science and Technology Division of Systems Science and Informatics Graduate School of Information Science and Technology Hokkaido University
This paper proposes a method of constructing weak control-Lyapunov functions for nonlinear systems by introducing a topological geometric assumption called a Morse-Smale system. A Lyapunov function is one of the most ... 详细信息
来源: 评论
Resource-Aware Test Suite Optimization
Resource-Aware Test Suite Optimization
收藏 引用
International Conference on Quality software
作者: Xiaofang Zhang Huamao Shan Ju Qian State Key Lab. for Novel Software Technology Nanjing University China school of Computer Science & Technology Soochow University China School of Computer Science & Engineering Southeast University China College of Information Science & Technology Nanjing University of Aeronautics and Astronautics China
Regression testing is an expensive and frequently executed activity, which is often performed in a resource constrained execution environment. As resource-aware test suite optimization problem can be reduced to the 0-... 详细信息
来源: 评论
Behavior-Based Proactive Detection of Unknown Malicious Codes
Behavior-Based Proactive Detection of Unknown Malicious Code...
收藏 引用
International Conference on Internet Monitoring and Protection, ICIMP
作者: Jianguo Ding Jian Jin Pascal Bouvry Yongtao Hu Haibing Guan Faculty of Science Technology and Communication (FSTC) University of Luxembourg Luxembourg Software Engineering Institute East China Jiao Tong University Shanghai China School of Information Science and Technology East China Jiao Tong University Shanghai China Third Research Institute of Ministry of Public Security China School of Information Security Engineering Shanghai Jiaotong University Shanghai China
With the rising popularity of the Internet, the resulting increase in the number of available vulnerable machines, and the elevated sophistication of the malicious code itself, the detection and prevention of unknown ... 详细信息
来源: 评论
Preface of the 2010 IAENG International Conference on Electrical engineering special session: Design, analysis and tools for integrated circuits and systems
Proceedings of the International MultiConference of Engineer...
收藏 引用
Proceedings of the International MultiConference of Engineers and Computer Scientists 2010, IMECS 2010 2010年 1333-1335页
作者: Man, Ka Lok Mercaldi, Michele Hahanov, Vladimir Prinetto, Paolo Poncino, Massimo MacIi, Alberto Choi, Joongho Li, Wei Schellekens, Michel Popovici, Emanuel Seon, Jong-Kug Rossi, Umberto Fummi, Franco Pravadelli, Graziano Lam, Yui Fai PavLov, Vladimir Patel, Ajay Huang, Jinfeng Vallee, Thierry Boubekeur, Menouer Sokolova, Ana Almerares, Sergio Donno, Monica Cho, Jun-Dong Zahirul Alam, A.H.M. Provan, Gregory Velev, Miroslav N. Uddin, M. Nasir Botchkarev, Alexei Bosnacki, Dragan Hickey, Dave O'Keeffe, Maria Krilavičius, Tomas Pastrnak, Milan Herbert, John Lu, Zhe-Ming Pan, Jeng-Shyang Chang, Chin-Chen Horng, Mong-Fong Chen, Liang Lim, Chee-Peng Tao, Ngo Quoc Deb, Suash Merniz, Salah Valero, Oscar Yi, Yang Woods, Damien Vedrine, Franck Monsuez, Bruno Yen, Kang Matsuura, Takenobu Edwards, R. Timothy Tveretina, Olga Fino, Maria Helena O'Riordan, Adrian Patrick labiak, Grzegorz Gaur, M.S. Chang, Jian Chung, Yeh-Ching Derezinska, Anna Cho, Kyoung-Rok Zhang, Yong Liutkevičius, R. Zeng, Yuanyuan Vasudevan, D.P. Bukowiec, Arkadiusz Kitsos, Paris Goudarzi, Maziar Dong, Jin Song Bhalla, Ateet Al-Khalili, Dhamin Navabi, Zainalabedin Zinchenko, Lyudmila Anjum, Muhammad Almas Narasimha, Deepak Laxmi Hughes, Danny Tadjouddine, Emmanuel M. Wang, Jun Kumar, A.P. Sathish Jaisankar, N. Mansoor, Atif Hollands, Steven Mohammadi, Siamak Klein, Felipe Westermann, Peter English, Tom Planas, Miquel Moreto Chung, Chelho Chakrabarti, Amlan Lei, Chi-Un Bamakhrama, Mohamed Naik, B. Rajendra Harte, Sean Yin, Alexander Giancardi, Luigi El-Din Mady, Alie Joseph, Arun Khandekar, Prasad D. Pandey, Hari Mohan Bharti, Vishal O'Mullane, Monica Chen, Chen Xi'an Jiaotong University China Liverpool University United Kingdom Kharkov National University of Radio Electronics Ukraine Politecnico di Torino Italy University of Seoul Korea Republic of Fudan University China Tyndall University College Cork Ireland System LSI Lab. LS Industrial Systems R and D Center Korea Republic of STMicroelectronics Italy University of Verona Italy Hong Kong University of Science and Technology Hong Kong Hong Kong International Software and Productivity Engineering Institute United States Intelligent Support Ltd. United Kingdom Philips and LiteOn Digital Solutions Netherlands Netherlands Georgia Southern University Statesboro GA United States University of Salzburg Austria Sung Kyun Kwan University Korea Republic of International Islamic University Malaysia Malaysia Aries Design Automation United States Lakehead University Canada IEEE Canada Board of Directors Canada Eindhoven University of Technology Netherlands Vytautas Magnus University Lithuania Siemens IT Solutions and Services Slovakia Sun Yat-Sen University China National Kaohsiung University of Applied Sciences Taiwan Feng Chia University Taiwan Shu-Te University Taiwan University of Northern British Columbia Canada University of South Australia Australia Vietnamese Academy of Science and Technology Viet Nam C. V. Raman College of Engineering India Mentouri University Constantine Algeria University of Balearic Islands Spain University of Seville Spain CEA France ENSTA France Florida International University United States Tokai University Japan MultiGiG Inc. United States Karlsruhe University Germany Universidade Nova de Lisboa Portugal University of Zielona Gora Poland Malaviya National Institute of Technology Jaipur India Texas Instruments Inc. United States National Tsing-Hua University Taiwan Warsaw University of Technology Poland Chungbuk National University Korea Republic of Shenzhen University China Vytautas Magnus University Kaunas Lithuania Hellenic Open Univ
来源: 评论
Robust audio steganography via genetic algorithm
Robust audio steganography via genetic algorithm
收藏 引用
International Conference on information and Communication Technologies (ICICT)
作者: Mazdak Zamani Hamed Taherdoost Azizah A. Manaf Rabiah B. Ahmad Akram M. Zeki Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia Kuala Lumpur Malaysia College of Science and Technology Universiti Teknologi Malaysia Kuala Lumpur Malaysia Centre of Advanced Software Engineering Universiti Teknologi Malaysia Kuala Lumpur Malaysia
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of... 详细信息
来源: 评论
Managing Malware in Higher Learning Institutions
Managing Malware in Higher Learning Institutions
收藏 引用
International Conference on Computer and Electrical engineering, ICCEE
作者: Zuraini Ismail Christine Simfukwe Department of Science College of Science & Technology International Campus Universiti Teknologi Malaysia Kuala Lumpur Malaysia Centre of Advanced Software Engineering Faculty of Computer Science and Information Systems International Campus Universiti Teknologi Malaysia Kuala Lumpur Malaysia
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all busin... 详细信息
来源: 评论
Designing a Credit Approval System Using Web Services, BPEL, and AJAX
Designing a Credit Approval System Using Web Services, BPEL,...
收藏 引用
IEEE International Conference on e-Business engineering (ICEBE)
作者: Vincent C.T. Chan Dickson K.W. Chiu Michelle Watson Patrick C.K. Hung Haiyang Hu Hua Hu Yi Zhuang Department of Computer Science & Engineering Hong Kong University of Science and Technology Hong Kong China Faculty of Business and IT University of Ontario Institute of Technology (UOIT) Canada College of Computer Science and Information Engineering Zhejiang Gongshang University China State Key Laboratory for Novel Software Technology Nanjing University China College of Computer Science Hangzhou Dianzi University China
In the business world, financial institutions, like banks and investment firms, heavily rely on technology to manipulate daily operations and support business. Many more business processes have now become automated an... 详细信息
来源: 评论
Combining opportunistic routing with dynamic source routing for wireless mesh networks
Combining opportunistic routing with dynamic source routing ...
收藏 引用
IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2009)
作者: Qiang Shen Xuming Fang Sunmyeng Kim Rong He High Performance Network Lab Institute of Acoustics Chinese Academy and Sciences Beijing China Provincial Key Laboratory of Information Coding and Transmission Southwest Jiaotong University Chengdu China School of Computer and Software Engineering Kumoh National Institute of Technology Gyeongbuk South Korea
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro...
来源: 评论
Editorial: Game theory in signal processing and communications
收藏 引用
Eurasip Journal on Advances in Signal Processing 2009年 2009卷
作者: Jorswieck, Eduard A. Boche, Holger Han, Zhu Larsson, Erik G. Department of Mobile Communications School of Electrical Engineering and Computer Sciences Technical University of Berlin Berlin Germany Wireless Networking Signal Processing and Security Lab Department of Electrical and Computer Engineering University of Houston Houston TX 77004 United States Linkping University SE-581 83 Linkping Sweden Communications Laboratory Faculty of Electrical Engineering and Information Technology Dresden University of Technology 01062 Dresden Germany
来源: 评论
Assessing the needs of CSCL tool and its impacts in Malaysian context
收藏 引用
WSEAS Transactions on Computer Research 2008年 第5期3卷 300-310页
作者: Kasirun, Z.M. Salim, S.S. Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya 50603 Kuala Lumpur Malaysia
Reviewing on computer-supported collaborative learning (CSCL) tools revealed that CSCL is important to support collaborative learning (CL) strategy in school. Existing CSCL applications are mostly research-based and a... 详细信息
来源: 评论