咨询与建议

限定检索结果

文献类型

  • 2,824 篇 会议
  • 2,667 篇 期刊文献
  • 93 册 图书

馆藏范围

  • 5,584 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,028 篇 工学
    • 1,971 篇 计算机科学与技术...
    • 1,614 篇 软件工程
    • 627 篇 信息与通信工程
    • 397 篇 生物医学工程(可授...
    • 395 篇 控制科学与工程
    • 392 篇 生物工程
    • 326 篇 电气工程
    • 287 篇 光学工程
    • 280 篇 电子科学与技术(可...
    • 186 篇 机械工程
    • 183 篇 化学工程与技术
    • 174 篇 仪器科学与技术
    • 171 篇 核科学与技术
    • 120 篇 动力工程及工程热...
    • 108 篇 安全科学与工程
    • 100 篇 材料科学与工程(可...
  • 2,477 篇 理学
    • 1,264 篇 物理学
    • 813 篇 数学
    • 490 篇 生物学
    • 289 篇 统计学(可授理学、...
    • 196 篇 化学
    • 193 篇 系统科学
    • 126 篇 地球物理学
  • 840 篇 管理学
    • 470 篇 管理科学与工程(可...
    • 406 篇 图书情报与档案管...
    • 266 篇 工商管理
  • 450 篇 医学
    • 375 篇 临床医学
    • 314 篇 基础医学(可授医学...
    • 200 篇 药学(可授医学、理...
    • 156 篇 公共卫生与预防医...
  • 122 篇 法学
  • 95 篇 农学
  • 90 篇 教育学
  • 80 篇 经济学
  • 16 篇 文学
  • 12 篇 军事学
  • 7 篇 艺术学

主题

  • 124 篇 deep learning
  • 109 篇 machine learning
  • 102 篇 accuracy
  • 96 篇 artificial intel...
  • 90 篇 hadron colliders
  • 83 篇 computational mo...
  • 81 篇 feature extracti...
  • 78 篇 training
  • 74 篇 informatics
  • 73 篇 support vector m...
  • 65 篇 convolutional ne...
  • 63 篇 computer science
  • 63 篇 higgs bosons
  • 54 篇 predictive model...
  • 52 篇 data mining
  • 52 篇 data models
  • 50 篇 internet of thin...
  • 48 篇 optimization
  • 48 篇 forecasting
  • 47 篇 proton-proton in...

机构

  • 411 篇 department for p...
  • 404 篇 faculty of scien...
  • 396 篇 department of ph...
  • 389 篇 kirchhoff-instit...
  • 385 篇 department of ph...
  • 382 篇 department of ph...
  • 358 篇 institute of phy...
  • 355 篇 fakultät für phy...
  • 352 篇 institute of phy...
  • 314 篇 instituto de fís...
  • 310 篇 dipartimento di ...
  • 306 篇 department of ph...
  • 280 篇 department of ph...
  • 275 篇 department of ph...
  • 270 篇 graduate school ...
  • 265 篇 universidade fed...
  • 264 篇 ictp trieste
  • 255 篇 department of ph...
  • 253 篇 nikhef national ...
  • 252 篇 yerevan physics ...

作者

  • 334 篇 c. alexa
  • 332 篇 j. m. izen
  • 327 篇 g. bella
  • 327 篇 d. calvet
  • 327 篇 c. amelung
  • 325 篇 j. strandberg
  • 323 篇 g. spigo
  • 321 篇 f. siegert
  • 314 篇 r. ströhmer
  • 311 篇 m. rijssenbeek
  • 309 篇 s. jin
  • 305 篇 g. gaudio
  • 303 篇 s. mohapatra
  • 297 篇 y. tayalati
  • 293 篇 s. guindon
  • 288 篇 a. kaczmarska
  • 281 篇 m. klein
  • 279 篇 j. schaarschmidt
  • 274 篇 a. d. pilkington
  • 269 篇 l. chevalier

语言

  • 5,316 篇 英文
  • 249 篇 其他
  • 14 篇 中文
  • 9 篇 日文
  • 2 篇 德文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Informatics Engineering Program Faculty of Computer Science"
5584 条 记 录,以下是4991-5000 订阅
排序:
Analysis of time-series correlations of packet arrivals to Darknet and their size- and location-dependencies
Computer Software
收藏 引用
computer Software 2011年 第2期28卷 129-139页
作者: Ohta, Masayuki Sugimoto, Shu Sugawara, Toshiharu Fukuda, Kensuke Hirotsu, Toshio Akashi, Osamu Dept. of Computer Science and Engineering Waseda University Japan National Institute of Informatics PRESTO JST Japan Faculty of Computer and Information Sciences Hosei University Japan NTT Network Innovation Labs Japan
In this paper, we show the possibility of predicting the anomalous packets' behaviors to the near active addresses from small observation address space (Darknet) in Internet. We have proposed the distributed coope... 详细信息
来源: 评论
Towards an ESL design framework for adaptive and fault-tolerant MPSoCs: MADNESS or not?
Towards an ESL design framework for adaptive and fault-toler...
收藏 引用
2011 9th IEEE Symposium on Embedded Systems for Real-Time Multimedia, ESTIMedia 2011
作者: Cannella, Emanuele Di Gregorio, Lorenzo Fiorin, Leandro Lindwer, Menno Melonr, Paolo Neugebauer, Olaf Pimentel, Andy Leiden Institute of Advanced Computer Science Leiden University Netherlands Lantiq Deutschland GmbH Neubiberg Germany ALaRI Faculty of Informatics University of Lugano Switzerland Silicon Hive BV High Tech Campus 83 5656 AG Eindhoven Netherlands DIEE Department of Electrical and Electronic Engineering University of Cagliari Cagliari Italy Informatik Centrum Dortmund Joseph-von-Fraunhofer-Str. 20 Dortmund Germany Computer Systems Architecture Group Informatics Institute University of Amsterdam Netherlands
The MADNESS project aims at the definition of innovative system-level design methodologies for embedded MP-SoCs, extending the classic concept of design space exploration in multi-application domains to cope with high... 详细信息
来源: 评论
Gray-level co-occurrence matrix bone fracture detection
收藏 引用
WSEAS Transactions on Systems 2011年 第1期10卷 7-16页
作者: Chai, Hum Yan Wee, Lai Khin Swee, Tan Tian Hussain, Sheikh Department of Biomedical Instrumentation and Signal Processing Faculty of Health Science and Biomedical Engineering Universiti Teknologi Malaysia UTM Skudai 81310 Johor Malaysia Institute for Biomedical Engineering and Informatics Faculty of Computer Science and Automation Technische Universität Ilmenau POB 100565 98684 Ilmenau Germany
Fractures of bone are a common affliction in orthopedic wards at any given time. Trained radiologists generally identify abnormal pathologies including fractures with a relatively high level of accuracy. However studi... 详细信息
来源: 评论
Communications in computer and Information science: Preface
Communications in Computer and Information Science
收藏 引用
Communications in computer and Information science 2011年 83 CCIS卷 VI页
作者: Gusev, Marjan Mitrevski, Pece University Sts. Cyril and Methodius Faculty of Natural Sciences and Mathematics Institute of Informatics Skopje Macedonia University of St. Clement Ohridski Faculty of Technical Sciences Department of Computer Science and Engineering Bitola Macedonia
来源: 评论
The design and implementation of the digital down converter based on the improved dds and dspbuilder techniques
Journal of Digital Information Management
收藏 引用
Journal of Digital Information Management 2011年 第6期9卷 281-286页
作者: Zhang, Guoping Xie, Mande Faculty of Informatics and Electronics Zhejiang Sci-Tech University Hangzhou Zhejiang 310018 China College of Computer Science and Information Engineering Zhejiang Gongshang University Hangzhou Zhejiang 310018 China
DDC (Digital Down Converter), as a key part of digital receivers, aims to get low-speed digital baseband signals by extracting and filtering the digital signals transformed by high-speed ADC (Analog Digital Conversion... 详细信息
来源: 评论
Biped walking using coronal and sagittal movements based on truncated fourier series
收藏 引用
14th Annual RoboCup International Symposium, 2010
作者: Shafii, Nima Reis, Luís Paulo Lau, Nuno DEI/FEUP – Informatics Engineering Department Faculty of Engineering University of Porto Rua Dr. Roberto Frias s/n Porto4200 465 Portugal LIACC – Artificial Intelligence and Computer Science Lab. Porto Portugal UA – University of Aveiro Campus Universitário de Santiago Aveiro3810 193 Portugal IEETA – Institute of Electronics and Telematics Engineering Aveiro Portugal
Biped walking by using all joint movements and DOFs in both directions (sagittal plane and coronal plane) is one of the most complicated research topics in robotics. In this paper, angular trajectories of a stable bip... 详细信息
来源: 评论
The design and challenges of online reprogramming system for wireless sensor networks
Journal of Digital Information Management
收藏 引用
Journal of Digital Information Management 2011年 第6期9卷 255-260页
作者: Xie, Mande Zhang, Guoping College of Computer Science and Information Engineering Zhejiang Gongshang University Hangzhou Zhejiang 310018 China Faculty of Informatics and Electronics Zhejiang Sci-Tech University Hangzhou Zhejiang 310018 China
At present, the online network reprogramming faces two challenges: 1) How to save the energy consumed during the code dissemination;and 2) How to enhance the security of online network reprogramming. In this paper, we... 详细信息
来源: 评论
Group-in-a-box layout for multi-faceted analysis of communities
Group-in-a-box layout for multi-faceted analysis of communit...
收藏 引用
2011 IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2011 and 2011 IEEE International Conference on Social Computing, SocialCom 2011
作者: Rodrigues, Eduarda Mendes Milic-Frayling, Natasa Smith, Marc Shneiderman, Ben Hansen, Derek Dept. of Informatics Engineering Faculty of Engineering University of Porto Portugal Microsoft Research Cambridge United Kingdom Connected Action Consulting Group Belmont CA United States Dept. of Computer Science Human-Computer Interaction Lab University of Maryland College Park MD United States College of Information Studies Center for Advanced Study of Communities and Information University of Maryland College Park MD United States
Communities in social networks emerge from interactions among individuals and can be analyzed through a combination of clustering and graph layout algorithms. These approaches result in 2D or 3D visualizations of clus... 详细信息
来源: 评论
Simulation of the anti-collision process of RFID systems based on multiple access protocol modeling
Simulation of the anti-collision process of RFID systems bas...
收藏 引用
IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)
作者: Hadjer Saadi Rachida Touhami Mustapha C.E. Yagoub Electronics and Informatics Faculty University of Sciences and Technology Houari Boumediene Algiers Algeria School of Electrical Engineering and Computer Science University of Ottawa Ottawa ONT Canada
In this paper, the authors targeted multiple access protocols to analyze the problem of collision and collision avoidance in RFID systems. By considering user terminals as tags and access point as reader, the authors ... 详细信息
来源: 评论
An authentication protocol based on kerberos 5
收藏 引用
International Journal of Network Security 2011年 第3期12卷 159-170页
作者: El-Emam, Eman Koutb, Magdy Kelash, Hamdy Faragallah, Osama S. Egyptian Space Program National Authority for Remote Sensing and Space Sciences El-Nozha El-Gedeeda Cairo Egypt Department of Industrial Electronics and Control Faculty of Electronic Engineering Menouf Egypt Department of Computer Science and Engineering Faculty of Electronic Engineering Menouf Egypt
We introduce some modifications to the widely deployed Kerberos authentication protocol. The principle's secret-key will be independent of the user password to overcome the weak passwords chosen by the network pri... 详细信息
来源: 评论