咨询与建议

限定检索结果

文献类型

  • 2,653 篇 会议
  • 942 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 3,631 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,021 篇 工学
    • 1,550 篇 计算机科学与技术...
    • 1,265 篇 软件工程
    • 578 篇 信息与通信工程
    • 420 篇 控制科学与工程
    • 268 篇 电气工程
    • 211 篇 生物工程
    • 208 篇 电子科学与技术(可...
    • 204 篇 网络空间安全
    • 190 篇 生物医学工程(可授...
    • 156 篇 光学工程
    • 155 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 127 篇 化学工程与技术
    • 126 篇 机械工程
    • 121 篇 交通运输工程
    • 95 篇 仪器科学与技术
  • 1,130 篇 理学
    • 576 篇 数学
    • 326 篇 物理学
    • 254 篇 生物学
    • 203 篇 统计学(可授理学、...
    • 142 篇 化学
    • 118 篇 系统科学
  • 628 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 279 篇 图书情报与档案管...
    • 196 篇 工商管理
  • 275 篇 医学
    • 197 篇 临床医学
    • 187 篇 基础医学(可授医学...
    • 170 篇 公共卫生与预防医...
    • 103 篇 药学(可授医学、理...
  • 131 篇 法学
    • 107 篇 社会学
  • 68 篇 农学
  • 62 篇 经济学
  • 25 篇 教育学
  • 16 篇 文学
  • 8 篇 军事学
  • 5 篇 艺术学

主题

  • 231 篇 accuracy
  • 156 篇 deep learning
  • 134 篇 machine learning
  • 129 篇 real-time system...
  • 114 篇 computational mo...
  • 111 篇 internet of thin...
  • 111 篇 convolutional ne...
  • 110 篇 feature extracti...
  • 96 篇 predictive model...
  • 86 篇 support vector m...
  • 77 篇 training
  • 72 篇 optimization
  • 70 篇 technological in...
  • 67 篇 cloud computing
  • 67 篇 data models
  • 66 篇 artificial intel...
  • 63 篇 security
  • 57 篇 machine learning...
  • 53 篇 wireless sensor ...
  • 49 篇 scalability

机构

  • 115 篇 lovely professio...
  • 105 篇 department of co...
  • 92 篇 department of co...
  • 64 篇 gla university d...
  • 57 篇 department of co...
  • 53 篇 lloyd law colleg...
  • 46 篇 department of co...
  • 42 篇 lloyd institute ...
  • 42 篇 the islamic univ...
  • 41 篇 school of comput...
  • 39 篇 chitkara univers...
  • 39 篇 beijing engineer...
  • 38 篇 school of comput...
  • 36 篇 graphic era deem...
  • 35 篇 gla university d...
  • 35 篇 institute of aer...
  • 34 篇 department of co...
  • 32 篇 graphic era deem...
  • 30 篇 saveetha school ...
  • 30 篇 lloyd institute ...

作者

  • 47 篇 neeraj varshney
  • 41 篇 varshney neeraj
  • 37 篇 rakesh kumar
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 31 篇 huang heyan
  • 28 篇 saloni bansal
  • 27 篇 singh kamred udh...
  • 26 篇 asha v.
  • 25 篇 bibhuti bhusan d...
  • 25 篇 singh teekam
  • 25 篇 sudhansu shekhar...
  • 24 篇 patra sudhansu s...
  • 24 篇 saxena deepika
  • 22 篇 kumar ankit
  • 20 篇 n. naga saranya
  • 20 篇 kumar gaurav
  • 20 篇 shrivastava anur...
  • 20 篇 anurag shrivasta...
  • 19 篇 bansal saloni

语言

  • 2,561 篇 英文
  • 1,047 篇 其他
  • 33 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Institute for Computer Applications in Science and Engineering"
3631 条 记 录,以下是3371-3380 订阅
排序:
A Content Management Scheme in a SCORM compliant Learning Object Repository
A Content Management Scheme in a SCORM compliant Learning Ob...
收藏 引用
作者: Su, Jun-Ming Tseng, Shian-Shyong Wang, Ching-Yao Lei, Ying-Chieh Sung, Yu-Chang Tsai, Wen-Nung Department of Computer Science National Chiao Tung University Hsinchu 300 Taiwan Department of Information Science and Applications Asia University Taichung 413 Taiwan National Chiao Tung University Taiwan Taiwan Department of Computer and Information Science National Chiao Tung University College of Computer Science Asia University Institute of Computer and Information Science National Chiao Tung University Taiwan Taiwan Department of Computer Science and Information Engineering
With the rapid development of the Internet, e-learning systems have become more and more popular. For sharing and reusing teaching materials in different e-learning system, the Sharable Content Object Reference Model ... 详细信息
来源: 评论
On the design of network-processor-based gigabit multiple-service switch
On the design of network-processor-based gigabit multiple-se...
收藏 引用
ITRE 2005 - 3rd International Conference on Information Technology: Research and Education
作者: Sheu, Tzu-Fang Huang, Nen-Fu Wu, Hung-Shen Shih, Ming-Chang Huang, Yuang-Fang Department of Computer Science National Tsing Hua University Taiwan Taiwan Institute of Communication Engineering National Tsing Hua University Taiwan Taiwan Institute of Information and System Applications National Tsing Hua University Taiwan Taiwan
As the increasing users and services over the Internet, people demand faster data fetching and more reliable network services. However, the increasing network services and equipment causes the network management much ... 详细信息
来源: 评论
Application of Wu's method to symbolic model checking  05
Application of Wu's method to symbolic model checking
收藏 引用
ISSAC'05 - 2005 International Symposium on Symbolic and Algebraic Computation
作者: Mao, Weibo Wu, Jinzhao Chengdu Institute of Computer Applications Chinese Academy of Sciences Chengdu 610041 China School of Information Science and Engineering Lanzhou University Lanzhou 730000 China Universität Mannheim D7 27 68131 Mannheim Germany
Model checking is widely used in verifying properties of concurrent systems. As an improvement, symbolic model checking uses OBDDs to alleviate the state explosion problem. However, the size of OBDDs greatly increases... 详细信息
来源: 评论
A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images
A Secure Image Steganography using LSB, DCT and Compression ...
收藏 引用
International Conference on Intelligent Sensing and Information Processing (ICISIP)
作者: K.B. Raja C.R. Chowdary K.R. Venugopal L.M. Patnaik Department ofComputer Science Engineering Bangalore University Department of Computer Science Engineering Bangalore University Bangalore Microprocessor Applications Laboratory Indian Institute of Science Bangalore
Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing... 详细信息
来源: 评论
IDEAS: intrusion detection based on emotional ants for sensors
IDEAS: intrusion detection based on emotional ants for senso...
收藏 引用
International Conference on Intelligent Systems Design and applications (ISDA)
作者: S. Banerjee C. Grosan A. Abraham Department of Computer Applications Institute of Management Studies India Department of Computer Science Babes Bolyai University Cluj-Napoca Romania School of Computer Science and Engineering Chung-Ang University South Korea
Due to the wide deployment of sensor networks recently security in sensor networks has become a hot research topic. Popular ways to secure a sensor network are by including cryptographic techniques or by safeguarding ... 详细信息
来源: 评论
A label space reduction algorithm for P2MP LSPs using asymmetric tunnels
A label space reduction algorithm for P2MP LSPs using asymme...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: F. Solano R. Fabregat Y. Donoso J.L. Marzo Institute of Informatics and Applications University of Girona Girona Spain Department of Computer Science and Systems Engineering Universidad del Norte Barranquilla Colombia
The aim of traffic engineering is to optimise network resource utilization. Although several works on minimizing network resource utilization have been published, few works have focused on LSR label space. This paper ... 详细信息
来源: 评论
Emotional ant based modeling of crowd dynamics
Emotional ant based modeling of crowd dynamics
收藏 引用
International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)
作者: Soumya Banarjee C. Grosan A. Abraham Department of Computer Science Faculty of Mathematics and Computer Science Babes Bolyai University Cluj-Napoca Romania Department of Computer Applications Institute of Management Studies Dhradun India School of Computer Science and Engineering Chung-Ang University Seoul South Korea Department of Computer Science Babes-Bolyai University Cluj-Napoca Romania IITA Professorship Program Chung-Ang University Seoul Korea
It is known that one of the most disastrous forms of collective human behavior is the kind of crowd stampede induced by panic. This situation often leads to fatalities as people are crushed or trampled. This problem h... 详细信息
来源: 评论
Illustrative visualization
Illustrative visualization
收藏 引用
VIS 05: IEEE Visualization 2005, Proceedings
作者: Viola, Ivan Gröller, Meister E. Hadwiger, Markus Bühler, Katja Preim, Bernhard Sousa, Mario Costa Ebert, David S. Stredney, Don Kanitsar, Armin Bruckner, Stefan Grimm, Sören Svakhine, Nikolai A. Jang, Yun Gaithert, Kelly Tietjen, Christian Krüger, Arno Peitgen, Heinz-Otto Isenberg, Tobias Hintze, Jana Hertel, Ilka Strauß, Gero Institute of Computer Graphics and Algorithms Vienna University of Technology Austria VRVis Research Center Vienna Austria Department of Simulation and Graphics University of Magdeburg Germany Department of Computer Science University of Calgary Canada School of Electrical and Computer Engineering Purdue University United States Ohio Supercomputer Center United States Institute of Computer Graphics and Algorithms Vienna University of Technology Austria VRVis Research Center Vienna Austria Electrical and Computer Engineering Purdue University United States IEEE Austria Department of Computer Science University of Calgary Canada Department of Computer Science Computer Graphics Research Lab. University of Calgary Canada Purdue University United States Ohio Supercomputer Center United States University of Texas Austin United States Interface Laboratory United States Biomedical Applications United States Department of Simulation and Graphics Otto-von-Guericke-University of Magdeburg Germany Otto-von-Guericke-University of Magdeburg FIN/ISG Germany Institute for Simulation and Graphics Department for Computer Science Otto-von-Guericke-University of Magdeburg Universitaetsplatz 2 39106 Magdeburg Germany Center for Medical Diagnosic Systems and Visualization Universitaetsallee 29 28359 Bremen Germany Department of Simulation and Graphics Otto-von-Guericke University of Magdeburg Germany ENT Department University Hospital of Leipzig Germany
The tutorial presents state-of-the-art visualization techniques inspired by traditional technical and medical illustrations. Such techniques exploit the perception of the human visual system and provide effective visu... 详细信息
来源: 评论
The preservation of interleaving equivalences
The preservation of interleaving equivalences
收藏 引用
IEEE International Conference on engineering of Complex computer Systems
作者: Jianmin Jiang Jinzhao Wu Computer Science and Information Engineering College Chongqing Technology and Business University Chongqing China Chengdu Institute of Computer Applications Chinese Academy and Sciences Chengdu China Fakultät für Mathematik und Informatik Universitat Mannheim Mannheim Germany
In recent years, though many attempts have been made to solve whether equivalences are preserved under action refinement, this problem still needs to be further investigated. The usual approach to the preservation pro... 详细信息
来源: 评论
Modeling of human driving behavior based on piecewise linear model
Modeling of human driving behavior based on piecewise linear...
收藏 引用
IEEE International Symposium on Industrial Electronics (ISIE)
作者: Jong-Hae Kim S. Okuma Young-Woo Kim Don-Ha Hwang Min-Huei Kim Dong-Hee Kim Department of Electrical Engineering and Computer Science Graduate School of Engineering University of Nagoya Japan Space Robotics Research Center Toyota Technological Institute Nagoya Japan Industry Applications Research Laboratory Korea Electrotechnology Research Institute Changwon South Korea Department of Electrical & Automation Engineering Yeungnam College of Science and Technology Daegu South Korea Department of Electrical Engineering Yeungnam University Kyungbuk South Korea
This paper presents the development of the modeling strategy of the human driving behavior based on the expression as Piecewise Linear (PWL) model focusing on the driver’s stopping maneuver. The driving data are coll... 详细信息
来源: 评论