咨询与建议

限定检索结果

文献类型

  • 1,452 篇 会议
  • 977 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,459 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,539 篇 工学
    • 1,177 篇 计算机科学与技术...
    • 958 篇 软件工程
    • 306 篇 信息与通信工程
    • 226 篇 控制科学与工程
    • 161 篇 电气工程
    • 153 篇 生物工程
    • 141 篇 机械工程
    • 110 篇 电子科学与技术(可...
    • 109 篇 生物医学工程(可授...
    • 100 篇 光学工程
    • 63 篇 交通运输工程
    • 60 篇 化学工程与技术
    • 59 篇 仪器科学与技术
    • 59 篇 安全科学与工程
    • 57 篇 动力工程及工程热...
  • 734 篇 理学
    • 385 篇 数学
    • 223 篇 物理学
    • 179 篇 生物学
    • 116 篇 统计学(可授理学、...
    • 98 篇 系统科学
    • 57 篇 化学
  • 525 篇 管理学
    • 330 篇 管理科学与工程(可...
    • 206 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 135 篇 医学
    • 112 篇 临床医学
    • 94 篇 基础医学(可授医学...
    • 57 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 74 篇 法学
    • 62 篇 社会学
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 51 篇 教育学
  • 29 篇 农学
  • 15 篇 文学
  • 9 篇 军事学
  • 8 篇 艺术学

主题

  • 75 篇 machine learning
  • 72 篇 deep learning
  • 60 篇 software enginee...
  • 58 篇 computer science
  • 53 篇 feature extracti...
  • 53 篇 accuracy
  • 49 篇 artificial intel...
  • 48 篇 training
  • 47 篇 computational mo...
  • 42 篇 data mining
  • 42 篇 software
  • 40 篇 information tech...
  • 40 篇 optimization
  • 39 篇 predictive model...
  • 31 篇 internet of thin...
  • 28 篇 support vector m...
  • 26 篇 educational inst...
  • 26 篇 semantics
  • 26 篇 security
  • 26 篇 convolutional ne...

机构

  • 41 篇 faculty of compu...
  • 37 篇 department of so...
  • 34 篇 college of compu...
  • 27 篇 department of so...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 18 篇 faculty of softw...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...
  • 14 篇 faculty of infor...

作者

  • 29 篇 quanyin zhu
  • 22 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 herawan tutut
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 muhammad waseem ...
  • 14 篇 zain ul abideen
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 muhammad adnan k...
  • 13 篇 siew hock ow
  • 12 篇 tutut herawan
  • 12 篇 belikov juri
  • 12 篇 levron yoash
  • 12 篇 ow siew hock
  • 11 篇 khan arif ali
  • 11 篇 li qi
  • 11 篇 pal umapada

语言

  • 2,211 篇 英文
  • 222 篇 其他
  • 26 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 日文
  • 1 篇 罗马尼亚文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software Engineering and Computer Technology"
2459 条 记 录,以下是2231-2240 订阅
Current problems of substitution techniques of audio steganography
Current problems of substitution techniques of audio stegano...
收藏 引用
2009 International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2009
作者: Zamani, Mazdak Manaf, Azizah Abdul Ahmad, Rabiah Faculty of Computer Science and Information System University of Technology Malaysia College of Science and Technology University of Technology Malaysia Centre for Advanced Software Engineering University of Technology Malaysia
A wide range of steganography techniques has been described in this literature. Our paper sets the main focus on the evaluation of transparency, robustness and capacity of the embedding function of Substitution Techni... 详细信息
来源: 评论
Incorporating software agents in automated personal software process (PSP) tools
Incorporating software agents in automated personal software...
收藏 引用
2009 9th International Symposium on Communications and Information technology, ISCIT 2009
作者: Hassan, Hazrina Nasir, Mohd Hairul Nizam Md. Fauzi, Shukor Sanim Mohd Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya 50603 Kuala Lumpur Malaysia Faculty of Information Technology and Quantitative Science University Technology Mara Perlis Malaysia
The PSP-Expert Visualization Agent (EVA) is designed for software engineers specifically to introduce the agent-oriented concept, as well as to automate all the processes and fields involved in PSP. Currently, some de... 详细信息
来源: 评论
Improving usability of HTA charts
Improving usability of HTA charts
收藏 引用
2nd International Conferences on Advances in computer-Human Interactions, ACHI 2009
作者: Yusof, Raja Jamilah Raja Hashim, Khairuddin Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia Software Engineering Department Tenaga Nasional University Kajang Malaysia
This paper proposes improving the usability of HTA (Hierarchical Task Analysis) chart through redefinition. The plans in the existing HTA chart (HTAe) are replaced with symbols giving a proposed representation of HTA ... 详细信息
来源: 评论
Reasoning intra-dependency in commitments for robust scheduling
Reasoning intra-dependency in commitments for robust schedul...
收藏 引用
8th International Joint Conference on Autonomous Agents and Multiagent Systems 2009, AAMAS 2009
作者: Wang, Mingzhong Ramamohanarao, Kotagiri Chen, Jinjun Dept. of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia Faculty of ICT Swinburne University of Technology VIC 3122 Australia
Commitment-modeled protocols enable flexible and robust interactions among agents. However, existing work has focused on features and capabilities of protocols without considering the active role of agents in them. Th... 详细信息
来源: 评论
A review on object-oriented metrics as a supporting method to extract object-oriented concepts from student's source code
A review on object-oriented metrics as a supporting method t...
收藏 引用
IASTED International Conference on Advances in computer Science and engineering, ACSE 2009
作者: Khamis, Norazlina Idris, Sufian Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya 50603 Kuala Lumpur Malaysia Department of Computer Science Universiti Kebangsaan Malaysia Bangi Selangor Malaysia
One of the debatable issues in programming courses for core computer Science (CS) and Information technology (IT) education is on how to improve the assessment so that it will reflect student's programming skills.... 详细信息
来源: 评论
Improve recognition-based segmentation for printed persian character recognition
Improve recognition-based segmentation for printed persian c...
收藏 引用
2009 International Conference on Image Processing, computer Vision, and Pattern Recognition, IPCV 2009
作者: Hatami, A. Majidi, M. Norouzi, Z. Mohamad, D. Center for Advanced Software Engineering UTM International Campus University Technology Malaysia Kuala Lumpur Malaysia Faculty of Computer Science and Information System University Technology Malaysia Johor Malaysia Department of Computer Science and Technology of Babol Babol Mazandaran Iran
The most scientific papers dealing with handwriting recognition systems make statements relating to recognition performance based on a forced-recognition rate. This rate describes the ratio between the number of the c... 详细信息
来源: 评论
Investigating Security Threats in Information Systems
Investigating Security Threats in Information Systems
收藏 引用
12th International-Business-Information-Management-Association Conference
作者: Samy, Ganthan Narayana Ahmad, Rabiah Ismail, Zuraini Department of Computer Systems and Communications Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia (UTM) Malaysia Centre for Advanced Software Engineering (CASE) Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia (UTM) Malaysia Department of Science College of Science and Technology Universiti Teknologi Malaysia (UTM) Malaysia
Information security surveys are important inputs to private, public and government sectors in order to measure current status of information security threats. This paper examines the various types of threats that exi... 详细信息
来源: 评论
Change management in business process modeling based on object oriented petri net
收藏 引用
World Academy of Science, engineering and technology 2009年 38卷 12-17页
作者: Rajabi, Bassam Atieh Lee, Sai Peck Software Engineering Department Faculty of Computer Science and Information Technology University of Malaya Malaysia
Business Process Modeling (BPM) is the first and most important step in business process management lifecycle. Graph based formalism and rule based formalism are the two most predominant formalisms on which process mo... 详细信息
来源: 评论
Event based simulator for parallel computing over the wide area network for real time visualization
Event based simulator for parallel computing over the wide a...
收藏 引用
1st International Visual Informatics Conference, IVIC 2009
作者: Sundararajan, Elankovan Harwood, Aaron Kotagiri, Ramamohanarao Satria Prabuwono, Anton Department of Industrial Computing Faculty of Information Sciences and Technology Universiti Kebangsaan Malaysia 43600 Bangi UKM Selangor Malaysia Department of Computer Science and Software Engineering Faculty of Engineering University of Melbourne 111 Barry Street Carlton VIC 3010 Australia
As the computational requirement of applications in computational science continues to grow tremendously, the use of computational resources distributed across the Wide Area Network (WAN) becomes advantageous. However... 详细信息
来源: 评论
Grid-aware approach to data statistics, data understanding and data preprocessing
收藏 引用
International Journal of High Performance Computing and Networking 2009年 第1期6卷 15-24页
作者: Wöhrer, Alexander Novakova, Lenka Brezany, Peter Tjoa, A. Min Institute for Scientific Computing Faculty of Computer Science University of Vienna Nordbergstrasse 15/C/3 1090 Vienna Austria Czech Technical University in Prague Faculty of Electrical Engineering Department of Cybernetics Technicka 2 166 27 Prague 6 Czech Republic Institute of Software Technology Vienna University of Technology Favoritenstr. 9 - 11/188 1040 Wien Austria
In recent years the focus of grid computing shifted towards more data intensive applications, increasingly needing access to various public and private databases. Relocating the code for Data Preprocessing (DPP) close... 详细信息
来源: 评论