咨询与建议

限定检索结果

文献类型

  • 1,705 篇 会议
  • 1,355 篇 期刊文献
  • 68 册 图书

馆藏范围

  • 3,128 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,541 篇 计算机科学与技术...
    • 1,262 篇 软件工程
    • 453 篇 信息与通信工程
    • 256 篇 生物工程
    • 240 篇 控制科学与工程
    • 221 篇 电气工程
    • 162 篇 光学工程
    • 155 篇 电子科学与技术(可...
    • 147 篇 机械工程
    • 140 篇 生物医学工程(可授...
    • 73 篇 安全科学与工程
    • 72 篇 动力工程及工程热...
    • 72 篇 化学工程与技术
    • 71 篇 仪器科学与技术
    • 71 篇 网络空间安全
  • 1,027 篇 理学
    • 560 篇 数学
    • 285 篇 生物学
    • 275 篇 物理学
    • 169 篇 统计学(可授理学、...
    • 96 篇 系统科学
    • 89 篇 化学
  • 599 篇 管理学
    • 376 篇 管理科学与工程(可...
    • 250 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 149 篇 医学
    • 132 篇 临床医学
    • 110 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 109 篇 法学
    • 84 篇 社会学
  • 58 篇 经济学
    • 56 篇 应用经济学
  • 54 篇 教育学
  • 33 篇 农学
  • 17 篇 军事学
  • 12 篇 文学
  • 6 篇 艺术学
  • 2 篇 哲学

主题

  • 79 篇 computer science
  • 79 篇 machine learning
  • 74 篇 deep learning
  • 73 篇 software enginee...
  • 63 篇 feature extracti...
  • 62 篇 training
  • 55 篇 data mining
  • 55 篇 computational mo...
  • 54 篇 artificial intel...
  • 49 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 semantics
  • 40 篇 internet of thin...
  • 38 篇 predictive model...
  • 37 篇 software
  • 36 篇 authentication
  • 35 篇 data models
  • 34 篇 optimization
  • 33 篇 neural networks
  • 31 篇 support vector m...

机构

  • 75 篇 college of compu...
  • 64 篇 state key labora...
  • 46 篇 school of inform...
  • 46 篇 sri lanka instit...
  • 44 篇 school of comput...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 sri lanka instit...
  • 30 篇 institute of inf...
  • 30 篇 department of co...
  • 29 篇 shenzhen institu...
  • 28 篇 national enginee...
  • 26 篇 university of ch...
  • 25 篇 department of in...
  • 25 篇 guangdong key la...
  • 24 篇 school of comput...
  • 23 篇 school of comput...
  • 23 篇 shanghai key lab...
  • 22 篇 institute of sof...
  • 21 篇 software enginee...

作者

  • 52 篇 shen linlin
  • 32 篇 das ashok kumar
  • 25 篇 mohammad s. obai...
  • 24 篇 fan guisheng
  • 24 篇 du bo
  • 23 篇 chen liqiong
  • 22 篇 obaidat mohammad...
  • 18 篇 ashok kumar das
  • 18 篇 mahmood khalid
  • 17 篇 yu huiqun
  • 16 篇 kasthurirathna d...
  • 16 篇 xie weicheng
  • 15 篇 dharshana kasthu...
  • 15 篇 tao dacheng
  • 15 篇 qiu daowen
  • 15 篇 linlin shen
  • 13 篇 wei sun
  • 13 篇 yu zitong
  • 13 篇 wang wei
  • 13 篇 xiaorui zhang

语言

  • 2,593 篇 英文
  • 487 篇 其他
  • 55 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Software and Theory of Information Science and Engineering Institute"
3128 条 记 录,以下是2441-2450 订阅
排序:
Finding canonical views by measuring features on the viewing plane
Finding canonical views by measuring features on the viewing...
收藏 引用
Asia-Pacific Signal and information Processing Association Annual Summit and Conference (APSIPA)
作者: Wencheng Wang Liming Yang Dongxu Wang State Key Laboratory of Computer Science Institute of Software CAS Beijing China College of Information Engineering Xiangtan University Xiangtan China
Canonical views are referred to the classical three-quarter views of a 3D object, always preferred by human beings, because they are stable and able to produce more meaningful and understandable images for the viewer.... 详细信息
来源: 评论
An improved algorithm to maintain the Binary Search Tree dynamically
An improved algorithm to maintain the Binary Search Tree dyn...
收藏 引用
IEEE International Conference on Multi Topic
作者: Inayat-ur-Rehman Zeeshan Mehta Manzoor Elahi Saif ur Rehman Khan Department of Computer Science COMSATS Institute of information technology Islamabad Pakistan Department of Software Engineering University of Malaya Kuala Lumpur Malaysia
Binary Search Tree (BST) is an acyclic graph that is widely used to arrange the data for optimal search. In order to maintain the binary search tree in optimal shape several algorithms have been proposed. A recently p...
来源: 评论
Improving linear drawing Concerning Stylized Sketch
Improving linear drawing Concerning Stylized Sketch
收藏 引用
中国电子学会第十八届青年学术年会
作者: Wen-Jing Guo Yan-Qiu Zhang Cui-Xia Ma Yong-Jin Liu Tsinghua National Laboratory for Information Science and Technology Department of Computer Science a Intelligence Engineering Laboratory Institute of SoftwareChinese Academy of Sciences Beijing Chi
Generally speaking,sketch takes advantage in conciseness and storage *** with the cognitive features of users,sketch maybe a better choice to communicate image message,which contains the least information but sufficie... 详细信息
来源: 评论
On the Weak State in GGHN-like Ciphers
On the Weak State in GGHN-like Ciphers
收藏 引用
International Conference on Availability, Reliability and Security, ARES
作者: Aleksandar Kircanski Amr M. Youssef Department of Computer Science and Software Engineering Concordia University Montreal QUE Canada Concordia Institute for Information Systems Engineering Concordia University Montreal QUE Canada
RC4 is a stream cipher that makes use of aninternal state table, S, which represents a permutation over Z 2 8 . GGHN is a relatively more efficient stream cipher whose design is inspired from RC4 but whose S table, ho... 详细信息
来源: 评论
Exploiting constructive interference for scalable flooding in wireless networks
Exploiting constructive interference for scalable flooding i...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Yin Wang Yuan He Xufei Mao Yunhao Liu Zhiyu Huang Xiangyang Li MOE Key Laboratory for Information System Security School of Software TNLIST Tsinghua University China Department of Computer Science and Engineering HKUST Hong Kong China Institute of Software Chinese Academy of Sciences China Department of Computer Science Illinois Institute of Technology USA
Exploiting constructive interference in wireless networks is an emerging trend for it allows multiple senders transmit an identical packet simultaneously. Constructive interference based flooding can realize milliseco... 详细信息
来源: 评论
Privacy preserving personalized access control service at third service provider
收藏 引用
Journal of Computational information Systems 2012年 第7期8卷 3051-3058页
作者: Tian, Xiuxia Sha, Chaofeng Wang, Xiaoling Zhou, Aoying School of Computer and Information Engineering Shanghai University of Electric Power Shanghai 200090 China School of Computer Science Fudan University Shanghai 200433 China Software Engineering Institute East China Normal University Shanghai 200062 China
With the convenient connection to network, more and more individual information including sensitive information, such as contact list in Mobile Phone or PDA, can be delegated to the professional third service provider... 详细信息
来源: 评论
GROOV: A geographic routing over VANETs and its performance evaluation
GROOV: A geographic routing over VANETs and its performance ...
收藏 引用
2012 IEEE Global Communications Conference (GLOBECOM)
作者: Sanjay K. Dhurandher Mohammad S. Obaidat Deepti Bhardwaj Ankush Garg Division of Information Technology Netaji Subhas Institute of Technology University of Delhi India Department of Computer Science and Software Engineering Monmouth University NJ USA
Owing to the features of erratic speeds and varying topography and requirements of minimum delay and high application reliability in terms of data delivery and security, existing MANET routing protocols prove to be in...
来源: 评论
A Novel Flit Serialization Strategy to Utilize Partially Faulty Links in Networks-on-Chip
A Novel Flit Serialization Strategy to Utilize Partially Fau...
收藏 引用
International Symposium on Networks-on-Chip (NOCS)
作者: Changlin Chen Ye Lu Sorin D. Cotofana Computer Science and Engineering Software and Computer Technology Delft University of Technology Delft Netherlands The Institute of Electronic Communication and Information Technology (ECIT) Queen's University Belfast UK
Aggressive MOS transistor size scaling substantially increase the probability of faults in NoC links due to manufacturing defects, process variations, and chip wire-out effects. Strategies have been proposed to tolera... 详细信息
来源: 评论
Applications of fuzzy logic and artificial neural network for solving real world problem
Applications of fuzzy logic and artificial neural network fo...
收藏 引用
1st International Conference on Advances in engineering, science and Management, ICAESM-2012
作者: Ramya, R. Anandanatarajan, R. Priya, R. Arul Selvan, G. Department of Computer Applications Bharathiyar College of Engineering and Technology Karaikal Pondicherry State India Dr.M.G.R. Educational and Research Institute Chennai India Department of Electronics and Instrumentation Engineering Pondicherry Engineering College Puducherry India Department of Software Engineering and Information Technology A.V.C. College of Engineering Mannampandal - 609305 Nagapattinam Dist. Tamil Nadu India Department of Computer Science and Engineering EGS Pillay Engineering College Nagapattinam Tamil Nadu India
Most of the neural networks in initial stage of enthusiasm, the field survived a period of frustration and disrepute. The reason for this is previous neuron doesn't do anything that conventional computers don'... 详细信息
来源: 评论
An effective strategy for mining frequent itemsets from uncertain dataset
收藏 引用
Journal of Convergence information Technology 2012年 第17期7卷 190-196页
作者: Liang, Shengbin Jiang, Binbin Wang, Le Zhang, Rui First Author School of Software Engineering Henan University China School of Software Nanyang Institute of Technology China School of Computer Science and Technology Faculty of Electronic Information and Electrical Engineering Dalian University of Technology China Daqing Oilfield Engineering Limited Corporation China
Mining frequent itemsets from uncertain datasets is an emerging research in the field of data mining;it differs from traditional frequent itemset mining in that each item in an uncertain dataset has a probability valu... 详细信息
来源: 评论