咨询与建议

限定检索结果

文献类型

  • 674 篇 会议
  • 514 篇 期刊文献

馆藏范围

  • 1,188 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 563 篇 工学
    • 335 篇 计算机科学与技术...
    • 273 篇 软件工程
    • 74 篇 信息与通信工程
    • 74 篇 生物医学工程(可授...
    • 65 篇 仪器科学与技术
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 55 篇 光学工程
    • 49 篇 电子科学与技术(可...
    • 48 篇 电气工程
    • 35 篇 航空宇航科学与技...
    • 34 篇 冶金工程
    • 32 篇 机械工程
    • 32 篇 化学工程与技术
  • 460 篇 理学
    • 193 篇 物理学
    • 127 篇 生物学
    • 120 篇 数学
    • 98 篇 地球物理学
    • 59 篇 统计学(可授理学、...
    • 38 篇 化学
    • 30 篇 系统科学
  • 170 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 152 篇 医学
    • 98 篇 临床医学
    • 90 篇 基础医学(可授医学...
    • 47 篇 公共卫生与预防医...
    • 37 篇 药学(可授医学、理...
  • 41 篇 农学
  • 32 篇 法学
    • 29 篇 社会学
  • 27 篇 教育学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 6 篇 艺术学
  • 3 篇 军事学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 26 篇 gamma rays
  • 25 篇 training
  • 23 篇 informatics
  • 23 篇 collaboration
  • 19 篇 machine learning
  • 18 篇 data mining
  • 17 篇 proposals
  • 17 篇 computational mo...
  • 17 篇 visualization
  • 17 篇 context
  • 17 篇 software
  • 16 篇 genetic algorith...
  • 15 篇 decision making
  • 15 篇 telescopes
  • 14 篇 deep learning
  • 14 篇 education
  • 14 篇 feature extracti...
  • 14 篇 accuracy
  • 13 篇 students
  • 12 篇 support vector m...

机构

  • 72 篇 instituto de ast...
  • 70 篇 zagreb 10000 cro...
  • 68 篇 centro de invest...
  • 68 篇 universitat de b...
  • 68 篇 university of lo...
  • 66 篇 dipartimento di ...
  • 66 篇 rome
  • 66 篇 iparcos institut...
  • 66 篇 eth zürich züric...
  • 65 篇 infn magic group...
  • 65 篇 università di si...
  • 65 篇 universität würz...
  • 64 篇 technische unive...
  • 61 篇 infn magic group...
  • 61 篇 università di pi...
  • 60 篇 urca rj rio de j...
  • 58 篇 japanese magic g...
  • 58 篇 università di ud...
  • 58 篇 inst. for nucl. ...
  • 57 篇 max-planck-insti...

作者

  • 114 篇 di pierro f.
  • 114 篇 dorner d.
  • 112 篇 asano k.
  • 111 篇 berti a.
  • 111 篇 barrio j.a.
  • 110 篇 green d.
  • 101 篇 kerszberg d.
  • 98 篇 ishio k.
  • 98 篇 lamastra a.
  • 96 篇 kushida j.
  • 88 篇 donini a.
  • 87 篇 lópez-oramas a.
  • 86 篇 mazin d.
  • 86 篇 ceribella g.
  • 84 篇 manganaro m.
  • 82 篇 lópez-coto r.
  • 80 篇 martínez m.
  • 78 篇 mannheim k.
  • 77 篇 agudo i.
  • 75 篇 acciari v.a.

语言

  • 1,136 篇 英文
  • 40 篇 其他
  • 9 篇 中文
  • 2 篇 日文
检索条件"机构=Graduate Program in Informatics"
1188 条 记 录,以下是991-1000 订阅
排序:
ASIS&T annual meeting pre-conference activities: Information behavior on the move: 2013 ASIS&T SIG/USE research symposium
收藏 引用
Bulletin of the Association for Information Science and Technology 2014年 第3期40卷
作者: Denise E. Agosto Lorri Mon Rong Tang Associate Professor College of Computing & Informatics Drexel University and editor of the Journal of Research on Libraries & Young Adults Associate Professor and Chair The MS-IT program in the Florida State University College of Communication and Information Associate Professor and Director Simmons Usability Lab in the Graduate School of Library and Information Science Simmons College
EDITOR'S SUMMARY The 13th Annual SIG/USE Research Symposium focused on ways mobile technologies have influenced information needs, seeking and use. In her keynote address, Caroline Haythornthwaite framed movement ...
来源: 评论
A fast EMD-based technique for Power Quality signals decomposition, compression, and time-frequency analysis
A fast EMD-based technique for Power Quality signals decompo...
收藏 引用
International Conference on Digital Signal Processing (DSP)
作者: Leonardo Bandeira Soares Sergio Bampi Cesar David Paredes Crovato Informatics Institute-Microelectronics Graduate Program (PGMicro) Federal University of Rio Grande do Sul Porto Alegre Brazil ICET/PPGE Feevale Univ. São Leopoldo Brazil
In this paper an EMD-based (Empirical Mode Decomposition) technique is proposed in order to improve the data compression and reconstructed signal accuracy trade-off for PQ (Power Quality) signals. We demonstrate that ... 详细信息
来源: 评论
Transforming creative requirements into conceptual models
Transforming creative requirements into conceptual models
收藏 引用
International Conference on Research Challenges in Information Science, RCIS
作者: Fernando Wanderley Denis Silva da Silveira João Araújo Ana Moreira Department of Informatics-CITI-Faculdade de Ciências Universidade Nova de Lisboa Lisboa Portugal Post-Graduate Program in Administration-PROPAD Universidade Federal de Pernambuco Pernambuco Brazil
Requirements Engineering involves different stakeholders and their different views of a system. Among these stakeholders, software designers are responsible for modeling the information gathered by domain experts. The... 详细信息
来源: 评论
A lightweight method for wireless sensor network intrusion detections
收藏 引用
ICIC Express Letters 2013年 第6期7卷 1793-1798页
作者: Chen, Rung-Ching Hsieh, Chia-Fen Huang, Yung-Fa Department of Information Management College of Informatics Chaoyang University of Technology No. 168 Jifeng E. Rd Wufeng District Taichung 41349 Taiwan Graduate Institute of Informatics Doctoral Program College of Informatics Chaoyang University of Technology No. 168 Jifeng E. Rd Wufeng District Taichung 41349 Taiwan Department of Information and Communication Engineering College of Informatics Chaoyang University of Technology No. 168 Jifeng E. Rd Wufeng District Taichung 41349 Taiwan
Wireless sensor networks can be applied to health care and disaster response, etc. The importance and accuracy of the information requirements of wireless sensors are more stringent. It corresponding to the use of inf... 详细信息
来源: 评论
Nuclear cardiology image enhancement using wavelet transform analysis
收藏 引用
Physica Medica 2014年 30卷 e30-e30页
作者: A. Poulakis S. Angelakis G. Fountos G.S. Panagiotakis I. Asteriadis I. Valais Department of Biomedical Engineering Technological Educational Institute of Athens 12210 Athens Greece Biomedical Informatics and Technology Graduate Program School of Computer Science University of Crete Department of Medical Physics Medical School University of Patras 265 00 Patras Greece Department of Nuclear Medicine General Hospital of Kavala 65 500 Kavala Greece
来源: 评论
Performance analysis of VoIP client with integrated encryption module
Performance analysis of VoIP client with integrated encrypti...
收藏 引用
International Conference on Communications, Signal Processing, and their Applications (ICCSPA)
作者: Abdi Wahab Rizal Broer Bahaweres Mudrik Alaydrus Muhaemin Riyanarto Sarno Graduate Program of Electrical Engineering Department Mercu Buana University Jakarta Indonesia Department of Information Systems STMIK Indonesia Jakarta Indonesia Department of Informatics Engineering Faculty of Information Tech ITS Surabaya Indonesia
The number of VoIP users in Indonesia is very low, although the cost offered by VoIP is smaller than using pulsed phone. One of the reason is security provided by the VoIP service provider is still lacking. VoIP users... 详细信息
来源: 评论
Study of decision variables for enterprises information security investment
收藏 引用
Journal of Quality 2013年 第4期20卷 379-401页
作者: Chanu, Chien-lung Tseng, Shu-Fen Lu, Chih-hung Department of Information Management Yuan Ze University Taiwan Graduate Program of Social Informatics Yuan Ze University Taiwan
The increased in information security issues have caused great amount losses to enterprises and have damaged the reputation of those enterprises. In coping with a variety of information security issues, enterprises ar... 详细信息
来源: 评论
A Data Management in a Private Cloud Storage Environment Utilizing High Performance Distributed File Systems
A Data Management in a Private Cloud Storage Environment Uti...
收藏 引用
IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
作者: Tiago S. Soares M. A. R. Dantas Douglas D. J. de Macedo Michael A. Bauer Informatics and Statistic Department (INE) Federal University of Santa Catarina (UFSC) Post-Graduate Program of Knowledge Engineering and Management Federal University of Santa Catarina (UFSC) Computer Science Department (CSD) University of Western Ontario (UWO)
The new trend in the process of data-intensive management indicates the importance of a distributed file system for both Internet large scale services and cloud computing environments. I/O latency and application buff... 详细信息
来源: 评论
A Security Model for Distributed Collaborative Environments in the Healthcare
A Security Model for Distributed Collaborative Environments ...
收藏 引用
International Conference on Computational Science and its Applications (ICCSA)
作者: Rafael Viana Lopes Araújo Francisco J.S. e Silva Graduate Program in Electrical Engineering Federal University of Maranhão (UFMA) São Luís MA Brazil Department of Informatics of the Federal University of Maranhão (UFMA) São Luís MA Brazil
Distributed Collaborative Environments provide a common user interface that enables collaborative tasks of geographically dispersed users in a specific context. In such environments, many features can be provided, suc... 详细信息
来源: 评论
Securing elliptic curve based El-Gamal against Pollard Rho attack using elliptic curve based Diffie-Hellman key exchange
Securing elliptic curve based El-Gamal against Pollard Rho a...
收藏 引用
7th International Conference for Internet Technology and Secured Transactions, ICITST 2012
作者: Zani, Tafta Barmawi, Ari Moesriami Abdurohman, Maman Informatics Study Program Graduate School of Telkom Institute of Technology Bandung Indonesia
Elliptic Curve based El-Gamal (ECEG) cryptosystem is one of many widely used public key cryptosystems that makes use the elliptic curve discrete logarithm problem (ECDLP). For breaking ECDLP, Pollard Rho is currently ... 详细信息
来源: 评论