咨询与建议

限定检索结果

文献类型

  • 478 篇 期刊文献
  • 463 篇 会议
  • 23 册 图书

馆藏范围

  • 964 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 663 篇 工学
    • 481 篇 计算机科学与技术...
    • 408 篇 软件工程
    • 144 篇 生物医学工程(可授...
    • 126 篇 信息与通信工程
    • 114 篇 生物工程
    • 97 篇 光学工程
    • 94 篇 控制科学与工程
    • 61 篇 电气工程
    • 44 篇 电子科学与技术(可...
    • 39 篇 仪器科学与技术
    • 31 篇 机械工程
    • 29 篇 建筑学
    • 24 篇 化学工程与技术
    • 23 篇 土木工程
    • 21 篇 安全科学与工程
    • 19 篇 交通运输工程
  • 370 篇 理学
    • 168 篇 数学
    • 136 篇 生物学
    • 100 篇 物理学
    • 61 篇 统计学(可授理学、...
    • 34 篇 系统科学
    • 33 篇 化学
  • 173 篇 管理学
    • 88 篇 图书情报与档案管...
    • 83 篇 管理科学与工程(可...
    • 48 篇 工商管理
  • 131 篇 医学
    • 108 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 73 篇 药学(可授医学、理...
    • 34 篇 公共卫生与预防医...
  • 30 篇 法学
    • 23 篇 社会学
  • 19 篇 农学
  • 17 篇 教育学
  • 11 篇 经济学
  • 3 篇 文学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 21 篇 semantics
  • 21 篇 artificial intel...
  • 20 篇 training
  • 19 篇 machine learning
  • 17 篇 deep learning
  • 16 篇 feature extracti...
  • 14 篇 computational mo...
  • 14 篇 forecasting
  • 13 篇 visualization
  • 12 篇 reinforcement le...
  • 12 篇 information stor...
  • 10 篇 optimization
  • 9 篇 image segmentati...
  • 8 篇 neural networks
  • 8 篇 data mining
  • 8 篇 predictive model...
  • 8 篇 biological syste...
  • 8 篇 testing
  • 8 篇 accuracy
  • 8 篇 cloud computing

机构

  • 17 篇 school of inform...
  • 12 篇 department of ra...
  • 10 篇 school of scienc...
  • 9 篇 university of pe...
  • 8 篇 national institu...
  • 8 篇 basira lab facul...
  • 8 篇 college of compu...
  • 7 篇 state key lab on...
  • 7 篇 school of comput...
  • 7 篇 lab crestview ra...
  • 7 篇 department of in...
  • 7 篇 department of bi...
  • 7 篇 yonsei frontier ...
  • 7 篇 tencent ai lab
  • 7 篇 school of comput...
  • 6 篇 sage bionetworks...
  • 6 篇 yale university ...
  • 6 篇 royal stoke univ...
  • 6 篇 university of co...
  • 6 篇 computer network...

作者

  • 16 篇 bakas spyridon
  • 14 篇 rekik islem
  • 13 篇 menze bjoern
  • 12 篇 kofler florian
  • 11 篇 yannis stylianou
  • 11 篇 ji rongrong
  • 10 篇 chen huajun
  • 9 篇 ezhov ivan
  • 8 篇 li hongwei bran
  • 8 篇 chen jiaoyan
  • 8 篇 stylianou yannis
  • 7 篇 lau nuno
  • 7 篇 linguraru marius...
  • 7 篇 sun fuchun
  • 7 篇 chen hao
  • 7 篇 mirjalili seyeda...
  • 6 篇 rashid tarik a.
  • 6 篇 ye chen
  • 6 篇 reinke annika
  • 6 篇 cohen-adad julie...

语言

  • 925 篇 英文
  • 35 篇 其他
  • 4 篇 中文
检索条件"机构=Informatics and Computer Science LAB"
964 条 记 录,以下是831-840 订阅
排序:
Correcting routing information through GPS data processing
Correcting routing information through GPS data processing
收藏 引用
International IEEE Conference on Intelligent Transportation Systems
作者: Freitas, Tiago R. M. Coelho, António Rossetti, Rosaldo J. F. Department of Informatics Engineering Faculty of Engineering University of Porto 4200-465 Porto Portugal INESC Porto 4200-465 Porto Portugal Artificial Intelligence and Computer Science Lab. LIACC NIAD and R Rua Dr. Roberto Frias s/n 4200-465 Porto Portugal
Devices that offer positioning and route guidance depend on updated digital maps for correct functioning. Updating digital maps is a highly expensive and complex process so it became necessary to develop new ways to d... 详细信息
来源: 评论
Fault tolerance and scaling in e-science cloud applications: Observations from the continuing development of MODISAzure
Fault tolerance and scaling in e-Science cloud applications:...
收藏 引用
2010 6th IEEE International Conference on e-science, escience 2010
作者: Li, Jie Humphrey, Marty Cheah, You-Wei Ryu, Youngryel Agarwal, Deb Jackson, Keith Van Ingen, Catharine Department of Computer Science University of Virginia Charlottesville VA United States School of Informatics and Computing Indiana University Bloomington Bloomington IN United States Dept. Environmental Science Policy and Management University of California Berkeley Berkeley CA United States Advanced Computing for Science Department Lawrence Berkeley National Lab. Berkeley CA United States eScience Group Microsoft Research San Francisco CA United States
It can be natural to believe that many of the traditional issues of scale have been eliminated or at least greatly reduced via cloud computing. That is, if one can create a seemingly wellfunctioning cloud application ... 详细信息
来源: 评论
Two level efficient user authentication scheme
Two level efficient user authentication scheme
收藏 引用
2010 4th IEEE International Conference on Digital Ecosystems and Technologies, DEST 2010
作者: Bardis, Nikolaos G. Doukas, Nikolaos Markovskyi, Oleksandr P. Drigas, Athanasios Dept of Mathematics and Engineering Science Hellenic Army Academy Vari 16673 Greece Department of Computer Sciences National Technical University of Ukraine Polytechnic Inst. of Kiev Peremohy pr. Kiev 252056 KPI 2003 Ukraine NCSR Demokritos Institute of Informatics and Telecommunications Net Media Lab. Agia Paraskevi 153 10 Athens Greece
User authentication procedures are a computer system's first line of defense against malicious attacks that could potentially jeopardize its availability and reliability. Computational complexity considerations ma... 详细信息
来源: 评论
Reports of the AAAI 2010 conference workshops
Reports of the AAAI 2010 conference workshops
收藏 引用
作者: Aha, David W. Boddy, Mark Bulitko, Vadim D'Avila Garcez, Artur S. Doshi, Prashant Edelkamp, Stefan Geib, Christopher Gmytrasiewicz, Piotr Goldman, Robert P. Halevy, Alon Hitzler, Pascal Isbell, Charles Josyula, Darsana Kaelbling, Leslie Pack Kersting, Kristian Kunda, Maithilee Lamb, Luis C. Marthi, Bhaskara McGreggor, Keith Mihalkova, Lilyana Nastase, Vivi Natarajan, Sriraam Provan, Gregory Raja, Anita Ram, Ashwin Riedl, Mark Russell, Stuart Sabharwal, Ashish Smaus, Jan-Georg Sukthankar, Gita Tuyls, Karl Van Der Meyden, Ron Adaptive Systems Section Naval Research Laboratory Washington DC United States Adventium Labs. Minneapolis MN United States Department of Computer Science University of Alberta Canada City University London United Kingdom University of Georgia United States University of Bremen Germany School of Informatics University of Edinburgh United Kingdom University of Illinois Chicago United States Smart Information Flow Technologies LLC Minneapolis MN United States Structured Data Group Google Research United States Department of Computer Science Wright State University Dayton OH United States School of Interactive Computing Georgia Institute of Technology Atlanta GA United States Department of Computer Science Bowie State University United States Department of Computer Science and Engineering Massachusetts Institute of Technology United States Statistical Relational Mining Group Fraunhofer IAIS Germany Department of Computer Science Federal University of Rio Grande Do sul Brazil Willow Garage Inc. CA United States Computer Science Department University of Maryland College Park United States Heidelberg Institute for Theoretical Studies Heidelberg Germany Department of Computer Science University of Wisconsin Madison United States University College Cork Ireland Cork Complex Systems Lab. Ireland Department of Software and Information Systems University of North Carolina Charlotte United States Department of Computer Science and Engineering University of California Berkeley United States Department of Computer Science Cornell University United States Institute for Computational Sustainability United States University of Freiburg Germany School of Electrical Engineering and Computer Science University of Central Florida United States Maastricht University Netherlands University of New South Wales NICTA Australia
The AAAI-10 workshop program was held on July 11-12, 2010, at the Westin Peachtree Plaza in Atlanta, Georgia. The workshop program included 13 workshops covering a wide range of topics in artificial intelligence. Ther... 详细信息
来源: 评论
Accelerated modular multiplication algorithm of large word length numbers with a fixed module
Accelerated modular multiplication algorithm of large word l...
收藏 引用
3rd World Summit on the Knowledge Society, WSKS 2010
作者: Bardis, N.G. Drigas, A. Markovskyy, A.P. Vrettaros, I. National Centre for Scientific Research Demokritos Institute of Informatics and Telecommunications Net Media Lab. Terma Patriarchou Grigoriou and Neapoleos 27 Ag.Paraskevi - Athens 15310 Greece Hellenic Army Academy Department of Mathematics and Engineering Science Vari Greece National Technical University of Ukraine Department of Computer Engineering KPI 2003 37 Peremohy pr. Kiev 252056 Ukraine
A new algorithm is proposed for the software implementation of modular multiplication, which uses pre-computations with a constant module. The developed modular multiplication algorithm provides high performance in co... 详细信息
来源: 评论
Check sum optimization for transmission and storage of digital information
Check sum optimization for transmission and storage of digit...
收藏 引用
3rd World Summit on the Knowledge Society, WSKS 2010
作者: Bardis, N.G. Drigas, A. Markovskyy, A.P. Vrettaros, I. National Centre for Scientific Research Demokritos Institute of Informatics and Telecommunications Net Media Lab. Terma Patriarchou Grigoriou and Neapoleos 27 Ag.Paraskevi - Athens 15310 Greece Hellenic Army Academy Department of Mathematics and Engineering Science Vari Greece National Technical University of Ukraine Department of Computer Engineering KPI 2003 37 Peremohy pr. Kiev 252056 Ukraine
In this paper a new approach to increase the effectiveness of the errors detection using check sum during the data transmission based on the optimization of coding with special differential Boolean transformations is ... 详细信息
来源: 评论
Design of an interactive game for teaching war ethics
Design of an interactive game for teaching war ethics
收藏 引用
1st International Conference on Reforming Education, Quality of Teaching and Technology-Enhanced Learning: Learning Technologies, Quality of Education, Educational Systems, Evaluation, Pedagogies, TECH-EDUCATION 2010
作者: Doukas, Nikolaos Drigas, Athanasios Bardis, Nikolaos G. Department of Mathematics and Engineering Science Hellenic Army Academy Vari 16673 Greece Department of Computer Sciences Hellenic Air Force Academy Dekelia Air Base Tatoi Metamorfosi 144 51 Greece Institute of Informatics and Telecommunications Net Media Lab N.C.S.R. Demokritos Agia Paraskevi Athens 153 10 Greece Hellenic Naval Academy Terma Hadjikyriakou Avenue Piraeus 18539 Greece
This work focuses on the use of computer simulations and computer games for the training of prospective and serving Armed Forces officers. A study of the use of computer simulations and games for teaching and training... 详细信息
来源: 评论
Assessment of NER solutions against the first and second CALBC Silver Standard Corpus
Assessment of NER solutions against the first and second CAL...
收藏 引用
4th International Symposium on Semantic Mining in Biomedicine, SMBM 2010
作者: Rebholz-Schuhmann, Dietrich Yepes, Antonio Jimeno Li, Chen Kafkas, Senay Lewin, Ian Kang, Ning Corbett, Peter Milward, David Buyko, Ekaterina Beisswanger, Elena Hornbostel, Kerstin Kouznetsov, Alexandre Witte, René Laurila, Jonas B. Baker, Christopher J.O. Kuo, Cheng-Ju Clematide, Simone Rinaldi, Fabio Farkas, Richárd Móra, György Hara, Kazuo Furlong, Laura Rautschka, Michael Neves, Mariana Lara Pascual-Montano, Alberto Wei, Qi Collier, Nigel Chowdhury, Md. Faisal Mahbub Lavelli, Alberto Berlanga, Rafael Morante, Roser Van Asch, Vincent Daelemans, Walter Marina, José Luís Van Mulligen, Erik Kors, Jan Hahn, Udo EMBL Outstation European Bioinformatics Institute Hinxton Cambridge CB10 1SD United Kingdom Dept. of Medical Informatics Erasmus University Medical Center Rotterdam NL Netherlands Linguamatics Ltd. St. John's Innovation Centre Cambridge United Kingdom Lab. Friedrich-Schiller-Universität Jena Germany Dept. of Computer Science and Applied Statistics University of New Brunswick Canada Dept. of Computer Science and Software Engineering Concordia University Montreal Canada Institute of Information Science Academia Sinica Taipei 115 Taiwan University of Zürich Switzerland Research Group on Artificial Intelligence Hungarian Academy of Sciences Hungary Institute of Science and Technology Nara Japan IMIM DCEX Universitat Pompeu Fabra Barcelona Spain Madrid Spain National Institute of Informatics Tokyo Japan Fondazione Bruno Kessler Trento Italy Universitat Jaume I Spain CLiPS University of Antwerp Belgium Complutense University of Madrid Spain
Background: Text mining challenges have been organised to measure the performance of automatic text mining solutions against a manually annotated gold standard corpus (GSC). The preparation of the GSC is timeconsuming... 详细信息
来源: 评论
Burst error control based on weighted checksum
Burst error control based on weighted checksum
收藏 引用
作者: Bardis, Nikolaos G. Markovskyi, Oleksandr P. Cepisca, Costin Argiri, Katerina University of Military Education - Hellenic Army Academy Department of Mathematics and Engineering Science Vari - 16673 Greece National Technical University of Ukraine Polytechnic Institute of Kiev Department of Computer Engineering 37 Peremohy pr. Kiev 252056 KPI 2003 Ukraine University POLITEHNICA Bucharest Faculty of Electrical Engineering Bucharest Romania NCSR Demokritos Institute of Informatics and Telecommunications Net Media Lab. Ag. Paraskevi 15310 Greece
This paper studies the problem of increasing the efficiency in controlling burst errors that are caused by external noise in the context of digital data transmission. For this purpose, the utilization of special weigh... 详细信息
来源: 评论
Fault Tolerance and Scaling in e-science Cloud Applications: Observations from the Continuing Development of MODISAzure
Fault Tolerance and Scaling in e-Science Cloud Applications:...
收藏 引用
IEEE International Conference on e-science and Grid Computing
作者: Jie Li Marty Humphrey You-Wei Cheah Youngryel Ryu Deb Agarwal Keith Jackson Catharine van Ingen Department of Computer Science University of Virginia Charlottesville VA USA School of Informatics and Computing Indiana University Bloomington Bloomington IN USA Dept. Environmental Science Policy and Management University of California Berkeley Berkeley CA USA Advanced Computing of Science Department Lawrence Livermore National Laboratories Berkeley CA USA Advanced Computing for Science Department Lawrence Berkeley National Lab Berkeley CA USA
It can be natural to believe that many of the traditional issues of scale have been eliminated or at least greatly reduced via cloud computing. That is, if one can create a seemingly well functioning cloud application... 详细信息
来源: 评论