咨询与建议

限定检索结果

文献类型

  • 1,464 篇 期刊文献
  • 1,274 篇 会议
  • 59 册 图书

馆藏范围

  • 2,797 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,728 篇 工学
    • 1,152 篇 计算机科学与技术...
    • 919 篇 软件工程
    • 349 篇 信息与通信工程
    • 322 篇 控制科学与工程
    • 213 篇 电气工程
    • 187 篇 电子科学与技术(可...
    • 185 篇 生物工程
    • 155 篇 机械工程
    • 153 篇 生物医学工程(可授...
    • 109 篇 核科学与技术
    • 105 篇 光学工程
    • 91 篇 仪器科学与技术
    • 77 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 64 篇 材料科学与工程(可...
  • 1,006 篇 理学
    • 436 篇 物理学
    • 390 篇 数学
    • 228 篇 生物学
    • 126 篇 统计学(可授理学、...
    • 97 篇 系统科学
    • 85 篇 天文学
    • 75 篇 化学
  • 503 篇 管理学
    • 340 篇 管理科学与工程(可...
    • 179 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 208 篇 医学
    • 168 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 78 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 68 篇 法学
  • 51 篇 经济学
  • 49 篇 农学
  • 37 篇 教育学
  • 12 篇 艺术学
  • 10 篇 文学
  • 4 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 113 篇 deep learning
  • 83 篇 machine learning
  • 67 篇 artificial intel...
  • 47 篇 information tech...
  • 45 篇 feature extracti...
  • 44 篇 internet of thin...
  • 40 篇 accuracy
  • 39 篇 optimization
  • 37 篇 computational mo...
  • 35 篇 computer science
  • 35 篇 training
  • 33 篇 testing
  • 31 篇 predictive model...
  • 29 篇 covid-19
  • 28 篇 convolutional ne...
  • 26 篇 software
  • 25 篇 computational in...
  • 24 篇 software enginee...
  • 24 篇 security
  • 23 篇 cloud computing

机构

  • 167 篇 faculty of scien...
  • 167 篇 departamento de ...
  • 167 篇 department for p...
  • 167 篇 department of ph...
  • 165 篇 department of ph...
  • 162 篇 yerevan physics ...
  • 161 篇 faculté des scie...
  • 158 篇 kirchhoff-instit...
  • 155 篇 department of ph...
  • 155 篇 department of ph...
  • 155 篇 institute of phy...
  • 154 篇 department of ph...
  • 152 篇 institute of phy...
  • 150 篇 physikalisches i...
  • 147 篇 fakultät für phy...
  • 147 篇 national scienti...
  • 147 篇 dsm/irfu cea sac...
  • 146 篇 instituto de fís...
  • 145 篇 physics departme...
  • 144 篇 institut für ast...

作者

  • 163 篇 c. alexa
  • 163 篇 j. m. izen
  • 163 篇 k. bos
  • 163 篇 g. bella
  • 163 篇 j. strandberg
  • 163 篇 d. calvet
  • 163 篇 c. amelung
  • 163 篇 h. a. gordon
  • 163 篇 g. spigo
  • 163 篇 e. hines
  • 163 篇 a. c. könig
  • 162 篇 f. siegert
  • 162 篇 m. klein
  • 161 篇 r. ströhmer
  • 160 篇 h. sakamoto
  • 160 篇 s. nektarijevic
  • 160 篇 m. rijssenbeek
  • 160 篇 f. marroquim
  • 160 篇 s. jin
  • 160 篇 g. gaudio

语言

  • 2,500 篇 英文
  • 283 篇 其他
  • 10 篇 中文
  • 9 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Information Technology and Systems Section of Computer Engineering"
2797 条 记 录,以下是2581-2590 订阅
排序:
Path-bounded one-way multihead finite automata
Path-bounded one-way multihead finite automata
收藏 引用
作者: Inoue, Satoshi Inoue, Katsushi Ito, Akira Wang, Yue Hitachi Ltd. Kawasaki-shi Japan Department of Computer Science and Systems Engineering Faculty of Engineering Yamaguchi University Ube-shi 755-8611 Japan Media and Information Technology Center Yamaguchi University Ube-shi 755-8611 Japan
For each positive integer r ≥ 1, a nondeterministic machine M is r path-bounded if for any input word x, there are r computation paths of M on x. This paper investigates the accepting powers of path-bounded one-way (... 详细信息
来源: 评论
Molecular-dynamics study on fracutre property of amorphous metal with crystallization
Molecular-dynamics study on fracutre property of amorphous m...
收藏 引用
11th International Conference on Fracture 2005, ICF11
作者: Matsumoto, R. Nakagaki, M. Nakatani, A. Kitagawa, H. Department of Mechanical Information Science and Technology Faculty of Computer Science and Systems Engineering Kyushu Institute of Technology 680-4 Kawazu Iizuka-City Fukuoka 820-8502 Japan Department of Adaptive Machine Systems Graduate School of Engineering Osaka University 2-1 Yamada-Oka Suita-City Osaka 565-0871 Japan Department of Energy and Mechanical Engineering Faculty of Engineering Doshisha University 1-3 Tatara Tsudani Kyotanabe-City Kyoto 610-0394 Japan
The fracture property of amorphous metal was studied by a large scale molecular dynamics (MD) simulation. The Finnis-Sinclair potential for α-iron was used as an inter-atomic potential. At first, we made a model amor... 详细信息
来源: 评论
Digital Image Scaling
Digital Image Scaling
收藏 引用
IEEE Instrumentation and Measurement technology Conference
作者: I. Andreadis A. Amanatiadis Laboratory of Electronics Section of Electronics and Information Systems Technology Department of Electrical and Computer Engineering Democritus University of Thrace Xanthi Greece
The proposed scaling algorithm outperforms other standard and widely used scaling techniques. The algorithm uses a mask of maximum four pixels and calculates the final luminosity of each pixel combining two factors; t... 详细信息
来源: 评论
Space-time-frequency turbo code over time-varying and frequency-selective fading channel
Space-time-frequency turbo code over time-varying and freque...
收藏 引用
作者: Ishii, Kouji Kohno, Ryuji Division of Electrical and Computer Engineering Faculty of Engineering Yokohama National University Yokohama-shi 240-8501 Japan Kagawa University Japan Departmant of Reliability-based Information Systems Engineering Kagawa University Japan IEEE Japan Division of Physics Electrical and Computer Engineering Yokohama National University Japan Japan Engineering Sciences Society IEICE IEICE Technical Committee on Spread Spectrum Technology ITS
In this paper, we propose and investigate space-time-frequency turbo coded OFDM transmissions through time-varying and frequency-selective fading channel. The proposed turbo code is a serial concatenated convolutional... 详细信息
来源: 评论
Risk in Trusted Decentralized Communications
Risk in Trusted Decentralized Communications
收藏 引用
International Conference on Data engineering Workshops
作者: O.K. Hussain E. Chang F.K. Hussain T.S. Dillon B. Soh School of Information Systems Curtin University of Technology WA Australia Faculty of Information Technology University of Technology Sydney NSW Australia Department of Computer Science and Computer Engineering La Trobe University VIC Australia
Risk is associated with almost every activity that is undertaken on a daily life. Risk associated with Trust, Security and Privacy. Risk is associated with transactions, businesses, information systems, environments, ... 详细信息
来源: 评论
A methodology for determining riskiness in peer-to-peer communications
A methodology for determining riskiness in peer-to-peer comm...
收藏 引用
IEEE International Conference on Industrial Informatics (INDIN)
作者: O.K. Hussain E. Chang F.K. Hussain T.S. Dillon B. Soh School of Information Systems Curtin University of Technology W.A. Australia Faculty of Information Technology University of Technology Sydney NSW Australia Dept of Computer Science and Computer Engineering La Trobe University VIC Australia
Every activity has some risk involved in it. Analyzing the risk involved in a transaction is important to decide whether to proceed with the transaction or not. Similarly in peer-to-peer communication analyzing the ri... 详细信息
来源: 评论
A method for fast rendering of caustics from refraction by transparent objects
A method for fast rendering of caustics from refraction by t...
收藏 引用
作者: Iwasaki, Kei Yoshimoto, Fujiichi Dobashi, Yoshinori Nishita, Tomoyuki Faculty of Systems Engineering Wakayama University Wakayama-shi 640-8510 Japan Graduate School of Information Science and Technology Hokkaido University Sapporo-shi 060-0814 Japan Graduate School of Frontier Science University of Tokyo Kashiwa-shi 277-8510 Japan Department of Computer and Communication Sciences Wakayama University Wakayama Japan
Caustics are patterns of light focused by reflective or refractive objects. Because of their visually fascinating patterns, several methods have been developed to render caustics. We propose a method for the quick ren... 详细信息
来源: 评论
A design and development of dialog pattern based bulletin board tool
A design and development of dialog pattern based bulletin bo...
收藏 引用
IADIS International Conference on Cognition and Exploratory Learning in Digital Age, CELDA 2005
作者: Takaoka, Ryo Kusano, Kohei Okamoto, Toshio Faculty of Education Yamaguchi University 1677-1 Yoshida Yamaguchi-City Yamaguchi 753-8513 Japan Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology 680-4 Kawazu Iizuka-City Fukuoka 820-8502 Japan Graduate School of Information Systems University of Electro-Communications 1-5-1 Chofugaoka Chofu-City Tokyo 182-8585 Japan
This study is to explore a method of learning support in e-Learning environment including some learning supporters. Especially we develop a learning support method of distance teaching assistants on the Web for proble... 详细信息
来源: 评论
CME: a temporal relational model for efficient coalescing
CME: a temporal relational model for efficient coalescing
收藏 引用
International Workshop on Temporal Representation and Reasoning (TIME)
作者: M. Al-Kateb E. Mansour M.E. El-Sharkawi Department of Computer Science College of Engineering and Mathematics University of Vermont VT USA Department of Computer Science School of Computing Dublin Institute of Technology Dublin Ireland Department of Information Systems Faculty of Computers and Information Cairo University Giza Egypt
Coalescing is a data restructuring operation applicable to temporal databases. It merges timestamps of adjacent or overlapping tuples that have identical attribute values. The likelihood that a temporal query employs ... 详细信息
来源: 评论
Energy-optimal online algorithms for broadcasting in wireless networks
Energy-optimal online algorithms for broadcasting in wireles...
收藏 引用
Annual Conference on Wireless On Demand Network systems and Services (WONS)
作者: S. Kutten H. Ono D. Peleg K. Sadakane M. Yamashita Faculty of Industrial Engineering and Management Information Systems Group Technion-Israel Institute of Technology Haifa Israel Department of Computer Science and Communication Engineering Kyushu University Fukuoka Japan Department of Computer Science and Applied Mathematics Weizmann Institute of Science Rehovot Israel
The paper considers the design of energy-efficient online protocols for the basic problem of message transmission to hosts positioned at unknown distances in ad-hoc wireless networks. The paper formulates a number of ... 详细信息
来源: 评论