咨询与建议

限定检索结果

文献类型

  • 2,726 篇 会议
  • 2,035 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 4,799 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,835 篇 工学
    • 1,860 篇 计算机科学与技术...
    • 1,548 篇 软件工程
    • 519 篇 信息与通信工程
    • 388 篇 控制科学与工程
    • 279 篇 电子科学与技术(可...
    • 273 篇 电气工程
    • 272 篇 生物工程
    • 242 篇 生物医学工程(可授...
    • 212 篇 机械工程
    • 195 篇 核科学与技术
    • 168 篇 光学工程
    • 146 篇 仪器科学与技术
    • 120 篇 化学工程与技术
  • 1,886 篇 理学
    • 874 篇 物理学
    • 698 篇 数学
    • 359 篇 生物学
    • 244 篇 统计学(可授理学、...
    • 149 篇 系统科学
    • 133 篇 化学
    • 112 篇 天文学
  • 773 篇 管理学
    • 477 篇 管理科学与工程(可...
    • 339 篇 图书情报与档案管...
    • 273 篇 工商管理
  • 285 篇 医学
    • 238 篇 临床医学
    • 193 篇 基础医学(可授医学...
    • 101 篇 药学(可授医学、理...
    • 93 篇 公共卫生与预防医...
  • 148 篇 法学
    • 130 篇 社会学
  • 116 篇 教育学
    • 109 篇 教育学
  • 92 篇 经济学
    • 91 篇 应用经济学
  • 87 篇 农学
  • 17 篇 文学
  • 17 篇 军事学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 96 篇 deep learning
  • 84 篇 computer science
  • 84 篇 machine learning
  • 71 篇 computational mo...
  • 71 篇 accuracy
  • 68 篇 artificial intel...
  • 63 篇 students
  • 63 篇 training
  • 62 篇 feature extracti...
  • 51 篇 data mining
  • 50 篇 data models
  • 43 篇 visualization
  • 42 篇 sentiment analys...
  • 39 篇 education
  • 39 篇 decision making
  • 38 篇 internet of thin...
  • 38 篇 semantics
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 software

机构

  • 297 篇 faculty of scien...
  • 297 篇 department for p...
  • 289 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 276 篇 department of ph...
  • 275 篇 department of ph...
  • 275 篇 kirchhoff-instit...
  • 271 篇 institute of phy...
  • 264 篇 institute of phy...
  • 255 篇 faculté des scie...
  • 250 篇 fakultät für phy...
  • 233 篇 institut für ast...
  • 231 篇 department of ph...
  • 231 篇 instituto de fís...
  • 230 篇 department of ph...
  • 225 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 220 篇 physics division...
  • 216 篇 department of ph...

作者

  • 272 篇 c. alexa
  • 272 篇 g. bella
  • 272 篇 j. strandberg
  • 272 篇 d. calvet
  • 272 篇 c. amelung
  • 271 篇 j. m. izen
  • 271 篇 g. spigo
  • 271 篇 f. siegert
  • 267 篇 m. klein
  • 267 篇 r. ströhmer
  • 265 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 264 篇 s. mohapatra
  • 263 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 258 篇 s. guindon
  • 257 篇 a. kaczmarska
  • 255 篇 y. nagasaka
  • 253 篇 h. sakamoto

语言

  • 4,288 篇 英文
  • 447 篇 其他
  • 36 篇 日文
  • 33 篇 中文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 俄文
检索条件"机构=Graduate Program of Computer Science Faculty of Computer Science and Information Technology"
4799 条 记 录,以下是4451-4460 订阅
排序:
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
science China(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of computer science and technology,Beijing University of technology,Beijing 100124,China 2 State Key Laboratory of Integrated Services Network,Xidian University,Xi’an 710071,China 3 State Key Laboratory of information Security (graduate University of Chinese Academy of sciences),Beijing 100049,China 4 State Key Laboratory of Networking and Switching technology,Beijing University of Posts and Tele-communications,Beijing 100876,China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 评论
Quantum threshold group signature
收藏 引用
science China(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of computer science and technology, Beijing University of technology, Beijing 100124, China 2 State Key Laboratory of Integrated Services Network, Xidian University, Xi’an 710071, China 3 State Key Laboratory of information Security (graduate University of Chinese Academy of sciences), Beijing 100049, China 4 State Key Laboratory of Networking and Switching technology, Beijing University of Posts and Tele-communications, Beijing 100876, China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 评论
Analysis of the co-doping effect of manganese and lanthanide elements in SrGa2S4by the relativistic DV-Xα calculation
收藏 引用
physica status solidi c 2009年 第5期6卷
作者: Shigetaka Nomura Takeo Takizawa Munenori Kai Shizutoshi Ando Department of Electrical Engineering Faculty of Engineering Tokyo University of Science 1-14-6 Kudankita Chiyoda-ku Tokyo 102-0073 Japan Department of Physics College of Humanities & Sciences Nihon University 3-25-40 Sakurajosui Setagaya-ku Tokyo 156-8550 Japan Department of Computer & Information Science Faculty of Science & Technology Seikei University 3-3-1 Kichijoji-kitamachi Musashino-shi Tokyo 180-8633 Japan
The electronic states of manganese and lanthanide elements in SrGa 2 S 4 are calculated by the relativistic discrete variational Xα method using a FORTRAN program of DVSCATR in order to investigate the mechanism allo... 详细信息
来源: 评论
A randomness based analysis on the data size needed for removing deceptive patterns
A randomness based analysis on the data size needed for remo...
收藏 引用
作者: Haraguchi, Kazuya Yagiura, Mutsunori Boros, Endre Ibaraki, Toshihide Department of Information Technology and Electronics Faculty of Science and Engineering Ishinomaki Senshu University Ishinomaki-shi 986-8580 Japan Department of Computer Science and Mathematical Informatics Graduate School of Information Science Nagoya University Nagoya-shi 464-8603 Japan Rutgers Center for Operations Research Rutgers University NJ 08854-8003 United States Department of Informatics School of Science and Technology Kwansei Gakuin University Sanda-shi 669-1337 Japan
We consider a data set in which each example is an n-dimensional Boolean vector labeled as true or false. A pattern is a co-occurrence of a particular value combination of a given subset of the variables. If a pattern... 详细信息
来源: 评论
Fuzzy Fusion for Affective State Assessment in Distance Learning Based on Image Detection
Fuzzy Fusion for Affective State Assessment in Distance Lear...
收藏 引用
2008 International Conference on Audio,Language and Image Processing(2008国际声音、语言、图像过程大会)
作者: Kuoan Hwang Chiahao Yang Department of Computer Science and Information Engineering & Graduate Institute of Networking and Co Graduate Institute of Informatics Doctoral program Chaoyang University of Technology
Distance learning is a learning style that can overcome the limitation of time and space. Because of the distance, teachers can not handle the student's learning situation, and they do not know whether the student... 详细信息
来源: 评论
A Restoration Method for Images Including Lost Pixels based on A Similarity between A Local Region and A Neighbor Region of A Lost Pixel
A Restoration Method for Images Including Lost Pixels based ...
收藏 引用
International Symposium on Communications and information Technologies (ISCIT)
作者: Hiroki Imamura Makoto Fujimura Hideo Kuroda Faculty of Computer and Information Science Department of Engineering Nagasaki University Nagasaki Japan Faculty of Graduate School of Science and Technology Nagasaki University Nagasaki Japan
In the field of image restoration of unnecessary regions, a method based on optical flow has been proposed. This method can accurately restore unnecessary regions in case of changing of edge direction or of plural edg... 详细信息
来源: 评论
Syntactically controlled generation of the test programs for microprocessor verification
Syntactically controlled generation of the test programs for...
收藏 引用
2nd International Symposium on Test Automation and Instrumentation, ISTAI 2008
作者: Ghennady, Bodean Diana, Bodean Serghei, Borshevich Designing and Manufacture Electronic Apparatuses Dep.Radio-electronics and Telecommunication Faculty Technical University Kishinau Moldova Computer Science and Technology School of Information Renmin University Beijing China
This paper presents an approach to synthesis of stylistically and syntactically controlled generator of the microprocessor test programs. The dependence of test length of the confidence level and the probabilities rep... 详细信息
来源: 评论
Achieving compelling student comprehension of complex information structures for both on-site and on-line courses
Achieving compelling student comprehension of complex inform...
收藏 引用
2008 ASEE Annual Conference and Exposition
作者: Uhlig, Ronald Farahani, Alireza Viswanathan, Shekar Evans, Howard Sotelo, Mark National University Department of Computer Science and Information Systems School of Engineering and Technology National University Wireless Communications for the Master ot Science in Wireless Communications Program International Telecommunications Academy School of Engineering and Technology Department of Applied Engineering Lead Faculty for Engineering Management and Homeland Security and Safety Engineering Academic Computing for National University
Teaching engineering and technology subjects involves conveying understanding of abstract information structures and processes such as complex telecommunications protocols, complex mathematical concepts, and data stru... 详细信息
来源: 评论
Detecting Feature Interactions in Home Appliance Networks
Detecting Feature Interactions in Home Appliance Networks
收藏 引用
ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Pattara Leelaprute Takafumi Matsuo Tatsuhiro Tsuchiya Tohru Kikuno Department of Computer Engineering Faculty of Engineering Kasetsart University Thailand Graduate School of Information Science and Technology Osaka University Japan
Home appliance networks now have the capability of integrating different features of independent appliances to provide value-added services. Concurrent execution of these services, however, can cause unexpected proble... 详细信息
来源: 评论
Digital data security and hiding on virtual reality VDO 3DGIS-Map
Digital data security and hiding on virtual reality VDO 3DGI...
收藏 引用
IEEE International Conference on Management of Innovation and technology, ICMIT
作者: Katanyoo Klubsuwan Surasak Mungsing PHD-Information Technology Sripatum University Bangkok Thailand Computer Science Program Faculty of Informatics Sripatum University Bangkok Thailand
Todaypsilas information technology supports varieties of e-commerce, in particular on-demand services such as news, message, seminar and presentation speech to message, and 3D Video GIS. Each service can have value-ad... 详细信息
来源: 评论