咨询与建议

限定检索结果

文献类型

  • 2,726 篇 会议
  • 2,035 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 4,799 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,835 篇 工学
    • 1,860 篇 计算机科学与技术...
    • 1,548 篇 软件工程
    • 519 篇 信息与通信工程
    • 388 篇 控制科学与工程
    • 279 篇 电子科学与技术(可...
    • 273 篇 电气工程
    • 272 篇 生物工程
    • 242 篇 生物医学工程(可授...
    • 212 篇 机械工程
    • 195 篇 核科学与技术
    • 168 篇 光学工程
    • 146 篇 仪器科学与技术
    • 120 篇 化学工程与技术
  • 1,886 篇 理学
    • 874 篇 物理学
    • 698 篇 数学
    • 359 篇 生物学
    • 244 篇 统计学(可授理学、...
    • 149 篇 系统科学
    • 133 篇 化学
    • 112 篇 天文学
  • 773 篇 管理学
    • 477 篇 管理科学与工程(可...
    • 339 篇 图书情报与档案管...
    • 273 篇 工商管理
  • 285 篇 医学
    • 238 篇 临床医学
    • 193 篇 基础医学(可授医学...
    • 101 篇 药学(可授医学、理...
    • 93 篇 公共卫生与预防医...
  • 148 篇 法学
    • 130 篇 社会学
  • 116 篇 教育学
    • 109 篇 教育学
  • 92 篇 经济学
    • 91 篇 应用经济学
  • 87 篇 农学
  • 17 篇 文学
  • 17 篇 军事学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 96 篇 deep learning
  • 84 篇 computer science
  • 84 篇 machine learning
  • 71 篇 computational mo...
  • 71 篇 accuracy
  • 68 篇 artificial intel...
  • 63 篇 students
  • 63 篇 training
  • 62 篇 feature extracti...
  • 51 篇 data mining
  • 50 篇 data models
  • 43 篇 visualization
  • 42 篇 sentiment analys...
  • 39 篇 education
  • 39 篇 decision making
  • 38 篇 internet of thin...
  • 38 篇 semantics
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 software

机构

  • 297 篇 faculty of scien...
  • 297 篇 department for p...
  • 289 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 276 篇 department of ph...
  • 275 篇 department of ph...
  • 275 篇 kirchhoff-instit...
  • 271 篇 institute of phy...
  • 264 篇 institute of phy...
  • 255 篇 faculté des scie...
  • 250 篇 fakultät für phy...
  • 233 篇 institut für ast...
  • 231 篇 department of ph...
  • 231 篇 instituto de fís...
  • 230 篇 department of ph...
  • 225 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 220 篇 physics division...
  • 216 篇 department of ph...

作者

  • 272 篇 c. alexa
  • 272 篇 g. bella
  • 272 篇 j. strandberg
  • 272 篇 d. calvet
  • 272 篇 c. amelung
  • 271 篇 j. m. izen
  • 271 篇 g. spigo
  • 271 篇 f. siegert
  • 267 篇 m. klein
  • 267 篇 r. ströhmer
  • 265 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 264 篇 s. mohapatra
  • 263 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 258 篇 s. guindon
  • 257 篇 a. kaczmarska
  • 255 篇 y. nagasaka
  • 253 篇 h. sakamoto

语言

  • 4,288 篇 英文
  • 447 篇 其他
  • 36 篇 日文
  • 33 篇 中文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 俄文
检索条件"机构=Graduate Program of Computer Science Faculty of Computer Science and Information Technology"
4799 条 记 录,以下是4461-4470 订阅
排序:
Object-oriented codes representation of program understanding system
Object-oriented codes representation of program understandin...
收藏 引用
International Symposium on information technology, ITSim
作者: Nor Fazlida Mohd Sani Abdullah Mohd. Zin Sufian Idris Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang Selangor Darul Ehsan Malaysia Faculty of Computer Science and Information Technology Universiti Kebangsaan슠Malaysia Bangi Selangor Darul Ehsan Malaysia
The purpose of this paper is to present and describe the representation of an object-oriented programming code in the program understanding system. The program’s representation that has been used and will be discusse... 详细信息
来源: 评论
Attentiveness Assessment in Learning Based on Fuzzy Logic Analysis
Attentiveness Assessment in Learning Based on Fuzzy Logic An...
收藏 引用
International Conference on Intelligent Systems Design and Applications (ISDA)
作者: Kuo-An Hwang Chia-Hao Yang Department of Computer Science and Information Engineering & Graduate Institute of Networking and CommunicationEngineering ChaoYang University of Technology Taiwan Graduate Institute of Informatics Doctoral program ChaoYang University of Technology Taiwan
Learner attention affects learning efficiency. However, in many classes, teachers cannot assess the degree of attention of every student. When a teacher is capable of addressing inattentive students immediately, he ca... 详细信息
来源: 评论
Insensitivity of constraint-based causal discovery algorithms to violations of the assumption of multivariate normality
Insensitivity of constraint-based causal discovery algorithm...
收藏 引用
21th International Florida Artificial Intelligence Research Society Conference, FLAIRS-21
作者: Voortman, Mark Druzdzel, Marek J. Decision Systems Laboratory School of Information Sciences and Intelligent Systems Program University of Pittsburgh Pittsburgh PA 15260 United States Faculty of Computer Science Bialystok Technical University Wiejska 45A 15-351 Bialystok Poland
Constraint-based causal discovery algorithms, such as the PC algorithm, rely on conditional independence tests and are otherwise independent of the actual distribution of the data. In case of continuous variables, the... 详细信息
来源: 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
science China(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2 1 College of computer science and technology,Beijing University of technology,Beijing 100124,China 2 State Key Laboratory of Networking and Switching technology,Beijing University of Posts and Tele-communications,Beijing 100876,China 3 State Key Laboratory of Integrated Services Network,Xidian University,Xi’an 710071,China 4 State Key Laboratory of information Security(graduate University of Chinese Academy of sciences) ,Beijing 100049,China 1. College of Computer Science and Technology Beijing University of Technology Beijing 100124 China 3. State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China 4. State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China 2. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 评论
Harnessing University-Industry Collaboration in Malaysia through Industrial Training
Harnessing University-Industry Collaboration in Malaysia thr...
收藏 引用
International Conference on information and Communication Technologies: From Theory to Applications, ICTTA
作者: Syahrul N. Junaini Sy F. Seyed Fadzir Jonathan Sidi Mohd J. Ahmad Khiri Rosita Mohamed Othman Faculty of Computer Science and Information Technology Universiti Malaysia Sarawak Kota Samarahan Sarawak Malaysia
As Malaysia is rapidly growing in terms of the advancement of science and technology, unprecedented demand for better graduates has been created. However, industry often criticizes that existing university curricula f... 详细信息
来源: 评论
Dynamic programming based ray-space interpolation for free-viewpoint video system
收藏 引用
High technology Letters 2008年 第1期14卷 72-76页
作者: 范良忠 Jiang Gangyi Chen Ken Yu Mei Jiang Zhidi Faculty of hffonnation Science and Engineering Ningbo University Ningbo 315211 P.R. China Institute of Computer Technology Graduate School of Chinese Academy of Sciences Beijing 100871 P.R. China National Key Laboratory of Machine Perception Peking University Beijing 100871 P.R. China
This paper presents a free viewpoint video (FVV) system based on ray-space interpolation method The new algorithm matches individual pixels in corresponding scanline pairs by using a ruing technique. A sparse interm... 详细信息
来源: 评论
A Tamper Detection Method for RFID Tag Data
A Tamper Detection Method for RFID Tag Data
收藏 引用
IEEE International Conference on RFID
作者: Akira Yamamoto Shigeya Suzuki Hisakazu Hada Jin Mitsugi Fumio Teraoka Osamu Nakamura Graduate school of Science and Technology KEIO University Yokohama Kanagawa Japan Graduate school of Media and Governance KEIO University Fujisawa Kanagawa Japan Department of Information and Computer Science Faculty of Science and Technology KEIO University Yokohama Kanagawa Japan Faculty of Environmental Information KEIO University Fujisawa Kanagawa Japan
Recently, system designers, especially in the field of product life-cycle management system start considering use of user memory bank of UHF RFID tags. By storing most useful life-cycle data onto a tag, user can acces... 详细信息
来源: 评论
Recommending mobile content using content diffusion and user preference transition
Recommending mobile content using content diffusion and user...
收藏 引用
2008 International Conference on e-Learning, e-Business, Enterprise information Systems, and e-Government, EEE 2008
作者: Lee, Tong Queue Lee, Eunchang Park, Young Park, Yongtae Department of Mobile Internet Dongyang Technical College Seoul Korea Republic of Graduate Program in Technology and Management Seoul National University Seoul Korea Republic of Department of Computer Science and Information Systems Bradley University Peoria IL United States Department of Industrial Engineering Seoul National University Seoul Korea Republic of
Recommendation accuracy is especially important in mobile e-commerce environments due to the limited screen size of mobile devices and relatively expensive connection costs. Mobile content tends to be fashionable and ... 详细信息
来源: 评论
An Efficient Forward and Backward Fault-Tolerant Mobile Agent System
An Efficient Forward and Backward Fault-Tolerant Mobile Agen...
收藏 引用
International Conference on Intelligent Systems Design and Applications (ISDA)
作者: Jong-Shin Chen Hong-Da Shi Ching-Mu Chen Zeng-Wen Hong Pei-Lin Zhong Graduate Institute of Networking and Communication Engineering ChaoYang University of Technology Taichung Taiwan Department of Computer Science and Information Engineering Chung Cheng Institute of Technology Changhua Taiwan Computer Science and Information Engineering Asia University Taichung Taiwan
Mobile agent is a special program and it can switch and execute the task of user commands among the networks and hosts. During the task executing, the mobile agent can convey the data, state and program code to anothe... 详细信息
来源: 评论
Fast replica allocation method by parallel calculation on DAPDNA-2
Fast replica allocation method by parallel calculation on DA...
收藏 引用
Asia-Pacific Conference on Communications
作者: Hiroyuki Ishikawa Sho Shimizu Yutaka Arakawa Naoaki Yamanaka Kosuke Shiba Department of Information and Computer Science Faculty of Science and Technology Keio University Yokohama Japan IPFlex Inc. Shinagawa Tokyo Japan
Replica placement problem is to select a subset from a group of potential nodes to put replicas in Content Distribution Network (CDN). It is derived from the set cover problem which is known to be NP-hard. So it is di... 详细信息
来源: 评论