咨询与建议

限定检索结果

文献类型

  • 2,190 篇 会议
  • 1,179 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 3,372 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,739 篇 工学
    • 1,178 篇 计算机科学与技术...
    • 978 篇 软件工程
    • 330 篇 信息与通信工程
    • 243 篇 电气工程
    • 225 篇 电子科学与技术(可...
    • 220 篇 生物工程
    • 184 篇 生物医学工程(可授...
    • 180 篇 控制科学与工程
    • 145 篇 光学工程
    • 143 篇 化学工程与技术
    • 122 篇 材料科学与工程(可...
    • 86 篇 仪器科学与技术
    • 85 篇 机械工程
    • 71 篇 动力工程及工程热...
    • 68 篇 土木工程
    • 67 篇 建筑学
  • 1,161 篇 理学
    • 467 篇 物理学
    • 403 篇 数学
    • 303 篇 生物学
    • 159 篇 化学
    • 155 篇 统计学(可授理学、...
    • 80 篇 系统科学
  • 521 篇 管理学
    • 314 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 221 篇 工商管理
  • 184 篇 医学
    • 150 篇 临床医学
    • 142 篇 基础医学(可授医学...
    • 69 篇 公共卫生与预防医...
  • 95 篇 法学
    • 85 篇 社会学
  • 74 篇 农学
  • 70 篇 经济学
    • 69 篇 应用经济学
  • 58 篇 教育学
  • 11 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 90 篇 computer science
  • 75 篇 training
  • 74 篇 machine learning
  • 73 篇 computational mo...
  • 69 篇 deep learning
  • 60 篇 accuracy
  • 50 篇 feature extracti...
  • 47 篇 predictive model...
  • 47 篇 data models
  • 46 篇 support vector m...
  • 44 篇 sentiment analys...
  • 41 篇 computer archite...
  • 40 篇 fuzzy logic
  • 39 篇 optimization
  • 37 篇 data mining
  • 36 篇 proposals
  • 35 篇 education
  • 35 篇 visualization
  • 34 篇 information tech...
  • 33 篇 internet of thin...

机构

  • 74 篇 computer science...
  • 69 篇 bioinformatics a...
  • 58 篇 computer science...
  • 55 篇 computer science...
  • 48 篇 bioinformatics a...
  • 48 篇 computer science...
  • 47 篇 computer science...
  • 33 篇 computer science...
  • 33 篇 bioinformatics a...
  • 32 篇 school of comput...
  • 31 篇 photonics initia...
  • 30 篇 photonics initia...
  • 30 篇 department of el...
  • 30 篇 computer science...
  • 30 篇 computer science...
  • 29 篇 computer science...
  • 28 篇 computer science...
  • 27 篇 department of ph...
  • 27 篇 school of inform...
  • 26 篇 applied physics ...

作者

  • 127 篇 bens pardamean
  • 108 篇 pardamean bens
  • 92 篇 gaol ford lumban
  • 66 篇 warnars harco le...
  • 62 篇 heryadi yaya
  • 59 篇 suharjito
  • 58 篇 meyliana
  • 55 篇 yaya heryadi
  • 53 篇 ford lumban gaol
  • 51 篇 harco leslie hen...
  • 48 篇 lukas
  • 41 篇 girsang abba sug...
  • 40 篇 prabowo harjanto
  • 40 篇 andrea alù
  • 38 篇 alù andrea
  • 36 篇 benfano soewito
  • 34 篇 abba suganda gir...
  • 33 篇 utama ditdit nug...
  • 32 篇 yulyani arifin
  • 31 篇 soewito benfano

语言

  • 3,285 篇 英文
  • 62 篇 其他
  • 14 篇 中文
  • 7 篇 日文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
检索条件"机构=Graduate Program in Science Computer"
3372 条 记 录,以下是3071-3080 订阅
排序:
Handling Failures of Static Sensor Nodes in Wireless Sensor Network by Use of Mobile Sensors
Handling Failures of Static Sensor Nodes in Wireless Sensor ...
收藏 引用
International Conference on Advanced Information Networking and Applications Workshops (AINAW)
作者: Edison Pignaton de Freitas Tales Heimfarth Ivayr Farah Netto Carlos Eduardo Pereira Armando Morado Ferreira Flavio Rech Wagner Tony Larsson IDE Halmstad University Halmstad Sweden Institute of Informatics Federal University of Rio Grande do Sul Porto Alegre Brazil Computer Science Department Federal University of Lavras Lavras Brazil Electrical Engineering Department Federal University of Rio Grande do Sul Porto Alegre Brazil Defense Engineering Graduate Program Military Institute of Engineering Rio de Janeiro Brazil
Node failures in Wireless Sensor Networks composed by static sensor nodes are common due to the nature of the sensor devices and the usually harsh environments in which they are deployed. Node failures can diminish th... 详细信息
来源: 评论
A method for identification and representation of business process deviations
A method for identification and representation of business p...
收藏 引用
16th International Conference on Collaboration and Technology, CRIWG 2010
作者: Migon, Lilian Bitton Borges, Marcos R.S. Campos, Maria Luiza MacHado Graduate Program in Informatics Computer Science Department Federal University of Rio de Janeiro Rio de Janeiro Brazil
Nowadays, process management represents a fundamental initiative to provide competitive advantages to organizations. The ability to build and operate such processes can provide competitive advantages to these organiza... 详细信息
来源: 评论
A fuzzy inference system to determine the number of clones in the clonal selection algorithm
A fuzzy inference system to determine the number of clones i...
收藏 引用
2010 2nd World Congress on Nature and Biologically Inspired Computing, NaBIC 2010
作者: Carraro, Luiz Antonio De Castro, Leandro Nunes De Ré, Angelita Maria Computer and Informatics Faculty Graduate Program in Electrical Engineering Mackenzie University São Paulo Brazil Computer Science Department State University of West-Center Parana Guarapuava Brazil
Artificial Immune Systems (AISs) are composed of techniques inspired by immunology. The clonal selection principle ensures the organism adaptation to fight invading antigens by an immune response activated by the bind... 详细信息
来源: 评论
Learning negotiation policies using IB3 and bayesian networks
Learning negotiation policies using IB3 and bayesian network...
收藏 引用
11th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2010
作者: Nalepa, Gislaine M. Ávila, Bráulio C. Enembreck, Fabrício Scalabrin, Edson E. Graduate Program on Applied Computer Science PUCPR Pontifical Catholic University of Paraná R. Imaculada Conceição Curitiba PR 1155 Brazil
This paper presents an intelligent offer policy in a negotiation environment, in which each agent involved learns the preferences of its opponent in order to improve its own performance. Each agent must also be able t... 详细信息
来源: 评论
3-3 Multimedia information hiding
收藏 引用
Journal of the National Institute of Information and Communications Technology 2011年 第1-2期58卷 183-194页
作者: Takizawa, Osamu Sonoda, Kotaro Yoshioka, Katsunari Suzuki, Jouji Disaster Management and Mitigation Group Japan Security Fundamentals Group Information Security Research Center Japan Computer and Information Science Program Faculty of Engineering Nagasaki University Japan Disaster Management and Mitigation Group Information Security Research Center Japan Interdisciplinary Research Center Yokohama National University Japan Network Security Incident Response Group Information Security Research Center Japan Technology Transfer Promotion Office Outcome Promotion Department Japan Graduate School Research Institute of Environment and Information Sciences Yokohama National University Japan
We research the multimedia information hiding (MIH) which is a technology to overlay digital information on multimedia contents such as picture, sound, document, etc. As application to disaster management of MIH, we h... 详细信息
来源: 评论
Detecting drifts in multi-issue negotiations
Detecting drifts in multi-issue negotiations
收藏 引用
12th Ibero-American Conference on Advances in Artificial Intelligence, AI 2010
作者: Nalepa, Gislaine M. Ávila, Bráulio C. Enembreck, Fabrício Scalabrin, Edson E. PUCPR Pontifical Catholic University of Paraná PPGIA Graduate Program on Applied Computer Science R. Imaculada Conceição 1155 Curitiba PR Brazil
In an automated negotiation process, it is usual for one party not to reveal their preferences to its opponent. In an attempt to adjust itself to this process, each trade agent can be endowed with capabilities of lear... 详细信息
来源: 评论
High embedding reversible data hiding scheme for JPEG
High embedding reversible data hiding scheme for JPEG
收藏 引用
6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010
作者: Kuo, Wen-Chung Kuo, Shao-Hung Wuu, Lih-Chyau Depart. of Computer Science and Information Engineering National Formusa University Yunlin 632 Taiwan Graduate School of Engineering Science Technology Doctoral Program National YunLin University of Science and Technology Yunlin 640 Taiwan
Both Data hiding and data compression are very important technologies in the field of image processing. It seems that there is no relationship between data hiding and data compression because most of the data hiding m... 详细信息
来源: 评论
Collective Intelligence for the design of emergency response
Collective Intelligence for the design of emergency response
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Vivacqua, Adriana S. Borges, Marcos R.S. PPGI/DCC-IM - Graduate Program in Informatics Department of Computer Science Institute of Mathematics UFRJ - Federal University of Rio de Janeiro Rio de Janeiro Brazil PPGI/DCC-IM - Graduate Program in Informatics Department of Computer Science Institute of Mathematics NCE - Electronic Computing Institute UFRJ - Federal University of Rio de Janeiro Rio de Janeiro Brazil
Collective Intelligence has received much attention in recent years, as organizations and businesses discover the power of crowds. With new technologies, such as blogs, twitter, wikis, photo sharing, collaborative tag... 详细信息
来源: 评论
Magnetic resonance imaging of irreversible electroporation in tubers
Magnetic resonance imaging of irreversible electroporation i...
收藏 引用
12th Mediterranean Conference on Medical and Biological Engineering and Computing, MEDICON 2010
作者: Hjouj, Mohammad Rubinsky, Boris Center for Bioengineering School of Computer Science Engineering Hebrew University of Jerusalem Israel Department of Mechanical Engineering Graduate Program in Biophysics University of California Berkeley United States
Purpose: A preliminary study on the magnetic resonance (MRI) characteristics of (vegetable) tissue NTIRE is an emerging minimally invasive surgery technique for tissue ablation in which, microsecond, high electrical f... 详细信息
来源: 评论
SP2MS: A MANet-based P2P service
SP2MS: A MANet-based P2P service
收藏 引用
24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010
作者: Vithoft, Marcelo H. Santin, Altair O. Freitas, Cinthia O. Ribeiro, Heverson B. Pontifical Catholic University of Paraná Graduate Program in Computer Science R. Imaculada Conceição 1155 Prado Velho 80215-901-Curitiba-PR Brazil
Applications using P2P as an Overlay network in MANet (P2M) are very unstable in terms of MANet interconnections and P2P churn. MANet-based P2P applications usually create a considerable overhead on the P2P consumer d... 详细信息
来源: 评论