咨询与建议

限定检索结果

文献类型

  • 1,477 篇 期刊文献
  • 1,274 篇 会议
  • 59 册 图书

馆藏范围

  • 2,810 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,722 篇 工学
    • 1,154 篇 计算机科学与技术...
    • 919 篇 软件工程
    • 349 篇 信息与通信工程
    • 322 篇 控制科学与工程
    • 213 篇 电气工程
    • 187 篇 电子科学与技术(可...
    • 185 篇 生物工程
    • 155 篇 机械工程
    • 153 篇 生物医学工程(可授...
    • 105 篇 光学工程
    • 102 篇 核科学与技术
    • 91 篇 仪器科学与技术
    • 77 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 64 篇 材料科学与工程(可...
  • 1,007 篇 理学
    • 438 篇 物理学
    • 390 篇 数学
    • 228 篇 生物学
    • 126 篇 统计学(可授理学、...
    • 97 篇 系统科学
    • 81 篇 天文学
    • 75 篇 化学
  • 503 篇 管理学
    • 340 篇 管理科学与工程(可...
    • 179 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 209 篇 医学
    • 169 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 78 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 68 篇 法学
  • 51 篇 经济学
  • 49 篇 农学
  • 37 篇 教育学
  • 12 篇 艺术学
  • 10 篇 文学
  • 4 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 113 篇 deep learning
  • 83 篇 machine learning
  • 67 篇 artificial intel...
  • 47 篇 information tech...
  • 45 篇 feature extracti...
  • 44 篇 internet of thin...
  • 40 篇 accuracy
  • 39 篇 optimization
  • 37 篇 computational mo...
  • 35 篇 computer science
  • 35 篇 training
  • 33 篇 testing
  • 31 篇 predictive model...
  • 29 篇 covid-19
  • 28 篇 convolutional ne...
  • 26 篇 software
  • 25 篇 computational in...
  • 24 篇 software enginee...
  • 24 篇 security
  • 23 篇 cloud computing

机构

  • 168 篇 faculty of scien...
  • 168 篇 departamento de ...
  • 168 篇 department for p...
  • 168 篇 department of ph...
  • 166 篇 department of ph...
  • 163 篇 yerevan physics ...
  • 162 篇 faculté des scie...
  • 159 篇 kirchhoff-instit...
  • 156 篇 department of ph...
  • 156 篇 department of ph...
  • 156 篇 department of ph...
  • 155 篇 institute of phy...
  • 153 篇 institute of phy...
  • 151 篇 physikalisches i...
  • 148 篇 fakultät für phy...
  • 148 篇 national scienti...
  • 148 篇 dsm/irfu cea sac...
  • 148 篇 instituto de fís...
  • 146 篇 physics departme...
  • 144 篇 institut für ast...

作者

  • 163 篇 c. alexa
  • 163 篇 j. m. izen
  • 163 篇 k. bos
  • 163 篇 g. bella
  • 163 篇 j. strandberg
  • 163 篇 d. calvet
  • 163 篇 c. amelung
  • 163 篇 h. a. gordon
  • 163 篇 g. spigo
  • 163 篇 e. hines
  • 163 篇 a. c. könig
  • 162 篇 f. siegert
  • 162 篇 m. klein
  • 161 篇 r. ströhmer
  • 160 篇 h. sakamoto
  • 160 篇 s. nektarijevic
  • 160 篇 m. rijssenbeek
  • 160 篇 f. marroquim
  • 160 篇 s. jin
  • 160 篇 g. gaudio

语言

  • 2,513 篇 英文
  • 283 篇 其他
  • 10 篇 中文
  • 9 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Information Technology and Systems Section of Computer Engineering"
2810 条 记 录,以下是2461-2470 订阅
排序:
A usability profile for graphical formal modelling methods
A usability profile for graphical formal modelling methods
收藏 引用
作者: Razali, Rozilawati Garratt, Paul Faculty of Information Science and Technology Universiti Kebangsaan Malaysia 43600 UKM Bangi Selangor Malaysia Dependable Systems and Software Engineering School of Electronics and Computer Science University of Southampton SO17 1BJ United Kingdom
The notation and environment in conceptual modelling transform developers' initial perception about a system to a concrete model. Any usability constraints that the notation and environment impose on the modeling ... 详细信息
来源: 评论
Threats to Health information Security
Threats to Health Information Security
收藏 引用
The Fifth International Conference on information Assurance and Security(第五届信息保障与安全国际会议)
作者: Ganthan Narayana Samy Rabiah Ahmad Zuraini Ismail Department of Computer Systems and Communications Faculty of Computer Science and Information System Centre for Advanced Software Engineering (CASE) Faculty of Computer Science and Information Systems Department of Science College of Science and Technology Universiti Teknologi Malaysia (UTM) Malaysia
The purpose of this paper is to identify the threats that exist in Healthcare information systems (HIS). The study has been carried out in three different departments namely, information technology Department (ITD), M... 详细信息
来源: 评论
Perfect Distinguishability of Quantum Operations
收藏 引用
Physical Review Letters 2009年 第21期103卷 210501-210501页
作者: Runyao Duan Yuan Feng Mingsheng Ying State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084 China and Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney New South Wales 2007 Australia
We provide a feasible necessary and sufficient condition for when an unknown quantum operation (quantum device) secretly selected from a set of known quantum operations can be identified perfectly within a finite numb...
来源: 评论
Threats Identification in Healthcare information systems using Genetic Algorithm and Coz Regression
Threats Identification in Healthcare Information Systems usi...
收藏 引用
The Fifth International Conference on information Assurance and Security(第五届信息保障与安全国际会议)
作者: Rabiah Ahmad Ganthan Narayana Samy Nuzulha Khilwani Ibrahim Peter A.Bath Zuraini Ismail Centre for Advanced Software Engineering (CASE) Faculty of Computer Science and Information Systems Department of Computer Systems and Communications Faculty of Computer Science and Information System Department of Information Studies University of Sheffield UK Department of Science College of Science and Technology Universiti Teknologi Malaysia (UTM) Malaysia
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which in... 详细信息
来源: 评论
To establish a pharmacological experimental platform for the study of cardiac hypoxia using the microelectrode array
收藏 引用
Journal of Pharmacological and Toxicological Methods 2009年 第3期59卷 146-152页
作者: Yeung, Chi-Kong Sommerhage, Frank Wrobel, Günter Law, Jessica Ka-Yan Offenhäusser, Andreas Rudd, John Anthony Ingebrandt, Sven Chan, Mansun Department of Pharmacology Faculty of Medicine The Chinese University of Hong Kong (CUHK) Shatin Hong Kong Institute of Bio- and Nanosystems - Bioelectronics (IBN-2) Centre of Nanoelectronic Systems for Information Technology (CNI) Leo-Brandt-Str. D-52425 Jülich Germany Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology (HKUST) Hong Kong
Introduction: Simultaneous recording of electrical potentials from multiple cells may be useful for physiological and pharmacological research. The present study aimed to establish an in vitro cardiac hypoxia experime... 详细信息
来源: 评论
Detection of plagiarism in database schemas using structural fingerprints
Detection of plagiarism in database schemas using structural...
收藏 引用
ACS/IEEE International Conference on computer systems and Applications
作者: Samer M. Abd El-Wahed Ahmed Elfatatry Mohamed S. Abougabal Department of Information Technology Institute of Graduate Studies and Research Alexandria University Egypt Department of Computer and Systems Engineering Faculty of Engineering Alexandria University Egypt
This research is concerned with plagiarism in software design. Specifically, the focus is on database design. Generally, producing plagiarized software may be done through illegal use of someone else's source code... 详细信息
来源: 评论
An Approach for Eliciting Software Requirements and its Prioritization Using Analytic Hierarchy Process
An Approach for Eliciting Software Requirements and its Prio...
收藏 引用
International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom
作者: Mohd. Sadiq Shabina Ghafir Mohd. Shahid Computer Engineering Section Faculty of Engineering and Technology Jamia Millia Islamia University New Delhi India Department of Computer Science Faculty of Management Studies and Information Technology Jamia Hamdard University New Delhi India Department of Computer Science and Engineering Al-Falah School of Engineering and Technology Maharshi Dayanand University Rohtak Haryana India
Most software engineering methods presume that requirements are explicitly and completely stated; however, experience shows that requirements are rarely complete and usually contain implicit requirements. The failure ... 详细信息
来源: 评论
Benefit and evaluation of interactive 3D process data visualization in operator training of plant manufacturing industry
Benefit and evaluation of interactive 3D process data visual...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Dorothea Pantförder Birgit Vogel-Heuser Chair of Embedded Systems Faculty of Electrical Engineering/Computer Science University of Kassel Kassel Germany Institute of Information Technology in Mechanical Engineering Faculty of Mechanical Engineering Technische Universität München Munich Germany
Operator training without a process model is necessary in certain plant manufacturing industry's applications because the process models from the control theory perspective are still not available. This paper desc... 详细信息
来源: 评论
Optimality of Affine Policies in Multi-stage Robust Optimization
Optimality of Affine Policies in Multi-stage Robust Optimiza...
收藏 引用
Joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference
作者: Dimitris Bertsimas Dan A.Iancu Pablo A.Parrilo Faculty of the Sloan School of Management and the Operations Research Center Massachusetts Institute of Technology the Operations Research Center Massachusetts Institute of Technology the Laboratory for Information and Decision Systems and the Faculty of Electrical Engineering and Computer Science Massachusetts Institute of Technology
In this paper,we prove the optimality of disturbance-affine control policies in the context of onedimensional,box-constrained,multi-stage robust *** results cover the finite horizon case,with minimax(worstcase) object... 详细信息
来源: 评论
Checking Sequence Construction Using Adaptive and Preset Distinguishing Sequences
Checking Sequence Construction Using Adaptive and Preset Dis...
收藏 引用
International Conference on Software engineering and Formal Methods (SEFM)
作者: Robert M. Hierons Guy-Vincent Jourdan Hasan Ural Husnu Yenigun School of Information Systems Computer and Mathematics Brunei University Uxbridge Middlesex UK School of Information Technology and Engineering University of Ottawa Ottawa ONT Canada Faculty of Engineering and Natural Sciences Sabanci University Istanbul Turkey
Methods for testing from finite state machine-based specifications often require the existence of a preset distinguishing sequence for constructing checking sequences. It has been shown that an adaptive distinguishing... 详细信息
来源: 评论